Chap 2 Introduction

Embed Size (px)

Citation preview

  • 7/31/2019 Chap 2 Introduction

    1/66

    College Portal

    1ME.CE. SEM-II(S/W Engg. & Meth.) Enrollment No: 110440702008

    1.INTRODUCTION

  • 7/31/2019 Chap 2 Introduction

    2/66

  • 7/31/2019 Chap 2 Introduction

    3/66

    College Portal

    3ME.CE. SEM-II(S/W Engg. & Meth.) Enrollment No: 110440702008

    1.3 Purpose of the Project

    Goals and Objectives of the project

    Purpose ofCollege Portal is to manage the college resources more efficiently. College Portal web and LAN base application for college staff and student to use

    various functionality with optimum use of resources.

    As name suggest College Resource is contain various functionality that handled bypaper work as now some of them been implemented in our project by us.

    Provides fast and efficient way to store and search the data. Subject wise average attendance can be generated by filtering the date range and also can

    have hard copy of that report.

    Student records can be filtered easily. Alumni student can be grouped easily by sending mail to authorized student. There is so many good objectives available within this project which never been realistic

    in past. (As per our knowledge).

    1.4 Scope of the Project

    Software Scope describes the data and control to be processed, function, performance,

    Constraints, interface and reliability.

    FUNCTIONSFunctions described in statement of the scope are evaluated and in some cases refined to

    provide more details prior to the beginning of the estimation.

    PERFORMANCEPerformance consideration encompasses processing and response time consideration.

  • 7/31/2019 Chap 2 Introduction

    4/66

    College Portal

    4ME.CE. SEM-II(S/W Engg. & Meth.) Enrollment No: 110440702008

    CONSTRAINTSConstraints identify limit placed on the software by external hardware, available memory

    or other existing system.

    INTERFACEInterface includes the hardware that executes the software, software that already exists,

    people that make use of the software and procedures that precede or succeed the software

    as sequential series of operation.

    RELIABILITYIt measures at how many point the system fails. The lesser the failure, the more is the

    reliable system. The system we have built is suitable for todays fast life as people dontget time to spend on things that are less essential.

    The system built is advantageous in many ways, after studying the requirements of thesystem and knowing the problems faced by the user the scope of proposed system is as

    follows.

    For the marketing of the current system company appoints the executives through thelimited states. So the scope of the current system is lower and now this system become

    online and LAN based as well as transparent by this project so the scope of this

    application will be higher.

    1.5 Project Deliverable (What it can do?)

    It helps the student to check the attendance reports. It will also provide the student toshare his/her knowledge through college educational forum.

    College Portal can be used by faculty by updating student attendance day by day andto remain in touch with past students through alumni module.

    Attendance report is the key functionality of this project and we can generate subject wiseaverage attendance report of any student.

    The Project Deliverables are results that are delivered to the customer. Below is a list of the

    deliverables for this Project:

  • 7/31/2019 Chap 2 Introduction

    5/66

    College Portal

    5ME.CE. SEM-II(S/W Engg. & Meth.) Enrollment No: 110440702008

    Software Requirements Specification Document Project Management Plan Design Analysis Test Plan Document

    Test Report Final Report

    What it can't do?

    This project cannot generate attendance report of last semester attendance records because

    database would be refreshed after every semester as every semester contains approximate 50000

    records in the database.

  • 7/31/2019 Chap 2 Introduction

    6/66

    College Portal

    6ME.CE. SEM-II(S/W Engg. & Meth.) Enrollment No: 110440702008

    2.PROJECT

    PLANNING

    AND

    SCHEDULING

    2.PROJECT PLANNING AND SCHEDULING2.1Process Model

  • 7/31/2019 Chap 2 Introduction

    7/66

    College Portal

    7ME.CE. SEM-II(S/W Engg. & Meth.) Enrollment No: 110440702008

    The software development model, adopted for the proposed system, is waterfall model

    (Iterative model).

    2.1.1 Project Plan

    Figure 2.1 Iterative Waterfall Model

    Reason for choosing the Waterfall Model:

    Waterfall model stipulates that the requirements should be completely specify before the rest of

    the system development is preceded. In the proposed system, the requirements are fixed and

    known beforehand and hence this model is suitable and adopted for the development of the

    proposed system.

    The systems services constraints and goals are established by consultation with system users.

    They are then defined in a manner is understandable by both users and developers. The system

    design process partitions the requirements to either hardware or software system. It establishes

    overall system architecture. Software design involves representing the software system functions

    in a form that may be transformed into one or more executable programs.

    ANALYSIS

    PHASE

    RequirementEngineering

    ObjectModeling

    DynamicModeling

    FunctionalModeling

    DESIGN

    PHASE

    SubsystemDesign

    ReusableComponent

    Design

    DatabaseDesignUI Design

    IMPLEMENTA

    TION PHASE

    DatabaseCreation

    PrototypeCreation

    UI ComponentDevelopment

    UI Development TESTINGPHASEUnit TestingIntegration

    Testing

  • 7/31/2019 Chap 2 Introduction

    8/66

    College Portal

    8ME.CE. SEM-II(S/W Engg. & Meth.) Enrollment No: 110440702008

    Analysis Phase

    This phase involves detailed study of the system using different tools like OMT and UML. First

    Using conventional requirement collection and engineering technique user and system

    requirements are explored. This gives the very detailed knowledge of the system. OMT includes

    Object Modeling, Dynamic Modeling and Function Modeling.

    Design Phase

    As conventional design method and according to OMT, as first step of design Subsystems of the

    system are identified. This phase also includes Architecture design, Deployment Design, File

    system Structure design and UI design.

    Implementation Phase

    Implementation phase includes development of UI components, creating prototypes of each core

    classes, development of core classes, UI development and remote service creation.

    Testing Phase

    In testing phase each method of the classes are checked during development phase as unit

    testing. Then each class is integrated and they are tested for integration testing. Ultimately test

    cases are tested to ensure that there are no bugs in the code.*/

    OMT

    It is primarily used by system and software developers supporting full life-cycle development,

    targeting object-oriented implementations. Because of its simple core notation, OMT has proven

    easy to understand, to draw, and to use. It continues to be successful in many application

    domains: telecommunication, transportation, compilers, etc. The popular Object Modeling

    Technique (OMT) has been used in many real-world problems.

    Key Benefit:

    The object-oriented paradigm using the OMT spans the entire development process, so there is

    no need to transform from one type of model to another.

    2.2Project Plan

  • 7/31/2019 Chap 2 Introduction

    9/66

    College Portal

    9ME.CE. SEM-II(S/W Engg. & Meth.) Enrollment No: 110440702008

    Months Plan

    March ( 1-17 ) Customer Communication

    March (18-25) Planning

    March (25-30) Risk Analysis

    April (1-30) Engineering Construction &

    Release/Documentation

    May (1-15) Testing/Documentation

    May(16-31) Customer Evaluation/Documentation

    2.3Schedule Representation

    *Note: This is only a Case Study of existing project.

