Training Report (8718114)
Training Report (8718114)
On
“E-COMMERCE WEBSITE”
Submitted in partial fulfilment of the award of the degree of
Bachelor of technology (B. tech)
in
Computer Science and Engineering
Submitted by:
Gourav
8718114
CSE (2018-2022)
Submitted To:
Department of Computer Science and Engineering,
State Institute of Engineering and Technology, Nilokheri (Karnal)
(Affiliated to Kurukshetra University, Kurukshetra)
DECLARATION BY THE CANDIDATE
I hereby declare that the project report entitled " E-commerce website" submitted by me to
State Institute of Engineering & Technology, Nilokheri (Karnal) in partial fulfilment of the
requirement for the award of the degree of B. TECH in COMPUTER SCIENCE &
ENGINEERING is a record of bonafide project work carried out by me. I further declare that
the work reported in this project has not been submitted and will not be submitted, either in
part or in full, for the award of any other degree or diploma in this institute or any other institute
or university.
ii
CERTIFICATE
iii
ACKNOWLEDGEMENT
The success and final outcome of this project required a lot of guidance and assistance from
many people and I am extremely privileged to have got this all along the completion of my
project. All that I have done is only due to such supervision and assistance and I would not
forget to thank them.
I would like to place on record my deep sense of gratitude to ISGEC Team who taught me the
usage of the various tools and techniques widely used in the field of user experience design.
Thank you ISGEC for giving such a wonderful opportunity to study under their online training
program.
I am thankful to and fortunate enough to get constant encouragement, support and guidance
from all Teaching staffs of Department of Computer Science and Engineering who helped me
in successfully completing our project work.
Gourav
CSE 5th Semester
Roll no.-8718114
iv
ABSTRACT
Computer plays an important role in our daily life. Anything we want we can get only in one
mouse click. Speed, reliability and accuracy of the computer make it a powerful tool for
different purposes. A very important and basic need of today’s modern business world is the
quick availability and processing of information using computer. One can easily get the type
of required information within a fraction of a second. The project that I have taken is also in
this category which is used in our daily life whenever we want to purchase some items, we can
easily get them at our home. The objective of project on Online Shopping Portal is to
developing a GUI based automated system, which will cover all the information Related to the
all products which is used in our daily life. For example – Mobiles Phones, Laptops, Clothes,
Books, Electronic Items and many more. So, by this GUI based automated system a user wants
to purchase something then it only a mouse clicks away to purchase these products.
v
COMPANY PROFILE
ISGEC Heavy Engineering Ltd. is the largest engineering and manufacturing enterprise of its
kind in India and is one of the leading international companies in the field of machine
manufacture and diversified global engineering. Established in 1933, ISGEC Heavy
Engineering Limited is a Rs. 2434 crore multi-product, multi-location public company
providing engineering products to customers across 76 countries. The major target sectors for
the company are: Power, Oil & Gas, Automobiles, Fertilizers, Sugar and Defence. With a team
of over 4000 employees, including 700 qualified engineers and over 450 designers, the
company has its manufacturing plants and design offices spread across India in Haryana, Uttar
Pradesh, Gujarat, Tamil Nadu and Maharashtra.
It is today a subsidiary company. At the time of the nation's independence, the need for an
Indian capital goods industry was recognized and ISGEC was established in 1946. The initial
activity was the manufacture of spares for sugar mills. In 1964 it established a joint venture
with John Thompson of the UK to form ISGEC John Thompson
The quality and reliability of its products is due to the emphasis on design, engineering and
manufacturing to international standards by acquiring and adapting some of the best
technologies from leading companies in the world, together with technologies developed in its
own R&Dcenters. ISGEC Heavy Engineering Limited, India and Hitachi Zosen Corporation,
Japan have a joint venture - ISGEC Hitachi Zosen Ltd. -for manufacturing specialized and
critical process equipment. The Company has been constantly adapting itself to face the
challenges thrown-up by the business environment. ISGEC has already attained ISO 9000
certification for quality management and all the manufacturing units /divisions have been
upgraded to the latest ISO 9001-2008version.ISGEC has also secured ISO 14001-
2004certification for environmental management systems & OHSAS -18001-2007certification
for occupational health and safety management systems for all its units/divisions. ISGEC is
continuing its journey towards Business Excellence. ISGEC has committed to support the
Global Compact & the set of core values enshrined in its ten principles in the areas of human
rights, labour standards and environment.
vi
LIST OF FIGURES
vii
Fig. 5.13 Add products page 47
Fig. 5.14 Manage user page 48
viii
TABLE OF CONTENTS
Title Page No.
