0% found this document useful (0 votes)
9 views

Training Report (8718114)

Uploaded by

Manju Adwal
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
9 views

Training Report (8718114)

Uploaded by

Manju Adwal
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 59

INDUSTRIAL TRAINING REPORT

On
“E-COMMERCE WEBSITE”
Submitted in partial fulfilment of the award of the degree of
Bachelor of technology (B. tech)
in
Computer Science and Engineering

Submitted by:
Gourav
8718114
CSE (2018-2022)

Submitted To:
Department of Computer Science and Engineering,
State Institute of Engineering and Technology, Nilokheri (Karnal)
(Affiliated to Kurukshetra University, Kurukshetra)
DECLARATION BY THE CANDIDATE
I hereby declare that the project report entitled " E-commerce website" submitted by me to
State Institute of Engineering & Technology, Nilokheri (Karnal) in partial fulfilment of the
requirement for the award of the degree of B. TECH in COMPUTER SCIENCE &
ENGINEERING is a record of bonafide project work carried out by me. I further declare that
the work reported in this project has not been submitted and will not be submitted, either in
part or in full, for the award of any other degree or diploma in this institute or any other institute
or university.

Signature of the Candidate


Date: Name: Gourav
Place: Class: CSE 5th Semester
Roll no.: 8718114

ii
CERTIFICATE

iii
ACKNOWLEDGEMENT
The success and final outcome of this project required a lot of guidance and assistance from
many people and I am extremely privileged to have got this all along the completion of my
project. All that I have done is only due to such supervision and assistance and I would not
forget to thank them.
I would like to place on record my deep sense of gratitude to ISGEC Team who taught me the
usage of the various tools and techniques widely used in the field of user experience design.
Thank you ISGEC for giving such a wonderful opportunity to study under their online training
program.
I am thankful to and fortunate enough to get constant encouragement, support and guidance
from all Teaching staffs of Department of Computer Science and Engineering who helped me
in successfully completing our project work.

Gourav
CSE 5th Semester
Roll no.-8718114

iv
ABSTRACT
Computer plays an important role in our daily life. Anything we want we can get only in one
mouse click. Speed, reliability and accuracy of the computer make it a powerful tool for
different purposes. A very important and basic need of today’s modern business world is the
quick availability and processing of information using computer. One can easily get the type
of required information within a fraction of a second. The project that I have taken is also in
this category which is used in our daily life whenever we want to purchase some items, we can
easily get them at our home. The objective of project on Online Shopping Portal is to
developing a GUI based automated system, which will cover all the information Related to the
all products which is used in our daily life. For example – Mobiles Phones, Laptops, Clothes,
Books, Electronic Items and many more. So, by this GUI based automated system a user wants
to purchase something then it only a mouse clicks away to purchase these products.

v
COMPANY PROFILE
ISGEC Heavy Engineering Ltd. is the largest engineering and manufacturing enterprise of its
kind in India and is one of the leading international companies in the field of machine
manufacture and diversified global engineering. Established in 1933, ISGEC Heavy
Engineering Limited is a Rs. 2434 crore multi-product, multi-location public company
providing engineering products to customers across 76 countries. The major target sectors for
the company are: Power, Oil & Gas, Automobiles, Fertilizers, Sugar and Defence. With a team
of over 4000 employees, including 700 qualified engineers and over 450 designers, the
company has its manufacturing plants and design offices spread across India in Haryana, Uttar
Pradesh, Gujarat, Tamil Nadu and Maharashtra.
It is today a subsidiary company. At the time of the nation's independence, the need for an
Indian capital goods industry was recognized and ISGEC was established in 1946. The initial
activity was the manufacture of spares for sugar mills. In 1964 it established a joint venture
with John Thompson of the UK to form ISGEC John Thompson
The quality and reliability of its products is due to the emphasis on design, engineering and
manufacturing to international standards by acquiring and adapting some of the best
technologies from leading companies in the world, together with technologies developed in its
own R&Dcenters. ISGEC Heavy Engineering Limited, India and Hitachi Zosen Corporation,
Japan have a joint venture - ISGEC Hitachi Zosen Ltd. -for manufacturing specialized and
critical process equipment. The Company has been constantly adapting itself to face the
challenges thrown-up by the business environment. ISGEC has already attained ISO 9000
certification for quality management and all the manufacturing units /divisions have been
upgraded to the latest ISO 9001-2008version.ISGEC has also secured ISO 14001-
2004certification for environmental management systems & OHSAS -18001-2007certification
for occupational health and safety management systems for all its units/divisions. ISGEC is
continuing its journey towards Business Excellence. ISGEC has committed to support the
Global Compact & the set of core values enshrined in its ten principles in the areas of human
rights, labour standards and environment.

vi
LIST OF FIGURES

Fig. No. Caption Page No.


Fig.1.1 Business-to-Business (B2B) 3
Fig.1.2 Business-to-Customer (B2C) 5
Fig.1.3 Customer-to-Business (C2B) 7
Fig.1.4 Customer-to-Customer (C2C) 8
Fig.1.5 Business-to-Administration (B2A) 9
Fig.1.6 Consumer-to-Administration (B2A) 9
Fig.3.1 Activities during software project planning 21
Fig.3.2 Requirement analysis Steps 25
Fig.4.1 Online shopping portal database 32
Fig.4.2 For registration 32
Fig.4.3 For login 33
Fig.4.4 For buying products 33
Fig.4.5 E-R diagram 34
Fig.5.1 Homepage 35
Fig.5.2 Product page 36
Fig.5.3 Contact us page 37
Fig.5.4 Registration page 38
Fig.5.5 Login page 39
Fig. 5.6 Cart page 40
Fig. 5.7 Checkout page 41
Fig. 5.8 Admin dashboard 42
Fig. 5.9 Subscriber dashboard 43
Fig. 5.10 Add user page 44
Fig. 5.11 Product page 45
Fig. 5.12 Order page 46

vii
Fig. 5.13 Add products page 47
Fig. 5.14 Manage user page 48

viii
TABLE OF CONTENTS
Title Page No.
Declaration ii
Certificate iii
Acknowledgement iv
Abstract v
Company profile vi
List of figures vii
Chapter 1: Introduction 1
1.1 What is e-commerce? 1
1.2 History of e-commerce 1
1.3 Objective of e-commerce 2
1.4 Types of e-commerce 2
Chapter 2: Tools & Technologies learned 10
2.1 Acceptance and text generation 10
2.2 Text data used 12
2.3 Implementation 14
2.4 Database-driven Online Shopping Portal 16
Chapter 3: Project Brief 17
3.1 Profile of Problem 17
3.2 Software development life cycle 17
3.3 Problem Analysis 18
3.4 Feasibility Analysis 19
3.5 Project plan 20
3.6 Planning the development process 20
3.7 Size estimation 21
3.8 cost estimation 22
3.9 Hardware and software required 22
3.10 Frontend details 23
3.11 Backend details 24
Chapter 4: Functional requirements 26
4.1 Nonfunctional requirements 27
4.2 System designed 27
4.3 Design notations 27
4.4 User characteristics 29
4.5 Entity relationship diagrams 30
Chapter 5: Final Design Screens 35
Chapter 6: Conclusion 49
References 50

