Professional Documents
Culture Documents
The main aim of the project is to make the working of Online Book Store very simple and easily achievable. The major objective of the project is to make the process of Online Book Store easy and user friendly Also, an utmost care has been taken to make this project totally system efficient. This project intends to introduce more user friendliness in the various activities such as- book updating, maintenance, and searching. The process of book maintenance and updation can also be accomplished by the admin. The entire information is maintained in the database or files and has been secured with security measures.
Online Book Store has been designed to computerize the following functions -
y y y y y y y y y y y y
Creating new account Providing a specific Books Show the Category Modification to existing Category Modification to existing Details Updation of Books Deletion of existing Books, Author and Publisher Administrative Login Change Password Addition of New User Feedback Help Section
COMPANY PROFILE
Linux Soft Technologies Pvt. Ltd., Jaipur is the Redhat Authorized training partner, exam centre & Registered with Govt. of India. We are the leading TrainingSolution-Development organization of Redhat Linux, Oracle, Cisco, Microsoft, Sun Microsystems, VHDL / VLSI & ROBOMAKINGEMBEDDED SYSTEMS. We have been providing services in imparting training and solution in Networking domain & Programming covering LAN, MAN, WAN with the complete offerings in Internet Security.
Based on our extensive support experience with a variety of customers, Linux Soft Technologies Pvt. Ltd. has developed a unique approach for technical support. We offer consulting and planning, integration and maintenance services for many open source projects, allowing you to deploy them across your network with complete peace of mind. With growing popularity and acceptance of Linux, RoboMaking, VLSI, Oracle, and Routers in the govt. sector we started a company, The Linux Soft Technologies Pvt. Ltd. to provide all Computer based solutions under one roof.
Background
Linux Soft TECHNOLOGIES Pvt. Ltd. is providing full service security and data networking solutions provider & Training centre for all major I.T Certifications. We provide complete, reliable, and dynamic network solutions, Web Solution & Security Solution to our clients. We design, develop, train, and deploy state - of - the - art information and communication system that are best suited to the needs of our customers.
Philosophy Linux Soft TECHNOLOGIES Pvt. Ltd. is committed to addressing each and every customer opportunity with a partnering approach. Based upon the customer's requirements, we design a solution that meets their business objectives. We ensure that our solution will provide growth and migration plans for the future. Linux Soft TECHNOLOGIES Pvt. Ltd. incorporates only the highest quality products and services in its solutions. This approach guarantees that all of our solutions meet the following criteria: overall quality, cost effectiveness, reliability, availability, maintainability, and are standards based.
People
The Linux Soft TECHNOLOGIES Pvt. Ltd. family is a team of qualified, skilled, highly trained and highly motivated professionals. We believe in the adage that a company is best defined by its people- dedicated, enthusiastic and innovative. There are no "Sales people" at Linux Soft TECHNOLOGIES Pvt. Ltd. Each employee is responsible for creating new business opportunities through a creative approach which combines cutting edge technology skills with expertise in the domain of networks.
The number of intrusions/hacking into private computer networks from the Internet is growing rapidly, in parallel with the explosive growth of the Internet; the extent of criminal activities within the Internet is expected to grow at an alarming rate. As businesses make increasing use of the Internet, this has also led to a spurt in deliberate abuse and criminal activities in this new medium. To protect your network from internal and external threats, Linux Soft Technologies Pvt. Ltd. Provides the most complete and comprehensive security solution from start to finish. If your company houses proprietary data and you have not addressed security, contact Linux Soft Technologies Pvt. Ltd. immediately. Security is not just a firewall.
Network Security Linux Soft Technologies Pvt. Ltd. prides itself on its ability to offer scalable, turnkey security solutions, which includes the following process. *Define Security Plan *Create network security design *Provide hardware and software *Implementation of security Architecture *Configuration of hardware and software *Ongoing security consulting services Linux / Windows Server-Setup Solution Linux Soft Technologies have implemented many Linux Windows Solution. In Linux & Windows we provide Solution for DNS, DHCP, WEB, MAIL, FIREWALL, PROXY, NETWORK INSTALLATION, ADS, BACKUP-RESTORE & Troubleshooting.
