Asset Tracking System Project Report
Asset Tracking System Project Report
Synopsis
2
Visit researchgate Profile : https://www.researchgate.net/profile/Kamal-Acharya-15/publications
Visit google scholar profile: https://scholar.google.com/citations?user=9QoTDzIAAAAJ&hl=en
SYNOPSIS
Laptops have become a valuable part of the computing arsenal. They allow users
powerful mobile computers with the same capacity and software of many desktops.
Asset Tracking System uses the web application to help us track each computer,
where it is located, what is status of laptop, who is repairing in and, should one go missing,
where it has been taken. We just report the missing computer to absolute and they work
with local law enforcement to find it and recover it for us. We can also inventory our
computers at any time.
Asset Tracking System is extremely valuable for laptop repairing company who
repairing the laptop and what is the status of the laptop. Unfortunately, the mobility,
technology and information that make laptops so useful to employees and organizations
also makes them valuable prizes for thieves. This article, the first in a two-part series
devoted to laptop security, will give a brief overview of how users can prevent laptop theft.
3
Visit researchgate Profile : https://www.researchgate.net/profile/Kamal-Acharya-15/publications
Visit google scholar profile: https://scholar.google.com/citations?user=9QoTDzIAAAAJ&hl=en
Introduction
4
Visit researchgate Profile : https://www.researchgate.net/profile/Kamal-Acharya-15/publications
Visit google scholar profile: https://scholar.google.com/citations?user=9QoTDzIAAAAJ&hl=en
INTRODUCTION
Asset Tracking System is used to locating or tracking static or in-motion assets,
such as laptops, healthcare facility, servers in a data center or laptops in a corporation, was
no easy task.
Active RFID allows users to instantly determine the general location of tagged
assets anywhere within the facility. Installation of "control point" Detection zones at
strategic locations throughout the facility allows the user to define logical zones and
monitor high traffic areas. Tagged assets moving through these control points provide
instant location data.
An Asset Tag is a small transponder that remains in a sleep state until activated.
When the Tag receives a special Very Low Frequency (VLF) signal from the Activator,
the Tag wakes up and emits an Ultra High Frequency (UHF) radio signal. The Asset Tag
can be mounted to an asset for effective protection and monitoring.
The Activator broadcasts an activation signal via the transmit antenna to wake up
the tag. The transmitting antenna attaches to the BNC connector on top of the Activator.
The wakeup signal writes the Activators ID Number to the tag.
The Receiver decodes the signal from the Tags and converts the data into SQL
Server. Some receivers have output control signals for activation TTL outputs or alarm
points.The Receiver can be configured to connect to an IP network using an
5
Visit researchgate Profile : https://www.researchgate.net/profile/Kamal-Acharya-15/publications
Visit google scholar profile: https://scholar.google.com/citations?user=9QoTDzIAAAAJ&hl=en
integral Network Interface Unit (NIU) to convert data from serial to Ethernet TCP/IP
format.
Asset Tracking System with solid Database Design, Easy-to-Use, Set of Workflow
status for laptop, Supports Passive and Active Radio Frequency Identification (RFID),
Active Directory.
The main requirement of the client is to maintain all the tag activities and workflow
status of the laptop and alert notification to fetch the required information from the system.
• Customer Module
Customer Entry
Edit Customer
Delete Customer
Customer List
• Additional Work
• Work Order
• Search
Customer Wise
Tag Wise
• Notification Log
• Working Tag
Tag Entry
Active Tag List
• Technician Info
Customer Entry
6
Visit researchgate Profile : https://www.researchgate.net/profile/Kamal-Acharya-15/publications
Visit google scholar profile: https://scholar.google.com/citations?user=9QoTDzIAAAAJ&hl=en
This chapter discusses about the time schedule for the project, and it contains the
Customer
Requirements
Determination
9
Visit researchgate Profile : https://www.researchgate.net/profile/Kamal-Acharya-15/publications
Visit google scholar profile: https://scholar.google.com/citations?user=9QoTDzIAAAAJ&hl=en
Existing System
The main principles are similar, with storing messages from previous example. To
generalize tasks, active user term is replaced with user session. User session, for this type
of process, should basically contain a unique session identifier and the user name.
The major method underwent in the system for specifying problems were:
Information Gathering
Discussion Information’s were collected from the user regarding the flow of the
system, the design of the system, validation checking and features, which are
to be incorporated in system.
Discussions were carried out with the management to choose the best package
for developing the system.
10
Visit researchgate Profile : https://www.researchgate.net/profile/Kamal-Acharya-15/publications
Visit google scholar profile: https://scholar.google.com/citations?user=9QoTDzIAAAAJ&hl=en
Drawbacks
Laptop theft
Less accuracy.
Chances of redundancy
11
Visit researchgate Profile : https://www.researchgate.net/profile/Kamal-Acharya-15/publications
Visit google scholar profile: https://scholar.google.com/citations?user=9QoTDzIAAAAJ&hl=en
PROPOSED SYSTEM
The proposed system will maintain all the automatically recording everything from
RF Tag including the laptop location, current workflow status and now of laptop is
repairing and working in progress.