ix
CHAPTER 1

INTRODUCTION

1.1 What is E-commerce?


Electronic Commerce or e-commerce is business transactions that take place by
communication networks. It is a process of buying and selling products, services, and
information over the computer network. E-commerce is a set of dynamic technologies,
applications and business process that link organizations, customers, suppliers, and
communities through electronic transactions and the electronic exchange of information
products and services
Electronic commerce that is conducted between businesses and consumers, on the other hand,
is referred to as business-to-consumer or B2C. This is the type of electronic commerce
conducted by companies such as Amazon.com.
Online shopping is a form of electronic commerce where the buyer is directly online to the
seller’s computer usually via the internet. There is no intermediary service. The sale and
purchase transaction are completed electronically and interactively in real-time such as
Amazon.com for new books. If an intermediary is present, then the sale and purchase
transaction is called electronic commerce such as eBay.com.
The “E-COMMERCE WEBSITE” is developed according the current need in different fields.
This is online shopping website which provides facility for purchasing Mobiles, Laptops,
Camera and many more items. So, by using this Online Shopping Portal users which want to
purchase some products will first Register an account on this portal then Login through their
Username and Password, and then Select items which they want to purchase and add them to
cart and finally checkout by giving payment details. So, by using this portal users can easily
purchase products from their home.

1.2 History of e-commerce


Originally, electronic commerce meant the facilitation of commercial transactions
electronically, using technology such as Electronic Data Interchange (EDI) and Electronic
Funds Transfer (EFT). These were both introduced in the late 1970s, allowing businesses to
send commercial documents like purchase orders or invoices electronically.
Online shopping, a form of electronic commerce, in 1979 Michael Aldrich, an English inventor,
connected a modified 26″ colour domestic television to a real-time transaction processing the
computer via a domestic telephone line and invented online shopping. The first recorded B2B
was Thomson Holidays 1981 the first recorded B2C was Gateshead SIS/Tesco in 1984. The
world’s first recorded online home shopper was Mrs. Jane Snowball, 72, of Gateshead, England
in May 1984. During the 1980s Aldrich sold many systems mainly in the UK including Ford,
Peugeot, General Motors and Nissan. The Nissan system of 1984/5 was revolutionary. It
enabled a car buyer on a dealer’s lot to both buy and finance the car, including a credit check,
online. Aldrich invented both the online shopping system and the business rationale for using
it. His 1980s systems were as fast as 2010 internet shopping systems. They used dial-up and

1
leased telephone lines as broadband was not available. From the 1990s onwards, electronic
commerce would additionally include enterprise resource planning systems (ERP), data mining
and data warehousing.
An early example of many-to-many electronic commerce in physical goods was the Boston
Computer Exchange, a marketplace for used computers launched in 1982. An early online
information marketplace, including online consulting, was the American Information
Exchange, another pre-Internet online system introduced in 1991.
The Internet became popular worldwide around 1994 when the first internet online shopping
started; it took about five years to introduce security protocols and DSL allowing continual
connection to the Internet. By the end of 2000, many European and American business
companies offered their services through the World Wide Web. Since then people began to
associate the word “eCommerce” with the ability to purchase various goods through the
Internet using secure protocols and electronic payment services.
Historical Timeline:
• 1979: Michael Aldrich invented online shopping
• 1981: Thomson Holidays, UK is first B2B online shopping
• 1985: Nissan UK sells cars and finance with credit checking to customers online from
dealers’ lots.
• Pizza Hut offers online ordering on its Web page in 1992
• 1995: Jeff Bezos launches Amazon.com
• 2010: US e-Commerce and Online Retail sales projected to reach $173 billion, an
increase of 7 percent over 2009

1.3 Objective of e-shopping


The main objectives of the e-shopping are given below:
1. To provide information about various products in a different category.
2. Customer can purchase Products Online.
3. Customer can log in and get various information about products and can purchase a
suitable product with price and quality comparison.
4. Customer can pay online, so security is must, therefore, e-shopping provide secure
transactions.
5. After-sale e-shopping also provide after-sales service in which customer problem is
solved.
6. Data security is maintained to a relatively high level by implementing it at the Database
level, so as to ensure that only authorized users have access to confidential client
information

1.4 Types of E-commerce


There are several types of e-commerce models, based on market segmentation, that can be used
to conducted business online. The 6 types of business models that can be used in e-
commerce include:
1. Business-to-Customer (B2C)
2. Consumer-to-Business (C2B)

2
3. Business-to-Business (B2B)
4. Consumer-to-Consumer (C2C)
5. Business-to-Administration (B2A)
6. Consumer-to-Administration (C2A)
1.4.1 Business-to-Business (B2B)
B2B e-commerce refers to the sale of goods or services between businesses via an online sales
portal. While sometimes the buyer is the end user, often the buyer resells to the consumer. This
type of e-commerce typically applies to the relationship between producers and wholesalers; it
may additionally remain applied to the relationship between the producers or the wholesalers
and the retailers themselves. However, the same relationship can also occur between service
providers and business organizations. B2B typically requires more venture capital and a longer
sales cycle, but results in higher order value and more recurring purchases.
As newer generations become decision makers in business, B2B ecommerce will become more
important. In 2015, Google found that close to half of B2B buyers were millennials—nearly
double the amount reported in 2012.
Examples of this model are ExxonMobil Corporation, the Chevron Corporation, Boeing,
and Archer-Daniels-Midland. These businesses have custom, enterprise ecommerce platforms
that work directly with other businesses in a closed environment.

Figure 1.1: Business-to-Business (B2B)


The advantages of B2B e-commerce include:
1. Convenience: While companies can sell through physical storefronts or take transactions
by phone, B2B commerce often takes place online, where companies advertise their
products and services, allow for demonstrations and make it easy to place bulk orders.
Sellers also benefit from efficient order processing thanks to this digital transaction model.
2. Higher profits: B2B companies often sell their items in wholesale quantities, allowing
buyers to receive a good deal and restock less often. Larger order numbers lead to higher

