1.Introduction Of Project 2. Objective Of The Project 3. Scope Of The Project 4. Project Plan 5. The Existing System 6. Background Of The Organization 7. Current Problems 8. Areas For Improvement 9. Proposed System 10. Input/Output Requirement 11. Hardware And Software Requirement 12. Database Requirement 13. System Design 14. Tables And Fields For Database 15. Database Dictionary 16. E-R Diagram 17. ‘0’ Level DFD 18. ‘1’ Level DFD 19. Security Control 20. Future Scope Of The Project 21. Conclusion
INTRODUCTION TO THE PROJECT
Our project is based on the “Online Web Based Information System of the National Institute of Career Development ”, and it perform all functioning of NICD that is issuing form, admission of student, Counseling, Course Enquiry , Center Allotment, Seat Management etc. are done using this. In this online functioning all the function of NICD is done through on line .we can submit all the application forms, directly online. It is very less time consuming method and convent to use. In the off line functioning student suffers form many problems they submitting all the form in the queue. That is very timing process and it is not sufficient for every student and also submitting all the examination forms in a queue but on line reduces this timing process and there is no need of queue for submitting all there. On line process is helpful to performing easily in the University management; student directly acquired the Registration no, receipt number and the related information very quickly. Today environment is on line based on which process is very helpful for all the students who lived in different place and submitting the form at a one place directly internet application web page.They directly logon on the web page and acquired all the information very quickly.
OBJECTIVE OF THE PROJECT
Sales of application form -
Firstly user fill all details about him like name,father name,
mother name, dob etc and also fill up details of payment like DD No., DD Date, Bank Name from where he make his DD. After this a user name and apassword is provided by admin to the user. Where User Name is the Registration No and User Password is the DOB of the user. Through this User Name and Pasword user can enter in this website.
Check the feasibility or minimum criteria -
In this module admin Check status of
application . Issuing the admit card-
After checking application form , admin will provide an admit
card to the user. This admit card will be printed by user to enter in examination hall. Without this they can not give examination. On line merit list – After completed examination , user can see their marks and also their rank through subject wise. On line Counseling –
In this module online counceling was done by admin. In this user has
choice to select minimum five colleges. Allotment of the college –
In this module on the basis of vacant seat , prefered college was
alloted to the user.
College Fee Submission – After this user/student go to that alloted college and submit their fees.
Hostel Fees Submission –
In this module student submit their hostel fees.
SCOPE OF THE PROJECT
SYSTEM ANALYSIS The questionnaires, interviews and informal discussion with the employees allowed me to understand the needs of the users. Reason For Analysis
The recent expansion has increased the frequency of book issue and return, which has in turn aided to the complexity of hosting them. The current manual system is not fulfilling the information needs of those, who are responsible for implementing the management. Various analysis tools such as DFD is used for analysis. Scope of system Analysis The system analysis work will determine the feasibility and direction of the information needs as outlined in the system plan and the information system services request form .The findings of system analysis will be subsequently
recorded in the system analysis
completion report. We will be responsible for the delivery of this report with in weeks from beginning of the analysis. Responsibility for system design will be determined at the end of this system analysis phase.
PROJECT PLAN Once scope has been identified, our project team focus on the feasibility.
1.
Technical 2. Economical 3. Operational
TECHNICAL FEASIBILITY Under the technical feasibility study we study about component of the project. First head office of the company is computerized with its main work stations.Company needs to put computer system to head office,work stations and and every sections networked to a centralized computer center called SERVER. Each officer and each section is provided with a computer, which is called client system. This network is organized in such a manner that data from any computer in the network can be transferred to the server system can be accessed through any other, computer in network. Thisnetwork is a form of LAN(local area network) with required access authorization. The application require storing large volume of data, speedy processing and maintaining all the data integrity. ECONOMIC FEASIBILITY:
The only major area of expenditure in this project is the purchase of software and hardware, there will be two main servers to be kept in Head quarter .Out of these two servers one will be used to store data base while other will be used to keep application programs.
OPERATIONAL FEASIBILITY:
Any one user of the corporation who has authorization, with the basic knowledge of computer can use this software. Large number of employee across all the department/section in corporation will be interacting with this system. Every employee are trained for handle this software. The software will not allow the user to enter invalid data either by mistake or by intention. In such a case it will also display message for the user. It is done to confirm whether the problem is worth solvable or not Different types of feasibility study has been done. For eg. technical, economic, social, and time feasibility. Various alternates are evaluated. For cost and benefit analysis the BREAK EVEN method is used and it is found that the system is beneficial with respect to the cost .