    0 1 2 3 4 5

    Mar-12

    February(18-25)

    March(25-30)

    April(1-30)

    May(1-15)

    May(16-31)

    Work DoneWork Left

    Customer

    Communicatio

    ProjectProfile

    Analysis Logical

    Design

    Evaluation DocumentationTesting Code

    Implementation

  • 7/31/2019 Chap 2 Introduction

    10/66

    College Portal

    10ME.CE. SEM-II(S/W Engg. & Meth.) Enrollment No: 110440702008

    Figure2.3 Schedule Representation

    2.4 Risk Management

    2.4.1 Risk Identification

    Risk identification is a systematic attempt to specify threats to the projects plan by

    identifying known and predictable risks. Risks are about events that, when triggered,

    cause problem. Hence risk identification can start with the source of problems or the

    problem itself.

    There are three main categories of risks which can affect a software project:

    Project Risks Technical Risks Business Risks

    Project Risks:

    Project risks concern various forms of budgetary, schedule, personnel, resource and customer

    related problems.

    Miscommunication: It leads to misunderstanding, delay, frustration, lack ofcoordination amongst the team members and client.

    Time shortage: It leads to delay in the delivery of the product.

    Personal conflicts between team members: It leads to unnecessary delay in eachand every phase of software cycle and loss of direction.

    Illness or absence of team members: Absence of a team member increases the loadof the project on other team members.

    Lack of expertise to fulfill certain tasks: Lack of knowledge in some areas leads toinsignificant delay.

  • 7/31/2019 Chap 2 Introduction

    11/66

    College Portal

    11ME.CE. SEM-II(S/W Engg. & Meth.) Enrollment No: 110440702008

    Technical Advisor not available when needed: Due to the absence of a technicaladvisor there was a delay in understanding the database .

    Unavailability of customerTechnical Risks:

    Technical risks concern potential design, implementation, interfacing, and testing and

    maintenance problems.

    Too many planned features lead to infeasible design Design errors: Due to lack of experience design errors are bound to happen.

    The customer changes the requirements: The scope of our project keeps changingas per users requirements

    The customer disapproves of the prototype: The customer may find the developedprototype unsuitable to his requirements

    Business Risks:

    Business risks threaten the viability of the software to be built. Business risks often jeopardize

    the project or the product.

    Market risk: Building a excellent product or system that no one really wants. Strategic risk: Building a product that no longer fits into the overall business strategy

    for the company.

    Management risk: Losing the support of senior management due to a change infocus or a change in people.

    Product is not put in service2.4.2 Risk Analysis

    Personnel Shortfalls:They may cause the developmental delays and would cause a change in the working

    strategy due to developmental dependencies of the functional modules.

  • 7/31/2019 Chap 2 Introduction

    12/66

    College Portal

    12ME.CE. SEM-II(S/W Engg. & Meth.) Enrollment No: 110440702008

    Unrealistic Schedule:It may cause the developers to give unrealistic commitments to the users and so lose

    their faith when the deliverables are not produced as per schedule.

    Developing wrong Software functions:It can be caused due to wrong requirement analysis or wrong programming method

    used to automate the requirements. It may cause the system to fail and not be

    implemented at all.

    Developing wrong User Interface:It may be caused due to lack of user acceptance and user involvement duringdevelopment.

    The probability of the risk might be assessed as very low (75%).

    Table 2.4.2 Risk Analysis

    Sr

    No.

    Risk Probability Effect

    1 Organizational financial problem force

    reduction in the product budget

    Low Catastrophic

    2 Required knowledge is not available High Catastrophic

    3 Change to requirement which require major

    design of rework

    Moderate Serious

    4 Organization is restructured so that different

    management are responsible for project

    High Serious

    5 The time required to develop software is High Serious

  • 7/31/2019 Chap 2 Introduction

    13/66

  • 7/31/2019 Chap 2 Introduction

    14/66

    College Portal

    14ME.CE. SEM-II(S/W Engg. & Meth.) Enrollment No: 110440702008

    It involves methods that accept the loss when risk occurs. Risk retention is a viable strategy

    for small risks where the cost of insuring against the risk would be greater over time than the

    total losses sustained. All risks that are not avoided or transferred are retained by default

    Risk Transfer:

    It involves method, which causes another party to accept the risk, typically by constructs or

    by hedging.

    3.

    SYSTEM

  • 7/31/2019 Chap 2 Introduction

    15/66

    College Portal

    15ME.CE. SEM-II(S/W Engg. & Meth.) Enrollment No: 110440702008

    REQUIREMENTS

    STUDY

    3. SYSTEM REQUIREMENTS STUDY

    3.1 User Characteristics

    The project when looked into minutely for all the aspects can be designed for four kinds of users:

    Admin User:-Admin is the central controller of this system and has all the rights andauthorities to view as well as to modify and update the system whenever required.

    Staff Users: - Staff user is responsible for enters the data like student records, fill student

  • 7/31/2019 Chap 2 Introduction

    16/66

    College Portal

    16ME.CE. SEM-II(S/W Engg. & Meth.) Enrollment No: 110440702008

    attendance& applications in the system.

    Student Users:-Student enters his personal data to view his/her attendance records and toaccess education forum.

    Guest User:-Guest user meant for the students guardian. He/she can check studentattendance by entering roll no into the application. Guest user cannot modify thesystem.

    There are two types of the users who are dealing with the system.

    Administrator Clients

    TABLE 3.1.1

    Sr. no. User Name Work Area

    1 Administrator Having access to all

    modules and supervise

    database.2 Clients of the company Having access to whole

    application through the

    online process.

    Client Group:

    Head of Department Lecturer Student Alumni Student Students guardian

    The rights that are given to above users are given in table below:

    View Filter

    Record

    Modify Print User creation

    Administrator Y Y Y Y Y

    HOD Y Y Y Y N

    Lecturer Y Y Y Y N

    Student Y Y N N N

    Alumni Student Y Y N N N

    Students Y Y N N N

  • 7/31/2019 Chap 2 Introduction

    17/66

    College Portal

    17ME.CE. SEM-II(S/W Engg. & Meth.) Enrollment No: 110440702008

    Guardian

    3.2Hardware And Software RequirementsHardware Requirements

    The Online System that we have built requires some specific hardware configuration. I have

    mentioned the basic minimum hardware recommendations to run the system adequately. Any

    higher configuration hardware would only add to the performance of the system. The minimum

    hardware requirements to run the system properly are as under.

    Pentium 4 with 1.4 GHz processor 40 GB Hard Disk 512 DDR RAM Network Card / Network Connection

    Software Requirements

    Server Side

    Operating System: Microsoft Windows(XP and onwards) Web Server: Internet Information Services (IIS) Server Database: MY SQL

    Client Side Operating System: Microsoft Windows XP Web Browser: Fire Fox Mozilla / Internet Explorer 5.0

    Technology Used for Development:

    FrontEnd Tool: ASP.Net with C#, AJAX Bac kEnd Tool: SQL Server 2000

    Operating System:

    Windows Professional Edition with Service Pack3.3 Constraints

    A constraint is anything that prevents the system from achieving more of its goal.

    Hardware Limitation.

  • 7/31/2019 Chap 2 Introduction

    18/66

    College Portal

    18ME.CE. SEM-II(S/W Engg. & Meth.) Enrollment No: 110440702008

    It requires minimum 256MB RAM to be loaded or run. It requires IIS to browse the

    application.

    Interfaces to Other Application.Since it is a standalone application it cannot be interfaced with other applications as such.