3
potential sales and additional profits for B2B sellers. At the same time, the ease of
advertising to other businesses through B2B websites can help cut marketing costs and
boost conversion rates.
3. Huge market potential: From business software and consulting services to bulk materials
and specialized machinery, B2B sellers can target a large market of companies across
industries. At the same time, they have the flexibility of specializing in an area like
technology to become a leader in the field.
4. Improved security: Since contracts are a common part of B2B commerce, there's some
security for both buyers and sellers in that there's less concern that one will pay and the
other will deliver goods as promised. Since sales usually get tracked digitally, it's also
more secure in that B2B sellers can track and monitor their financial results.
The disadvantages of B2B e-commerce include:
1. More complex setup process: Getting started as a B2B retailer takes work to figure out
how to get customers who stay dedicated and make large-enough orders. This often
requires thorough research to advertise to potential businesses, set up a custom ordering
system and adapt quickly when sales are underwhelming;
2. Limits to sales: While B2B companies can sell a lot, they do miss out on potential sales
to individual customers. The smaller pool of business buyers and the need to negotiate
contracts can put some limits on profits, especially when the company loses key buyers
to other competitors;
3. Need for B2B sellers to stand out: At the same time, the B2B market has many
companies competing and selling similar products and services. Sellers often need to
cut prices and find special ways to grab companies' attention to succeed in the market;
4. Special ordering experience needed: B2B companies selling online need to put much
effort into designing a website and ordering system that buyers find easy to use. This
means presenting product and service information clearly, offering online demos or
consultations and using order forms with appropriate options for quantities and any
special customization needed.
1.4.2 Business-to-consumer (B2C)
Business-to-consumer (B2C), or direct-to-consumer, is the most common e-commerce model.
It deals with electronic business relationships between businesses—both producers and service
providers—with end consumers. Many people like this method of e-commerce as it allows
them to shop around for the best prices, read customer reviews, and often find different
products that they would not otherwise be exposed to in the physical retail world. This e-
commerce category also enables businesses to develop a more personalized relationship with
their customers.
Anything one buys online as a consumer is done as part of a B2C transaction. The decision-
making process for a B2C purchase is much shorter than a business-to-business (B2B)
purchase, especially for items that have a lower value, thus having a shorter sales cycle. B2C
businesses therefore typically spend less marketing dollars to make a sale but also have a lower
average order value and less recurring orders than their B2B counterparts. B2C innovators have
leveraged technology like mobile apps, native advertising and re-marketing to market directly
to their customers and make their lives easier in the process.

4
Examples of B2C businesses are everywhere: exclusively-online
retailers include Newegg, Overstock.com, Wish, and Mod Cloth. Major B2C-model brick-
and-mortar businesses include Staples, Wal Mart, Target, REI, and Gap.

Figure 1.2: Business-to-Customer (B2C)


The advantages of B2C e-commerce include:
1. Unlimited marketplace: The marketplace is unlimited, enabling the customers to
explore and shop at their convenience. We can check on the desired product from home,
offices and anywhere else without any time restrictions. Products can be purchased
from around the world. It represents the breaking of international barriers, giving people
the opportunity to purchase products virtually;
2. Lower costs of doing business: B2C has reduced several business components
including employees, purchasing cost, mailing confirmations, phone calls, data entry
and the requirement for opening stores with physical existence. This has reduced
transaction costs for customers;
3. Business administration made easier: It has made it easier to record store inventory,
shipment, logs and overall business transactions compared with traditional methods of
business administration. These calculations are now occurring automatically.
Moreover, real-time updates can be provided, through which any issues can be flagged;
More efficient business relationships: Building new and improved associations with the
dealers and suppliers.
4. Workflow automation: This process enables the shipping of products in a timely
manner. Furthermore, it automatically adjusts stock levels and figures out location
availability. It includes highly reliable security systems, with step by step verification,
account entry and admiration mode to look after business transactions. The third-party
direct sales are backed up with familiar banking and accounting features that enable
businesses to reach out to vendors and perform internal business transactions
accordingly.
The disadvantages of B2C e-commerce include:

5
1. Infrastructure: Even though the internet enables reaching a huge, international pool of
customers, many still do not have access to the internet;
2. Competition: Competition is severe. There are certain companies that have managed to
maintain sizeable market shares giving them a chance to survive in the long run. New
and improved products must be rolled out consistently to secure customers;
3. Limited product exposure: Despite rewarding the customers with ease-of-access and a
unique level of flexibility for choosing products, e-commerce has restricted product
exposure for buyers over the internet. Most websites would not allow customers to go
beyond the glamorous product images and their descriptions at the time of purchasing
the product. It gives consumers the idea that e-commerce supports ‘limited product
exposure', which is why some products disappoint customers at the time of shipment
and are sent back to companies immediately.
1.4.3 Consumer-to-business (C2B)
Consumer-to-business (C2B) e-commerce is when a consumer makes their services or products
available for companies to purchase. The competitive edge of the C2B e-commerce model is
in its pricing for goods and services. This approach includes reverse auctions, in which
customers name the price for a product or service they wish to buy. Another form of C2B
occurs when a consumer provides a business with a fee-based opportunity to market the
business's products on the consumer's blog.
For instance, food companies may ask food bloggers to include a new product in a recipe and
review it for readers of their blogs. YouTube reviews may be incentivized by free products or
direct payment. This could also include paid advertisement space on the consumer
website. Google AdWords/AdSense has enabled this kind of relationship by simplifying the
process in which bloggers can be paid for ads. Services such as Amazon Affiliates allow
website owners to earn money by linking to a product for sale on Amazon.
Examples of C2B include: a graphic designer customizing a company logo, or a photographer
taking photos for an e-commerce website.
The C2B model has flourished in the internet age because of ready access to consumers who
are "plugged in" to brands. Where the business relationship was once strictly one-directional,
with companies pushing services and goods to consumers, the new bi-directional network has
allowed consumers to become their own businesses. Reductions in the cost of technologies
such as video cameras, high-quality printers, and Web development services give consumers
access to tools for promotion and communication that were once limited to large companies.
As a result, both consumers and businesses can benefit from the C2B model.

6
Figure 1.3: Customer-to-Business (C2B)
The advantages of C2B can be expressed through an example: The C2B
website thefreemortgagecalculator.com offers a LendingTree advertisement at the top of the
page. The advantage of this website is that the owner does not have to sell mortgages, meet
with customers, or pay for everyday business operation expenses in order to make money. If
the LendingTree advertisement is used by a visitor, the website owner gets paid a commission
from LendingTree for the lead.
The disadvantages of C2B transactions are that one must be well-versed in web design to create
such a website and the amount of money earned is far less than what could be earned by selling
the mortgage directly to the consumer instead.
1.4.4 Consumer to consumer (C2C)
Consumer-to-consumer (C2C), or customer-to-customer, represents a market environment
where one customer purchases goods from another customer using a third-party business or
platform to facilitate the transaction.
In this case, the third-party platform typically earns their money by charging transaction or
listing fees. These businesses benefit from self-propelled growth by motivated buyers and
sellers, but face a key challenge in quality control and technology maintenance. Another
customers’ benefit is the competition for products. Customers may often find items that are
difficult to locate elsewhere. Also, margins can be higher than traditional pricing methods for
sellers as there are minimal costs due to the absence of retailers or wholesalers. Opening a
C2C site takes careful planning.
Examples of C2C include Craigslist and eBay, who pioneered this model in the early days of
the internet. Generally, transactions in this model occur via online platforms (such as PayPal),
but often are conducted using social-media networks (e.g. Facebook marketplace) and
websites (Craigslist).