Declaration ii
Certificate iii
Acknowledgement iv
Abstract v
Company profile vi
List of figures vii
Chapter 1: Introduction 1
1.1 What is e-commerce? 1
1.2 History of e-commerce 1
1.3 Objective of e-commerce 2
1.4 Types of e-commerce 2
Chapter 2: Tools & Technologies learned 10
2.1 Acceptance and text generation 10
2.2 Text data used 12
2.3 Implementation 14
2.4 Database-driven Online Shopping Portal 16
Chapter 3: Project Brief 17
3.1 Profile of Problem 17
3.2 Software development life cycle 17
3.3 Problem Analysis 18
3.4 Feasibility Analysis 19
3.5 Project plan 20
3.6 Planning the development process 20
3.7 Size estimation 21
3.8 cost estimation 22
3.9 Hardware and software required 22
3.10 Frontend details 23
3.11 Backend details 24
Chapter 4: Functional requirements 26
4.1 Nonfunctional requirements 27
4.2 System designed 27
4.3 Design notations 27
4.4 User characteristics 29
4.5 Entity relationship diagrams 30
Chapter 5: Final Design Screens 35
Chapter 6: Conclusion 49
References 50
ix
CHAPTER 1
INTRODUCTION
1
leased telephone lines as broadband was not available. From the 1990s onwards, electronic
commerce would additionally include enterprise resource planning systems (ERP), data mining
and data warehousing.
An early example of many-to-many electronic commerce in physical goods was the Boston
Computer Exchange, a marketplace for used computers launched in 1982. An early online
information marketplace, including online consulting, was the American Information
Exchange, another pre-Internet online system introduced in 1991.
The Internet became popular worldwide around 1994 when the first internet online shopping
started; it took about five years to introduce security protocols and DSL allowing continual
connection to the Internet. By the end of 2000, many European and American business
companies offered their services through the World Wide Web. Since then people began to
associate the word “eCommerce” with the ability to purchase various goods through the
Internet using secure protocols and electronic payment services.
Historical Timeline:
• 1979: Michael Aldrich invented online shopping
• 1981: Thomson Holidays, UK is first B2B online shopping
• 1985: Nissan UK sells cars and finance with credit checking to customers online from
dealers’ lots.
• Pizza Hut offers online ordering on its Web page in 1992
• 1995: Jeff Bezos launches Amazon.com
• 2010: US e-Commerce and Online Retail sales projected to reach $173 billion, an
increase of 7 percent over 2009
2
3. Business-to-Business (B2B)
4. Consumer-to-Consumer (C2C)
5. Business-to-Administration (B2A)
6. Consumer-to-Administration (C2A)
1.4.1 Business-to-Business (B2B)
B2B e-commerce refers to the sale of goods or services between businesses via an online sales
portal. While sometimes the buyer is the end user, often the buyer resells to the consumer. This
type of e-commerce typically applies to the relationship between producers and wholesalers; it
may additionally remain applied to the relationship between the producers or the wholesalers
and the retailers themselves. However, the same relationship can also occur between service
providers and business organizations. B2B typically requires more venture capital and a longer
sales cycle, but results in higher order value and more recurring purchases.
As newer generations become decision makers in business, B2B ecommerce will become more
important. In 2015, Google found that close to half of B2B buyers were millennials—nearly
double the amount reported in 2012.
Examples of this model are ExxonMobil Corporation, the Chevron Corporation, Boeing,
and Archer-Daniels-Midland. These businesses have custom, enterprise ecommerce platforms
that work directly with other businesses in a closed environment.
3
potential sales and additional profits for B2B sellers. At the same time, the ease of
advertising to other businesses through B2B websites can help cut marketing costs and
boost conversion rates.
3. Huge market potential: From business software and consulting services to bulk materials
and specialized machinery, B2B sellers can target a large market of companies across
industries. At the same time, they have the flexibility of specializing in an area like
technology to become a leader in the field.
4. Improved security: Since contracts are a common part of B2B commerce, there's some
security for both buyers and sellers in that there's less concern that one will pay and the
other will deliver goods as promised. Since sales usually get tracked digitally, it's also
more secure in that B2B sellers can track and monitor their financial results.
