KEMBAR78
Chapter 1 Search Engine 1. Objective | PDF | Web Search Engine | Client–Server Model
0% found this document useful (0 votes)
394 views63 pages

Chapter 1 Search Engine 1. Objective

The document discusses search engines and how they work. It defines search engines as software programs that search websites based on keywords and return relevant results. It describes how search engines use web crawlers or spiders to index web pages by following links and storing information about pages. When a user enters search terms, the engine examines its index and returns the best matching pages based on relevance. The document provides details on how search engines work through crawling, indexing, and searching processes. It also defines key components of data flow diagrams used to model how data moves through systems.

Uploaded by

Kumar Bhupendra
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
394 views63 pages

Chapter 1 Search Engine 1. Objective

The document discusses search engines and how they work. It defines search engines as software programs that search websites based on keywords and return relevant results. It describes how search engines use web crawlers or spiders to index web pages by following links and storing information about pages. When a user enters search terms, the engine examines its index and returns the best matching pages based on relevance. The document provides details on how search engines work through crawling, indexing, and searching processes. It also defines key components of data flow diagrams used to model how data moves through systems.

Uploaded by

Kumar Bhupendra
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 63

1

CHAPTER 1 SEARCH ENGINE

1. OBJECTIVE
Our objective to develop a “search engine”. My aim is that user can obtained information easily
about all the Central University of India through my search engine. User can obtain information
like about the university, course, what’s the rank of college, fee structure etc.

2. SEARCH ENGINE
Search engine is a software program that searches for sites based on the words that you designate
as search terms. Search engines look through their own databases of information in order to find
what it is that you are looking for.

Search engines are web based software that go through millions of web pages to find information
for users. They work by searching for keywords that are inputted by the user. In other words,
web search engine is designed to search for information on the World Wide Web and FTP
servers. The search results are generally presented in a list of results and are often called hits.
The information may consist of web pages, images, information and other types of files. Some
search engines also mine data available in databases or open directories. Unlike Web directories,
which are maintained by human editors, search engines operate algorithmically or are a mixture
of algorithmic and human input.

Search engines automatically create web site listings by using spiders that "crawl" web pages,
index their information, and optimally follows that site's links to other pages. Spiders return to
already-crawled sites on a pretty regular basis in order to check for updates or changes, and
everything that these spiders find goes into the search engine database.

A spider, also known as a robot or a crawler, is actually just a program that follows, or "crawls",
links throughout the Internet, grabbing content from sites and adding it to search engine indexes.

Spiders only can follow links from one page to another and from one site to another. That is the
primary reason why links to your site (inbound links) are so important. Links to your website
from other websites will give the search engine spiders more "food" to chew on. The more times
they find links to your site, the more times they will stop by and visit. Google especially relies on
its spiders to create their vast index of listings.

Spiders find Web pages by following links from other Web pages, but you can also submit your
Web pages directly to a search engine or directory and request a visit by their spider. In fact, it's
a good idea to manually submit your site to a human-edited directory such as Yahoo, and usually
spiders from other search engines (such as Google) will find it and add it to their database. It can
be useful to submit your URL straight to the various search engines as well; but spider-based
2

engines will usually pick up your site regardless of whether or not you've submitted it to a search
engine.

2.1. Need

It became very easy to search anything by using search engine, through search engine we can
search any information too less time , to search we simply type the name and related to the word
which we typed all information is given through search engine and thus our problem solves in
very less time . In computer field , times are more importance.

Without search engine it was very difficult search about any thing to which we need to search
and a lot of time is wastage in searching time.

2.2. Working

Search engines are not simple. They include incredibly detailed processes and methodologies,
and are updated all the time. This is a bare bones look at how search engines work to retrieve
your search results. All search engines go by this basic process when conducting search
processes, but because there are differences in search engines, there are bound to be different
results depending on which engine you use.

1. The searcher types a query into a search engine.

2. Search engine software quickly sorts through literally millions of pages in its database to
find matches to this query.

3. The search engine's results are ranked in order of relevancy

A search engine operates, in the following order

1. Web crawling
2. Indexing
3. Searching

Web search engines work by storing information about many web pages, which they retrieve
from the html itself. These pages are retrieved by a Web crawler (sometimes also known as a
spider) — an automated Web browser which follows every link on the site. Exclusions can be
made by the use of robots.txt. The contents of each page are then analyzed to determine how it
should be indexed (for example, words are extracted from the titles, headings, or special fields
called meta tags). Data about web pages are stored in an index database for use in later queries.
A query can be a single word. The purpose of an index is to allow information to be found as
3

quickly as possible. Some search engines, such as Google, store all or part of the source page
(referred to as a cache) as well as information about the web pages, whereas others, such as
AltaVista, store every word of every page they find. This cached page always holds the actual
search text since it is the one that was actually indexed, so it can be very useful when the content
of the current page has been updated and the search terms are no longer in it.

When a user enters a query into a search engine (typically by using key words), the engine
examines its index and provides a listing of best-matching web pages according to its criteria,
usually with a short summary containing the document's title and sometimes parts of the text.
The index is built from the information stored with the data and the method by which the
information is indexed. Unfortunately, there are currently no known public search engines that
allow documents to be searched by date. Most search engines support the use of the boolean
operators AND, OR and NOT to further specify the search query. Boolean operators are for
literal searches that allow the user to refine and extend the terms of the search. The engine looks
for the words or phrases exactly as entered.

There may be millions of web pages that include a particular word or phrase, some pages may be
more relevant, popular, or authoritative than others. Most search engines employ methods to rank
the results to provide the "best" results first. How a search engine decides which pages are the
best matches, and what order the results should be shown in, varies widely from one engine to
another.

3. DATA FLOW DIAGRAM

Data flow diagrams (DFDs) reveal relationships among and between the various components in
a program or system. DFDs are an important technique for modeling a system’s high-level detail
by showing how input data is transformed to output results through a sequence of functional
transformations. DFDs consist of four major components: entities, processes, data stores, and
dataflow. The symbols used to depict how these components interact in a system are simple and
easy to understand; however, there are several DFD models to work from, each having its own
symbology. DFD syntax does remain constant by using simple verb and noun constructs. Such a
syntactical relationship of DFDs makes them ideal for object-oriented analysis and parsing
functional specifications into precise DFDs for the systems analyst.

Definition: When it comes to conveying how information data flows through systems (and how
that data is transformed in the process), data flow diagrams (DFDs) are the method of choice
over technical descriptions for three principal reasons.

1. DFDs are easier to understand by technical and nontechnical audiences.


4

2. DFDs can provide a high level system overview, complete with boundaries and
connections to other systems
3. DFDs can provide a detailed representation of system components 1

DFDs help system designers and others during initial analysis stages visualize a current system
or one that may be necessary to meet new requirements. Systems analysts prefer working with
DFDs, particularly when they require a clear understanding of the boundary between existing
systems and postulated systems.

DFDs represent the following:

1. External devices sending and receiving data

2. Processes that change that data

3. Data flows themselves

4. Data storage locations

The hierarchical DFD typically consists of a top-level diagram (Level 0) underlain by cascading
lower level diagrams (Level 1, Level 2…) that represent different parts of the system.

Defining DFD Components

DFDs consist of four basic components that illustrate how data flows in a system: entity, process,
data store, and data flow.