    Higher Order Language Requirements.Since the application has been created in JSP (Java Server Page) which is a successor of

    C/C++, it gets easily dissolved with any operating system since C/C++ constraints for all

    operating systems are the same.

    Reliability Requirements.Since the application is almost error- free, the reliability of the system is pretty high.

    Even in case of natural calamities or power failure or connection failure, the application

    is not affected as data remains secured in the corresponding database.

    Criticality of Application.Criticality of the application lies in the fact that when any field in any one of the six

    modules is empty then that particular record is not added or updated in the database. Even

    without proper name & password the administrator cannot access the application.

    4.

    ESTIMATION

  • 7/31/2019 Chap 2 Introduction

    19/66

    College Portal

    19ME.CE. SEM-II(S/W Engg. & Meth.) Enrollment No: 110440702008

    4. ESTIMATION

    4.1 Effort Estimation

    Project Estimation proper evaluation of the system and to get the estimation of the

    project, it was needed to do some metrics calculation for this project. Software project metrics

  • 7/31/2019 Chap 2 Introduction

    20/66

    College Portal

    20ME.CE. SEM-II(S/W Engg. & Meth.) Enrollment No: 110440702008

    are the way to do this task efficiently. Project metrics allow knowing the size and complexity of

    the project and helping us on the planning and cost estimation.

    For this project, function-oriented metrics were used to get the size of the project at the

    abstract level (without taking the language in consideration). For that purpose, Function Points

    (FP) was used.

    Function Points can be counted using the following information domains:

    Number of external inputs (EIs)inputs given by a user or another system. Number of external outputs (EOs) outputs derived within the system or given to

    another system.

    Number of external inquiries (EQs) as an online input that results in generation ofsome immediate software response in the form of an on-line output.

    Number of internal logical files (ILFs)logical grouping of data that resideswithin the applications boundary and is maintained via external inputs.

    Number of external interfaces files (EIFs) - logical grouping of data that residesexternal to the application but provides data that may be of use to the application.

    Table 4.1 Information Domain Values

    Measurement Parameters Count Simple Average Complex Total

    Number of user inputs 4 X 3 4 6 = 16

    Number of user outputs 4 X 4 5 7 = 20

    Number of user inquiries 5 X 3 4 6 = 20

    Number of files 20 X 7 10 15 = 200

    Number of external

    interfaces

    4 X 5 7 10 = 28

    Count=Total 284

    Question 0 1 2 3 4 5

    1. Does the system require reliable backup

    and recovery?

    2. Are data communications required?

    3. Are there distributed processing

  • 7/31/2019 Chap 2 Introduction

    21/66

    College Portal

    21ME.CE. SEM-II(S/W Engg. & Meth.) Enrollment No: 110440702008

    functions?

    4. Is performance critical?

    5. Will the system run in an existing, heavily

    utilized operational environment?

    6. Does the system require on-line dataentry?

    7. Does the on-line data entry require the

    input transaction to be built over multiple

    screens or operations?

    8. Are the master file updated on-line?

    9. Are the inputs, outputs, files, or inquiries

    complex?

    10. Is the internal processing complex?

    11. In the code designed to be reusable?

    12. Are conversion and installation included in

    the design?

    13. Is the system designed for multiple

    installations in different organizations?

    14. Is the application designed to facilitate

    change and ease of use by the user?

    Total

    36

    Formula = count x [0.65+0.01 x SUM [fi]]

    The Function Point is: 286.84

    Programming Language LOC/FP (average) Select

    Assembly Language 320

    C 128

    COBOL 105

    Fortran 105

    Pascal 90

    Ada 70

    Object-Oriented Languages 50

  • 7/31/2019 Chap 2 Introduction

    22/66

    College Portal

    22ME.CE. SEM-II(S/W Engg. & Meth.) Enrollment No: 110440702008

    Fourth Generation Languages (4GLs) 20

    Code Generators 15

    Spreadsheets 6

    Graphical Languages (icons) 4

    LOC/FP = 50

    Software Project LOC

    Approx

    Effort Rs Paper

    work

    Errors Defects People

    Student

    Management and

    attendance

    15000 3.00 30000 150 250 29 3

    Student

    Education forum

    and alumni

    80000 3.00 20000 90 200 25 3

    4.2 Cost Analysis

    Error per person= total error/total people = 64/3 = 21.33

    LOC per person= total LOC/total people = 23000/3 = 7666.66

    0.5 rupee per paper of documentation = total Rs. = 100

    Total cost of project (in rupees) = sum of Rs = 60000

    Other expense = 50000

    Total project cost = 60000+50000 = 110000

    4.3 Use Case Estimation

    Unadjusted Actor Weight

    Actor weight How many? product

    simple 1 1 1average 2 1 2

    complex 3 1 3

    UAW 6

    Unadjusted Use Case Point

  • 7/31/2019 Chap 2 Introduction

    23/66

    College Portal

    23ME.CE. SEM-II(S/W Engg. & Meth.) Enrollment No: 110440702008

    UUCP = UAW + UUCW 206

    0-5

    Technical Factor weight Value

    distributed system 2 1

    performance requirements 1 1

    end user efficiency 1 1

    internal processing 1 1

    reusability of code 1 1

    installation ease 0.5 0

    usability requirements 0.5 0

    portability requirements 2 1

    changeability requirements 1 1

    Concurrency 1 1

    security requirements 1 1

    direct access to third party 1 1user training facility 1 1

    TF 11

    Technical complexity factor (TCF) 0.6 + 0.01

    * TF 0.71

    Environmental complexity factor (EF) 1.4 -

    0.03 * ENVF 1.34

    Adjusted Use Case Point (AUCP) UUCP * TCF * EF 195.9884

    Table: 4.3.1 Use Case Estimation

    Unadjusted Use Case Weight

    Use Case weight how many? Product

    simple 7 transactions 15 5 75

    UUCW 200

    0-5

    Environmental factor weight Value

    familiarity with project 1.5 1

    application experience 0.5 0

  • 7/31/2019 Chap 2 Introduction

    24/66

    College Portal

    24ME.CE. SEM-II(S/W Engg. & Meth.) Enrollment No: 110440702008

    OO experience 1 1

    lead analyst capabilities 0.5 0

    motivation 1 0

    stability of requirements 2 0

    part-time staff -1 0

    programming lang. difficulty -1 0ENVF 2

    Person-Hours per AUCP 25

    Effort in Days AUCP * P-H / 7 699.9585714

    Cost per Day in $ 400

    Total estimated cost 279983.43

    Table: 4.3.1 Use Case Estimation

    5.SYSTEM

    ANALYSIS

  • 7/31/2019 Chap 2 Introduction

    25/66

    College Portal

    25ME.CE. SEM-II(S/W Engg. & Meth.) Enrollment No: 110440702008

    5. SYSTEM ANALYSIS

    5.1 Study of Current System

    In the past before site is organized following difficulties are coming towards user.

    First LookIn current system clerks are doing paper work to maintain students records and employees

    records and that record may be frequently used in any terms, Like student records used to search

    any student or to update the student attendance day by day and employee records can be

    frequently used in this environment.