7
Figure 1.4: Customer-to-Customer (C2C)
The advantages of C2C:
1. Availability: It is always available so consumers can shop on demand;
2. Websites are updated regularly.
3. Higher profitability: Consumers selling products directly to other consumers can
achieve higher profits.
4. Low transaction cost: Selling via online platforms is much cheaper than the costs
incurred on having physical store space.
5. Direct relationship: Customers can directly contact sellers without having to go through
an intermediary.
The disadvantages of C2C include:
1. Payment may be less secure.
2. Security issues: There could be theft due to scammers falsely impersonating well know
C2C sites.
3. Lack of quality control of products.
1.4.5 Business to Administration (B2A)
Business-to-administration (B2A), also known as business-to-government (B2G), refers to all
transactions between companies and public administrations or government agencies.
Government agencies use central websites to trade and exchange information with various
business organizations. This is an area that involves many services, particularly in areas such
as social security, employment, and legal documents.
Businesses that are accustomed to interacting with other businesses or directly with consumers
often encounter unexpected hurdles when working with government agencies. Layers of
regulation can harm the overall efficiency of the contracting process, and thus, governments
tend to take more time than private companies to approve and begin work on a given project.

8
While businesses may find that government contracts involve additional paperwork, time, and
vetting, there are advantages to providing goods and services to the public sector. Government
contracts are often large and more stable than analogous private-sector work. A company with
a history of successful government contracting usually finds it easier to get the next contract.
One example of a B2A model is Accela, a software company that provides government
software solutions and public access to government services for permitting, planning, licensing,
public health, and so on.

Figure 1.5: Business to Administration (B2A)

1.4.6. Consumer-to-Administration (C2A)


Consumer-to-administration (C2A) e-commerce encompasses all electronic transactions
between individuals and public administration. The C2A e-commerce model helps the
consumer post their queries and request information regarding the public sector directly from
their local governments/authorities. It provides an easy way to establish communication
between the consumers and the government.
Examples of C2A include taxes (filing tax returns), health (scheduling an appointment using
an online service), and paying tuition for higher education.

Figure 1.6: Consumer-to-administration (C2A)

9
CHAPTER 2
TOOLS AND TECHNOLOGIES LEARNED

2.1 Acceptance test generation

The objective of this step is to produce a set of test data that may be used to test the system.
Whenever a new system is developed it need to be tested to confirm its validity and to
determine whether it meets the user requirements. The system was also tested with some
sample records. The records were entered into the system and various reports were generated
to check the system.

System testing is a critical phase of implementation. Testing of the system involves hardware
devices and debugging of computer programs and testing information processing procedures.
Testing can be done with test data, which attempt to simulate all possible condition that may
rise during processing. The testing methods adopted during the testing of system are unit testing
and integration testing.

2.1.1 TESTING

Testing is the process of executing a program with the intent of finding errors. Although
software testing is itself an expensive activity, yet launching of software without may lead to
cost potentially much higher than that of testing, especially in systems where human safety is
involved. Effective software testing will contribute to the delivery of higher quality software
products, more satisfied users, and lower maintenance costs, more accurate and reliable results.
Software testing is necessary and important activity of software development process.

2.1.2 STRUCTURAL TESTING


Structural Testing takes into account the internal mechanism of a system or component. Fatigue
Testing is carried out with the objective of determining the relationship between the stress
range and the number of times it can be applied before causing failure. So when your product’s
structural durability needs to be predicted, verified and validated, turn to DTB's Structural
Testing and Fatigue Testing experts. We provide you with the necessary structural testing and
fatigue testing equipment and personnel to test the design and manufacturing integrity of your
product. Call upon our vast experience in commercial and military applications.
Software structure testing is a 2-day course designed to provide an excellent knowledge base
and practical skills for anyone interested in improving Software Structural Testing techniques
and practices in their organization. This course starts with an overview of software testing
basics, including discussions of the importance of software testing, the different levels of
testing and basic testing principles. Basic testing terminology is defined. Techniques for

10
ensure test coverage of requirements, different types of testing documentation and various test
activities are discussed.
2.1.3 FUNCTIONAL TESTING
It is very useful and convenient in support of functional testing. Although JMeter is known
more as a performance testing tool, functional testing elements can be integrated within the
Test Plan, which was originally designed to support load testing. Many other load-testing tools
provide little or none of this feature, restricting themselves to performance-testing purposes.
Besides integrating functional-testing elements along with load-testing elements in the Test
Plan, you can also create a Test Plan that runs these exclusively. In other words, aside from
creating a Load Test Plan, it also allows you to create a Functional Test Plan. This flexibility
is certainly resource-efficient for the testing project.
This will give a walkthrough on how to create a Test Plan as we incorporate and/or configure
its elements to support functional testing. This created a Test Plan for a specific target web
server. We will begin the chapter with a quick overview to prepare you with a few expectations;
we will create a new Test Plan, only smaller. The Test Plan we will create and run at the end
of this chapter will incorporate elements that support functional testing, exclusively.
2.1.4 UNIT TESTING

Unit testing focuses on the modules independently locate the errors. This enables the tester to
detect errors in coding. It is the process of taking a module and running it in isolation from rest
of the software product by using prepared test cases and comparing the actual result with the
result redirected with the specifications and design of the module. One purpose of testing is to
find and remove as many errors in the software as practical. There are number of reasons in
support of unit testing-:

• The size of module single module is small that we can locate an error fairly easily.
• The module is small enough that we can attempt to test it in some demonstrably
exhaustive fashion.
• Confusing interactions of multiple errors in widely different parts of software are
eliminated.
There are problems associated with testing a module in isolation. How do we run a module
without anything to call it, to be called by it, possibly to output intermediate values obtained
during execution? One approach is to construct an appropriate driver routine to call it, and
simply stubs to be called by it, and to insert output statements in it. Stubs serve to replace
modules that are subordinate to the module to be tested. A stub or dummy subprogram uses the
subordinate module’s interface, may do minimal data manipulation, prints verification of entry
and returns.

11
2.1.5 INTEGRATION TESTING

This is a systematic technique for constructing the program structure while at the same time to
uncover the errors associated with the interface. The objective is to take unit tested module and
build a program structure that has been detected by designing. The main purpose of integration
testing is to determine that the interfaces between modules are correct or not. One specific
target of integration testing is the interface: whether parameter matches on both sides as to type,
permissible ranges, meaning & utilization. There are 3 types of integration testing-

• Top Down Approach: Top Down integration proceeds down the invocation hierarchy,
adding one module at a time until an entire tree level is generated.
• Bottom Up Approach: The Bottom up strategy works similarly from the bottom to up.
• Sandwich Strategy: A sandwich strategy runs from top and bottom simultaneously.