EXISTING SYSTEM SOFTWARE & HARDWARE REQUIRMENT SPECIFICATION HARDWARE REQUIREMENT:
There will be LAN. The LAN consists of many PCs The estimation of the number of the PC is given in the table. Table: SPECIFICATION OF THE SERVER SERVER (As hardware technology in the IT is rapidly upgrading , thus any upgrdade / higher /better configuration of a device is available at the time of purchase it must be taken in account and upgraded device is to be procured.) Intel 3 GHZ Pentium IV processor 1 GB SDRAM 256 KB L2 Cache 1.44 MB Floppy diskette derive 15” SVGA digital color monitor DVD Writer 2 X 40 GB HARD disk 10 /100 MBPS 32-bit Ethernet card Table Ports –one parallel two serial PC Compatible keyboard 3 Button mouse Specification DESKTOP PC WITH COLOR MONITOR Intel 1 GHz Pentium IV processor 256 KB 12 Cache
128 / 256 MB SDRAM 810 Chipset 80 GB HDD 1.44 MB floppy derive 17” SVGA color monitor 10 /100 MBPS 32-bit Ethernet card DVD writer
BACK GROUND OF ORGANISATION “National Institute of Career Development” provides the basic information related to the Education Program Conducted for the Woman welfare, Providing IT Education to all the Sector of the Society such as for Minorities and Under Privileged people so that anyone who wants to get the information related to admission; courses, fees etc. can view online and search the details of their boys and girls online. In this online functioning all the function of NICD is done through on line .we can submit all the application forms, directly online. It is very less time consuming method and convent to use. In the off line functioning student suffers form many problems they submitting all the form in the queue. That is very timing process and it is not sufficient for every student and also submitting all the examination forms in a queue but on line reduces this timing process and there is no need of queue for submitting all there.On line process is helpful to performing easily in the University management; student directly acquired the Registration no, receipt number and the related information very quickly.Today environment is on line based on which process is very helpful for all the students who lived in different place and submitting the form at a one place directly internet application web page.They directly logon on the web page and acquired all the information very quickly.
CURRENT PROBLEM
Hardware And Software Requirement SURVEY OF TECHNOLOGY Front End
: C#.Net 2.0
Back End
: SQL SERVER
Operating System
: Windows XP
REASON FOR USING C# .Net: (a) C#.Net 2.0 is the best front-end tool available for making Windows based application. (b) It is easy to use. (c) .Net is the world’s most popular rapid application development tools for creating windows based application. (d) It provides GUI facilities. (e) Ready-made controls make project development easier and faster. (f) Connectivity with the database is easy with the help of ADO.NET.
REASONS FOR USING SQL SERVER: (a) It is powerful database. (b) It can store large amount of records. (c)It provides security features i.e. only authorized users can access the records. (d) SQL SERVER has includes all standard RDBMS features.
. Database Requirement . System Design System Design
Software design is a multi step process, which focuses on distinct attributes of program: data structure, software architecture, interface representation, and procedural detail. The design process translates requirements into a representation of the software that can be assessed for quality before coding begins. According to requirement, the design is documented. The design must be translated into a machine-readable form. The code generation step perform this task .If design is performed in a detailed manner. Design phase is the first step while moving from the problem domain to solution domain. This phase begins when the requirement specification document for the newly developing system is available. The aim of this phase is to produce a model or a representation of the system, which is useful to have an overall look of the system without even developing the entire system. This model of the system is a plan for developing the system. There are three characteristics for the evaluation of a good design.
1.
The design should implement all the requirements of the user, which are specified in the
SRS and it must accommodate all the requirements that may not be specified by the client in the analysis phase. 2.
The design should be readable and understandable for the people who involve in developing
and testing the system. 3. The design should provide a complete picture of the system, addressing the data functional domains from the implementation perspective. Design Methodology
When solving a small problem, the entire problem can be tackled at once. The complexity of large problems and limitations of human minds do not allow large problems to be treated as huge monoliths. For software design, the goal is to divide the problem into manageably small phases that can be solved separately. However, the different phases cannot be entirely independent of each other, as they together form the system. The different phases have to co-operate and communicate in order to solve the larger problem.
Database Design A database management system (DBMS) consists of a collection of interrelated data and a set of programs to access those data. The collection of data, usually referred to as the database, contains information about one particular enterprise. The primary goal of a DBMS is to provide an environment that is both convenient and efficient to use in retrieving and sorting database information. Database systems are designed to manage large bodies of information. The management of data involves both the definition of storage of information and the provision of mechanisms for the manipulation of information. We used relational database management system (RDBMS) for developing this system. The goal of a relational- database management system (RDBMS) design is to generate a set of relation schemas that allows us to store information without unnecessary redundancy. It also allows us to retrieve information easily. Redundancy
means repetition of information i.e., same information may be written or stored in many places (files). This redundancy may lead to data inconsistency i.e., the various copies of the same data. When we access this inconsistent data, system may give wrong information. To reduce the data redundancy we use the concept of normalization. Normalization of data is a process in which unsatisfactory relation schemas are decomposed by breaking up their attribute into smaller relation schemas that possess desirable properties. Normal forms provide a formal framework for analyzing relation schemas based on their keys and the functional dependencies among attributes to database designers. The concurrent process model is often used as the paradigm for the development of client server system that is composed of a set of functional component. When applied to client /server, the concurrent process model defines activity in two dimensions--a system dimension and a component dimension. System level issues are addressed using three activities: design, assembly, and use. The component dimension is addressed with two activities: design and realization. Concurrency is achieved in two ways: 1) System and activities occur simultaneously and can be modeled using the state oriented approach described previously. 2) A typical client server application is implemented with many components, each of which can be designed and realized concurrently.