  • 7/31/2019 Chap 2 Introduction

    26/66

  • 7/31/2019 Chap 2 Introduction

    27/66

    College Portal

    27ME.CE. SEM-II(S/W Engg. & Meth.) Enrollment No: 110440702008

    Role Based Access Control (HOD, Admin, Lecturer and Student have diff access) Superior Technology for Faster and Secured Access

    Friendly FeaturesSome of the friendly features of this software are as follows:

    Towards Paperless College System Efficient Monitoring of Activities Automated Assessment Features To Eliminate Manual Scheduling Errors Promotes Effective Utilization of Resources Facility To Track Realization & Growth Tracking of Interest of People for the Upcoming Activities.

    ExtendibilityAfter implementing the whole system, if any type of suggestion and any new ideas

    are allowed. According to that it is possible to extend the system for more convenient.

    User FriendlinessSome of the features that make the software user friendly are as follows:

    User friendly design Easy to access all the accessible modules.

    5.4 Feasibility Study

    In the history of College Portal it happened first time to use this kind of web an Lan based

    application and its feasible to implement within a less time and money.

    5.4.1 Operational FeasibilityPerformance

    Our system provides adequate throughout and its response time is very quick.

    Because when any user sees the application for searching the data, it will search

    form the database and display the output.

    Information

    The system provides records to end users with timely, accurate and

    usefully formatted information. When any user or administrator wants the

    information about system, he or she will just log into system. And get their desire

    information.

  • 7/31/2019 Chap 2 Introduction

    28/66

    College Portal

    28ME.CE. SEM-II(S/W Engg. & Meth.) Enrollment No: 110440702008

    Economy

    No we are not jumping into economic feasibility. The question here is

    does the system offer adequate service level & capacity reduce the burden of

    manual work of the college.

    Efficiency

    Does the system make maximum use of available resources including

    Manual Work of Administrator, time, and flows of forums, minimum processing

    delays & the like?

    In the matter of efficiency, our system is totally computerized, so no need

    for any person to explain anything regarding our system, and its very easy to

    understand as well as operate.

    Each and every information is given very briefly and well known to user

    so user is able to do the work without any Administrators help. Here also only few

    persons are required for moderating and controlling the system, so with the help

    of very less human resource and manual work system will work.

    All the forms are well designed as well as developed so user can easily

    deal with system like every form is designed as per the lecturers requirements.

    5.4.2 Technical FeasibilityIt is a measure of practically of a specific technical solution and the

    availability of technical resource and expertise.

    The analyst must find out whether current technical resources, which are

    available in the system is capable of handling the users requirements or not. If

    not, then the analyst with the help of developers should confirm whether the

    technology is available and capable or not.

    As per the availability of the technical resources we could make this

    project of student and attendance management.

    Q-1 Do we currently posses the necessary technology?

    Ans : Yes,

  • 7/31/2019 Chap 2 Introduction

    29/66

    College Portal

    29ME.CE. SEM-II(S/W Engg. & Meth.) Enrollment No: 110440702008

    The technology & software that we are going to use are available with us.

    The technology which we have used is easily available in the market today.

    Q-2 Do we have necessary technical expertise?

    Ans : Yes,

    We do have necessary technical expertise so that development would be

    compatible with the schedule. But certain kind of training is required for the

    particular technology but it will not make an adverse effect on the development

    schedule.

    Factor considering

    Here we have to consider those tools, which will be requiring for developing theproject.

    The tools which are available and the tools, which will be required, have to takein account. As far as basic knowledge is concerned we have studied we have basic knowledge

    of C# and SQL server. Various technical books, e-books etc are available.

    Dealing with database is the main issues in our system. Using SQL server asbackend provided this functionality. But we have used MY SQL.

    5.4.3 Schedule Feasibility:Schedule feasibility corresponds to whether sufficient time is available to

    complete the project.

    Factor considered

    Schedule of the project was around 3 months Time by which the project has to be completed. Reporting must be completed within this time period.

    By considering all above factors it was decided that we have sufficient

    time and we decide to start the project. By marinating the schedule we were able

    to complete the project on time.

    5.4.4 Economic Feasibility

  • 7/31/2019 Chap 2 Introduction

    30/66

    College Portal

    30ME.CE. SEM-II(S/W Engg. & Meth.) Enrollment No: 110440702008

    For declaring that the system is economically feasible, the benefits obtained from

    the system we have to be rated against the cost incurred to actually develop the

    system. The benefits must equal or below the cost for development.

    The basic resources to consider are:

    Management time. Time spent by the system analysis team. Cost of doing full system study. Estimated cost of hardware. Estimated cost of software and /or software development.

    The following are benefits that would be derived from the proposed system:-

    The application is developed using C# and MYSQL server technology.Application does not increase hardware cost as minimal configuration

    required for developing code. In this way developing application does notgenerate any overhead costs.

    As this application has no overhead in development and installation buteconomically this application will be beneficial to maintain student records.

    5.5 Requirements ValidationAs our project is to build a dynamic web site and lan based, there is criteria such as

    windows authentication but still some security must be provided in essence of making the

    rights of certain entity to be limited to them. Certain validation criteria that are neededlisted below.

    In our system, some functionality like view the employee and college records arerestricted to the admin and college employee only. So, we have to apply validation

    for the login functionality for the authentication.

    Our system generates the student attendance report from the web services as per theusers search criteria. So to produce the best match we have to apply validations on

    the input controls.

    In the page of Personal Detail of alumni student, student has to enter his/her contactinformation (Email Id) in order form which he/she get mail when he/she fill that

    form our college gave him user name and password to access site. So, we have to

    apply validation on the field of Email Id.

  • 7/31/2019 Chap 2 Introduction

    31/66

    College Portal

    31ME.CE. SEM-II(S/W Engg. & Meth.) Enrollment No: 110440702008

    5.6 Functions of System

    Student Registration and Attendance Use Case

  • 7/31/2019 Chap 2 Introduction

    32/66

    College Portal

    32ME.CE. SEM-II(S/W Engg. & Meth.) Enrollment No: 110440702008

    employee

    techingnonteching

    faculty

    student section(clerk)

    hod

    cheak validationfor student

    registation foralumini

    maintain studentattendance

    generaleattendance report

    login

    raise question

    ans. the question

    student

    insert studentdetail

    maintain & updationof student detail

    over all studentdeatail

    check studentattendance report

    set min limt ofattendance

    *

    *

    *

    *

    *

    *

    *

    *

    AttendanceManagement / project

    Diary moduleOnline examination.

    Used student recordfor attendance project

    dairy, other activity.