In addition to that, the above said difficulties are overcome in the proposed
system.
Every transaction was saved as the database and retrieve the various report from
the database. The Tag Moving log is classified by date. With our strong search engine,
you can easily and accurately find the logs you want.
The proposed system will keep track of all the user information that attempts to use
the system and to change any information. At the same time some of the important fields
and the values are freezed, show that is secured.
12
Visit researchgate Profile : https://www.researchgate.net/profile/Kamal-Acharya-15/publications
Visit google scholar profile: https://scholar.google.com/citations?user=9QoTDzIAAAAJ&hl=en
Features
Maintain the customer information
Software Requirements
Specification
14
Visit researchgate Profile : https://www.researchgate.net/profile/Kamal-Acharya-15/publications
Visit google scholar profile: https://scholar.google.com/citations?user=9QoTDzIAAAAJ&hl=en
FUNCTIONAL REQUIREMENTS
Flow Chart
Login
Clear All
No
Check User
Authentication
Yes
PERFORMANCE REQUIREMENT
The project must satisfy the End user requirements. Accuracy and fast must be
imposed in this project.
The project is developed as easy as possible for the sake of end user. The project
has to be developed with a view of satisfying the future requirements and future
enhancement.
The Asset Tracking System has been finally implemented satisfying the needs
specified by the company. As per as the performance is concerned this system said is
performing well. The processing time as well as time taken to generate reports where also
very less even when large amount of data was used. The system is designed in such a way
that even when large amount of data are used for processing there would less performance
degradation.
16
Visit researchgate Profile : https://www.researchgate.net/profile/Kamal-Acharya-15/publications
Visit google scholar profile: https://scholar.google.com/citations?user=9QoTDzIAAAAJ&hl=en
INTERFACE REQUIREMENTS
Most interface constraints and restrictions that are imposed by a designer are
intended to simplify the mode of interaction.
The user interface should move into the virtual world of the application. The user
should not be aware of the operating system, file management functions, or other arcane
computing technology .A user should never be required to type operating system
commands from within Web application software.
The user feels a sense of control when able to manipulate the objects that are
necessary to perform a task in a manner similar to what would occur if the object were
physical thing.
17
Visit researchgate Profile : https://www.researchgate.net/profile/Kamal-Acharya-15/publications
Visit google scholar profile: https://scholar.google.com/citations?user=9QoTDzIAAAAJ&hl=en
OPERATIONAL REQUIREMENTS
The database or databases that are being failed over to the standby server cannot be
used for anything else. But databases on the standby server not being used for failover can
still be used normally.
When it comes time for the actual failover, you must do one of two things to make
your applications work: either rename the standby server the same name as the failed
production server (and the IP address), or re-point your user's applications to the new
standby server. In some cases, neither of these options is practical.
18
Visit researchgate Profile : https://www.researchgate.net/profile/Kamal-Acharya-15/publications
Visit google scholar profile: https://scholar.google.com/citations?user=9QoTDzIAAAAJ&hl=en
RESOURCE REQUIREMENTS
Software Requirements:
Hardware Requirements:
Hard Disk : 80 GB
SECURITY REQUIREMENTS
Web Applications are available via network access, it is difficult, if not possible, to
limit the population of End-users who may access the application, In order to protect
sensitive content and provide secure modes of data transmission, strong security measures
must be implemented throughout the infrastructure that supports a Web Application and
within the application itself.
Web Applications have become heavily integrated with critical corporate and
government databases. E-commerce applications extract and then store sensitive customer
information.
For these and many other reasons, Web Application security is paramount in many
situations. The key measure of security is the ability of the Web Application and its server
environment to rebuff unauthorized access and/or thwart an outright malevolent attack.
20
Visit researchgate Profile : https://www.researchgate.net/profile/Kamal-Acharya-15/publications
Visit google scholar profile: https://scholar.google.com/citations?user=9QoTDzIAAAAJ&hl=en
DESIGN REQUIREMENTS
Microsoft Office Visio 2003 SDK, providing a work environment that integrates
with Visio. This article provides a step-by-step description of how to create shapes in Shape
Studio. It shows how to create a project, add base masters and masters to the project, assign
behaviors to the masters, create and assign behavior sets, and then apply, test, and validate
those behaviors. It also shows how to create and build a stencil to hold the shapes.
The following list shows the major steps to develop shapes in Shape Studio:
• Create a project
• Create a base master specification
• Add shape geometry to the base master
• Assign behaviors to the base master specification
• Apply base master behavior and validate the base master specification
• Create master specifications based on the base master specification
• Define styles to apply to masters
• Add shape geometry to masters
• Assign behaviors to masters
• Apply master behaviors and validate master specifications
• Create and apply sets of behaviors to masters
• Run developer and test tools on masters
• Create and validate stencil specifications and build stencil files
• Create reports
21
Visit researchgate Profile : https://www.researchgate.net/profile/Kamal-Acharya-15/publications
Visit google scholar profile: https://scholar.google.com/citations?user=9QoTDzIAAAAJ&hl=en
System Analysis
23
Visit researchgate Profile : https://www.researchgate.net/profile/Kamal-Acharya-15/publications
Visit google scholar profile: https://scholar.google.com/citations?user=9QoTDzIAAAAJ&hl=en
The data flow diagram is one of the most important tools used by system analysis.