2.2 Test data used

The proper selection of the data is very important. If the test data is not appropriate or
representative of the data to be provided by the user, the reliability of the output is susceptible.

Two different sources were during testing of the system:

• Using Live Test Data: Live test are those that are actually extracted from the
organization files. Use of the live data make testing easier by obtaining most expected
outputs and if it is found that the program can handle the entries processing of the
system accurately.
• Using Artificial Test Data: Live data is difficult to obtain insufficient amount to conduct
extensive testing. It does not test all the combination or formats that can be done by
entering to the system. Therefore, artificial test data were used at the time of unit testing.
Artificial test data was created solely for test purposes which provide extreme values
for testing the limit of candidate system.
TEST CASES:

• System is properly linked or not: Whether they are redirected to desired page or not.
• Information passed: If a page passes some parameter to another page then it should be
checked that the page gets the correct information, whatever is passed by the previous
page.

12
• Output should be correct: Every functionality of the system should be checked properly
whether it gives the right result or not generally test is performed with known results.
If the output of the system is matched with that result the system is working fine.

Table 2.1: Login for user

Serial Description Expected Actual Result Result


No Result

1. This page contains 2 User home page Respective user Passed


fields user name and should open home page is
password and a login after successful opening after
button to submit the login. successful login
information. User is by user.
entering correct
information.

2. If either user name or An error When wrong Passed


password is filled message should information is
incorrect or left blank. be displayed entered by user
and user should then an error
be asked fill the message is
information displayed.
again.

Table 2.2: User registration page

Serial Description Expected Actual Result Result


No Result

1. User registration page 1 After After Passed


consist of detail submitting submitting
information about User information information
and a submit button to User User
submit the information. registration registration

13
Here user is entering page 2 should page 2 is
correct information. be displayed. displayed.

2. If the information entered An error An error Passed


by user in incorrect or left message should message is
somewhere blank. be displayed occurred if the
and ask the user information is
to fill the incorrect or left
information blank.
again.

2.3 Implementation

Implementation is the stage in the project where the theoretical design is turned into the
working system and is giving confidence to the new system for the users i.e. will work
efficiently and effectively. It involves careful planning, investigation of the current system and
its constraints on implementation, design of method to achieve the changeover, an evaluation,
of change over methods. A part from planning major task of preparing the implementation is
education of users. The more complex system is implemented, the more involved will be the
system analysis and design effort required just for implementation. An implementation
coordinating committee based on policies of individual organization has been appointed. The
implementation process begins with preparing a plan for the implementation for the system.
According to this plan, the activities are to be carried out; discussions may regarding the
equipment have to be acquired to implement the new system.

Implementation is the final and important phase. The most critical stage is in achieving a
successful new system and in giving the users confidence that the new system will work and
be effective. The system can be implemented only after thorough testing is done and if it found
to working according to the specification. This method also offers the greatest security since
the old system can take over if the errors are found or inability to handle certain types of
transaction while using the new system.

At the beginning of the development phase a preliminary implementation plan is created to


schedule and manage the many different activities that must be integrated into plan. The
implementation plan is updated throughout the Development phase, culminating in a

14
changeover plan for the operation phase. The major elements of implementation plan are test
plan, training plan, equipment installation plan, and a conversion plan.

There are three types of implementation:

• Implementation of a computer system to replace a manual system.


• Implementation of a new computer system to replace an existing system.
• Implementation of a modified application to replace an existing one, using the same
computer.
Successful implementation may not guarantee improvement in the organization using the new
system, but improper installation will prevent it. It has been observed that even the best system
cannot show good result if the analysts managing the implementation do not attend to every
important detail. This is an area where the systems analysts need to work with utmost care.

2.3.1 Conversion Methods:

A conversion is the process of changing from the old system to the new one. It must be properly
planned and executed. Four methods are common in use. They are Parallel Systems, Direct
Conversion, Pilot System and Phase In method.

2.3.2 Parallel system:


The most secure method of converting from an old to new system is to run both systems in
parallel. This method is safest one because it ensures that in case of any problem in using new
system, the organization can still fall back to the old system without the loss of time and money.
The disadvantages of parallel systems approach are:
• It doubles operating costs.
• The new system may not get fair trial.

2.3.3 Post Implementation Review


After the system is implemented and conversion is complete, a review should be conducted to
determine whether the system is meeting expectations and where improvements are needed. A
post implementation review measures the systems performance against predefined
requirement. It determines how well the system continues to meet the performance
specifications.

2.4 Database-driven Online Shopping Portal


The shopping portal that I have built for our store makes use of several advance features that
the cart contains all the selected products until checkout and My Shopping by which user can
track their previous shopping on this portal. For doing so shopping portal uses a Database by
which all this information stored in this database and when required then it is fetched from it.

15
So, I use MYSQL Database in this project. So, this shopping portal contains dynamic effects
by using this database. Some parts of this project which use database are following:
• Firstly, when user Register an account on this website the user gives their information
which are stored in database.
• Then when users want to login on this website then they give their username and
password as they choose at registration time, if both are matched with database’s
username and password then user can successfully log in the website otherwise Access
Denied.
• The Objects which users can see on homepage, after login page, buy products page are
also come from database.
• Now After login user can modify their profile and password. The modified profile
details and password details altered in the database.
• In Buy Products Section Product and Their Prices also fetched from database’s table.
When user select a product and push Add to cart then items added to database’s cart
table.
• Then in My Cart section the products displayed which are in the cart table of the
database following by user.
• Checkout section takes the carts item and their total price and then payment details are
given by the user and these details store in separate database table. After Successful
entry in this table users cart empty automatically because all items purchased by him.
• In My Shopping section the products a user purchased are displayed.

16
CHAPTER 3

PROJECT BRIEF

3.1 Profile of the Problem

One must know what the problem is before it can be solved. The basis for the online shopping
portal is to buy products online and save the timing.

An Online shopping portal, who want to buy any product of their need, has to contact different
Shoppers, before deciding upon a particular Product that best suit his needs, requirements and
satisfaction. Moreover, most of the work involved in this development process has to be done
manually which is very time consuming and cumbersome and also, it reduces the efficiency,
accuracy.

To know the facts and understanding of the problem in detail, System Analysis is carried out. It
is the process of studying the business processes and procedures, generally referred to as business
systems, to see how they can operate and whether improvement is needed.