The disadvantages of B2B e-commerce include:
1. More complex setup process: Getting started as a B2B retailer takes work to figure out
how to get customers who stay dedicated and make large-enough orders. This often
requires thorough research to advertise to potential businesses, set up a custom ordering
system and adapt quickly when sales are underwhelming;
2. Limits to sales: While B2B companies can sell a lot, they do miss out on potential sales
to individual customers. The smaller pool of business buyers and the need to negotiate
contracts can put some limits on profits, especially when the company loses key buyers
to other competitors;
3. Need for B2B sellers to stand out: At the same time, the B2B market has many
companies competing and selling similar products and services. Sellers often need to
cut prices and find special ways to grab companies' attention to succeed in the market;
4. Special ordering experience needed: B2B companies selling online need to put much
effort into designing a website and ordering system that buyers find easy to use. This
means presenting product and service information clearly, offering online demos or
consultations and using order forms with appropriate options for quantities and any
special customization needed.
1.4.2 Business-to-consumer (B2C)
Business-to-consumer (B2C), or direct-to-consumer, is the most common e-commerce model.
It deals with electronic business relationships between businesses—both producers and service
providers—with end consumers. Many people like this method of e-commerce as it allows
them to shop around for the best prices, read customer reviews, and often find different
products that they would not otherwise be exposed to in the physical retail world. This e-
commerce category also enables businesses to develop a more personalized relationship with
their customers.
Anything one buys online as a consumer is done as part of a B2C transaction. The decision-
making process for a B2C purchase is much shorter than a business-to-business (B2B)
purchase, especially for items that have a lower value, thus having a shorter sales cycle. B2C
businesses therefore typically spend less marketing dollars to make a sale but also have a lower
average order value and less recurring orders than their B2B counterparts. B2C innovators have
leveraged technology like mobile apps, native advertising and re-marketing to market directly
to their customers and make their lives easier in the process.
4
Examples of B2C businesses are everywhere: exclusively-online
retailers include Newegg, Overstock.com, Wish, and Mod Cloth. Major B2C-model brick-
and-mortar businesses include Staples, Wal Mart, Target, REI, and Gap.
5
1. Infrastructure: Even though the internet enables reaching a huge, international pool of
customers, many still do not have access to the internet;
2. Competition: Competition is severe. There are certain companies that have managed to
maintain sizeable market shares giving them a chance to survive in the long run. New
and improved products must be rolled out consistently to secure customers;
3. Limited product exposure: Despite rewarding the customers with ease-of-access and a
unique level of flexibility for choosing products, e-commerce has restricted product
exposure for buyers over the internet. Most websites would not allow customers to go
beyond the glamorous product images and their descriptions at the time of purchasing
the product. It gives consumers the idea that e-commerce supports ‘limited product
exposure', which is why some products disappoint customers at the time of shipment
and are sent back to companies immediately.
1.4.3 Consumer-to-business (C2B)
Consumer-to-business (C2B) e-commerce is when a consumer makes their services or products
available for companies to purchase. The competitive edge of the C2B e-commerce model is
in its pricing for goods and services. This approach includes reverse auctions, in which
customers name the price for a product or service they wish to buy. Another form of C2B
occurs when a consumer provides a business with a fee-based opportunity to market the
business's products on the consumer's blog.
For instance, food companies may ask food bloggers to include a new product in a recipe and
review it for readers of their blogs. YouTube reviews may be incentivized by free products or
direct payment. This could also include paid advertisement space on the consumer
website. Google AdWords/AdSense has enabled this kind of relationship by simplifying the
process in which bloggers can be paid for ads. Services such as Amazon Affiliates allow
website owners to earn money by linking to a product for sale on Amazon.
Examples of C2B include: a graphic designer customizing a company logo, or a photographer
taking photos for an e-commerce website.
The C2B model has flourished in the internet age because of ready access to consumers who
are "plugged in" to brands. Where the business relationship was once strictly one-directional,
with companies pushing services and goods to consumers, the new bi-directional network has
allowed consumers to become their own businesses. Reductions in the cost of technologies
such as video cameras, high-quality printers, and Web development services give consumers
access to tools for promotion and communication that were once limited to large companies.
As a result, both consumers and businesses can benefit from the C2B model.
6
Figure 1.3: Customer-to-Business (C2B)
The advantages of C2B can be expressed through an example: The C2B
website thefreemortgagecalculator.com offers a LendingTree advertisement at the top of the
page. The advantage of this website is that the owner does not have to sell mortgages, meet
with customers, or pay for everyday business operation expenses in order to make money. If
the LendingTree advertisement is used by a visitor, the website owner gets paid a commission
from LendingTree for the lead.
The disadvantages of C2B transactions are that one must be well-versed in web design to create
such a website and the amount of money earned is far less than what could be earned by selling
the mortgage directly to the consumer instead.