Entity

An entity is the source or destination of data. The source in a DFD represents these entities that
are outside the context of the system. Entities either provide data to the system (referred to as a
source) or receive data from it (referred to as a sink). Entities are often represented as rectangles
(a diagonal line across the right-hand corner means that this entity is represented somewhere else
in the DFD). Entities are also referred to as agents, terminators, or source/sink.

Fig.1.1. External/Internal entity


5

Process

The process is the manipulation or work that transforms data, performing computations, making
decisions (logic flow), or directing data flows based on business rules. In other words, a process
receives input and generates some output. Process names (simple verbs and dataflow names,
such as “Submit Payment” or “Get Invoice”) usually describe the transformation, which can be
performed by people or machines. Processes can be drawn as circles or a segmented rectangle on
a DFD, andinclude a process name and process number.

Fig.1.2. Process/Function

Data Store

A data store is where a process stores data between processes for later retrieval by that same
process or another one. Files and tables are considered data stores. Data store names (plural) are
simple but meaningful, such as “customers,” “orders,” and “products.” Data stores are usually
drawn as a rectangle with the right- hand side missing and labeled by the name of the data
storage area it represents, though different notations do exist.

Fig.1.3.Data Store

Data Flow

Data flow is the movement of data between the entity, the process, and the data store. Data flow
portrays the interface between the components of the DFD. The flow of data in a DFD is named
to reflect the nature of the data used (these names should also be unique within a specific DFD).
Data flow is represented by an arrow, where the arrow is annotated with the data name.

Fig.1.4. Data Flow


6

3.1. Process for Developing DFDs

Data flow diagrams can be expressed as a series of levels. We begin by making a list of business
activities to determine the DFD elements (external entities, data flows, processes, and data
stores). Next, a context diagram is constructed that shows only a single process (representing the
entire system), and associated external entities. The Diagram-0, or Level 0 diagram, is next,
which reveals general processes and data stores . Following the drawing of Level 0 diagrams,
child diagrams will be drawn (Level 1 diagrams) for each process illustrated by Level 0
diagrams.

Developing the Level 0 DFD

At this point, you should have a good idea of the system boundary. All components within the
system boundary are included within a single system/process box in the DFD. External entities
lie outside the system boundary; internal entities will become locations for processes. The data
flow arrows to and from the external entities will indicate the system’s relationship with its
environment. Remember that information always flows to or from a process, an external entity,
or a data store. You can use a dashed line to show data flows between external entities

Developing the Level 1 DFD

It is important that the system relationship with its environment be preserved no matter how
many levels deep you model. In other words, you can’t have new data flows crossing the system
boundary in Level 1. The next section deals with such non-valid data flows. The Level 1 DFD
provides a high-level view of the system that identifies the major processes and data stores.
Identify or list each incoming and outgoing data flow with a corresponding process that receives
or generates data. Make sure you refer to your data item table for any missing internal data flows
and to identify data stores. If your table contains documents with the same source and
destination, they might be data stores. Some processes share data stores while some data stores
are used by one process. It may be possible to move the single process - data store inside the
process itself. Identify those processes that only address internal outputs and outputs, and use one
process for each source or destination from the DFD.

Revising the Level 1 DFD

Once you’ve finished your first attempt at a Level 1 DFD, review it for consistency and refine it
for balance by asking yourself these questions:

1. Do the Level 1 processes correspond with the major

functions that a user expects from the system?

2. Is the level of detail balanced across the DFD?

3. Can some processes be merged?


7

4. Can I remove data stores not shared by more than one process?

5. Have I avoided crossed data flow lines by making

use of duplicated components (external entities and

data stores)?

Advantages and Disadvantages of DFDs

As we have seen, the DFD method is an element of object-oriented analysis and is widely used.
Use of DFDs promotes quick and relatively easy project code development. DFDs are easy to
learn with their few-and-simple-to-understand symbols (once you decide on a particular DFD
model). The syntax used for designing

Disadvantages

DFDs for large systems can become cumbersome, difficult to translate and read, and be time
consuming in their construction. Data flow can become confusing to programmers, but DFDs are
useless without the prerequisite detail: a Catch-22 situation. Different DFD models employ
different symbols (circles and rectangles, for example, for entities).

Conclusion

Data flow diagramming is a highly effective technique for showing the flow of information
through a system. DFDs are used in the preliminary stages of systems analysis to help understand
the current system and to represent a required system. The DFDs themselves represent external
entities sending and receiving information (entities), the processes that change information
(processes), the information flows themselves (data flows), and where information is stored (data
stores). The hierarchical DFDs consist of a single top layer (Level 0 or the context diagram) that
can be decomposed into many lower level diagrams (Level 1,Level 2…Level N), each
representing different areas ofthe system.DFDs are extremely useful in systems analysis as they
help structure the steps in object-oriented design andanalysis. Because DFDs and object
technology share the same syntax constructs, DFDs are appropriate for the domain only.DFDs
are a form of information development, and as such provide key insight into how information is
transformed as it passes through a system. Having the skills to develop DFDs from functional
specs and being able to interpret them is a value-add skill set that is well within the domain of
technical communications.
8

Figure 1.5 shows the data flow diagram of my Search engine, in this the entity database
administrator wants to insert or update the database according to their necessity day by day. The
DBA uses the process acquire university to accomplish their task. When the data is successfully
inserted or updated then there is an acknowledgement showing that the task is successfully done,
if the task is not successfully done then the error prints trough the acknowledgement. The
inserted or updated data is stored into the Local server or into the University information stored
database.

There is another entity user which is interfacing to the process browser. When the user
wants to know the information throw the database then the user types the parameter what he
needs to get then submit, after submitting the typed parameter the typed parameter goes to the
database and searches all the data related to the typed parameter and picks up the actual data and
displays onto the browser through which the user is interfacing gets the result.

Fig.1.5.Data Flow Diagram Level 1: Search Engine

Figure 1.6 is the sublevel of the process acquire university, In this the DBA inserts or update the
database local server. In which the DBA uses two processes. The first one is the insertion and
another one is the updation process. When the DBA need to insert any information to insert into
the database local server, then all it happens through the insertion process. When the DBA wants
to update the database local server then all the task of the updation would occur in the process
updation .The inserted or updated data is stored into the main database known as local server.
9

Acquire University Sub level process

Fig.1.6. Data Flow Diagram of Level 2: Search Engine

4. SEARCHING TECHNIQUE (CLIENT SERVER ARCHITECTURE)

The client–server model of computing is a distributed application structure that partitions tasks
or workloads between the providers of a resource or service, called servers, and service
requesters, called clients. Often clients and servers communicate over a computer network on
separate hardware, but both client and server may reside in the same system. A server machine is
a host that is running one or more server programs which share their resources with clients. A
client does not share any of its resources, but requests a server's content or service function.
Clients therefore initiate communication sessions with servers which await incoming requests.
10

Fig.1.7. Architecture of client-server

Description

The client–server characteristic describes the relationship of cooperating programs in an


application. The server component provides a function or service to one or many clients, which
initiate requests for such services.

Functions such as email exchange, web access and database access, are built on the client–server
model. Users accessing banking services from their computer use a web browser client to send a
request to a web server at a bank. That program may in turn forward the request to its own
database client program that sends a request to a database server at another bank computer to
retrieve the account information. The balance is returned to the bank database client, which in
turn serves it back to the web browser client displaying the results to the user. The client–server
model has become one of the central ideas of network computing. Many business applications
being written today use the client–server model. So do the Internet's main application protocols,
such as HTTP, SMTP, Telnet, and DNS.