Data flow diagrams are made up of a number symbols, which represent system
components.
Login:
User Id
Login Home
Password
Process
External Entry
Data Base
Data File
24
Visit researchgate Profile : https://www.researchgate.net/profile/Kamal-Acharya-15/publications
Visit google scholar profile: https://scholar.google.com/citations?user=9QoTDzIAAAAJ&hl=en
New Customer:
Customer Name
Assigned Tag
SMS
Addesss
25
Visit researchgate Profile : https://www.researchgate.net/profile/Kamal-Acharya-15/publications
Visit google scholar profile: https://scholar.google.com/citations?user=9QoTDzIAAAAJ&hl=en
Work Flow
Tag Id
Work Order
Work Status
Last Update
26
Visit researchgate Profile : https://www.researchgate.net/profile/Kamal-Acharya-15/publications
Visit google scholar profile: https://scholar.google.com/citations?user=9QoTDzIAAAAJ&hl=en
ER DIAGRAM
User
Home Page
Search Tag
(or) Customer Work Flow
Submit
Database
27
Visit researchgate Profile : https://www.researchgate.net/profile/Kamal-Acharya-15/publications
Visit google scholar profile: https://scholar.google.com/citations?user=9QoTDzIAAAAJ&hl=en
A use case diagram is a type of behavioral diagram defined by the Unified Modeling
provided by a system.
Tag details
Administrator
Settings
End User
CASE Tools
Integration Framework
Portability Services
Operating System
Hardware Platform
Environment Architecture
The compilers, editors and debuggers those are available to support most
conventional programming languages. Web development tools include to the generation
of text, graphics, forms, scripts and other elements of a web page.
29
Visit researchgate Profile : https://www.researchgate.net/profile/Kamal-Acharya-15/publications
Visit google scholar profile: https://scholar.google.com/citations?user=9QoTDzIAAAAJ&hl=en
UML
Unified Modeling Language (UML) is a standardized visual specification
language for object modeling. UML is a general-purpose modeling language that includes
a graphical notation used to create an abstract model of a system, referred to as a UML
model.
Notification Log
30
Visit researchgate Profile : https://www.researchgate.net/profile/Kamal-Acharya-15/publications
Visit google scholar profile: https://scholar.google.com/citations?user=9QoTDzIAAAAJ&hl=en
Design
31
Visit researchgate Profile : https://www.researchgate.net/profile/Kamal-Acharya-15/publications
Visit google scholar profile: https://scholar.google.com/citations?user=9QoTDzIAAAAJ&hl=en
INPUT DESIGN
In this project, the end user gives the input through the predefined options. For
administrator the input is given through the ASP.Net to the database.
In accurate input data is the most common cause of errors in data processing .Input
design is the process of converting user oriented inputs into a computer based format. the
goal of designing is to make data entry as easy, logical and from errors as possible.
The input forms are designed to be user friendly. Meaningful labels are given to
input fields. Immediate validations are done for each input from the user so that the
individual inputs are not sending to the gateway.
The input forms are designed so that they provide proper links to the other forms.
Each screen has the provision to view the home previous and next page.
The Administrator can create a new user, edit the existing user, delete the existing
user and view all user information. But the normal user can only view the user information
and edit his / her profile such as First name, last name, and password and so on.
32
Visit researchgate Profile : https://www.researchgate.net/profile/Kamal-Acharya-15/publications
Visit google scholar profile: https://scholar.google.com/citations?user=9QoTDzIAAAAJ&hl=en
6.2.1 Normalization:
Thin project consist of second normal form.
A relation is said to be in 2NF if and only if it is in 1NF and every non key attribute
is fully functional dependent on the primary key.
The relation users are in 2NF, because every non-key attribute such as Name,
Password are fully functional dependent on the primary key User Id.