    >

  • 7/31/2019 Chap 2 Introduction

    33/66

  • 7/31/2019 Chap 2 Introduction

    34/66

    College Portal

    34ME.CE. SEM-II(S/W Engg. & Meth.) Enrollment No: 110440702008

    Part B

    Check_Attendance_Report R8

    Set_Category_Questio R7

    Main_Catagory_Master

    B3

    MCM_Name

    MCM_Id

    Sub_Category_Master

    B4

    Set_Category_Questio R7

    MCM_IdSCM_Name

    SCM_Id

    Question_R

    aise_Master_B5

    QRM_DateQRM_Questi

    on

    FTM_Id

    SCM_Id

    MCM_IdSCM_Id

    QRM_Attend

    ance

    Raise_Question R5

    Answer_Ma

    ster B6

    FANS_Attachment

    FANS_Answer

    FANS_DateLM_Id

    QRM_IdFANS_Id

    Give_Ans_Of_QueR2

    Forum_Type_Master B7

    FTM_Id

    FTM_TypeSet_Forum_Categ

    ory R17

    Attendance_Transction_master B2 AM_Lecno

    AM_Lecno

    AM_Lecno

    AM_Lecno

    Save_Attendance

    _Record R10

    Attendance_Master B1

    Lecture C4Update_Student_

    Attendance R9

    CLS_IdEM_Id

    AM_Id AM_Lecno

    SUB_Id

    Aggregation

    Link to part C to ISA 3

    Link to Part AEntity A2

    Link to Part CEntity C5

    Link to Part AEntity A2

    Link to Part AEntity A1

    PART-B

  • 7/31/2019 Chap 2 Introduction

    35/66

    College Portal

    35ME.CE. SEM-II(S/W Engg. & Meth.) Enrollment No: 110440702008

    Part C

    C1Employee

    master

    ISA2

    c3Non-teaching

    c2teaching

    ISA4

    ISA3

    peon

    principle

    HOD

    EM_photo

    DSG

    _Id

    Em_cs

    tateEM_

    gaurdiation_

    Name

    EM_g

    aurdiation_

    no

    EM_joini

    ngdate

    BM

    _Id

    EM_Worklo

    ad

    EM_dob

    age

    EM_qualification

    EM_Areaof

    EM_Past

    experienc

    e

    EM_Fname

    Em_ppin

    EM_pstate

    Em_email

    EM_pdist

    EM_cadd

    EM_cc

    ity

    EM_pcity

    EM_Padd

    EM_Mname

    EM_Lname

    EM_

    ph.no

    EM_Id

    SUB_

    Id

    EM_

    cd

    ist

    R16Check

    Studentdetaile

    Link to part A entity-

    A1

    Link to part B entity-R8

    Link to part B entity-

    C4

    Link to part D entity-

    C8

    Link to part A entity-R16

    Em_Cin

    Em_Areao

    fint

    Em_mo.no

    PART-C

  • 7/31/2019 Chap 2 Introduction

    36/66

    College Portal

    36ME.CE. SEM-II(S/W Engg. & Meth.) Enrollment No: 110440702008

    Part D

    CategoryMaster d1

    R14Update

    catagory

    R13

    UpdateBranchrecord

    BranchMaster d2

    Categorybranch

    Master d3

    R12

    UpdateNo of sits /

    branch

    StudentLeave

    Master d4

    R11

    UpdateLeavedStudent

    From study

    clerk

    CM_Id

    CM_Nam

    e

    BM_hea

    d_Id

    BM_ID

    BM_Name

    BM_trainee_head

    EM_Id

    CBM_NOofsits

    CBM_Id

    CM_idBM

    _Id

    SLM_leavereson

    SLM_Id

    SM_Id

    SLM_Date

    LinktopartAr

    elationship

    R4

    LinktopartAr

    ealationsh

    ip

    R3

    Linktop

    artC

    ISA

    4

    PART-D

  • 7/31/2019 Chap 2 Introduction

    37/66

    College Portal

    37ME.CE. SEM-II(S/W Engg. & Meth.) Enrollment No: 110440702008

    Overview of All Part

    A1

    A2

    A3

    A4

    A5

    A6

    B1

    B2

    C4

    R8

    B7

    B6

    B5

    B4

    B3

    C1

    C2

    C3

    C5

    C6

    C7

    ISA4

    ISA3

    C8

    D1

    D2

    D3

    D4

    R5

    R8

    R16

    R17

    R8

    *

    *

    R4

    R8

    *

    *

    PART A

    PART B

    PART C

    PART D

  • 7/31/2019 Chap 2 Introduction

    38/66

    College Portal

    38ME.CE. SEM-II(S/W Engg. & Meth.) Enrollment No: 110440702008

    5.7.2 System Activity or Object Interaction Diagram

    Student Registration and Attendance

    Usel Login

    View Student Management Form

    Update Record

    Insert Student Record

    Maintain Student Recoed View Student Record

    User

    Validation

    Check if student

    record available

    Yes

    No

    STOP

    START

    Authorization

    Transfer to view Record

    ShutdownRecord fully Updated

    Close RecordValidation Failed

  • 7/31/2019 Chap 2 Introduction

    39/66

    College Portal

    39ME.CE. SEM-II(S/W Engg. & Meth.) Enrollment No: 110440702008

    Alumni and Educational Forum

    view alumini form

    register for alumini

    user login

    generate student attendance report

    maintain attendance record

    update student attendance

    view student attendance form

    check circular for alumini student

    view attendence report

    view attendance record

    seccessful

    Check

    student type

    Aluministudent

    Reg for alumini

    validationfailed

    succers

    stop

    General login start

    Validate

    student

    User

    validation

    Update

    attendance

    Closeattendance

    form

    shutdown

    Closeattendance

    report

    Alumini validation failed &

    stop

    To view

    record

    To view

    report

  • 7/31/2019 Chap 2 Introduction

    40/66

    College Portal

    40ME.CE. SEM-II(S/W Engg. & Meth.) Enrollment No: 110440702008

    5.8 Function and Behavioral Modeling

    5.8.1 Context Diagram

    Student Registration, Attendance & Education Forum

    College

    Resource

    planning

    student

    Fill project diary

    Information sharing

    Raise the question

    Answer the raised

    question

    employee

    Update,insert,delete

    Student detail/record

    Apply for leave

    Generate timetable

    Online discusion with

    Student or faculty

    Online discusionWith student

    Login

    Update student attendance

    Generate attendance report

    Report to admin for

    Invalid or fake

    information

    Action taken for invalide

    info

    Info.sharing

    Online discussion with

    Student or faculty

    Online discussion with

    faculty

    Login

  • 7/31/2019 Chap 2 Introduction

    41/66

  • 7/31/2019 Chap 2 Introduction

    42/66

    College Portal

    42ME.CE. SEM-II(S/W Engg. & Meth.) Enrollment No: 110440702008

    5.8.3 Control Flow Diagram

    InsertStudentrecord

    ModifyStudentredord

    InsertAluminirecord

    View aluminirecord

    UsedNew

    Question ans.

    StoreStudent

    Attendancerecord

    StoreStudentrecord

    Validaterecords

    StoreAluminirecord

    View student

    record

    StoreQuestion

    Ans.