The interaction between client and server is often described using sequence diagrams. Sequence
diagrams are standardized in the Unified Modeling Language.

Specific types of clients include web browsers, email clients, and online chat clients.
11

Specific types of servers include web servers, ftp servers, application servers, database servers,
name servers, mail servers, file servers, print servers, and terminal servers. Most web services
are also types of servers.

The client-server architecture is a way to structure a distributed application so that it consists of


two distinct software modules. A server module, only one instance of which is present in the
System. A client module, of which multiple instances are present in the system .The only
communication in the system is between the client modules and the server module .Please note
that the client and server modules themselves may be quite complex systems with further
submodules and components.However, the key characteristic of the client-server architecture is
that there is a server module that is the central point for communication. Clients do not
communicate with each other,only with the server module.In the client-server architecture, the
server is usually the more complex piece of the software. The clients are often (although not
always) simpler. With the wide availability of a web browser on most desktops, it is quite
common to develop distributed applications so that they can use a standard web browser as the
Client.

Fig.1.8. Internal Architecture


12

4.1. Working of client-server

The Internet revolves around the client-server architecture. Your computer runs software called
the client and it interacts with another software known as the server located at a remote
computer. The client is usually a browser such as Internet Explorer, Netscape Navigator or
Mozilla. Browsers interact with the server using a set of instructions called protocols. These
protocols help in the accurate transfer of data through requests from a browser and responses
from the server. There are many protocols available on the Internet. The World Wide Web,
which is a part of the Internet, brings all these protocols under one roof. You can, thus, use
HTTP, FTP, Telnet, email etc. from one platform - your web browser.

4.2. Examine the client-server inter-communication with three models

Model #1 of the client-server architecture - Static HTML pages

Fig.1.9. client-server architecture - Static HTML pages


13

Model #2 of the client-server architecture - CGI Scripts

Fig.1.10. client-server architecture - CGI Scripts

Model #3 of the client-server architecture - Server side scripting technologies

Fig.1.11. client-server architecture - Server side scripting technologies


14

My search engine works on the basis of client server architecture - Server side scripting
technologies.

The third case also involves dynamic response generated by the use of server side technologies.

There are many server side technologies today


Personal Home Pages (PHP) : An open source technology. PHP pages typically have .php,phtml
or .php3 file name extensions.

Active Server Pages (ASP): A Microsoft technology. ASP pages typically have the
extension.asp.

Java Server Pages: .Java Server Pages contains Java code.

Server Side Includes (SSI): Involves the embedding of small code snippets inside the HTML
page. An SSI page typically has .shtml as its file extension.

With these server technologies it has become easier to maintain Web pages especially helpful for
a large web site. The developer needs to embed the server-side language code inside the HTML
page. This code is passed to the appropriate interpreter which processes these instructions and
generates the final HTML displayed by the browser. Note, the embedded server-script code is
not visible to the client (even if you check the source of the page) as the server sends ONLY the
HTML code.

Let's look at PHP as an example. A request sent for a PHP page from a client is passed to the
PHP interpreter by the server along with various program variables. The interpreter then
processes the PHP code and generates a dynamic HTML output. This is sent to the server which
in turn redirects it to the client. The browser is not aware of the functioning of the server. It just
receives the HTML code, which it appropriately formats and displays on your computer.

5. TECHNOLOGY USED

5.1. PHP (Hypertext Preprocessor)

PHP is a server-side scripting language devised by Rasmus Lerdorf in 1994 for building
dynamic, interactive Web sites.
15

PHP Main Use:

 Cross-platform: Most PHP code can be processed without alteration on computers


running many different operating systems.
 HTML-embedded: PHP code can be written in files containing a mixture of PHP
instruction and HTML code.
 Server-side: The PHP programs are run on a server-specifically a Web server.
 Web-scripting language: PHP program run via a Web browser.

5.2. HTML (Hypertext Markup Language)

HTML is a collection of platform-independent styles used to create a document for the World
Wide Web (WWW).

5.3. MySQL (Structure Query Language)

MySQL is a database server. It is ideal for both small and large

applications. MySQL supports standard SQL for database creation. MySQL compiles on a
number of platforms.

The data in MySQL is stored in database objects called tables. The table is a collection of related
data entries and it consists of columns and rows. PHP combined with MySQL are cross-platform.
MySQL is the de-facto standard database for web sites that supports huge volumes of both data
and end users.
16

CHAPTER 2 SOFTWARE REQUIREMENT SPECIFICATION

2. SOFTWARE REQUIREMENT SPECIFICATION (SRS)


The Software Requirements specification is produced at the culmination of the analysis task. The
functions and performance located to software as art of in the system engineering are refined by
establishing the complete information description, a detailed functional and behavioral
description, and indication of performance requirement and design constraints, appropriate
validation criteria and data pertinent to requirements.
The format of software requirements specifications having as follows:-

2.1. Introduction

The introduction states the goal and objective of the software describing in the context of the
computer based system. Actually the introduction nothing more than the software scope of the
planning document.

2.2. Information description

Online Education System (OES) is a software for handling all the works that are related to the
education processing of university or institution system. This is web-based application software
that is working on Internet. This is an application between user and client server. All the
information is given on the site of university or institutional. The registered student can get
information of the education package. This system is mainly concerned about Student’s
requirement and their education package delivery. The education center deals with a number of
educational package as per offered by University. All the package have many categories. All the
package/categories are running as per the University’s or Institute.

2. 3. Functional Description

A description of each function required to solve the problem is presented in the functional
description. A processing narrative is provided for each function, design constraints are stated
and justified performance characteristics are stated and one or more diagrams are included to
graphically represent overall structured of software and interplay among software functions and
other system elements.
17

2.3.1. Hardware Description

Tools used Hardware description

Processor Pentium(r) dual-core 2 GHz


RAM 1 GB
Hard Disk Drive 160 GB
Keyboard Standard 104 Keys
Monitor 1280*800 Resolutions
Networking Tools TCP/IP
Protocol HTTP
Web Server Wamp

2.3.2. Software Description

Operating System Windows 7/XP


Development Tools WAMP (PHP, Apache, MySQL), HTML
Web Browser Internet Explorer 6.0 or above, Mozilla
Firefox
Database MySQL

2.4. Behavioral Description

This description section of the specification examines the operation of the software as a
consequence of external events and internal generated control characteristics.

This software is “Search Engine” software which is made for a searching. This software may
handle by many users. This situation makes a software developer to think about users. The user
of the system must be well known of the behaviors of the system.
If the user is not familiar with the system then it may create problem for the OOPS. Before using
the system it is necessary for the user who is unfamiliar to the system must know which type of
input each and every fields requires, otherwise it leads to ambiguity in the records. Such type
event comes under the external event to the system. If some ambiguity takes place then it can be
18

cancel before saving, if did not cancel then it can be removed by modifying that field. Thus it is
necessary to before using the system understanding the system is compulsory.
Apart from external event this system also provides the facility for the internal event. This
system will be made module wise and each module is independent of other modules. If any
ambiguity occurs in one database file it will not affect the other database files that make sure that
internal event will not takes place.

2.5. Validation and criteria

Probably most important, and ironically, the most often neglected section of a software
requirement specification is validation criteria. How do we recognize a successful
implementation what classes of tests must be conducted to validate functions performance and
constraints? We neglect this section because completing it demands through understanding the
software requirements. Something that we often do not has a this stage. Yet, specification of
validation
Criteria act as an implicit revue of all other requirements it is essential that time and attention we
given to this section.