1.4.4 Consumer to consumer (C2C)
Consumer-to-consumer (C2C), or customer-to-customer, represents a market environment
where one customer purchases goods from another customer using a third-party business or
platform to facilitate the transaction.
In this case, the third-party platform typically earns their money by charging transaction or
listing fees. These businesses benefit from self-propelled growth by motivated buyers and
sellers, but face a key challenge in quality control and technology maintenance. Another
customers’ benefit is the competition for products. Customers may often find items that are
difficult to locate elsewhere. Also, margins can be higher than traditional pricing methods for
sellers as there are minimal costs due to the absence of retailers or wholesalers. Opening a
C2C site takes careful planning.
Examples of C2C include Craigslist and eBay, who pioneered this model in the early days of
the internet. Generally, transactions in this model occur via online platforms (such as PayPal),
but often are conducted using social-media networks (e.g. Facebook marketplace) and
websites (Craigslist).
7
Figure 1.4: Customer-to-Customer (C2C)
The advantages of C2C:
1. Availability: It is always available so consumers can shop on demand;
2. Websites are updated regularly.
3. Higher profitability: Consumers selling products directly to other consumers can
achieve higher profits.
4. Low transaction cost: Selling via online platforms is much cheaper than the costs
incurred on having physical store space.
5. Direct relationship: Customers can directly contact sellers without having to go through
an intermediary.
The disadvantages of C2C include:
1. Payment may be less secure.
2. Security issues: There could be theft due to scammers falsely impersonating well know
C2C sites.
3. Lack of quality control of products.
1.4.5 Business to Administration (B2A)
Business-to-administration (B2A), also known as business-to-government (B2G), refers to all
transactions between companies and public administrations or government agencies.
Government agencies use central websites to trade and exchange information with various
business organizations. This is an area that involves many services, particularly in areas such
as social security, employment, and legal documents.
Businesses that are accustomed to interacting with other businesses or directly with consumers
often encounter unexpected hurdles when working with government agencies. Layers of
regulation can harm the overall efficiency of the contracting process, and thus, governments
tend to take more time than private companies to approve and begin work on a given project.
8
While businesses may find that government contracts involve additional paperwork, time, and
vetting, there are advantages to providing goods and services to the public sector. Government
contracts are often large and more stable than analogous private-sector work. A company with
a history of successful government contracting usually finds it easier to get the next contract.
One example of a B2A model is Accela, a software company that provides government
software solutions and public access to government services for permitting, planning, licensing,
public health, and so on.
9
CHAPTER 2
TOOLS AND TECHNOLOGIES LEARNED
The objective of this step is to produce a set of test data that may be used to test the system.
Whenever a new system is developed it need to be tested to confirm its validity and to
determine whether it meets the user requirements. The system was also tested with some
sample records. The records were entered into the system and various reports were generated
to check the system.
System testing is a critical phase of implementation. Testing of the system involves hardware
devices and debugging of computer programs and testing information processing procedures.
Testing can be done with test data, which attempt to simulate all possible condition that may
rise during processing. The testing methods adopted during the testing of system are unit testing
and integration testing.
2.1.1 TESTING
Testing is the process of executing a program with the intent of finding errors. Although
software testing is itself an expensive activity, yet launching of software without may lead to
cost potentially much higher than that of testing, especially in systems where human safety is
involved. Effective software testing will contribute to the delivery of higher quality software
products, more satisfied users, and lower maintenance costs, more accurate and reliable results.
Software testing is necessary and important activity of software development process.
10
ensure test coverage of requirements, different types of testing documentation and various test
activities are discussed.
2.1.3 FUNCTIONAL TESTING
It is very useful and convenient in support of functional testing. Although JMeter is known
more as a performance testing tool, functional testing elements can be integrated within the
Test Plan, which was originally designed to support load testing. Many other load-testing tools
provide little or none of this feature, restricting themselves to performance-testing purposes.
Besides integrating functional-testing elements along with load-testing elements in the Test
Plan, you can also create a Test Plan that runs these exclusively. In other words, aside from
creating a Load Test Plan, it also allows you to create a Functional Test Plan. This flexibility
is certainly resource-efficient for the testing project.
This will give a walkthrough on how to create a Test Plan as we incorporate and/or configure
its elements to support functional testing. This created a Test Plan for a specific target web
server. We will begin the chapter with a quick overview to prepare you with a few expectations;
we will create a new Test Plan, only smaller. The Test Plan we will create and run at the end
of this chapter will incorporate elements that support functional testing, exclusively.