3.2 Software development life cycle


The activities in the life cycle are explained in brief below:
1. Survey project scope and feasibility:
This activity is also known as the feasibility study. It begins with a request from the user for a
new system. It involves the following:
• Identify the responsible user for a new system
• Clarify the user request
• Identify deficiencies in the current system
• Establish goals and objectives for the new system
• Determine the feasibility for the new system
• Prepare a project charter that will be used to guide the remainder of the Project

2. Systems analysis:
The objective of the system analysis activity is to develop structured system specification for
the proposed system. The structured system specification should describe what the proposed
system would do; independent of the technology, which will be used to implement these
requirements. The structured system specification will be used to implement these
requirements. The structured system specification will be called the essential model (also
known as logical model). The essential model may itself consist of multiple models, modelling
different aspect of the system. The data flow diagrams may model the data and their
relationships and the state transition diagram may model time dependent behaviour of the
system. The essential model thus consists of the following.
17
• Context diagram
• Levelled data flow diagrams
• Process specification for elementary bubbles
• Data dictionary for the flow and stores on the DFDs.

3. Preliminary design:
The activity deals with certain design issues, which are to be finalized in consultation with the
user. The two most important design issues of relevance to the user are the automation
boundary and the human machine interface. The output of the activity is the user
implementation model. The major part of the user implementation model is the specification
for the user interface of the proposed system. The user implementation model is also referred
to as the physical model of the proposed system. The user implementation model is also
referred to as the physical model of the proposed system. The model, in addition to the essential
model, defines the following for the proposed system:
• Automation boundary
• Report layouts
• Layouts of the source documents
• Screen layouts for the data entry forms
• Menu

4. System design:
System design involves transformation of the user implementation model into software design.
The design specification of the proposed system consists of the following:
• Database scheme
• Structure charts
• Pseudo codes for the modules in structure charts

5) Implementation:
This activity includes programming, testing and integration of modules into a progressively
more complete system. Implementation is the process of collect all the required parts and
assembles them into a major product.
6) Test generation:
This activity generates a set of test data, which can be used to test the new system before
accepting it. In the test generation phase, all the parts are come which are to be tested to ensure
that system does not produce any error. If there are some errors then we remove them and
further it goes for accepting.

3.3 Problem analysis

Product definition:

18
Online Shopping Portal System is a computerized, online solution to the various problems faced
by the Product buyer and seller wishing to outsource their software development work to a
Provider at an economical cost, thus achieving high performance, accuracy, reliability and high
speed of data retrieval.

In this system, there is a registration process each for the Product buyer and seller. The
Administrator of the site verifies the Provider after his registration and if satisfied, assigns him a
user name and password.

Our site can be used by anyone who is searching for Products whether he/she is first time visiting
our site. Our site also provides some discounted Products as same u get on any shop.

The software covers the following point while keeping in mind user’s requirement:

• Fast online access of information about various Products.


• Search Products by keywords like functional area, experience and also by initials of the
Product’s name.
• Administrator will maintain the database and perform all process.
There are 2 categories of users:

1. General User
2. Registered Users

3.4 Feasibility analysis

The feasibility study of this project comprises of the following:

1. Economic Feasibility:
The cost centres in the system development as well as operation are trivial. The
major can be network, internet and the software required for coding. The software used for
the development of the proposed system is PHP and MySQL. In terms of wallet our product
is in well reach of pocket.

2. Technical Feasibility:
Technical feasibility centres on the current system and to what extent it can support
the proposed system, it includes current computer system specifications such as hardware,
software etc. it also involves financial considerations to accommodate the technical
enhancements. If the budget is serious constraint then the project is judged not feasible.
Though the system is developed in the generalized form, which covers all the procedures

19
and operations carried out in an internet-based solution. The version used in the system is
PHP and MySQL. MySQL can manage large amount of data and is simple and secure.
Using PHP helps us to design the look of our application.

3. Operational Feasibility:
In this we determine what change will be brought in system, new skills required
and other human organization and political aspects. Each user can easily use our site.
However, it is desirable that the user has the basic knowledge of the computers. Without
making any changes in the rules and regulations of the existing system proposed system
can easily adopted.

3.5 Project plan

1. Defining a problem:
• Define a problem.
• Justify the needs for a computerized solution.
• Identify the functions to be provided by the systems along with the constraints.
• Determine goal and requirements of the system.
• Establish the high-level acceptance criteria.

2. Developing a solution strategy:


• Outline several solution strategies. Do not consider constraints for the time being.
• Conduct a feasibility strategy, including why the other strategies are rejected.
• Develop a list of priorities for the product characteristics.

3.6 Planning the development process:


• Define a life cycle model and an organizational structure for the project.
• Plan the configuration management, quality assurance and validation activities.
• Establish the preliminary cost estimates, the schedule and the staffing estimates for
System development.
• Develop preliminary estimates for the computing resources required to operate and
maintain the system.

20
SIZE

COST DEVELOPMENT
ESTIMATION TIME

RESOURCES
REQUIREMENT

PROJECT
SCHEDULING

Figure: 3.1 Activities during software project planning

3.7 Size estimation:


The estimation of size is very critical and difficult area of the project planning. It has been
recognized as a crucial step from the very beginning. The difficulties in establishing units for
measuring size lie in the fact that the software is essentially abstract; it is difficult to identify
the size of the system. Many attempts have been made at establishing a unit for measure size.
They are given as:

• Lines of Code:
A line of code is any line of program that is not a comment or blank line, regardless of
the number of statements or fragments of statements on the line. This specifically

21
includes all lines containing program header, declarations and executable and non-
executable statements.
• Function Count:
It measures functionally from user point of view that is on the basis of what the user
requests and receives in return. Therefore, it deals with the functionality being
delivered, and not with lines of code, source modules etc. Measuring size in this way
has the advantage that size measure is independent of the technology used to deliver
the functions.

3.8 Cost estimation:

For any software project, it is necessary to know how much it will cost to develop and how
much development time it will take. These estimates are needed before development is
initiated. In many cases estimates are made using past experience as the only guide. A number
of techniques have been developed and are having following attributes in common:

• Project scope must be established in advance.


• Software metrics are used as a basis from which estimates are made.
• The project is broken into small pieces which are estimated individually.

3.9 Hardware & software requirements:

At Developer Side:
During system development, I have to design both static and dynamic website interfaces, create
website functions and a database system, edit photos and pictures, so it has a set of software
and hardware requirements.