This software will perform many validations almost in each module on line.

Some of the validation description is given below

Validation in User Maintenance Process


 Enter a parameter (parameters are central university)
Parameter should not be null
19

CHAPTER 3 DATABASE DESIGN

3. Database Design

Database design is the process of producing a detailed data model of a database. This logical data
model contains all the needed logical and physical design choices and physical storage
parameters needed to generate a design in a Data Definition Language, which can then be used to
create a database. A fully attributed data model contains detailed attributes for each entity.

The term database design can be used to describe many different parts of the design of an overall
database system. Principally, and most correctly, it can be thought of as the logical design of the
base data structures used to store the data. In the relational model these are the tables and views.
However, the term database design could also be used to apply to the overall process of
designing, not just the base data structures, but also the forms and queries used as part of the
overall database application within the database management system (DBMS).

The process of doing database design generally consists of a number of steps which will be
carried out by the database designer. Usually, the designer must:

• Determine the relationships between the different data elements.

• Superimpose a logical structure upon the data on the basis of these relationships.

3.1. ER Diagram (Entity-relationship model)

Fig.3.1. A Sample Entity-Relationship Diagram


20

Database designs also include ER (Entity-relationship model) diagrams. An ER diagram is a


diagram that helps to design databases in an efficient way.

Attributes in ER diagrams are usually modeled as an oval with the name of the attribute, linked
to the entity or relationship that contains the attribute.

Within the relational model the final step can generally be broken down into two further steps,
that of determining the grouping of information within the system, generally determining what
are the basic objects about which information is being stored, and then determining the
relationships between these groups of information, or objects. This step is not necessary with an
Object database.

The Design Process

The design process consists of the following steps:

1. Determine the purpose of your database - This helps prepare you for the remaining steps.

2. Find and organize the information required - Gather all of the types of information you
might want to record in the database, such as product name and order number.

3. Divide the information into tables - Divide your information items into major entities or
subjects, such as Products or Orders. Each subject then becomes a table.

4. Turn information items into columns - Decide what information you want to store in each
table. Each item becomes a field, and is displayed as a column in the table. For example,
an Employees table might include fields such as Last Name and Hire Date.

5. Specify primary keys - Choose each table’s primary key. The primary key is a column
that is used to uniquely identify each row. An example might be Product ID or Order ID.

6. Set up the table relationships - Look at each table and decide how the data in one table is
related to the data in other tables. Add fields to tables or create new tables to clarify the
relationships, as necessary.

7. Refine your design - Analyze your design for errors. Create the tables and add a few
records of sample data. See if you can get the results you want from your tables. Make
adjustments to the design, as needed.

8. Apply the normalization rules - Apply the data normalization rules to see if your tables
are structured correctly. Make adjustments to the tables

Determining data to be stored

In a majority of cases, a person who is doing the design of a database is a person with expertise
in the area of database design, rather than expertise in the domain from which the data to be
21

stored is drawn e.g. financial information, biological information etc. Therefore the data to be
stored in the database must be determined in cooperation with a person who does have expertise
in that domain, and who is aware of what data must be stored within the system.

This process is one which is generally considered part of requirements analysis, and requires
skill on the part of the database designer to elicit the needed information from those with the
domain knowledge. This is because those with the necessary domain knowledge frequently
cannot express clearly what their system requirements for the database are as they are
unaccustomed to thinking in terms of the discrete data elements which must be stored. Data to be
stored can be determined by Requirement Specification.

3.2. Table Structure

S.No. Name of the Table Purpose

1. Central_University Searching Index of University


Link
2. Aligarh_Muslim_University(master table) University Information

3. So on other university table So on University Information

Table 3.1. Table Structure

Table Descriptions

Table Name: Central_University

Description: This table contains name of the Central University of India for creating dynamic
link.

Attribute Name Data Type Size Null/Not Null Primary Key


University_Id Int 4 Null _
University_Name Text 200 Null _
About_University LongText 1000 Null _
City Varchar 30 Null _
State Varchar 30 Null _

Table 3.2. Central_University

Table Name: Aligarh_Muslim_University


22

Description: This table contains information of the Central University of India Aligarh Muslim
University.

Attribute Name Data Type Size Null/Not Null Primary Key


Id Int 5 Null _
About_the_University LongText 900 Null _
Faculties_and_Departments LongText 700 Null _
Courses_of_Study LongText 900 Null _
Admissions LongText 800 Null _
Examination LongText 600 Null _
University_Library LongText 500 Null _
Auditorium_and_Guest Hous LongText 500 Null _
Faculty_Members LongText 400 Null _
Adminstration LongText 700 Null _
Acadmic_Calender LongText 500 Null _
Hostels LongText 400 Null _
Co_Curricular_Activities LongText 500 Null _
Placement LongText 700 Null _

Table 3.3. Aligarh_Muslim_University


23

CHAPTER 4 PHP CODE

4. PHP CODE
4.1. Home Page Design

<html>

<head><title>homepage</title></head>

<style type="text/css">

h4{color:#3300FF}</style>

<body>

<table width="900">

<tr>

<td width="150"><a href="web.php" style="text-decoration:none">

<h3 align="center">web</h3></a></td>

<td width="150"><a href="bollywoodimages.php" style="text-decoration:none">

<h3 align="center">images</h3></a></td>

<td width="150"><a href="book.php" style="text-decoration:none">

<h3 align="center">books</h3></a></td>

<td width="150"><a href="songs.php" style="text-decoration:none">

<h3 align="center">songs</h3></a></td>

<td width="150"><a href="movies.php" style="text-decoration:none">

<h3 align="center">movies</h3></a></td>

<td width="150"><a href="railway.php" style="text-decoration:none">

<h3 align="center">railway</h3></a></td>

</tr>

</table><br><br><br><br><br><br><br><br><br><br>

<form method="post" action="search.php">


24

<h4 align="center">REBA is my search enginee<br></h4>

<h4 align="center"><input type="text" name="u_name" style="width:400px; height:40">

<input type="submit" name="search" value="Search"style="width:130px; height:30">

<br>

<br>

<input type="button" name="search3" value="I'm feeling lucky"style="width:130px;

height:30">

</h4>

<h4>

<pre> <a href="setting.php" name="setting" style="text-

decoration:none">Setting</a>&nbsp;&nbsp;

&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;

<a href="feedback.php" name="feed" style="text-decoration:none">Feedback</a></h4>

</form>

</body>

</html>

4.2. Searching Code(Create Dynamic Link)

<html>

<head><title>homepage</title></head>

<style type="text/css">

h4{color:#3300FF}</style>

<body bgcolor="#00CCCC">

<?php

include ('includes/form.php');
25

$con = mysql_connect("localhost","root","");

if (!$con)

die('Could not connect: ' . mysql_error());

mysql_select_db("Central_University_India", $con);

$u_name = $_POST['u_name'];

$result = mysql_query ("SELECT * FROM `Central_University` WHERE `

University_Name` LIKE ('$u_name%')" );

while($row = mysql_fetch_array($result))

echo "<a href=\"{$row['University_Name']}.php\"><font

size='+3'>{$row['University_Name']}</font></a> . <br />";

echo "<font size='+1'>" . $row['About_University'] . "</font>" ."<br/>";

mysql_close($con);