Security Services Linux Soft Technologies Pvt. Ltd. security audit looks at the current state of your information security and evaluates it against a benchmark - as directed by your internal policies, industry standards or applicable legislation. At the end of this audit, Linux Soft Technologies Pvt. Ltd. will prepare a paper and discuss the "GAP ANALYSIS" along with options to "plug" the gaps. Linux Soft Technologies Pvt. Ltd. will then work with your team to come to a level of risk and cost of security which you feel happy with.
Firewall Services A firewall is protective fence around your network. Linux Soft Technologies Pvt. Ltd. range of firewall services is one of the most comprehensive in the market today. Our firewall solutions are not simply of the shelf, but are designed and implemented after a complete security audit of the organization's network. Linux Soft Technologies Pvt. Ltd. firewall suite has products from all leading vendors. Anti-Virus Services We monitor your gateway to the Internet for viruses, worms and Trojan horse programs, which continue to cause significant losses to organizations. Our continuous monitoring allows us to update patches remotely and immediately from our 24x7 secure lab- thus ensuring you are protected to highest level at all times. VPN Services We create a secure VPN tunnel from your corporate networks to your clients. We achieve confidentiality, integrity and authenticity for your network users by implementing IPSec with IKE options and using AES or 3DES or IDEA algorithms.
WAN Services
Linux Soft Technologies Pvt. Ltd. range of WAN solutions runs the entire gamut from leased lines, ISDN, Broadband & Frame Relay. From large corporations to small home offices to mobile users we have the WAN Technology to suite every need. Our WAN Solutions are a byword for efficiency, robustness, flexibility and maintainability. . Linux Soft Technologies Pvt. Ltd. undertakes total consultancy for WAN's including the supply and configuration of Modems, CSU/DSU, Remote Access Servers, Routers, Firewalls, etc. We coordinate installation of all necessary cabling and ancillary support infrastructure to insure all elements necessary for a robust network are in place.
Leased Lines Linux Soft Technologies Pvt. Ltd. has setup many Leased lines with speeds ranging from 64Kbps to 512kbps, to provide dedicated connectivity to customers.
ISDN
Linux Soft Technologies Pvt. Ltd. is a virtual powerhouse of ISDN solutions, with unsurpassed proficiency in ISDN BRI, ISDN Leased Lines to ISDN Backups to Telecommuter ISDN Dial Ups.
We configure ISDN BRI routers, NT Boxes and TA's. Linux Soft Technologies Pvt. Ltd. Is providing Training program on following Technologies Red Hat Linux RHCT, RHCE Cisco System CCNA, CCNP, CSPFA Microsoft MCP, MCSA, MCSE 2003, VB.Net, ASP.Net, C#.Net CompTia A+, Network+ Sun Microsystems Java, J2EE Oracle Oracle DBA/Developer VHDL/VLSI, Robomaking / Embedded Systems Security CEH, CCSA Linux Soft Technologies Pvt. Ltd. Is providing Solution on following Technologies 1) 2) 3) 4) 5) 6) 7) 8) 9) Redhat Linux Cisco Router Switch Implementation Windows Server Installation & Configuration Cisco Pix Firewall Implementation Web Hosting, Domain Registration Web Site Development, Web Solution Software Development Electronic Projects Database Solution
REQUIREMENT ANALYSIS
Requirement Analysis is the first phase of the SDLC. First, we need to figure out what the problem is (analysis)? We must know exactly what we want to do before we can begin to do it. A clear understanding of exactly what is needed is necessary for creating a solution. In this phase Business Analysts (BA), find out what is the problem and what are requirements and so on.It begins with a request from the user for a new system. It involves the following: Identify the requirement for the system. Clarify deficiencies in the current system. Identify deficiencies in the current system. Establish goals and objectives for the new system. Determine the feasibility for the new system. Prepare a project charter that will be used to guide the reminder of the project.
ANALYSIS
Analysis is a detailed study of the various operations performed by a system and their relationships within and outside of the system. This activity is also used to study the system in details. The objective of this step is to develop structured system specifications for the proposed system. The structured system specification will be called the Essential Model. It involves: Detailed study of the system. Understand the procedure of the system. Determine the scope of the system. Define the goals of the proposed system.