Tables And Fields For Database
Tables
Application Form 1 :
SN.
Field Name
Data Type
Size
1
Fname
Varchar
50
2
Mname
varchar
50
3
Lname
varchar
50
4
FullName
varchar
50
5
FatherName
Varchar
50
6
MotherName
Varchar
50
7
CommAddress
varchar
50
8
PemanentAddress
varchar
50
9
PinCode
int
4
10
State
varchar
50
11
City
Varchar
50
12
Category
Varchar
50
13
Mobile
varchar
50
14
PhoneNo
varchar
50
15
DOB
varchar
50
16
Email
varchar
50
17
RegistrationNo
Numeric
9
18
sex
Varchar
50
19
ApplicationStatus
varchar
50
Key
PK
. Database Dictionary . E-R Diagram . ‘0’ Level DFD
Data Flow Digram.
0 Level
Application Form
Admission Notice
Student Persional Details
Hostel Allotement
Student Confidential Details
Seat Allotment
National Institute of Career Developmen t
Fees Submission
Admission
Admit Card
‘1’ Level DFD
Registration No
First Level
Process 1.0
Student Information
Student Application Data
Payment Details
Applicatio n Form
Registration Slip
Student Application Data
2.0
Applicatio n Notificatio n
Application Status
3.0
Application Status
Student Application Data
Admit Card
Admit Card
4.0
Student Marks Feeding
Student Application Data
Marks Data
Marks Details
Student Application Data
5.0
Merit List Generatio n Marks Data
Student Data
Process
6.0
Councelin g Process Choice List
Merit List Data
Choice Data
Seat Data
7.0
Seat Allocation
Seat Allocation Data
Student Application Data
Fee Details
8.0
Fees Submissio n
Student Application Data ER DIAGRAM Hostel Details
Course Code
9.0
Fee Collection Data
Hostel Allocation Data
Hostel allotment
Registration No.
Nam e
FNam e MNam e Qualificati -on Details
Ma inta in
Course Details
Course Duration
Cours e Name
Application Form
Re cord s
Addres s DO B
Fil lup
Payment Details DD No.
Amoun t
Student DD Date
Pro vide s
Colleg e Name
Choice List
Registration No.
Ha s Colleg e Name
Seat allotement Ran k
Branch Name Ha s
DD No. Amount DD
Hostel Fee
Hostel Allotement
Registration No. Registration No.
use case diagram Room Mode
Security Control System security
Security is the protection of the database against unauthorized access or charge. Because you separate the data from the application ,and because you allow multiple near access to the data. You must also take security need to account.
FIRST LEVEL SECURITY WITH PASSWORD Every user has a user ID and it’s own password. When user input the user id and password then match if it is a valid id and password then open application but if the id and password not valid then application is not open.it is a way of elemenate password protection for users,but it strongly advise against using the feature.it is not a good idea to depend on application security in a client/server environment.the emplications for our application ,I must have a way of logging on the database with the user name and password that gives our applications the right level of access.
VALIDATION CHECKS System security refer to various validation of data inform of checks. It is always important to ensure that only valid data is entered and only valid operatons are perform on the system.the system employee two types of checks.
Future Scope Of The Project
FUTURE SCOPE We can upgrade this project into a multi user, multitasking system.The project can handle database with security features . We can increase the performance of output reports according to requirement.
Features of project DATA INTEGRITY After sufficient volume of data is stored in the system, the data mining and data Warehouse techniques should be employed for information analysis and decision making. Data warehousing is one of the fastest growing client/server application. It is informational analysis and decision support oriented, not operational or transaction processing oriented .Data mining is the almost important application of data warehouse. Data mining is also known as knowledge discover of database., assists buissiness analyst with generating hypothesis ,the key difference between OLA(online analytical processing) and data mining is that OLAP is user driven,the analyst generates hypothesis and use the OLAP tools to verify the hypothesis. In contrast, in data mining the tool is used on the data to generate a hypothesis. This will help in the following: Decision support oriented reports Any type of report that not been generated earlier for generating new hypothesis using the available data.
. Conclusion On line process is helpful to performing easily in the University management; student directly acquired the Registration no, receipt number and the related information very quickly. Today environment is on line based on which process is very helpful for all the students who lived in different place and submitting the form at a one place directly internet application web page. They directly logon on the web page and acquired all the information very quickly.