?>
26

4.3. Information of site (e.g. amucontroler exam.com)

I. Aligarh Muslim Unversity Home Page

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"


"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1" />
<title>Jamia Homepage</title>
</head>

<body bgcolor="#66CC99">
<?php
include ('includes/AMUheader1.php');
include ('includes/form.php');
?>

<table width="75%" border="0" align="center">


<tr align="center">
<td width="20%"><p><a href="amuUniversity Library.php">University
Library</a></p>
<p>&nbsp;</p>
<p><a href="amuAuditorium and Guest House.php">Auditorium andGuest
House</a></p>
<p>&nbsp;</p>
<p><a href="amuFaculty Members.php">Faculty Members</a></p>
<p>&nbsp;</p>
<p><a href="amuAdminstration.php">Adminstration</a></p></td>
<td width="60%"><img src="images/amu.PNG" /></td>
<td width="20%"><p><a href="amuAcadmic Calender.php">Acadmic
Calender</a></p>
<p>&nbsp;</p>
<p><a href="amuHostels.php">Hostels</a></p>
<p>&nbsp;</p>
<p><a href="amuCo-Curricular Activities.php">Co-Curricular Activities</a></p>
<p>&nbsp;</p>
<p><a href="amuPlacement.php">Placement</a></p></td>
</tr>
</table>
<p>&nbsp;</p>
27

</body>
</html>
<?php
include ('includes/linking of amu page.php');
?>

II. amu _about_the_university

<html>
<head><title>homepage</title></head>
<style type="text/css">
h4{color:#3300FF}</style>
<body bgcolor="#66CC99">
<?php
include ('includes/AMUheader1.php');
include ('includes/form.php');
?>
<?php

$con = mysql_connect("localhost","root","");
if (!$con)
{
die('Could not connect: ' . mysql_error());
}

mysql_select_db("Central_University_India", $con);

$result = mysql_query ("SELECT * FROM Aligarh_Muslim_University" );


echo "<font size='+5' color='#000066'>About the University</font>";
echo "<table width='80%' border='0' align='center'>
<tr>

<th></th>

</tr>";

while($row = mysql_fetch_array($result))
{
echo "<tr>";
28

echo "<td align='justify'>" . "<font size='+2'>" . $row['About_the_University'] .


"</font>" . "</td>";
echo "</tr>";
}
echo "</table>";
mysql_close($con);
include ('includes/linking of amu page.php');

?>

III. amu_faculties_&_departments

<html>
<head><title>homepage</title></head>
<style type="text/css">
h4{color:#3300FF}</style>
<body bgcolor="#66CC99">
<?php
include ('includes/amuheader1.php');
include ('includes/form.php');
?>
<?php

$con = mysql_connect("localhost","root","");
if (!$con)
{
die('Could not connect: ' . mysql_error());
}

mysql_select_db("Central_University_India", $con);

$result = mysql_query ("SELECT * FROM Aligarh_Muslim_University" );


echo "<font size='+5' color='#000066'>Faculties and Departments </font>";

echo "<table width='80%' border='0' align='center'>


<tr>
<th></th>
</tr>";
29

while($row = mysql_fetch_array($result))
{
echo "<tr>";
echo "<td align='justify'>" ."<font size='+2'>" . $row['Faculties_and_Departments'] .
"</font>" . "</td>";
echo "</tr>";
}
echo "</table>";
mysql_close($con);
include ('includes/linking of amu page.php');

?>

IV. amu _courses_of_study

<html>
<head><title>homepage</title></head>
<style type="text/css">
h4{color:#3300FF}</style>
<body bgcolor="#66CC99">
<?php
include ('includes/amuheader1.php');
include ('includes/form.php');
?>
<?php

$con = mysql_connect("localhost","root","");
if (!$con)
{
die('Could not connect: ' . mysql_error());
}

mysql_select_db("Central_University_India", $con);

$result = mysql_query ("SELECT * FROM Aligarh_Muslim_University" );


echo "<font size='+5' color='#000066'>Courses of Study</font>";
echo "<table width='80%' border='0' align='center'>
<tr>
<th></th>
</tr>";
30

while($row = mysql_fetch_array($result))
{
echo "<tr>";
echo "<td align='justify'>" . "<font size='+2'>" . $row['Courses_of_Study'] . "</font>" .
"</td>";
echo "</tr>";
}
echo "</table>";
mysql_close($con);
include ('includes/linking of amu page.php');

?>

V. amu _admissions

<html>
<head><title>homepage</title></head>
<style type="text/css">
h4{color:#3300FF}</style>
<body bgcolor="#66CC99">
<?php
include ('includes/amuheader1.php');
include ('includes/form.php');
?>
<?php

$con = mysql_connect("localhost","root","");
if (!$con)
{
die('Could not connect: ' . mysql_error());
}

mysql_select_db("Central_University_India", $con);

$result = mysql_query ("SELECT * FROM Aligarh_Muslim_University" );


echo "<font size='+5' color='#000066'>Admissions</font>";
echo "<table width='100%' border='0' align='center'>
<tr>
31

<th></th>

</tr>";

while($row = mysql_fetch_array($result))
{
echo "<tr>";
echo "<td align='justify'>" . "<font size='+2'>" . $row['Admissions'] . "</font>" ."</br
/></td>";
echo "</tr>";
}
echo "</table>";
mysql_close($con);
include ('includes/linking of amu page.php');

?>
<a href="Jamia Millia Islamia,New-Delhi.php" style="text-
decoration:none"><h4><i>Go to home</i></h4></a>

VI. amu_examinations

<html>
<head><title>homepage</title></head>
<style type="text/css">
h4{color:#3300FF}</style>
<body bgcolor="#66CC99">
<?php
include ('includes/amuheader1.php');
include ('includes/form.php');
?>
<?php

$con = mysql_connect("localhost","root","");
if (!$con)
{
die('Could not connect: ' . mysql_error());
}
32

mysql_select_db("Central_University_India", $con);

$result = mysql_query ("SELECT * FROM Aligarh_Muslim_University" );


echo "<font size='+5' color='#000066'>Examination</font>";
echo "<table width='80%' border='0' align='center'>
<tr>
<th></th>
</tr>";

while($row = mysql_fetch_array($result))
{
echo "<tr>";
echo "<td align='justify'>" . "<font size='+2'>" . $row['Examination'] . "</font>" .
"</td>";
echo "</tr>";
}
echo "</table>";
mysql_close($con);
include ('includes/linking of amu page.php');

?>

VII. amu _university_library

<html>
<head><title>homepage</title></head>
<style type="text/css">
h4{color:#3300FF}</style>
<body bgcolor="#66CC99">
<?php
include ('includes/AMUheader1.php');
include ('includes/form.php');
?>
<?php

$con = mysql_connect("localhost","root","");
if (!$con)
{
die('Could not connect: ' . mysql_error());
33

mysql_select_db("Central_University_India", $con);

$result = mysql_query ("SELECT * FROM Aligarh_Muslim_University" );


echo "<font size='+5' color='#000066'>University Library</font>";
echo "<table width='80%' border='0' align='center'>
<tr>
<th></th>
</tr>";

while($row = mysql_fetch_array($result))
{
echo "<tr>";
echo "<td align='justify'>" . "<font size='+2'>" . $row['University_Library'] . "</font>" .
"</td>";
echo "</tr>";
}
echo "</table>";
mysql_close($con);
include ('includes/linking of amu page.php');