2.1.4 UNIT TESTING
Unit testing focuses on the modules independently locate the errors. This enables the tester to
detect errors in coding. It is the process of taking a module and running it in isolation from rest
of the software product by using prepared test cases and comparing the actual result with the
result redirected with the specifications and design of the module. One purpose of testing is to
find and remove as many errors in the software as practical. There are number of reasons in
support of unit testing-:
• The size of module single module is small that we can locate an error fairly easily.
• The module is small enough that we can attempt to test it in some demonstrably
exhaustive fashion.
• Confusing interactions of multiple errors in widely different parts of software are
eliminated.
There are problems associated with testing a module in isolation. How do we run a module
without anything to call it, to be called by it, possibly to output intermediate values obtained
during execution? One approach is to construct an appropriate driver routine to call it, and
simply stubs to be called by it, and to insert output statements in it. Stubs serve to replace
modules that are subordinate to the module to be tested. A stub or dummy subprogram uses the
subordinate module’s interface, may do minimal data manipulation, prints verification of entry
and returns.
11
2.1.5 INTEGRATION TESTING
This is a systematic technique for constructing the program structure while at the same time to
uncover the errors associated with the interface. The objective is to take unit tested module and
build a program structure that has been detected by designing. The main purpose of integration
testing is to determine that the interfaces between modules are correct or not. One specific
target of integration testing is the interface: whether parameter matches on both sides as to type,
permissible ranges, meaning & utilization. There are 3 types of integration testing-
• Top Down Approach: Top Down integration proceeds down the invocation hierarchy,
adding one module at a time until an entire tree level is generated.
• Bottom Up Approach: The Bottom up strategy works similarly from the bottom to up.
• Sandwich Strategy: A sandwich strategy runs from top and bottom simultaneously.
The proper selection of the data is very important. If the test data is not appropriate or
representative of the data to be provided by the user, the reliability of the output is susceptible.
• Using Live Test Data: Live test are those that are actually extracted from the
organization files. Use of the live data make testing easier by obtaining most expected
outputs and if it is found that the program can handle the entries processing of the
system accurately.
• Using Artificial Test Data: Live data is difficult to obtain insufficient amount to conduct
extensive testing. It does not test all the combination or formats that can be done by
entering to the system. Therefore, artificial test data were used at the time of unit testing.
Artificial test data was created solely for test purposes which provide extreme values
for testing the limit of candidate system.
TEST CASES:
• System is properly linked or not: Whether they are redirected to desired page or not.
• Information passed: If a page passes some parameter to another page then it should be
checked that the page gets the correct information, whatever is passed by the previous
page.
12
• Output should be correct: Every functionality of the system should be checked properly
whether it gives the right result or not generally test is performed with known results.
If the output of the system is matched with that result the system is working fine.
13
Here user is entering page 2 should page 2 is
correct information. be displayed. displayed.
2.3 Implementation
Implementation is the stage in the project where the theoretical design is turned into the
working system and is giving confidence to the new system for the users i.e. will work
efficiently and effectively. It involves careful planning, investigation of the current system and
its constraints on implementation, design of method to achieve the changeover, an evaluation,
of change over methods. A part from planning major task of preparing the implementation is
education of users. The more complex system is implemented, the more involved will be the
system analysis and design effort required just for implementation. An implementation
coordinating committee based on policies of individual organization has been appointed. The
implementation process begins with preparing a plan for the implementation for the system.
According to this plan, the activities are to be carried out; discussions may regarding the
equipment have to be acquired to implement the new system.
Implementation is the final and important phase. The most critical stage is in achieving a
successful new system and in giving the users confidence that the new system will work and
be effective. The system can be implemented only after thorough testing is done and if it found
to working according to the specification. This method also offers the greatest security since
the old system can take over if the errors are found or inability to handle certain types of
transaction while using the new system.
14
changeover plan for the operation phase. The major elements of implementation plan are test
plan, training plan, equipment installation plan, and a conversion plan.
A conversion is the process of changing from the old system to the new one. It must be properly
planned and executed. Four methods are common in use. They are Parallel Systems, Direct
Conversion, Pilot System and Phase In method.
15
So, I use MYSQL Database in this project. So, this shopping portal contains dynamic effects
by using this database. Some parts of this project which use database are following:
• Firstly, when user Register an account on this website the user gives their information
which are stored in database.
• Then when users want to login on this website then they give their username and
password as they choose at registration time, if both are matched with database’s
username and password then user can successfully log in the website otherwise Access
Denied.
• The Objects which users can see on homepage, after login page, buy products page are
also come from database.