PRELIMINARY DESIGN
The most creative and challenging phase of the system life cycle is System Design. The term design describes the final system and the process by which it is developed. This activity deals with certain design issues that are to be finalized in consultation with the user. The two most important issues of relevance to the user are the automation boundary & the human machine interface. The output of this activity is the user implementation model. This model, in addition to the essential model defines the following for the system: Automation Boundary Report Layout Workable plan for implementing the candidate system. Screen layouts for the data entry forms Menus Information on personnel, money, hardware, facilities, and their estimated cost must also be available.
DESIGN
System Design involves the transformation of the user implementation model into software design. The first step is to determine how the output is to be produced and in what format. Second, input data and master files (database) have to be designed to meet the requirements of the proposed output. The design specification of the proposed system consists of the following: Database schema & Pseudo code for all the modules.
10
CODING
After designing the new system/software, the whole system/software is required to be converted into computer language. Coding the new system/software into computer programming language does this. It is an important stage where the defined procedures are transformed into control specifications by the help of a computer language. This is also called the Programming Phase in which the programmer converts the program specifications into computer instructions, which we refer as programs. The programs coordinate the data movement as and control the entire process in a system/software.
TESTING
Before actually implementing the new system/software into operations, a test run of the system/software is done removing all the bugs, if any. It an important phase of a successful system. After codifying the whole programs of the system, a test plan should be developed and run on a given set of test data. In the system/software testing stage, we check the overall behavior of the system/software against the functional and the performance requirements. There are two type of testing: White-Box: Internal part (code) of the project is testing. Black-Box: System behavior (input/output) is checked.
11
IMPLEMENTATION
After having the user acceptance of the new system/software developed, the Implementation phase begins. Implementation is the stage of a project during which theory is turned into practice. In this phase, user can know how to execute the package, how to enter data and so on. y The implementation phase is less creative then system design. This activity includes programming, testing & integration of modules into progressively more complete system. y It is primarily concerned with user training, site preparation, and file conversion. During the final testing user acceptance is tested, followed by user training. y System testing checks the readiness and accuracy of the system to access, update, and retrieve data from new files. The output of this activity is the complete integrated system. y Major sub activities Coding Integration Testing Debugging y Inputs Project character Design specification y Outputs Integrated Systems
12
MAINTENANCE
When the implementation report is submitted, an Maintenance should be made to determine whether the system/software meets the objectives stated in the general design report. In this phase, users may be able to suggest the easy-to-implement improvements.
PROCEDURE DESCRIPTION
The objective of this step is to produce a manual, which may be used as a guide for operating the system. Inputs Project Character User implementation model Outputs User manual (guide for end user)
13
ASP.NET Includes
A page and control framework. The ASP.NET compiler. Security Infrastructure. State-management facilities. Application configuration. Health monitoring and performance features. Debugging support. An XML web service framework. Extensible hosting environment and application life cycle management. An extensible designer environment. ASP is a server side scripting technology that enables scripts (embedded in web pages) to be executed by an Internet Server.
14
ASP is a Microsoft technology. ASP stands for Active Server Pages. ASP is a program that runs inside IIS. IIS stands for Internet Information Services. IIS comes a free component with Windows 2000. IIS is also a part of the Windows NT 4.0 Option pack. PWS is a smaller but fully functional version of IIS. PWS can be found on your windows 95/98 CD.
ASP file
An ASP file is just the same as an HTML file. An ASP file can contain text, HTML, XML and scripts. Scripts in an ASP file are executed on the server. An ASP file has the file extension .asp.
ABOUT ASP.NET
ASP 3.0 is the latest version of ASP, but there will never be an ASP 4.0 version . ASP.NET is the next generation ASP, but its not an upgraded version of ASP.ASP.NET Framework. Microsoft spent three years rewriting ASP.NET from the ground up, and ASP.NET is not fully backward compatible with ASP 3.0.
15
.NET FRAMEWORK
The .NET framework is the infrastructure for the Microsoft .NET platform. The .NET Framework is an environment for building, deploying and running web applications and the .NET framework contains a common language runtime and common class libraries like ADO.NET, ASP.NET and Windows Forms to provide advanced standard services that can be integrated into a variety of computer systems. The.NET framework provides a feature-rich application environment, simplified development and easy integration between a numbers of different development languages. The .NET framework is language neutral. Currently it supports C++, C#, Visual Basic and Jscript.Microsoft Visual Studio .Net is a common development for the .net framework.