?>

VIII. amu _auditorrium_and_guest_house

<html>
<head><title>homepage</title></head>
<style type="text/css">
h4{color:#3300FF}</style>
<body bgcolor="#66CC99">
<?php
include ('includes/amuheader1.php');
include ('includes/form.php');
?>
<?php

$con = mysql_connect("localhost","root","");
if (!$con)
{
34

die('Could not connect: ' . mysql_error());


}

mysql_select_db("Central_University_India", $con);

$result = mysql_query ("SELECT * FROM Aligarh_Muslim_University" );


echo "<font size='+5' color='#000066'>Auditorium and Guest House</font>";

echo "<table width='80%' border='0' align='center'>


<tr>
<th></th>
</tr>";

while($row = mysql_fetch_array($result))
{
echo "<tr>";
echo "<td align='justify'>" . "<font size='+2'>" . $row['Auditorium_and_Guest House '] .
"</font>" . "</td>";
echo "</tr>";
}
echo "</table>";
mysql_close($con);
include ('includes/linking of amu page.php');

?>

IX. amu _faculty_members

<html>
<head><title>homepage</title></head>
<style type="text/css">
h4{color:#3300FF}</style>
<body bgcolor="#66CC99">
<?php
include ('includes/amuheader1.php');
include ('includes/form.php');
?>
<?php
35

$con = mysql_connect("localhost","root","");
if (!$con)
{
die('Could not connect: ' . mysql_error());
}

mysql_select_db("Central_University_India", $con);

$result = mysql_query ("SELECT * FROM Aligarh_Muslim_University" );


echo "<font size='+5' color='#000066'>Faculty Members</font>";
echo "<table width='80%' border='0' align='center'>
<tr>
<th></th>
</tr>";

while($row = mysql_fetch_array($result))

echo "<tr>";
echo "<td align='justify'>" . "<font size='+2'>" . $row['Faculty_Members'] . "</font>" .
"</td>";
echo "</tr>";
}
echo "</table>";
mysql_close($con);
include ('includes/linking of amu page.php');

?>

X. amu _administration

<html>
<head><title>homepage</title></head>
<style type="text/css">
h4{color:#3300FF}</style>
<body bgcolor="#66CC99">
<?php
include ('includes/amuheader1.php');
36

include ('includes/form.php');
?>
<?php

$con = mysql_connect("localhost","root","");
if (!$con)
{
die('Could not connect: ' . mysql_error());
}

mysql_select_db("Central_University_India", $con);

$result = mysql_query ("SELECT * FROM Aligarh_Muslim_University" );


echo "<font size='+5' color='#000066'>Adminstration</font>";
echo "<table width='80%' border='0' align='center'>
<tr>
<th></th>
</tr>";

while($row = mysql_fetch_array($result))
{
echo "<tr>";
echo "<td align='justify'>" . "<font size='+2'>" . $row['Adminstration'] . "</font>" .
"</td>";
echo "</tr>";
}
echo "</table>";
mysql_close($con);
include ('includes/linking of amu page.php');

?>

XI. amu _academic_calender

<html>
<head><title>homepage</title></head>
<style type="text/css">
37

h4{color:#3300FF}</style>
<body bgcolor="#66CC99">
<?php
include ('includes/AMUheader1.php');
include ('includes/form.php');
?>
<?php

$con = mysql_connect("localhost","root","");
if (!$con)
{
die('Could not connect: ' . mysql_error());
}

mysql_select_db("Central_University_India", $con);

$result = mysql_query ("SELECT * FROM Aligarh_Muslim_University" );


echo "<font size='+5' color='#000066'>Acadmic Calender</font>";
echo "<table width='80%' border='0' align='center'>
<tr>
<th></th>
</tr>";

while($row = mysql_fetch_array($result))
{
echo "<tr>";
echo "<td align='justify'>" . "<font size='+2'>" . $row['Acadmic_Calender'] . "</font>" .
"</td>";
echo "</tr>";
}
echo "</table>";
mysql_close($con);
include ('includes/linking of amu page.php');

?>
XII. amu _hostels

<html>
<head><title>homepage</title></head>
<style type="text/css">
h4{color:#3300FF}</style>
38

<body bgcolor="#66CC99">
<?php
include ('includes/amuheader1.php');
include ('includes/form.php');
?>
<?php

$con = mysql_connect("localhost","root","");
if (!$con)
{
die('Could not connect: ' . mysql_error());
}

mysql_select_db("Central_University_India", $con);

$result = mysql_query ("SELECT * FROM Aligarh_Muslim_University" );


echo "<font size='+5' color='#000066'>Hostels</font>";
echo "<table width='80%' border='0' align='center'>
<tr>
<th></th>
</tr>";

while($row = mysql_fetch_array($result))
{
echo "<tr>";
echo "<td align='justify'>" . "<font size='+2'>" . $row['Hostels'] . "</font>" . "</td>";
echo "</tr>";
}
echo "</table>";
mysql_close($con);

include ('includes/linking of amu page.php');


?>
XIII. amu _co_curricular_activities

<html>
<head><title>homepage</title></head>
<style type="text/css">
h4{color:#3300FF}</style>
<body bgcolor="#66CC99">
39

<?php
include ('includes/amuheader1.php');
include ('includes/form.php');
?>
<?php

$con = mysql_connect("localhost","root","");
if (!$con)
{
die('Could not connect: ' . mysql_error());
}

mysql_select_db("Central_University_India", $con);

$result = mysql_query ("SELECT * FROM Aligarh_Muslim_University" );

echo "<font size='+5' color='#000066'>Co-Curricular Activities</font>";


echo "<table width='80%' border='0' align='center'>
<tr>
<th></th>
</tr>";

while($row = mysql_fetch_array($result))
{
echo "<tr>";
echo "<td align='justify'>" . "<font size='+2'>" . $row['Co_Curricular_Activities'] .
"</font>" . "</td>";
echo "</tr>";
}
echo "</table>";
mysql_close($con);
include ('includes/linking of amu page.php');
?>
XIV. amu _placement

<html>

<head><title>homepage</title></head>

<style type="text/css">
h4{color:#3300FF}</style>
40

<body bgcolor="#66CC99">
<?php
include ('includes/AMUheader1.php');
include ('includes/form.php');
?>
<?php

$con = mysql_connect("localhost","root","");
if (!$con)
{
die('Could not connect: ' . mysql_error());
}

mysql_select_db("Central_University_India", $con);

$result = mysql_query ("SELECT * FROM Aligarh_Muslim_University" );


echo "<font size='+5' color='#000066'>Placement</font>";
echo "<table width='80%' border='0' align='center'>
<tr>
<th></th>
</tr>";

while($row = mysql_fetch_array($result))

{
echo "<tr>";
echo "<td align='justify'>" . "<font size='+2'>" . $row['Placement'] . "</font>" . "</td>";
echo "</tr>";
}
echo "</table>";
mysql_close($con);
include ('includes/linking of amu page.php');

?>

4.1.4. Include Files

i. Form.php

<pre> <form method="post" action="search.php">


41

<input type="text" name="u_name" style="width:400px; height:40" />

<input type="submit" name="search" value="Search"style="width:130px; height:30" />