• Now After login user can modify their profile and password. The modified profile
details and password details altered in the database.
• In Buy Products Section Product and Their Prices also fetched from database’s table.
When user select a product and push Add to cart then items added to database’s cart
table.
• Then in My Cart section the products displayed which are in the cart table of the
database following by user.
• Checkout section takes the carts item and their total price and then payment details are
given by the user and these details store in separate database table. After Successful
entry in this table users cart empty automatically because all items purchased by him.
• In My Shopping section the products a user purchased are displayed.
16
CHAPTER 3
PROJECT BRIEF
One must know what the problem is before it can be solved. The basis for the online shopping
portal is to buy products online and save the timing.
An Online shopping portal, who want to buy any product of their need, has to contact different
Shoppers, before deciding upon a particular Product that best suit his needs, requirements and
satisfaction. Moreover, most of the work involved in this development process has to be done
manually which is very time consuming and cumbersome and also, it reduces the efficiency,
accuracy.
To know the facts and understanding of the problem in detail, System Analysis is carried out. It
is the process of studying the business processes and procedures, generally referred to as business
systems, to see how they can operate and whether improvement is needed.
2. Systems analysis:
The objective of the system analysis activity is to develop structured system specification for
the proposed system. The structured system specification should describe what the proposed
system would do; independent of the technology, which will be used to implement these
requirements. The structured system specification will be used to implement these
requirements. The structured system specification will be called the essential model (also
known as logical model). The essential model may itself consist of multiple models, modelling
different aspect of the system. The data flow diagrams may model the data and their
relationships and the state transition diagram may model time dependent behaviour of the
system. The essential model thus consists of the following.
17
• Context diagram
• Levelled data flow diagrams
• Process specification for elementary bubbles
• Data dictionary for the flow and stores on the DFDs.
3. Preliminary design:
The activity deals with certain design issues, which are to be finalized in consultation with the
user. The two most important design issues of relevance to the user are the automation
boundary and the human machine interface. The output of the activity is the user
implementation model. The major part of the user implementation model is the specification
for the user interface of the proposed system. The user implementation model is also referred
to as the physical model of the proposed system. The user implementation model is also
referred to as the physical model of the proposed system. The model, in addition to the essential
model, defines the following for the proposed system:
• Automation boundary
• Report layouts
• Layouts of the source documents
• Screen layouts for the data entry forms
• Menu
4. System design:
System design involves transformation of the user implementation model into software design.
The design specification of the proposed system consists of the following:
• Database scheme
• Structure charts
• Pseudo codes for the modules in structure charts
5) Implementation:
This activity includes programming, testing and integration of modules into a progressively
more complete system. Implementation is the process of collect all the required parts and
assembles them into a major product.
6) Test generation:
This activity generates a set of test data, which can be used to test the new system before
accepting it. In the test generation phase, all the parts are come which are to be tested to ensure
that system does not produce any error. If there are some errors then we remove them and
further it goes for accepting.
Product definition:
18
Online Shopping Portal System is a computerized, online solution to the various problems faced
by the Product buyer and seller wishing to outsource their software development work to a
Provider at an economical cost, thus achieving high performance, accuracy, reliability and high
speed of data retrieval.
In this system, there is a registration process each for the Product buyer and seller. The
Administrator of the site verifies the Provider after his registration and if satisfied, assigns him a
user name and password.
Our site can be used by anyone who is searching for Products whether he/she is first time visiting
our site. Our site also provides some discounted Products as same u get on any shop.
The software covers the following point while keeping in mind user’s requirement:
1. General User
2. Registered Users
1. Economic Feasibility:
The cost centres in the system development as well as operation are trivial. The
major can be network, internet and the software required for coding. The software used for
the development of the proposed system is PHP and MySQL. In terms of wallet our product
is in well reach of pocket.
2. Technical Feasibility:
Technical feasibility centres on the current system and to what extent it can support
the proposed system, it includes current computer system specifications such as hardware,
software etc. it also involves financial considerations to accommodate the technical
enhancements. If the budget is serious constraint then the project is judged not feasible.
Though the system is developed in the generalized form, which covers all the procedures
19
and operations carried out in an internet-based solution. The version used in the system is
PHP and MySQL. MySQL can manage large amount of data and is simple and secure.
Using PHP helps us to design the look of our application.
3. Operational Feasibility:
In this we determine what change will be brought in system, new skills required
and other human organization and political aspects. Each user can easily use our site.
However, it is desirable that the user has the basic knowledge of the computers. Without
making any changes in the rules and regulations of the existing system proposed system
can easily adopted.