33
Visit researchgate Profile : https://www.researchgate.net/profile/Kamal-Acharya-15/publications
Visit google scholar profile: https://scholar.google.com/citations?user=9QoTDzIAAAAJ&hl=en
HistoryId int
TagId int
AlertId int
LogTime datetime
Synopsis varchar 250
Name varchar 100
WorkOrderno int
CustId int
LastName varchar 50
SMS varchar 50
EMail varchar 50
Phone varchar 50
OtherEmail varchar 50
Createdon datetime
Updatedon datetime
FirstName varchar 50
EventLogId int
WorkOrderNo int
StatusId int
LogTime datetime
Status bit
34
Visit researchgate Profile : https://www.researchgate.net/profile/Kamal-Acharya-15/publications
Visit google scholar profile: https://scholar.google.com/citations?user=9QoTDzIAAAAJ&hl=en
IsSeen bit
UserId int
LogId int
EventLogId int
ActionId int
Remarks varchar 100
Status bit
LogTime datetime
DataId bigint
TagId int
StarId tinyint
RoomId smallint
Keys tinyint
DataIdx tinyint
Updatedon datetime
TechId bigint
TechName varchar 100
Notify bit
StatusId int
Description varchar 100
UserId int
LoginName varchar 50
Password varchar 50
Lastname varchar 50
LoginTime datetime
36
Visit researchgate Profile : https://www.researchgate.net/profile/Kamal-Acharya-15/publications
Visit google scholar profile: https://scholar.google.com/citations?user=9QoTDzIAAAAJ&hl=en
TagId bigint
Status bit
Id int
WorkOrderNo int
CustId int
TagId int
StatusId int
Remarks varchar 250
Updatedon datetime
37
Visit researchgate Profile : https://www.researchgate.net/profile/Kamal-Acharya-15/publications
Visit google scholar profile: https://scholar.google.com/citations?user=9QoTDzIAAAAJ&hl=en
OUTPUT DESIGN
Computer output is the most important and the direct source of information for the
user. output design is very much dependent on the type of output and the nature of data and
editing and totaling of data. The primary objective of output design is to arrange the data
in a form most convenient to the user.
Outputs from computer system are primarily to communicate the results of the
processing to the user. They are also used to provide permanent copy of results for later
consultations. Once the output medium has been detailed specification of output document
can be carried out.
INTERFACE DESIGN
Once an operational user interface prototype has been created, it must be evaluated
to determine whether it meets the needs of the user. Evaluation can span a formality
spectrum that ranges from an informal “test drive,” in which a user provides impromptu
feedback to a formally designed study that uses statistical methods for the evaluation of
questionnaires completed by a population of end-users.
39
Visit researchgate Profile : https://www.researchgate.net/profile/Kamal-Acharya-15/publications
Visit google scholar profile: https://scholar.google.com/citations?user=9QoTDzIAAAAJ&hl=en
ASP.NET
Gain mature and powerful, built-in functionality, including a rich set of collection
classes, networking support, multithreading support, string and regular expression classes,
and broad support for XML, XML Schemas, XML namespaces, XSLT. Microsoft
designed VB from the ground up to take advantage of its new .NET Framework. The .NET
Framework is made up of four parts,
The .NET Framework is designed with three goals in mind. First, it was intended
to make Windows applications much more reliable, while also providing an application
with greater degree of security. Second, it was intended to simplify the development of
Web applications and services that not only work in the traditional sense, but on mobile
devices as well. Lastly, the framework was designed to provide a single set of libraries that
would work with multiple languages. The .NET Framework is the infrastructure for the
new Microsoft .Net Platform. The .NET Framework is a common environment for
building, developing, and running Web applications and Web Services. The .NET
Framework contains a common language runtime and common class libraries- like
ADO.NET, ASP.NET and Windows Forms – to provide advanced standard services that
can be integrated into a variety of computer systems. The .NET Framework provides a
feature – rich application environment, simplified development and easy integration
between a numbers of different development languages. The .NET Framework is
40
Visit researchgate Profile : https://www.researchgate.net/profile/Kamal-Acharya-15/publications
Visit google scholar profile: https://scholar.google.com/citations?user=9QoTDzIAAAAJ&hl=en
language neutral. Currently it supports ASP, C++, C# and Jscript (The Microsoft version
of Java Script). Microsoft’s Visual Studio.NET Framework.
One of the design goals of .NET Framework was to unify the runtime engines so
that all developers could work with a set of runtime services. The .NET Framework’s
solution is called the Common Language Runtime (CLR). The CLR provides capabilities
such as memory management, security, and robust error handling to any language that
work with the .NET Framework. The CLR enables languages to inter operate with one
another. Memory can be allocated by code written in one language and can be freed by
code written in another language. Similarly, errors can be raised in one language and
processed in another language.
The .NET Framework provides many classes that help developers re-use code. The
.NET Class Libraries contain code for programming topics such as threading, file I/O,
database support, XML parsing, and data structures such as stacks and queues. This entire
class library is available o any programming languages that support the .NET Framework.
Because all languages now support the same runtime, they can re-use any class that works
with the .NET Framework. This means that any functionality available to one language will
also be available to any other .NET language.
The .NET Framework provides a set of tools that help to build code that
works with the .NET Framework. Microsoft provides a set of languages that are
already .NET compatible. ASP.NET is one of those languages.
41
Visit researchgate Profile : https://www.researchgate.net/profile/Kamal-Acharya-15/publications
Visit google scholar profile: https://scholar.google.com/citations?user=9QoTDzIAAAAJ&hl=en
ASP.NET Environment:
Visual Basic were released by Microsoft to enable the creation of dynamic pages
based on user input and interaction with a Web Site. ASP.NET improves upon the original
VB by providing code-behind. ASP.NET Web services are XML – based services that are
exposed on the Internet that can be SQL Server by other Web services and Web services
clients
The application distributes the work between the local machine (the client) and the
server (the backend), depending on the strengths of the client and server products.