    RetriveStudent

    record

    Viewstudent

    attendance

    VisualStudio2008

    VisualStudioserver

    Updateattendance

    MySql

    database

    Request to raisequestion

    Requ

    estto

    Update

    atten

    danc

    e

    Request toInsert student record Requestregister

    Requestto

    store

    UpdateStudentn record

    Request tovalidate

    Answer the raisedquestion

    Requ

    estto

    store

    Resp

    onse

    Alumi

    niup

    date

    Response of

    data

    Response

    Stud

    entre

    cord

    update

    Response

    recordup

    date

    Rep

    once

    for

    Studentattendan

    ce

    RequesttoVie

    w

    attendan

    cerequst

    Requestfor

    Aluminirecord

    Requ

    estto

    store

    Resp

    onse

    que.o

    rans

    .is

    stored

    ResponseOfaluminirecord

  • 7/31/2019 Chap 2 Introduction

    43/66

    College Portal

    43ME.CE. SEM-II(S/W Engg. & Meth.) Enrollment No: 110440702008

    5.9 Main Modules of New System

    The Main module is used to manage all other modules present in this project and it is

    the Heart of our data logger.In our project student registration, employee registration and

    fill attendance module can be considered as the main module because other all the

    modules like attendance report cannot be work without this module

    5.10 Selection of Hardware and Software and Justification

    Software

    The software selected for the modules are .NET(Asp), MYSQL. This software has been selected for this module for the following reasons: .NET is selected for this module because it supports multiple languages. .NET provides many built in functionality so we choose to develop our project in .NET MYSQL is used as database as it easier to build database in it and connect. MYSQL is used as database, because as stated earlier MYSQL is Open source there is

    no need to purchase license for that.

    Hardware

    PROCESSOR: Pentium IV. RAM : 1GB. MEMORY : 80 GB HDD SPACE.

    I have used the above mentioned hardware specification in order to obtainoptimized

    performance.

  • 7/31/2019 Chap 2 Introduction

    44/66

    College Portal

    44ME.CE. SEM-II(S/W Engg. & Meth.) Enrollment No: 110440702008

    6.TESTING

  • 7/31/2019 Chap 2 Introduction

    45/66

    College Portal

    45ME.CE. SEM-II(S/W Engg. & Meth.) Enrollment No: 110440702008

    6. TESTING

    Errors are more common, more pervasive and more troublesome in software than

    with other technologies

    Software Testing has a dual function; it is used to establish the presence of defects inprogram and it is used to help judge whether or not the program is usable in practice. Thus

    software testing is used for validation and verification, which ensure that software conforms

    to its specification and meets the need of the software customer.

    Developer resorted Alpha testing, which usually comes in after the basic design of the

    program has been completed. The project scientist will look over the program and give

    suggestions and ideas to improve or to correct the design. They also report and give ideas to

    get rid of around any major problems. There is bound to be a number of bugs after a

    program have been created.

    Software InspectionAnalyze and check system representations such as the requirements document, design

    diagrams and the program source code. They may be applied at all stages of the process.

    6.1 Testing Plan

    The Testing ProcessDeveloper tests the software process activities such as Design, Implementation,

    and Requirement Engineering, because design errors are very costly to repair once

    system has been started to operate. Therefore, it is quite obvious to repair them at early

    stage of the system. So analysis is the most important process of any project.

    Requirements TractabilityAs most interested portion is whether the system is meeting its requirements or

    not, for that testing should be planned so that all requirements are individually tested.

    Developer checked the output of certain combination of inputs, which gives desirable

    results, or not. Strictly stick to your requirements specifications, give you the path to get

    desirable results from the system.

  • 7/31/2019 Chap 2 Introduction

    46/66

    College Portal

    46ME.CE. SEM-II(S/W Engg. & Meth.) Enrollment No: 110440702008

    Tested ItemsOur tested items are like database object reading/writing, skin object

    manipulation, view of containers and skins in different browsers.

    Testing ScheduleDeveloper has to test each procedure back-to-back so that errors and omissions can

    be found as early as possible. Once the system has been developed.

    6.2 Testing Strategy

    Unit TestingModule TestingIn this testing individual components and modules are tested to ensure that they operatecorrectly. We had tested each and every module such as login details, upload details, to

    maintain information for all the features and finally the generation of the reports. For this

    we have checked the database for particular entry for validation.

    Integrated TestingThis testing is a systematic technique for constructing the program structure while at the

    same time conducting tests to uncover errors associated with interfacing. All the modules

    testing in the unit testing are integrated and are tested for their interdependency. This

    system mainly works on the integration of all the departments.

    Validation Testing - Alpha TestingA customer conducts alpha testing at the developers site. The customer check by

    entering the live data. If any errors occur in the system than they directly contact us.

    Security TestingThis testing is done to confirm that the software allow only authorized users to access anduse the system. There are two levels of security in this system. We have tested entering

    the username and password for all the security levels to show them the information

    pertaining to their work only.

  • 7/31/2019 Chap 2 Introduction

    47/66

    College Portal

    47ME.CE. SEM-II(S/W Engg. & Meth.) Enrollment No: 110440702008

    Human Factor TestingThe user cannot do anything if after submitting the screen goes blank while the data are

    being processed. They may not take the action the analyst wanted or expects instead

    responding in unusual ways.

    6.3 Testing Methods

    Testing methods Involves executing an implementation of the software with test data and

    examining the outputs of the software and its operational behavior to check that it is performing

    as required.

    6.3.1 Statistical Testing

    Used to test the programs performance and reliability and to check how it worksunder operational conditions. Tests are reflecting the actual user inputs and their

    frequency.

    The stages involved in the static analysis for this system are as follows:-

    Control flow analysis Unreachable code Unconditional branches into loops Data use analysis Variable used before initialization Variables declared but never used Variables assigned twice but never used between assignments Possible array bound violations Declared variables Interface analysis Parameter type mismatches Parameter number mismatches Non-usage of the results of functions Uncalled functions and procedures

  • 7/31/2019 Chap 2 Introduction

    48/66

  • 7/31/2019 Chap 2 Introduction

    49/66

    College Portal

    49ME.CE. SEM-II(S/W Engg. & Meth.) Enrollment No: 110440702008

    Structural Testing

    We have done path testing to exercise every independent execution path through a component or

    program. If every independent execution path is executed then all statements in the components

    must have been executed at least once.

    Integration Testing

    After our individual modules were tested out we go to the integrated to create a complete system.

    This integration process involves building the system and testing the resultant system for

    problems that arise from component interactions.

    We have applied top-down strategy to validate high-level components of a system before design

    and implementation have been implemented. Because our development process started with

    high-level components and we worked down the component hierarchy.

    Performance Testing

    Performance testing is designed to test the runtime performance of the system within thecontext of the system. These tests were performed as module level as well as system

    level. Individual modules were tested for required performance.

    In performance testing we counted the processing time and response from the systemwith respect to request.

    We also checked out the total-execution time, which takes 10 to 15 seconds for loading.Condition Testing

    Condition testing is the test case design method that exercise the conditions contained in a

    program module. If the condition is incorrect then, at least one component of the condition is

    incorrect. It may include

    Boolean variable error String index out of bound error Null pointer assignment Input output connection exception Parsing (conversion) errors Arithmetic expression error

  • 7/31/2019 Chap 2 Introduction

    50/66

    College Portal

    50ME.CE. SEM-II(S/W Engg. & Meth.) Enrollment No: 110440702008

    Interface Testing

    Interface testing is integral part on Integration testing. Therefore we checked for

    Interface misuse Interface misunderstanding We examined the code to be tested and explicitly list each call to an external component.

    In the system, standard tests for GUIs have been performed, which are as follows:-

    The position and related labels for all controls were checked. Name of the form is also given appropriately. All menu functions and sub functions were verified for correctness. Validations for all inputs were done. Each menu function was tested, whether it invokes the corresponding functionality

    properly.

    Pull down controls was verified for proper functionality. Whether the non-editable text control is disabling and it was also Verified that it doesnt

    exceed the maximum allowed length.