1. Defining a problem:
• Define a problem.
• Justify the needs for a computerized solution.
• Identify the functions to be provided by the systems along with the constraints.
• Determine goal and requirements of the system.
• Establish the high-level acceptance criteria.
20
SIZE
COST DEVELOPMENT
ESTIMATION TIME
RESOURCES
REQUIREMENT
PROJECT
SCHEDULING
• Lines of Code:
A line of code is any line of program that is not a comment or blank line, regardless of
the number of statements or fragments of statements on the line. This specifically
21
includes all lines containing program header, declarations and executable and non-
executable statements.
• Function Count:
It measures functionally from user point of view that is on the basis of what the user
requests and receives in return. Therefore, it deals with the functionality being
delivered, and not with lines of code, source modules etc. Measuring size in this way
has the advantage that size measure is independent of the technology used to deliver
the functions.
For any software project, it is necessary to know how much it will cost to develop and how
much development time it will take. These estimates are needed before development is
initiated. In many cases estimates are made using past experience as the only guide. A number
of techniques have been developed and are having following attributes in common:
At Developer Side:
During system development, I have to design both static and dynamic website interfaces, create
website functions and a database system, edit photos and pictures, so it has a set of software
and hardware requirements.
22
At system user side:
The following is the requirements for the system users including members and administrators.
Hardware Used Software Used
• Intel Dual Core Processor • XAMPP local server
• 1 TB Hard Disk Drive. • MYSQL database
• 4 GB RAM. • Chrome browser
• O.S. – Windows 10
23
Why PHP?
PHP is one of the most popular server-side scripting languages running today. It is used for
creating dynamic Webpages that interact with the user offering customized information. PHP
offers many advantages; it is fast, stable, secure, easy to use and open source (free).
• User friendly
• GUI
• Separation of work (designing & coding)
• Written once run anywhere
• PHP API
24
Draw context
Diagram
Draw
Prototypes
Model the
Requirement
Finalize the
Requirement
The context diagram is a simple model that defines the boundaries and interfaces of the
proposed system with the external world. It identifies the entities outside the proposed system
that interact with the system
2. Development of Prototype
One effective way to find out what the customer really wants is to construct a prototype,
something that looks and preferably acts like a part of the system they want.
3. Model the Requirement
This process really consists of various graphical representations of functions, data entities,
external entities and the relationship between them. The graphical view may help to find
incorrect, inconsistent, missing and superfluous requirement.
4. Finalize the Requirements
After modelling the requirements, we will have better understanding of the system behaviour.
The inconsistencies and ambiguities have been identified and corrected.
25
CHAPTER 4
FUNCTIONAL REQUIREMENTS
Functional requirements define the fundamental actions that must take place in the software in
accepting the inputs and in processing and generating the outputs.
1. Login Module:
This module is provided for administrator and users such as Product buyer and seller who have
registered themselves in the system. These logins are provided according to the need of the
systems.
26
4.1 Non-functional requirement
1. Performance Requirement
The performance of the product mainly depends on the speed of Internet connection. If the user
wants hard real time response, then this is definitely not the product to go for.
2. Safety Requirements
The electrical connection to the devices is critical and should be done according to the standards
to avoid any short circuits.
3. Security Requirements
We aim to provide high security features like encryption to the user accounts to provide security
from illegal hacking and gaining access to the system.
The most creative and challenging phase of System Development Life Cycle (SDLC) is
Software Design. SDS is systematic documentation of design. A design process involves
“conceiving and planning out in the mind” and “making drawing pattern or sketch”. The term
“design” describes a final system and the process by which it is developed. It assists in catching
potential errors before the implementation phase itself which had been very costly to remove
otherwise.
System Design is a solution how to translate the system requirement into a blue print for
constructing the software. The goal of SDS is not only to produce a correct design but the best
possible one within the limitation imposed by the requirements and the physical and social
environment in which the system will operate.
The system architecture description found in this document provides the reader a clear sense
of how the system will be organized, how the components will interact and how the users will
interface with the running software.
27
SYMBOLS USED:
1. PROCESS:
2. EXTERNAL ENTITY:
3. DATA FLOW:
A directed arc or an arrow is used as a data flow symbol. A data flow symbol represents
the data flow occurring between two processes, or between an external entity and a process, in
the direction of the data flow arrow. Data flow symbols are usually annotated with the
corresponding data names.
4. DATA STORE:
A data store represents a logical file. It is represented using two parallel lines. A logical
file can represent either a data store symbol, which can represent either a data structure, or a
physical file on disk. Each data store is connected to a process by means of a data flow symbol.