New in ASP.NET
Better language support Programmable controls. Event Driven programming. XML-Based components. User authentication, with accounts and roles. Higher scalability. Increased performance compiled code . Easier configuration and deployment. Not fully ASP compatible.
16
Language Support
ASP.NET uses the new ADO.NET. ASP.NET supports full Visual Basic , not VB script. ASP.NET supports C# and C++. ASP.NET supports Jscript as before.
ASP.NET Controls
ASP.NET contains a large set of HTML controls. Almost all HTML controls on a page can be defined as ASP.NET control objects that can be controlled by scripts .ASP.NET also contains a new set of object oriented input controls , like programmable list boxes and validation controls. A new data grid control supports sorting, data paging and everything you expect from a dataset control.
17
Hard Disk:
Without MSDN: 2 GB of available space required on installation drive. 1 GB of available space required on system drive. With MSDN: 3.8 GB of available space required on installation drive with a full MSDN install or 2.8 GB of available space required on installation drive with a default MSDN install. 1 GB of available space required on system drive. Display: Minimum: 800 X 600 256 colors. Recommended: 1024 X 768 High Color - 16-bit.
18
Software Specification:
Operating System: Minimum:Microsoft Windows 2000 SP4. Recommended:Microsoft Windows XP SP2 (All Edition). Microsoft Windows Server 2003 SP1 (All Edition).
Server Language:
C#
19
DATA FLOW DIAGRAM:Graphical description of a systems data and how the processes transform the data is known as Data Flow Diagram (DFD). A DFD shows the flow of data through a system. It views a system as a function that transforms the inputs into desired outputs. Any complex system will not perform this transformation in a Single Stop, and the data will typically undergo a series of transformations before it becomes the output. The DFD aims to capture the transformations that take place within a system to the input data so that eventually the output data is produces. The agent that performs the transformation of data form one state to another is called processes. So the DFD show the movement of data through the different transformations of processes in the system. Control information such as record counts, passwords and validation requirements is not pertinent to a data flow diagram. Meaning full names for data flows, processes and data stores must be chosen.To construct the data flow diagrams, we use Arrows: An arrow identifies the data flow- data in motion. It is a pipeline through which information flows. All data flow are identified by unique names. These names are chosen so that they convey some meaning about what the data is. Circles: Circles stands for processes that convert data into information. Open ended boxes: An open-ended box represents a data store or a temporary repository of data. Squares: A square defines a source (originator) or destination of system data.
20
21
Executive Summary : BookWorm is Book providing company site. User can see different BOOKS available , by different Authors and Publisher etc. User can select his book of interest and can order online and pay online.
This Web Application is developed for make easiest communication and share the information between Book company & User Of The Web Site. Having studied the various requirements of the customer, Our Team concluded the following requirements of the Application:
y BookWorm Website is the Book Search Engine. y It share the informations related to most famous books, new books, Books of particular category. y The user of the site: a. Administrator: Administrator will access all the page of site. Admin can modify any information about the Books, Category , Author, Pubisher etc any time. b. Guest User : Guest user has interaction with all the information of site related to any Book, Author, Publisher etc. He can store his feedback on the website
22
23
y Validation in Login Process: When Administrator wants to Login, the following checks are carried out. y Administrator have to fill LoginId otherwise an error message should be displayed i.e. Enter Login Id. y Administrator must have to enter Password otherwise an error message should be displayed i.e. Enter Password. y LoginId and Password should be correct otherwise an error message will be displayed i.e. Either Login Id or Password is incorrect.
ADMIN PANEL
24
Main Page Options: y ADMIN HOME y Category Management y Author Management y Publisher Management y Book Management y Account Manager y Help y Contact Us y About Us y FAQ ADMIN HOME Control: HyperLink Function Description: This option displays new page that have the options to manage the available Contents. Category Management Control: Hyper Link Function Description: This option displays new page that have the options to manage the Category. Author Management Control: Hyper Link Function Description: This option display new page that have the options to manage the Author. Publisher Control: Hyper Link
25
Management
Function Description: This option display new page that have the options to manage the Publisher.