    Whether the system prompts the user with appropriate message as And when invalidinformation is entered.

    Stress Testing

    Stress testing is to test the system for emergent properties such as performance and reliability.

    Performance tests have to be designed to ensure that the system can process its intended load.

    Object Testing

    Object testing is to test objects as individual components, which are often larger than single

    functions. Here following activities have taken place.

    Testing the individual operations associated with objects. Testing individual object classes. Testing clusters of object. Testing the object-oriented system.

  • 7/31/2019 Chap 2 Introduction

    51/66

  • 7/31/2019 Chap 2 Introduction

    52/66

  • 7/31/2019 Chap 2 Introduction

    53/66

  • 7/31/2019 Chap 2 Introduction

    54/66

    College Portal

    54ME.CE. SEM-II(S/W Engg. & Meth.) Enrollment No: 110440702008

    7.2 Test Cases

    Test Case No: 1

    Name: Login page

    Description: In this page client must enter the User Name and Password toaccess the system.

    Test Data Used: The data about user name and password from the Database.

    Expected Output: If proper status and user name and password match then allow

    to login otherwise not allow

    Actual Output: If proper status and user name and password match then allow

    to login otherwise not allow

    Pass/Fail? Pass

    Test Case No: 2

    Name: Check on the Browser capability

    Description: Here checking about that this online system will work on the

    different browsers or not like (internet explorer, firebox etc.

    Test Data Used: The data about user name and password from the Database.

    Expected Output: If user name and password match then allow to login otherwise

    not allow

    Actual Output: If proper status and user name and password match then allow

    to login otherwise not allow

    Pass/Fail? Pass

    Test Case No: 3

    Name: Check Multi-user availability

    Description: Here check that at a same time more than one user can access

    the system with User name and password.

    Test Data Used: User name and password from the database.

    Expected Output: At a time system will allow, multi user should access the user

    name and password

    Actual Output: At a time system will allow, multi user can access the system

    by their own user name and password

    Pass/Fail? Pass

  • 7/31/2019 Chap 2 Introduction

    55/66

    College Portal

    55ME.CE. SEM-II(S/W Engg. & Meth.) Enrollment No: 110440702008

    Test Case No: 4

    Name: View all student records

    Description: Here after logged into the system user can see the entire

    student records.

    Test Data Used: Student related data from the student_master tables from the

    database

    Expected Output: User should see the details of all the student after logged in to

    the system

    Actual Output: User can see the details of all the student after logged in to the

    system

    Pass/Fail? Pass

    Test Case No: 5

    Name: Only specific student record search

    Description: Here after logged into the system user can see the any specificstudent details by only its authority.

    Test Data Used: Student related data specially student name from the

    student_master tables from the database

    Expected Output: User should see the details of the specific act after logged in

    to the system only by selecting only branch, sem and class

    Actual Output: User can easily see the details of the specific student after

    logged in to the system only by selecting branch, sem and class

    Pass/Fail? Pass

    Test Case No: 6

    Name: Student lab allocation

    Description: Here after logged into the system user can see the any specific

    lab by only selecting branch, sem and class

    Test Data Used: Student related data specially student enrollment no from the

    student_master tables from the database

    Expected Output: User should see the specific module of the specific input

    given to the system after logged in to the system by selecting

    branch, sem, class and lab batch

    Actual Output: User should see the specific module of the specific input

    given to the system after logged in to the system by selecting

    branch, sem, class and lab batch

    Pass/Fail? Pass

  • 7/31/2019 Chap 2 Introduction

    56/66

    College Portal

    56ME.CE. SEM-II(S/W Engg. & Meth.) Enrollment No: 110440702008

    Test Case No: 7

    Name: Combination of Name and Password

    Description: Here after logged into the system user can see the any specific

    details of the specific Designation.

    Test Data Used: Act related data specially act name and password from the act

    related tables from the database

    Expected Output: User should see the details of the specific data of the specific

    act after logged in to the system by selecting act name and

    password.

    Actual Output: User can see the details of the specific data of the specific act

    after logged in to the system by selecting act name and

    password.

    Pass/Fail? Pass

    Test Case No: 8Name: Only by Surname search in student alumni

    Description: Here after logged into the system user can search the student

    only by surname.

    Test Data Used: Related data specially search by surname from related tables

    from the database

    Expected Output: User should see the details of the specific surname after logged

    in to the system by selecting only surname.

    Actual Output: User cannot see the details of the specific rule after logged in

    to the system without entering surname. Error message is there

    by only selecting not the surname.

    Pass/Fail? Fail

    Test Case No: 9

    Name: Only Student Attendance search

    Description: Here after logged into the system user can see the details of

    the attendance of different subject.

    Test Data Used: Related data of enrollment number ,search from tables from

    the database

    Expected Output: User should see the details of the specific data after logged into the system by selecting only from date To date.

    Actual Output: User cannot see the details of the specific data after logged in

    to the system without selecting any subject name. Error

    message will be generate.

    Pass/Fail? Fail

  • 7/31/2019 Chap 2 Introduction

    57/66

    College Portal

    57ME.CE. SEM-II(S/W Engg. & Meth.) Enrollment No: 110440702008

    Test Case No: 10

    Name: Student search his/her registration detail of its enrollment

    number and update specific detail.

    Description: Here after logged into the system user can see the details of

    its registration.

    Test Data Used: Related data find from related tables from the database

    Expected Output: User should see the details of the registration and update

    selected detail.

    Actual Output: User should see the details of the registration and update

    selected detail.

    Pass/Fail? Pass

    Test Case No: 11

    Name: Faculty wise student attendance search

    Description: Here after logged into the system user can see the details of

    the attendance of different subject filled by faculty

    Test Data Used: Related data of enrollment number and attendance records

    from attendace_master tables from the database

    Expected Output: User should see the details of the specific data after logged in

    to the system by selecting only from date To date.

    Actual Output: User cannot see the details of the specific data after logged in

    to the system without selecting any subject name. Error

    message will be generate.

    Pass/Fail? Pass

    Test Case No: 12

    Name: Class wise student attendance search

    Description: Here after logged into the system user can see the details of

    the attendance of different subject filled by faculty

    Test Data Used: Related data of enrollment number and attendance records

    from attendace_master tables from the database

    Expected Output: User should see the details of the specific data after logged in

    to the system by selecting only from date To date.

    Actual Output: User cannot see the details of the specific data after logged in

    to the system without selecting any subject name. Error

    message will be generate.

    Pass/Fail? Pass

  • 7/31/2019 Chap 2 Introduction

    58/66

    College Portal

    58ME.CE. SEM-II(S/W Engg. & Meth.) Enrollment No: 110440702008

    Test Case No: 13

    Name: Average subject wise student attendance search

    Description: Here after logged into the system user can see the details of

    the attendance of different subject filled by faculty

    Test Data Used: Related data of enrollment number and attendance records

    from attendace_master tables from the database

    Expected Output: User should see the details of the specific data after logged in

    to the system by selecting only from date To date.

    Actual Output: User cannot see the details of the specific data after logged in

    to the system without selecting any subject name. Error

    message will be generate.

    Pass/Fail? Pass

    Reliability of the System

    There are three approaches to reliability of the system.