Hardware Used Software Used


• Intel Dual Core Processor • XAMPP local server
• 1 TB Hard Disk Drive. • MYSQL database
• 4 GB RAM. • Notepad
• O.S. – Windows 10 • Chrome browser

22
At system user side:
The following is the requirements for the system users including members and administrators.
Hardware Used Software Used
• Intel Dual Core Processor • XAMPP local server
• 1 TB Hard Disk Drive. • MYSQL database
• 4 GB RAM. • Chrome browser
• O.S. – Windows 10

3.10 Front End Details:


Front End tool is used for give a Graphical user interface to system. By this we can make a
system user friendly and more capable. I have chosen PHP as front-end tool. Because it is an
Open Source Technology, freely available and more familiar with any type of database.
About php:
PHP: Hypertext Pre-processor is a widely used, general-purpose scripting language that was
originally designed for web development to produce dynamic web pages. For this purpose,
PHP code is embedded into the HTML source document and interpreted by a web server with
a PHP processor module, which generates the web page document. As a general-purpose
programming language, PHP code is processed by an interpreter application in command-
line mode performing desired operating system operations and producing program output on
its standard output channel. It may also function as a graphical application. PHP is available as
a processor for most modern web servers and as standalone interpreter on most operating
systems and computing platforms.
PHP stores whole numbers in a platform-dependent range. This range is typically that of 32-
bit signed integers. Unsigned integers are converted to signed values in certain situations; this
behaviour is different from other programming languages. Integer variables can be assigned
using decimal (positive and negative), octal, and hexadecimal notations. Point numbers are
also stored in a platform-specific range. They can be specified using floating point notation, or
two forms of scientific notation. PHP has a native Boolean type that is similar to the native
Boolean types in Java and C++. Using the Boolean type conversion rules, non-zero values are
interpreted as true and zero as false, as in Perl and C++. The null data type represents a variable
that has no value. The only value in the null data type is NULL. Variables of the "resource"
type represent references to resources from external sources. These are typically created by
functions from a particular extension, and can only be processed by functions from the same
extension; examples include file, image, and database resources. Arrays can contain elements
of any type that PHP can handle, including resources, objects, and even other arrays. Order is
preserved in lists of values and in hashes with both keys and values, and the two can be
intermingled. PHP also supports strings, which can be used with single quotes, double quotes,
or heredoc syntax.

23
Why PHP?
PHP is one of the most popular server-side scripting languages running today. It is used for
creating dynamic Webpages that interact with the user offering customized information. PHP
offers many advantages; it is fast, stable, secure, easy to use and open source (free).
• User friendly
• GUI
• Separation of work (designing & coding)
• Written once run anywhere
• PHP API

3.11 Back end details:


Back end part of a system is more important because it controls all the internal process
of a system. I have chosen XAMPP local database as back end. Because it is word’s Most
Capable relational database and provide more security than others.
Why MySQL?
MySQL is the world's most popular open source database software, with over 100 million
copies of its software downloaded or distributed throughout its history. With its superior speed,
reliability, and ease of use, MySQL has become the preferred choice for Web, Web 2.0, SaaS,
ISV, Telecom companies and forward-thinking corporate IT Managers because it eliminates
the major problems associated with downtime, maintenance and administration for modern,
online applications.
Many of the world's largest and fastest-growing organizations use MySQL to save time and
money powering their high-volume Web sites, critical business systems, and packaged
software including industry leaders such as Yahoo!, Alcatel-Lucent, Google, Nokia, YouTube,
Wikipedia, and Booking.com.
The flagship MySQL offering is MySQL Enterprise, a comprehensive set of production-tested
software, proactive monitoring tools, and premium support services available in an affordable
annual subscription.
MySQL is a key part of WAMP (Window, Apache, MySQL, PHP), the fast-growing open
source enterprise software stack. More and more companies are using WAMP as an alternative
to expensive proprietary software stacks because of its lower cost and freedom from platform
lock-in.

24
Draw context
Diagram

Draw
Prototypes

Model the
Requirement

Finalize the
Requirement

Figure 3.2: Requirement analysis steps

1. Draw Context Diagrams

The context diagram is a simple model that defines the boundaries and interfaces of the
proposed system with the external world. It identifies the entities outside the proposed system
that interact with the system

2. Development of Prototype
One effective way to find out what the customer really wants is to construct a prototype,
something that looks and preferably acts like a part of the system they want.
3. Model the Requirement
This process really consists of various graphical representations of functions, data entities,
external entities and the relationship between them. The graphical view may help to find
incorrect, inconsistent, missing and superfluous requirement.
4. Finalize the Requirements
After modelling the requirements, we will have better understanding of the system behaviour.
The inconsistencies and ambiguities have been identified and corrected.

25
CHAPTER 4
FUNCTIONAL REQUIREMENTS
Functional requirements define the fundamental actions that must take place in the software in
accepting the inputs and in processing and generating the outputs.

1. Login Module:

This module is provided for administrator and users such as Product buyer and seller who have
registered themselves in the system. These logins are provided according to the need of the
systems.

• Input: User id and password


• Process: After entering user id and password by user process of validation occur to
identify whether user id and password is available in database or not.
• Output: Registered user can access website and can use the services.
Administrator Module: The administrator is provided with password and login-id with which
he/she can access the system. Administrator is provided right of maintaining the database,
verifies registered users.
• Input: Login id and password.
• Process: Process of validation will occur.
• Output: Administrator will maintain the database and will perform Product seller
process.
Search Module: In this module we are going to provide facility for Product buyer to search for
Products according to their specified categories so that users can search for Products easily.
• Input: Initial letter of Product, with the help of keywords and with the help of Brand
name.
• Output: Information about Products.
User Module: As users are the main visitor of site, the following facilities are available through
this module.
• Can search the Products according to their need
• Can order online books and pay via credit or atm card or PayPal.
• Can get information about Products.
• Input – User Id and password
• Process – Process of validation will occur.
• Output – Only genuine user can access services provided by website.

26
4.1 Non-functional requirement

1. Performance Requirement
The performance of the product mainly depends on the speed of Internet connection. If the user
wants hard real time response, then this is definitely not the product to go for.

2. Safety Requirements
The electrical connection to the devices is critical and should be done according to the standards
to avoid any short circuits.

3. Security Requirements
We aim to provide high security features like encryption to the user accounts to provide security
from illegal hacking and gaining access to the system.

4.2 System design

The most creative and challenging phase of System Development Life Cycle (SDLC) is
Software Design. SDS is systematic documentation of design. A design process involves
“conceiving and planning out in the mind” and “making drawing pattern or sketch”. The term
“design” describes a final system and the process by which it is developed. It assists in catching
potential errors before the implementation phase itself which had been very costly to remove
otherwise.
System Design is a solution how to translate the system requirement into a blue print for
constructing the software. The goal of SDS is not only to produce a correct design but the best
possible one within the limitation imposed by the requirements and the physical and social
environment in which the system will operate.
The system architecture description found in this document provides the reader a clear sense
of how the system will be organized, how the components will interact and how the users will
interface with the running software.

4.3 Design notations


The DFD also known as the Bubble Chart is a simple graphical formalism that can be used to
represent a system in terms of the input data to the system. Various processing carried out on
these data, and the output data generated by the system. The main reason why the DFD
technique is so popular is probably because of the fact that DFD is a very simple formalism-it
is simple to understand and use. A DFD uses a very limited number of primitive symbols to
represent the functions performed by a system and the data flow among these functions.
Starting with a set of high-level functions that a system performs, a DFD model hierarchically
represents various sub functions. The five different types of primitive symbols used for
constructing DFDs are:

27
SYMBOLS USED:

1. PROCESS:

A function is represented using a circle. This symbol is called a process or a bubble.


Bubbles are annotated with the names of the corresponding functions.