Client/Server systems are often very efficient because they minimize network traffic, and
each portion of the application can be optimized for its particular function.
Language Support
ASP .NET contains a large set of HTML controls. Almost all HTML elements on
a page can be defined as ASP .NET control objects that can be controlled by scripts.
ASP .NET also contains a new set of object oriented input controls, like
programmable list boxes and validation controls.
42
Visit researchgate Profile : https://www.researchgate.net/profile/Kamal-Acharya-15/publications
Visit google scholar profile: https://scholar.google.com/citations?user=9QoTDzIAAAAJ&hl=en
A new data grid control supports sorting, data paging, and everything you expect
from a dataset control.
All ASP .NET objects on a Web page can expose events that can be processed by
ASP .NET code.
Load, Click and Change events handled by code makes coding much simpler and
much better organized.
ASP .NET components are heavily based on XML. Like the new AD Rotator, that
uses XML to store advertisement information and configuration.
User Authentication
ASP .NET allows for user accounts and roles, to give each user (with a given
role) access to different server code and executables.
High Scalability
Much has been done with ASP .NET to provide greater scalability.
43
Visit researchgate Profile : https://www.researchgate.net/profile/Kamal-Acharya-15/publications
Visit google scholar profile: https://scholar.google.com/citations?user=9QoTDzIAAAAJ&hl=en
Compiled Code
The first request for an ASP .NET page on the server will compile the ASP .NET
code and keep a cached copy in memory. The result of this is greatly increased
performance.
Easy Configuration
Configuration of ASP .NET is done with plain text files. Configuration files can be
uploaded or changed while the application is running. No need to restart the server. No
more metabase or registry puzzle.
Easy Deployment
No more server restart to deploy or replace compiled code. ASP .NET simply
redirects all new requests to the new code.
Compatibility
ASP .NET is not fully compatible with earlier versions of ASP, so most of the old
ASP code will need some changes to run under ASP .NET.
To overcome this problem, ASP .NET uses a new file extension ".aspx". This will
make ASP .NET applications able to run side by side with standard ASP applications on
the same server.
44
Visit researchgate Profile : https://www.researchgate.net/profile/Kamal-Acharya-15/publications
Visit google scholar profile: https://scholar.google.com/citations?user=9QoTDzIAAAAJ&hl=en
What is ADO.NET?
The Connection
After we import all the necessary namespaces, we're ready to connect to our
database. Now, whether you implement the DataReader or Dataset, your initial database
connection will still be as follows:
State - Tells you what type of connection state your object is in, often used to check
whether your connection is still using any resources.
Ex. if (ConnectionObject.State == ConnectionState.Open)
45
Visit researchgate Profile : https://www.researchgate.net/profile/Kamal-Acharya-15/publications
Visit google scholar profile: https://scholar.google.com/citations?user=9QoTDzIAAAAJ&hl=en
As far as opening a database connection goes, that's really the extent of it. Now we
have to decide which object to use in order to achieve the end results you wish to present.
We now have to choose whether to work with a Datareader or the Dataset. Let's begin by
looking at the DataReader.
The DataReader
With classic ASP, when we needed a method for data retrieval, we'd use the
appropriate data object and set its cursors to the task at hand. If we wanted a quick forward-
only data read, we would set our Recordset's CursorType to adOpenForwardOnly and its
LockType to adLockReadOnly (often referred to as a "fire- hose" cursor). Well, with .NET,
all you need is the DataReader, which offers many features by which you can further tweak
the efficiency of its output.
Now that we know what the DataReader does, there are numerous methods that can
be used with it to achieve your specific goals. Here are some methods the DataReader works
with through its Command object. The four Execute methods all pertain to an action
performed by the Command object, wile the remaining methods are used to enhance the
Command object's own functionality.
ExecuteXmlReader - Executes the SQL query against SQL Server only, while
returning an XmlReader object.
Dispose - Releases the resources on the Command object. Used to force garbage
collecting, ensuring no resources are being held after our connection is used. Incidentally,
by using the Dispose method you automatically call the Connection object's Close method
as well.
Thus, after we establish our initial database connection all we need to do to retrieve
data with a DataReader is to use the Command object to query the open database. The
Command.ExecuteReader method used via the Command Object creates our DataReader.
SQL Server is such a rich and powerful that most people where to begin when they
start using it.
SQL Server makes it easy for users even beginners to work with databases, you
can Create Table, Edit data and use queries to find the data you want with very little effort,
and SQL Server includes wizards that can do the work of designing data entry forms,
reports and mailing labels for you.
SQL Server also makes it easy for develops to create applications. It includes as
entire programming language, visual basic for applications, and its interface is so powerful
that developers can create many custom applications without programming. SQL Server ‘
quires, reports and macros are powerful enough to do most of the work that use to require
programming.