    Error Avoidance

    Error Avoidance is impossible in any system, as it points to prevention of errors from occurring

    in system. In our system, we cannot prevent occurrence of errors because, if user does not call

    methods properly and does not input appropriate parameters, we are unable to avoid errors.

    Error Detection and Correction

    Error Detection corresponds to reorganization of errors when they are encountered. In the

    system, developer use alert message to prompt errors to users. We also use try-catch structure to

    prompt errors. Alert message shown to users are in well-understood forms. System prompts

    various error messages like file does not exist, whenever the user tries to open any other file

    instead of image file. However, system does not support correction of errors; it is user's

    responsibility to take appropriate action.

    Error Tolerance

    Error Tolerance refers to reorganization of errors when they occur, but enables system to keep

    running through degraded system. In system will never shutdown automatically due to errors, but

    it is possible that because of errors it may not work efficiently. For example, if invalid image is

    given then system will prompt error and it will not shut down. Furthermore, if user does not add

    image file, in that case, that layer is not displayed nor activated and any further operations are

    not done.

  • 7/31/2019 Chap 2 Introduction

    59/66

    College Portal

    59ME.CE. SEM-II(S/W Engg. & Meth.) Enrollment No: 110440702008

    Finally theres only one amazing statement that means everything in itself

    Testingnever ends, it just gets transmitted from you to your customer, every time your

    customer uses the software, and a test is being conducted

  • 7/31/2019 Chap 2 Introduction

    60/66

    College Portal

    60ME.CE. SEM-II(S/W Engg. & Meth.) Enrollment No: 110440702008

    8.

    SUMMARY

  • 7/31/2019 Chap 2 Introduction

    61/66

    College Portal

    61ME.CE. SEM-II(S/W Engg. & Meth.) Enrollment No: 110440702008

    8. SUMMARY

    Our project wasto create a COLLEGE PORTAL which could be useful for college.This

    portal has many features such as good interactivity, ease of use, proper GUI, simple navigation,

    effective and accurate results and good security. The main objective is to build a system thatassists the end user in finding aany type of record he wants provided he has proper authority. For

    this system, there are 4 types of users: they are Admin,Staff,Student and Guest users.

    8.1Overview

    This project aims to eliminate extra work that is associated with finding a company to

    develop a software project. Previously the customers had to make a field study about the

    software companies that would build their software product and have to perform a lot of paper

    work. Now they can simply post a software proposal and interested software companies bid on

    those software proposals. This way the interaction between the customers and development

    companies will become easy and simple. This is an online bidding system consisting of mainly

    three types of users: namely customers, software development companies and administrator. The

    project also allows software developers and customers to give feedback to each other for a

    particular project.This website helps the customers and software developers to interact easily and

    share information effectively in a secured manner. It works as a bridge between the customers

    and software developers.

    8.2Specification and Project Plan

    8.2.1 Requirements specification

    The software requirements specification document contained information about the

    project such as objectives and goals of developing the software product. It also contained the

    information about the target environment, various types of requirements such as functional, non-

    functional and domain requirements. Moreover, the requirements document also had some

    details about the users of the system, major functions performed by the system as well as the

    risks associated with the system. And finally the deliverables of the system. More information

    can be obtained from the software requirements specification document.

    8.2.2 Project Plan document

    The project plan document contained information about the project, process model used

    for building the project, team organization, deliverables of the project and risks associated with

    the project. It also focuses on the project schedule, project estimates, control plan and project

    resources. For more information on project plan see project plan document.

  • 7/31/2019 Chap 2 Introduction

    62/66

    College Portal

    62ME.CE. SEM-II(S/W Engg. & Meth.) Enrollment No: 110440702008

    Team

    Overview

    The members of the team were:

    Madhu Shukla. Viral Parekh. Dipalee Rathod. Manisha Valera.

    Team Structure

    Our team is a Democratic Decentralized (DD) team. Instead of having a team leader, each

    member in the team was responsible for some specific task. The decisions were made by

    conducting meetings and discussions. The team as a whole was accountable for the

    outcomes of its decisions and actions. All the members of the team performed some

    specific functions such as requirements gathering and reviews were done by all the team

    members while you can see the details of the tasks that each person performed from the

    task sheet.

    Advantages

    As our team structure was Democratic Decentralized (DD) we did not have any team

    leader. All the members took the decisions by reaching a consensus. No decision wasforced on anyone and hence there no clashes for anything. There were no ego problems

    and the working in the team went off very smoothly. Everyone got equal opportunity to

    share and implement their ideas. No member of the team faced any problem working

    with others and everything went off very smoothly.

    Disadvantages

    The only problem we faced sometimes was staying on schedule. So if there was a team

    leader, then he would force us to finish the work on a specific date so that we do

    everything on time. Also sometimes we had a hard time to decide what we should do next

    and in what time, so this was an issue.

  • 7/31/2019 Chap 2 Introduction

    63/66

    College Portal

    63ME.CE. SEM-II(S/W Engg. & Meth.) Enrollment No: 110440702008

    Doing things differently

    We could have developed system with different suited model and as following

    centralized structure to comple it earlier than the time taken. Also it could be

    implemented on different environment than .NET to make it cost effective using OPEN

    SOURCE software.

    Process

    Overview

    We used Iterative Model. So With incremental yield is intended that all requirements to

    be fully described. Then the system iterative phases. The first definition phase study is

    performed once. Work is done in phases. And also increments of the product can be madewith enhance features as time passes.

    Advantages

    Risks can be better managed by smaller pieces to be developed. Bottlenecks are so quickto light.

    Complex systems are clearer and less complex to implement it step by step to acomprehensive income working without the need of a complete design is created.

    At the end of each iteration, a useful product, even if the development is discontinuedput. In a linear method would often never made use perch.

    Changes in organization can be quickly incorporated into the development process.Disadvantages

    There are obvious disadvantages. Some disadvantages:

    Because during the development process needs to be adapted and refined, it may be that

    the original purpose fades. It can happen that it continues to change and it never finished.

    This is called Scope Creep.

    Project managers who are accustomed to linear development can be confused by thestrong dynamics.

    The rapid development has the potential to draw a bill on the organization and resourcesof the great dynamics.

    Inexperience with the way of working can lead to misunderstandings anddisappointments.

  • 7/31/2019 Chap 2 Introduction

    64/66

    College Portal

    64ME.CE. SEM-II(S/W Engg. & Meth.) Enrollment No: 110440702008

    Conclusion

    We used iterative model and hence we needed to develop the requirement on hand as a core

    product. Team structure used was Democratic Decentralized which again benefited us as

    member with expertise in different field leaded at different phase of time. Also further

    development can be made in the system it can be enhanced as well as can be converted as web

    based system.

    Future Implementation

    1) Message service is most accentual services so it can be added in future for circular andother curriculum activities.

    2) College Portal can be converted into a web based application for fully web basedfunctionality.

    3) It can be used in Online Examination also.

  • 7/31/2019 Chap 2 Introduction

    65/66

    College Portal

    65ME.CE. SEM-II(S/W Engg. & Meth.) Enrollment No: 110440702008

    9.

    COLLEGE

    PORTAL

    PPT

  • 7/31/2019 Chap 2 Introduction

    66/66

    College Portal

    10.

    SOFTWARE

    REUSE

    PPT