The direction of the data flow arrow shows whether data is being read from or written into a
data store. An arrow flowing in or out of a data store implicitly represents the entire data of the
data store and hence connecting to a data store need not be annotated with the name of the
corresponding data items.
5. OUTPUT SYMBOL:
The output symbol is used when a hard copy is produced and the user of the copies cannot be
clearly specified or there are several users of the output.
6. PRODUCT FUNCTION:
28
The complete product is comprised of various functions
• User can access the information about various Products and Brands.
• User can become a member of site by registering himself.
• User can buy a Product online.
• Selected categories can be explored by user.
Registered user has some other function like
This subsection of SRS should describe whose characteristics of the eventual user of the
product that will affect the specific requirement. Our website will be intended not only for
authorized user but also for general user.
4.4.1 ADMINISTRATOR
• Administrator should know how to access internet and must have good knowledge of
English.
• He must be aware of how to respond feedback and queries fired by user.
• We assume that user knows English & user need not be computer professionals.
• User should be aware of internet.
• User can access information through hyperlink such that navigation of various pages.
29
4.4.3 CONSTRAINTS
Only administrator will be able to make entries in the database and can modify it.
1. Search:
On this web site two type of user can search the book one is registered and another is
unregistered. Registered user has to fill the form and then he/she can search or buy the
Products but unregistered can only search the Products not buy the Product until they did
not get the registered user.
2. Registration Form:
Shop will place registration form on the site. In this buyer interact with the shop. Buyer
will get registration form from the site and fill those forms and submit on the site. Shop
will store these registration forms in their database. In this we have to fill first name, last
name, address, e-mail, etc.
ERDs may also be more abstract, not necessarily capturing every table needed within a
database, but serving to diagram the major concepts and relationships. This ERD is of the latter
type, intended to present an abstract, theoretical view of the major entities and relationships
needed for management of electronic resources. It may assist the database design process for
an e-resource management system, but does not identify every table that would be necessary
for an electronic resource management database.
OBJECTS
30
1. Entities
2. Relations
3. Attributes
1. Entities:
An entity is a concept or object in the database. Entities are concepts within the data model.
Each entity is represented by a box within the ERD. Entities are abstract concepts, each
representing one or more instances of the concept in question. An entity might be
considered a container that holds all of the instances of a particular thing in a system.
Entities are equivalent to database tables in a relational database, with each row of the table
representing an instance of that entity.
2. Attributes:
The Supplier Name, Supplier Address, Telephone Number etc. A given attribute belonging
to a given entity occurrence can only have one value. Therefore, if a supplier could have
more than one address or telephone number then this should be determined before defining
the attributes of that entity type. In this example the defined entity may require two or three
address and/or telephone number attributes. It is the maximum practical instances of a given
attribute that should be catered for in the entity type definition.
3. Relationships:
Relations are the connections between two or more entities. Relationship lines indicate that
each instance of an entity may have a relationship with instances of the connected entity,
and vice versa. Each entity type can always be described in terms of attributes, and these
attributes will apply to all occurrences of that given entity type.
31
reply Request
Operation/data
processing
Authentication
Online
Login / Shopping Portal Products / Cart /
Index Database Shopping
(Approved/Reject) (Acknowledgement)
Payment / Checkout
User
Details
Register
Form
Username exists
Databas
e
Login
32
User Request Access Denied
Not Authenticate
Authenticate
Database
Buy Products
User Request
Database
User’s Cart
Checkout
Payment
Details
33
Figure 4.5: E-R diagram
34
CHAPTER 5
35
Figure 5.2: Product page
36
Figure 5.3: Contact Us page
37
Figure 5.4: Register page
38
Figure 5.5: Login page
39
Figure 5.6: Cart page
40
Figure 5.7: Checkout page
41
Figure 5.8: Admin Dashboard
42
Figure 5.9: Subscribers on dashboard
43
Figure 5.10: Add user page
44
Figure 5.11: Product list page
45
Figure 5.12: Order (manage) page
46
Figure 5.13: Add product page
47
Figure 5.14: Manage User page
48
CHAPTER 6
49
REFERENCES
Web References
[1] https://en.wikipedia.org/wiki/E-commerce
[2] https://www.php.net/docs.php
[3] https://www.paypal.com/in/webapps/mpp/home
[4] https://www.bigcommerce.com/articles/ecommerce/types-of-business-models/
[5] https://www.businessofapps.com/insights/ecommerce-website-development-process/
50