When users learn SQL Server that often find they have to wade through long
discussions of power features to learn about the simple features they need to work with on
their own data. The help system is so extensive and complex discussion of properties,
expressions and other advanced features along with instructions on the basis of creating
tables, queries, simple forms, reports and mailing labels, which average the user actually
needs.
SQL Server has become the best selling database management programs because
of its combination of power and easy of use. It is powerful enough that developers can use
it to create entire applications. Yet it is easy enough to use that in a short time, beginners
can learn to manage their own data with SQL Server.
48
Visit researchgate Profile : https://www.researchgate.net/profile/Kamal-Acharya-15/publications
Visit google scholar profile: https://scholar.google.com/citations?user=9QoTDzIAAAAJ&hl=en
When you open a database, SQL Server displays the database window sometimes
called as the database container, because it contains all the objects that make up the
database.
There are two terms you should know, as they are almost always used when
computerized databases are discussed. They are simply new names for familiar things.
A record is all the data on a single entity. For example, if have a list of names and
address, each record includes the name and address of one person. In the sample table,
where you have a list of products, each record includes the name and other details for one
product.
A filed is one piece of data that appears up each record. For example, if you have
a list of names and addresses the first name might be the first field, the last name might be
the second field and the street address might be the third field. In the same table there are
fields of product id, product name, supplier and there.
A table is made up of all the similar records you want to work on together. For
example you might want to keep the names and address of all your friends in second table.
The simplest and most important type of query is a select query is a select query,
which lets you select which data from a table is displayed. You can specify which fields
49
Visit researchgate Profile : https://www.researchgate.net/profile/Kamal-Acharya-15/publications
Visit google scholar profile: https://scholar.google.com/citations?user=9QoTDzIAAAAJ&hl=en
are displayed, enter criteria to specify which records are displayed and specify the sort
order of these records.
Forms let you control how data is displayed on the screen. Macros let you automate
and speed up your work; they are also used when you develop applications. A macro is a
list of actions. Macros can save time for SQL Server users.
Multiple Databases:
Most Business applications database because there are many types of data that you
cannot store effectively in a single table.
When businesses first begin to use computers they discovered they could eliminate
repetitious data by breaking up some databases into multiple tables.
When a business kept records on paper, for example, the payroll department had a
file with each employee’s name, address, social security number unmanned data on the
benefits department had a file with each employee’s name, address, Social Security number
and data on the benefits to which each was entitled.
The computer can looks up the name and address that go with each payroll record.
It can retrieve data so quickly that it can display the name and address ROM one table and
the payroll data from another table just as quickly as if they were in a single table.
You only have to enter the basic data once, though. When sometimes you only have
to change the address in one table, and it will automatically be changed in all the forms
used by all the departments.
50
Visit researchgate Profile : https://www.researchgate.net/profile/Kamal-Acharya-15/publications
Visit google scholar profile: https://scholar.google.com/citations?user=9QoTDzIAAAAJ&hl=en
Relational Database is not needed for very simple data, such as a mailing list, but
they are needed for most business applications.
Internet Integration:
The SQL Server 2000 programming model is integrated with the Windows DNA
architecture for developing Web applications, and SQL Server 2000 supports features such
as English Query and the Microsoft Search Service to incorporate user-friendly queries and
powerful search capabilities in Web application.
The same database engine can be used across platforms ranging from laptop
computers running Microsoft Windows 98 through large, multiprocessor servers running
Microsoft Windows 2000 Data center edition. SQL Server 2000 Enterprise Edition
supports features such as federated servers, indexed views, and large memory support that
allow it to scale to the performance levels required by the largest Websites.
SQL Server 2000 includes a set of administrative and development tools that
improve upon the process of installing, deploying, managing, and using SQL Server across
several sites. SQL Server 2000 also supports a standards-based programming model
integrated with the Windows DNA, making the use of SQL Server databases and data
warehouses a seamless part of building powerful and scalable systems. These features
allow you to rapidly deliver SQL Server applications that customers can implement with a
minimum of installation and administrative overhead.
51
Visit researchgate Profile : https://www.researchgate.net/profile/Kamal-Acharya-15/publications
Visit google scholar profile: https://scholar.google.com/citations?user=9QoTDzIAAAAJ&hl=en
Enterprise Manager is the main administrative console for SQL Server installations.
It provides you with a graphical "birds-eye" view of all of the SQL Server installations on
your network. You can perform high-level administrative functions that affect one or more
servers, schedule common maintenance tasks or create and modify the structure of
individual databases.
Query Analyzer offers a quick and dirty method for performing queries against any of your
SQL Server databases. It's a great way to quickly pull information out of a database in
response to a user request, test queries before implementing them in other applications,
create/modify stored procedures and execute administrative tasks.
SQL Profiler provides a window into the inner workings of your database. You can monitor
many different event types and observe database performance in real time. SQL Profiler
allows you to capture and replay system "traces" that log various activities. It's a great tool
for optimizing databases with performance issues or troubleshooting particular problems.