2. EXTERNAL ENTITY:

An external entity such as a librarian, a library member, etc. is represented by a


rectangle. The external entities are essentially those physical entities external to the software
system that interact with the system by inputting data to the system or by consuming the data
produced by the system. In addition to the human users, the external entity symbols can be used
to represent external hardware and software such as application software.

3. DATA FLOW:
A directed arc or an arrow is used as a data flow symbol. A data flow symbol represents
the data flow occurring between two processes, or between an external entity and a process, in
the direction of the data flow arrow. Data flow symbols are usually annotated with the
corresponding data names.

4. DATA STORE:
A data store represents a logical file. It is represented using two parallel lines. A logical
file can represent either a data store symbol, which can represent either a data structure, or a
physical file on disk. Each data store is connected to a process by means of a data flow symbol.
The direction of the data flow arrow shows whether data is being read from or written into a
data store. An arrow flowing in or out of a data store implicitly represents the entire data of the
data store and hence connecting to a data store need not be annotated with the name of the
corresponding data items.

5. OUTPUT SYMBOL:

The output symbol is used when a hard copy is produced and the user of the copies cannot be
clearly specified or there are several users of the output.
6. PRODUCT FUNCTION:

28
The complete product is comprised of various functions

Function available to general user:

• User can access the information about various Products and Brands.
• User can become a member of site by registering himself.
• User can buy a Product online.
• Selected categories can be explored by user.
Registered user has some other function like

• Log – in page to log into the application.


• He will get email from administrator sending him information about new Products in
the store.
• Can change his/her password.
Function available to Administrator

• Administrator will add or delete the Products in the database.


• Administrator also provides the discount on the Products.
• It enables or disables the user after fill the user registration form.
• Administrator will send new password to the user email address.

4.4 User characteristics

This subsection of SRS should describe whose characteristics of the eventual user of the
product that will affect the specific requirement. Our website will be intended not only for
authorized user but also for general user.

4.4.1 ADMINISTRATOR

• Administrator should know how to access internet and must have good knowledge of
English.
• He must be aware of how to respond feedback and queries fired by user.

4.4.2 GENERAL USER

• We assume that user knows English & user need not be computer professionals.
• User should be aware of internet.
• User can access information through hyperlink such that navigation of various pages.

29
4.4.3 CONSTRAINTS

Only administrator will be able to make entries in the database and can modify it.

4.4.4 DETAIL DESIGN

1. Search:
On this web site two type of user can search the book one is registered and another is
unregistered. Registered user has to fill the form and then he/she can search or buy the
Products but unregistered can only search the Products not buy the Product until they did
not get the registered user.

2. Registration Form:
Shop will place registration form on the site. In this buyer interact with the shop. Buyer
will get registration form from the site and fill those forms and submit on the site. Shop
will store these registration forms in their database. In this we have to fill first name, last
name, address, e-mail, etc.

4.5 Entity Relationship Diagram


Entity relationship diagrams are a way to represent the structure and layout of a database. It is
used frequently to describe the database schema. ER diagrams are very useful as they provide
a good conceptual view of any database, regardless of the underlying hardware and software.
An ERD is a model that identifies the concepts or entities that exist in a system and the
relationships between those entities. An ERD is often used as a way to visualize a relational
database: each entity represents a database table, and the relationship lines represent the keys
in one table that point to specific records in related tables.

ERDs may also be more abstract, not necessarily capturing every table needed within a
database, but serving to diagram the major concepts and relationships. This ERD is of the latter
type, intended to present an abstract, theoretical view of the major entities and relationships
needed for management of electronic resources. It may assist the database design process for
an e-resource management system, but does not identify every table that would be necessary
for an electronic resource management database.

OBJECTS

There are three main objects on an ER Diagram:

30
1. Entities
2. Relations
3. Attributes
1. Entities:
An entity is a concept or object in the database. Entities are concepts within the data model.
Each entity is represented by a box within the ERD. Entities are abstract concepts, each
representing one or more instances of the concept in question. An entity might be
considered a container that holds all of the instances of a particular thing in a system.
Entities are equivalent to database tables in a relational database, with each row of the table
representing an instance of that entity.

2. Attributes:
The Supplier Name, Supplier Address, Telephone Number etc. A given attribute belonging
to a given entity occurrence can only have one value. Therefore, if a supplier could have
more than one address or telephone number then this should be determined before defining
the attributes of that entity type. In this example the defined entity may require two or three
address and/or telephone number attributes. It is the maximum practical instances of a given
attribute that should be catered for in the entity type definition.

3. Relationships:
Relations are the connections between two or more entities. Relationship lines indicate that
each instance of an entity may have a relationship with instances of the connected entity,
and vice versa. Each entity type can always be described in terms of attributes, and these
attributes will apply to all occurrences of that given entity type.

31
reply Request

Operation/data
processing
Authentication
Online
Login / Shopping Portal Products / Cart /
Index Database Shopping

(Approved/Reject) (Acknowledgement)

(Acknowledgement) Payment / Submission

Payment / Checkout

Figure 4.1: Online shopping portal database

User
Details

Register
Form

Username exists
Databas
e

Login

Figure 4.2: For Registration

32
User Request Access Denied

Not Authenticate

Authenticate

Database
Buy Products

Figure 4.3: For login

User Request

Database

User’s Cart
Checkout

Payment
Details

Figure 4.4: For buying products

33
Figure 4.5: E-R diagram

34
CHAPTER 5

FINAL DESIGN SCREENS

Figure 5.1: Homepage

35
Figure 5.2: Product page

36
Figure 5.3: Contact Us page

37
Figure 5.4: Register page

38
Figure 5.5: Login page

39
Figure 5.6: Cart page

40
Figure 5.7: Checkout page

41
Figure 5.8: Admin Dashboard

42
Figure 5.9: Subscribers on dashboard

43
Figure 5.10: Add user page

44
Figure 5.11: Product list page

45
Figure 5.12: Order (manage) page

46
Figure 5.13: Add product page

47
Figure 5.14: Manage User page

48
CHAPTER 6

CONCLUSION AND FUTURE SCOPE

1. To provide information about various products in a different category.


2. Customer can purchase Products Online.
3. Customer can log in and get various information about products and can purchase a
suitable product with price and quality comparison.
4. Customer can pay online, so security is must, therefore, e-shopping provide secure
transactions.
5. After-sale e-shopping also provide after-sales service in which customer problem is
solved.
6. Data security is maintained to a relatively high level by implementing it at the
Database level, so as to ensure that only authorized users have access to confidential
client information

49
REFERENCES

Web References
[1] https://en.wikipedia.org/wiki/E-commerce
[2] https://www.php.net/docs.php
[3] https://www.paypal.com/in/webapps/mpp/home
[4] https://www.bigcommerce.com/articles/ecommerce/types-of-business-models/
[5] https://www.businessofapps.com/insights/ecommerce-website-development-process/

50

You might also like