</p></form></pre>

ii. AMUheader1.php

<table width="1189" height="103" border="0" align="center">

<tr bgcolor="#00CCCC" align="center">

<td width="1430"><img src="../arzaque/images/AMUIMAGE.PNG" alt="error to img

load" name="amulogo" width="1241" />

<h3><pre> <a href="amuhome.php">Home</a> <a href="amuAbout the

University.php"> About the University</a> <a href="amuFaculties and

Departments.php">Faculties and Departments</a> <a href="amuCourses of

Study.php">Courses of Study</a> <a href="amuAdmissions.php">Admissions</a>

<a href="amuExamination.php">Examination</a> </pre></h3>

</td></tr>

</table>

i. Linking of amu page.php

<h3 style="text-align:center"> <br />

(Click on Index Number)<br />

<a href="amuhome.php">1</a>&nbsp;&nbsp;<a href="amuAbout the

University.php">2</a>&nbsp;&nbsp;

<a href="amuFaculties and Departments.php">3</a>&nbsp;&nbsp;

<a href="amuCourses of Study.php">4</a>&nbsp;&nbsp;

<a href="amuCourses of Study.php">5</a> &nbsp;&nbsp;


42

<a href="amuExamination.php">6</a>&nbsp;&nbsp;

<a href="amuUniversity Library.php">7</a>&nbsp;&nbsp; <a href="amuAuditorium

and Guest House.php">8</a>&nbsp;&nbsp;

<a href="amuFaculty Members.php">9</a>&nbsp;&nbsp;

<a href="amuAdminstration.php">10</a>&nbsp;&nbsp;

<a href="amuAcadmic Calender.php">11</a>&nbsp;&nbsp;

<a href="amuHostels.php">12</a>&nbsp;&nbsp;

<a href="amuCo-Curricular Activities.php">13</a>&nbsp;&nbsp;

<a href="amuPlacement.php">14</a>

<hr /></h3>

CHAPTER 5 TESTING

5. Testing
43

Testing is a set of activities that must be planned in advance and conducted systematically. The
objective of software testing is to uncover errors. To fulfill this objective, a series of test steps –
Unit, Integration, Validation and System test are planned and executed. It can be shown as:

Fig.5.1. Levels of Testing

A strategy for software testing may be viewed in the context of the spiral. Unit testing begins at
the vertex of the spiral and concentrates on each unit of the software implemented in source
code. Testing progresses by moving outward along the spiral to Integration testing, where the
focus is on design and the construction of the software architecture. Taking another turn outward
on the spiral, we encounter Validation testing, where requirements established as part of software
requirements analysis are validated against the software that has been constructed. Finally, we
arrive at System testing, where the software and other system elements are tested as whole. To
test computer software, we spiral out along streamlines that broaden the scope of testing with
44

each turn.

5.1. Unit Testing

5.1.1. White-Box Testing

Unit testing makes heavy use of White-Box Testing techniques exercising specific paths in a
module’s control structure to ensure complete coverage and maximum error detection. In this
testing, I tested all the branching condition that the entire if / else are working properly or not,
how many times loop encounter.

Such as:-

<script language=”Javascript “>

function textname_onchange()

l=len(form1.textname.value)

for (i= =1; i<= l; i++)

ch=mid(form1.textname.value,i,1)

ch=Ucase(ch);

if(asc(ch)<65 or asc(ch)>90)

alert(“Only Albhabets is allowed”);

form1.textname.value=””;

form1.textname.focus;

break;

}
45

In the above example, I tested each and every line of code for the proper result. Initially I wrote
the code for small alphabet and capital alphabet separately. Later when problem occurred, I
minimized this thing by using Ucase function which converts all alphabets into upper case. Now
I perform all checking in upper case through ASCII value. It reduces our lines of code
compilation time. Next, components must be assembled or integrated to form the complete
software package. Integration testing addresses the issues associated with the dual problems of
verification and program construction. Black-box test case design techniques are the most
prevalent during integration, although a limited amount of white-box testing may be used to
ensure coverage of major control paths.

5.1.2. Black-Box Testing

In Black-Box Testing Inputs and outputs are tested. After the software has been integrated, a set
of high order tests are conducted.

5.2. Integration Testing

In the Integration Testing, modules are tested after integration of some module that these are
working properly or not.

Such as:-

while (RS.next())

strtemp=trim(RS.getString(“home”));

strtemp1=trim(strname);

strtemp2=trim(strpass);

if (strcomp(strtemp,strtemp1)= =0 and

strcomp(strtemp2,strtemp3)= =0)
46

f=1;

header(“Location: homepages.php”) ;

if(f != 1)

header(“Location: search.php”);

Here Response. Redirect method integrates another page. After this all connected pages were
began to work properly.

Validation criteria (established during requirements analysis) must be tested.

5.3. Validation Testing

Validation Testing provides final assurance that software meets all functional, behavioral and
performance requirements. Black-box testing techniques are used exclusively during validation.
It refers to a different set of activities that ensures that the software that has been built is
traceable to customer requirements.

I made the following criteria for validation

(1) The date up to which doctor’s status is busy; the patient should be given the appointment date
just preceding the busy date.

(2) On giving the patient id the relevant history of the corresponding patient should be produced
by the present system.
47

Verification refers to the set of activities that ensure that, software correctly implements a
specific function or not.

Verification refers to the set of activities that ensure that, software correctly implements a
specific function or not.

I achieved these two validation criteria through the series of black box testing that demonstrate
conformity with requirement.

5.4. System Testing

System Testing verifies that all elements mesh properly and that overall system
function/performance achieved. In this test whole system is tested that it meets the objective or
not which has been identified in the analysis phase.

5.4.1. Alpha Testing

Most software product builders, use a process called alpha testing and beta testing. The alpha test
is conducted at the developer’s site by a customer. Alpha test is conducted in controlled
environment.

I always consulted the some staff of study center and they came to test the system. They got the
error and informed me about the error. This test helped me very much.

5.4.2. Beta Testing

This test is conducted at one or more customer site by the end user and if any problem occur
customer inform to developer at regular interval.

Test Cases

There are two very different sources of data, live & artificial. Both have distinct advantages &
disadvantages for the tester.

Using live test data


Live tests are those that are actually extracted from organization files. After system is partially
constructed, programmer or analysts often ask users to key in a set of data from their normal
48

activities. For example: - In a general, new user login form, is given to fill by the user. Then the
system person uses this data as a way to partially test the system. In other instance, programmers
& analysts extract a set of live data from the files & love them entered themselves. It is difficult
to obtain data in a sufficient amount to conduct extensive testing, & although it is will perform
for the typical processing requirements, assuming that the live data entered are intact typical and
such data generally will not test all the combinations or formats that can enter the system.

Using artificial test data


Artificial tests are created solely for test purpose, since they can be generated to test all
combination of formats & values. In other words the artificial data, which can quickly be
prepared by a data generating utility, program in the information system departments make
possible the testing of all logic & control paths through the program.

Fig.5.2. Test Cases


49

The following tests should be always implemented at the time of developing web-based
application.

1) The content model for the web application is reviewed to uncover error.

2) The design model for the web application is reviewed to uncover navigation errors.

3) The assembled web application is tested for overall functionality and content delivery.

4) The web application is tested by a controlled and monitored population of end users.

5.5.Error handling

Error handling is a mechanism by which error is handled and informs to user. This mechanism
helps to optimize the program also. It must be implemented at the time of developing the system.

In my system, for the error handling, msgbox, trim, ucase, isdate etc have been used. If any error
encounter, msgbox will inform to developer.