Service Manager is used to control the MS SQL Server (the main SQL Server process),
MSDTC (Microsoft Distributed Transaction Coordinator) and SQL Server Agent
processes. An icon for this service normally resides in the system tray of machines running
SQL Server. You can use Service Manager to start, stop or pause any one of these services.
Data Transformation Services (DTS) provide an extremely flexible method for importing
and exporting data between a Microsoft SQL Server installation and a large variety of other
formats. The most commonly used DTS application is the "Import and Export Data"
wizard found in the SQL Server program group.
52
Visit researchgate Profile : https://www.researchgate.net/profile/Kamal-Acharya-15/publications
Visit google scholar profile: https://scholar.google.com/citations?user=9QoTDzIAAAAJ&hl=en
Database
A database is similar to a data file in that it is a storage place for data. Like a data
file, a database does not present information directly to a user; the user runs an application
that accesses data from the database and presents it to the user in an understandable format.
Database systems are more powerful than data files. The data is more highly
organized. In a well-designed database, there are no duplicate pieces of data that the user
or application has to update at the same time. Related pieces of data are grouped together
in a single structure or record, and relationships can be defined between these structures
and records.
When working with data files, an application must be coded to work with the
specific structure of each data file. In contrast, a database contains a catalog that
applications use to determine how data is organized. Generic database applications can use
the catalog to present users with data from different databases dynamically, without being
tied to a specific data format.
Relational Database
There are different ways to organize data in a database but relational databases are
one of the most effective. Relational database systems are an application of mathematical
set theory to the problem of effectively organizing data. In a relational database, data is
collected into tables (called relations in relational theory).
A table represents some class of objects that are important to an organization. For
example, a company may have a database with a table for employees, another table for
customers, and another for stores. Each table comprises columns and rows (attributes and
tuples in relational theory). Each column represents some attribute of the object represented
by the table. For example, an Employee table would typically have columns for first name,
last name, employee ID, department, pay grade, and job title. Each row
53
Visit researchgate Profile : https://www.researchgate.net/profile/Kamal-Acharya-15/publications
Visit google scholar profile: https://scholar.google.com/citations?user=9QoTDzIAAAAJ&hl=en
represents an instance of the object represented by the table. For example, one row in the
Employee table represents the employee who has employee ID 12345.
When organizing data into tables, you can usually find many different ways to
define tables. Relational database theory defines a process, normalization, which ensures
that the set of tables you define will organize your data effectively.
To work with data in a database, you must use a set of commands and statements
(language) defined by the DBMS software. There are several different languages that can
be used with relational databases; the most common is SQL. Standards for SQL have been
defined by both the American National Standards Institute (ANSI) and the International
Standards Organization (ISO). Most modern DBMS products support the Entry Level of
SQL-92, the latest SQL standard (published in 1992).
54
Visit researchgate Profile : https://www.researchgate.net/profile/Kamal-Acharya-15/publications
Visit google scholar profile: https://scholar.google.com/citations?user=9QoTDzIAAAAJ&hl=en
ALGORITHM USED
Login entry:
User entry:
STEP-1: Select a new form.
STEP-2: The user module consists of general, login and communication
information
STEP-4: The first name, last name entered in textbox.
STEP-5: The address is entered in multi line textbox.
STEP-6: The department and designation are entered in dropdown list.
STEP-7: The communication information consists of three textbox
STEP-8: The mail id, phone home, phone office are entered in a textbox
STEP-9: The login information consists of two textbox.
STEP-10: The username and password are entered in the textbox
STEP-11: The add button add the records to the database.
STEP-12: The view button view the records from the database
STEP-13: The delete button is used to delete the records from the
Database
STEP-14: The edit button is used to edit the user records in the
Database
55
Visit researchgate Profile : https://www.researchgate.net/profile/Kamal-Acharya-15/publications
Visit google scholar profile: https://scholar.google.com/citations?user=9QoTDzIAAAAJ&hl=en
Testing
56
Visit researchgate Profile : https://www.researchgate.net/profile/Kamal-Acharya-15/publications
Visit google scholar profile: https://scholar.google.com/citations?user=9QoTDzIAAAAJ&hl=en
TESTING
Definition of Testing:
Testing program is the first step in the debugging process. Some people idea of the
testing a program consists of running the program a few times to see what happens, each
time using slightly different input. This process can succeed when we have a short
program, but it is not effective for a long program. In any case, even for the simplest
program the choice of test data is all-important.
A good testing suite is vital because the user must test all possible Execution paths
inside the code in order to have any hope it will be bug free. Testing program is an art, not
a science.
Testing of the system is done to ensure the integrity of the system. Testing is vita
for the success of the project, which is the last stage of development. The aim of testing is
to prove that the development system addresses the predefined processing requirements
and will perform reliably and efficiently during time.
Purposes of testing:
Unit Testing
In the lines of this strategy all the individual functions and modules were put to the
test independently. By following this strategy all the error in coding were identified and
corrected. This method was applied in combination with the white and Black box testing
techniques to find the errors in each module.
Integration Testing
This testing strategy has two different approaches namely the Top-down approach
in which the integration is carried out from the top level module to the bottom and the
Bottom-up approach in which the integration is carried out from the low level module to
the top.
The modules were tested using the Bottom-up approach by introducing stubs for
the top-level functions. This test was used to identity the errors in the interfaces, the errors
in passing the parameters between the functions and to correct them.
58
Visit researchgate Profile : https://www.researchgate.net/profile/Kamal-Acharya-15/publications
Visit google scholar profile: https://scholar.google.com/citations?user=9QoTDzIAAAAJ&hl=en
Validation Testing
The main aim of this testing is to verify that the software system does what
it was designed for Alpha testing and Beta testing were conducted to ensure the validity of
the system. A customer conducted the Alpha test at the developer’s site. The end user of
the software conducted the Beta test at one or more of the customer site.
System Testing
The idea of applying this strategy was to put the system to a series of different test
whose primary purpose is to fully exercise the computer-based system. Although each test
has a different purpose, all work to verify that all system elements have been properly
integrated and perform allocated functions, security testing was conducted.
Acceptance testing
Acceptance testing involves planning and execution of functional tests,
performance test and stress test to verify that the implemented system satisfies its
requirements. Typically, acceptance test will incorporate test cases developed during unit
testing and integration testing.
Additional test cases are added to achieve the desired level of functional,
performance and stress testing of the entire system. Tools of special importance during
acceptance testing include a test coverage analyzer, and a coding standard checker.
59
Visit researchgate Profile : https://www.researchgate.net/profile/Kamal-Acharya-15/publications
Visit google scholar profile: https://scholar.google.com/citations?user=9QoTDzIAAAAJ&hl=en
PROBLEM FACED
During this project faced lot of problems. Mainly the problem is to read the
coding of the existing forms and understand how they are built that.
Most of the time machine, programmer, and module are not correctly retrieved
from the database.
For the allocation, the module and machine are changed. At that time only the
project name are not retrieved correctly.
FEATURE PLANS
The performance of any software product can be measured by its ability to satisfy
the user needs, the speed at which it is done, its ability to integrate with the various
functions and its ability to capture the errors and conveying the performance of the software
is up to the satisfactory level.
Extensions can be done in the technology aspects by using data warehouse and data
mining tools to adopt online databases for the end to end process which will help the
network to function faster
Limitations of the software are again dependent on the economic feasibility of the
user. If the user is provided with perfect and suitable configuration the software
performance is still raised.
Always there is a need for improvement and enhancement for software. Even giants
like Microsoft are also producing the enhanced versions even after developed an efficient
product. This project work is feasible enough for amendments and modifications that may
arrive in future.
61
Visit researchgate Profile : https://www.researchgate.net/profile/Kamal-Acharya-15/publications
Visit google scholar profile: https://scholar.google.com/citations?user=9QoTDzIAAAAJ&hl=en
References
1. Kamal Acharya. School management system project report. Authorea. August 01, 2024.
DOI: https://doi.org/10.22541/au.172254873.34023165/v1
8. Kamal Acharya. Online music portal management system project report. Authorea. August
01, 2024. DOI: https://doi.org/10.22541/au.172252488.89734698/v1
11. Kamal Acharya. Ludo management system project report. Authorea. July 31, 2024. DOI:
https://doi.org/10.22541/au.172243999.98091616/v1
12. Kamal Acharya. Literature online quiz system project report. Authorea. July 31, 2024 DOI:
https://doi.org/10.22541/au.172243825.53562953/v1
13. Kamal Acharya. Avoid waste management system project. Authorea. July 29, 2024. DOI:
https://doi.org/10.22541/au.172228528.85022205/v1
ABBREVIATION USED
CONCLUSION
The Asset Tracking process for the testers is successfully done in this project. any
Software concern can use this project. This project is more effective and efficient. The
special feature of this project is easy way to communicate between the Programmer
(developers) and the testing team members. Almost all needs for maintaining a scheduling
are fully implemented in this project. This Project is used by three types of users such as
administrator, developers, testing team members of a software concern can use it. In future,
it should be enhanced. This project will satisfy the needs of users who are using it.
The various processes of the construction of the new system have been done. The
customized programs are effective and easy to handle, with good help and browse Facility.
The necessary information is allowed to feed into the output screen. The Customized
modules satisfy the user needs.
An inconvenience of this chat is that it is possible for several users to share a single
name at different times. In the next part, it will be fixed by implementing registration
mechanism.
The system is done with insight into the necessary modification that may require in
the future. Hence the system can be maintained successfully without much rework.
The login operation will complete successfully only if no active users have the same
name. But there are also possible situations where a user is disconnected from the network
or closed their chat by mistake. In these cases, a mechanism is required to repeat user
authorization.
65
Visit researchgate Profile : https://www.researchgate.net/profile/Kamal-Acharya-15/publications
Visit google scholar profile: https://scholar.google.com/citations?user=9QoTDzIAAAAJ&hl=en