5.6. Debugging and Code Optimization

Debugging

Debugging occurs as a consequence of successful testing. That is, when a test case uncovers an
error, debugging is an action that results in the removal of the error. Debugging process begins
with the execution of a test case. Results are assessed and a lack of correspondence between
expected and actual performance is encountered.

Debugging will always have one of two outcomes: (a) the cause will be found and corrected and
(b) the cause will not be found. The person performing debugging may suspect a cause, design
one or more test cases to help validate the suspicion, and work toward error correction in an
iterative fashion.

Code Optimization

(1) Suggested techniques and standards.

(2) Separate user interface from database interfaces:


50

 The user inputs forms and display of the output should be on separate pages and actual
queries search logic on one page.
(3) Indentation:

 The most fundamental thing to improve the readability of the code.


(4) Naming convention:

 While creating any function, procedure, variable or control, a logical naming convention
should be followed. The should be meaningful and should depict the functionality of the
function/procedure or should reveal information about the contents of the control.
(5) Grouping related statements together:-

 The related statements are put together as they operate on same date perform similar task,
depends on each other’s being performed in order.
(6) Use of function or procedure:-

 Reusability of code, the statements which are use very frequently and needed to be uses
in a certain portion of the program, are put together as a function or procedure and that
function or procedure is called whenever required.
(7) Declaration of variables:-

 All the variables local to a module should be declared in that module to maintain the
integrity of the data stored in them and overcome any ambiguity regarding the variable
names. The global variables which are needed to be accessible to all the modules should
be declared in global module.

5.4. Software Engineer Paradigm

 Software engineering discusses systematic and cost effective approaches to developing


good quality software. It is an engineering approach to developing software. Though
many of the methodologies and guidelines provided by the software engineering
discipline lack scientific basis, are subjective, and are often inadequate, yet adopting
software engineering techniques facilitates development of high quality software in a cost
effective and efficient manner. A software life cycle (or process) is a series of identifiable
stages that a software product undergoes during its life time. Several life cycle models
51

have been proposed so far. Based on the requirement of our software, the Iterative
Waterfall Model is used
 in this project.
 In most practical development environments, defects get introduced in almost every
phase of the life cycle. These defects usually get detected much later in the life cycle.
 Once a defect is detected, one needs to go back to the phase where it got introduced and
redo some of the work done during this phase and subsequent phases. Hence the classical
waterfall model must incorporate feedback paths. This is the essence of this model. The
 diagram given below gives a much more vivid picture.

Fig.5.3. Waterfall Model

5.4.1. Feasibility Study

 A feasibility study is the test to proposal according to its viability impact on the
organization, ability to meet user needs and effective use of the resources. The objective
of the feasibility is not to solve the problem but to acquire a sense of its viability scope.
Once the feasibility study is done and proposal is approved, we move to the requirement
analysis.
52

5.4.2. Requirement Analysis

 The requirement gathering process is intensified and forcused specifically on software.


To understand the nature of the program to build, the analyst must understand
information domain of software as well as required functions, behaviours, performance &
interfaces. Requirements for both the system and the software are documented and
reviewed with the customer.

5.4.3. Software Design

 The designing phase is actually a multistep process that focuses on four distinct attributes
of programs:
  data structure
  software architecture
  interface representation and
  procedural (algorithmic) details.
 The designing process translates requirements into a representation of software that can
be access for quality before coding.

5.4.4. Coding
 Under this process design is translated into machine readable form. If design is performed
in a detailed manner, code generation can be accomplished mechanistically.

5.4.5. Testing
 The testing process focus on the logical intyernals of the software,
 insuring that all statement has been tested. Testing is also perform to uncover errors and
insures that input will produce actual results, that agree with the requirement.

5.3.5. Maintenance
 Maintenance involves three kinds of activities:-
 1. Corrective maintenance:- Correcting errors that were not discovered during product
development phase.
 2. Perfective maintenance:- Improving the implementation of the system and enchancing
the functionality of the system according to user’s requirement.
53

 3. Adopting maintenance:- Porting the S/W to a new environment (eg: to a new computer
or to a new operating system).

 The Waterfall model is the oldest and most widely used paradigm for software
engineering. However the problem encountered with this model is that real projects rarely
follow the sequential flow that the model proposes. It also required long to for
development.
 So as web application evolve from static, content-directed information source to
dynamic, user-directed application environment, the need to apply solid management and
engineering principle grows in importance. To accomplish this, it is necessary to develop
Web application framework that encompasses an effective process model, populated by
frame work activities and engineering tasks. A process model for Web application, which
is most suitable, is Component based model. Because component-based development
model supports the object oriented technology, an analyst creates the classes that
encapsulates both data and algorithm. These classes can be reused for different
applications.
 The component based development model follows the many characteristics of the
Spiral model. It is evolving in nature and follows the iterative approach to the certain of
software. In this model, the engineering activity begins with the identification of
candidate class. Classes which have been created in past are stored in class library. When
a project comes for the development, an analyst creates classes and these created classes
are searched in class library and if these classes exist in class library, then they are
extracted from the class library. The class which do not match in the class library, then
are built. And the class which matched in class library is reused.
 This model provides the concept of reusability of software and reusability
provides a number of measurable benefits. Reusability helps 70 percent reduction in
development cycle time and 84 percent reduction in project progress.
54

CHAPTER 6 REPORTS AND OUTPUT

Search Engine Output Design

Fig.6.1.Search Engine Output Design

Dynamic Link

Fig.6.2.Dynamic Link

Home Page Design


55

Fig.6.3.Homepage Output Design

About The University

Fig.6.4.About the University Output Design

Faculties & Departments


56

Fig.6.5.Faculties & Department Output Design

Courses of Study

Fig.6.6.Courses of Study Output Design


57

Admissions

Fig.6.7.Admissions Output Design

Examinations

Fig.6.8.Examinations Output Design


58

University Library

Fig.6.9.University Library Output Design

Faculty Members

Fig.6.10.Faculty Member Output Design


59

Administration

Fig.6.11.Administration Output Design

Academic Calendar

Fig.6.12.Academic Calander Output Design

Hostels
60

Fig.6.13.Hostels Output Design

Co-Curricular Activities

Fig.6.14.Co-curricular Activities Output Design

Placement
61

Fig.6.15.Placement Output Design


62

CHAPTER 7 SECURITY AND LIMITATION

7. SECURITY
Backup end security provide by wamp server. Wamp Server is a local server Which is used for
backup end security.

8. LIMITATION
1. To search only text.

2. Not search images

3. User obtained only university information Central University of India.

9. FUTURE SCOPE AND FURTHER ENHANCEMENT


This project is basically created for Online Education System and Users who wants to know
about their details; here user can be a see offered courses, Offer course and client. Online
Education System system can be used for storing and retrieving courses, order and student
records. This project is very useful for present days and future also. It is an online technology
that is very convenience to registration, study and other user. Features that can use in future are
given below:

 Enhanced graphics and designing.


 More User-friendly interface.
 More information will provide on site if necessary.
 In future this project will support distributed database rather than centralized database.
 In future, several courts can integrated together to display composite reulst.
 For better support of users this project also support the following technique in future.
 Backup file
 Fast searching technique
 Support broad range input and output device.
63

BIBLIOGRAPHY

 1. Software Engineering A Practitioner’s Approach by Roger S.


Pressman
 2. PHP5 Wrox
 3. HTML Black Book Sreven Holzner
 4. MySQL from PHP5
 5. JAMIA Course Materials

You might also like