Book Management
Control: Hyper Link Function Description: This option display new page that have the options to manage the Books.
Account Manager
Control: Hyper Link Function Description: This option display new page that have the options to manage the Admin Accounts.
Help
Control: Hyper Link Function Description: This option display new page that have the options to manage the States in which Tours are available.
Contact Us
Control: Hyper Link Function Description: This option display new page that have the Contact Details
About Us
Control: Hyper Link Function Description: This option display new page that have the About us Details.
FAQ
Control: Hyper Link Function Description: This option display new page that have the options to manage the Frequently Asked Questions.
26
BOOK MANAGEMENT
ADD BOOK
28
Publisher
Control: DropDownList Default: Blank Function Description: This field enables us to enter the Publisher name from the list.
Edition
Control: Text Box Default: Select City Function Description: This field accepts nvarchar type value.
Price
Control: Text Box Default: Blank Function Description: This field accepts nvarchar type value..
Image
Control: File Upload Default: Blank Function Description: This field accepts the image Url.
Submit
Control: Button Default: Enable Function Description: This button have the functionality to enter all the values into the database.
Reset
Control: Button Default: Enable Function Description: Reset all the controls.
Finish
Control: Link Button Default: Back Function Description: This have the functionality to go one step back from the current page.
29
CATEGORY MANAGEMENT
30
Edit
Control: Button of GridView Default: Enable Function Description: This button have the functionality to navigate on new page that have the functionality to edit selected schedule.
ADD CATEGORY
31
all the values into the database. Reset Control: Button Function Description: Reset all the controls. Finish Control: Button Function Description: This have the functionality to go one step back from the current page
AUTHOR MANAGEMENT
32
ADD AUTHOR
33
PUBLISHER MANAGEMENT
34
ADD PUBLISHER
35
Control: Text Box Function Description: This field accepts nvarchar type value. Control: Text Box Function Description: This field accepts nvarchar type value. Control: Text Box Function Description: This field accepts nvarchar type value.
Control: Text Box Function Description: This field accepts nvarchar type value.
Website
Control: Text Box Function Description: This field accepts nvarchar type value.
Reset
Control: Button Default: Enable Function Description: Reset all the controls.
Submit
Control: Button Function Description: This button have the functionality to enter all the values into the database.
Finish
Control: Button Default: Back Function Description: This have the functionality to go one step back from the current page.
36
ACCOUNT MANAGER
37
CHANGE PASSWORD
38
USER HOMEPAGE
39
ABOUT US
CONTACT US
40
BOOKS PAGE
41
AUTHOR PAGE
42
DATABASE DESIGN
Once the input data is captured in the system, these may have to be
preserved either for a short or long period. These data will generally be stored in files or databases in logical manner. The designer will have to advise the techniques of sorting and retrieving data from these files. The system uses database, which is described as follows.
43
44
DATABASE SNAPSHOTS
Category Table :-
Author Table :-
Publisher Table :-
Book Table :-
45
SECURITY FEATURES
Authentication is the process of identifying users. Authorization is the process of granting access to users based on identity. Together, authentication and authorization provide the means to keep your application secure from intruders. The kind of security measures used in our System are as follows: User Authentication Only the Valid users, who are present in the pre defined list of Users stored in User Master table are granted permissions to enter the System . Any user apart from Record of users are denied access.
User Session Creation :This helps in the creation of isolated Login which reduces the chance of trespassing into the Admin Panelor any other restricted part.
46
CONCLUSION
The main objective of this package is to assist an online Book Management System or Search Engine in dealing with the customer of the Books for Ordering and Searching of the books with just a very less span of time..The chance of making mistake is negligible as with every transaction the database is updated. It also reduces service time. With this Website the workload is reduced and hence the efficiency is increased due to the User Friendliness of this website, the chance of error is Negligible. The accuracy of this Website is optimum. We have completed the study about ASP.NET and project on BOOKWORM. Now we conclude that: ASP.NET is more beneficial then Asp not only because it supports many languages one need not to study a particular language to work on this , but also the coding part is very limited. ASP.NET 3.5 framework is highly secured platform for building and modifying website and other web application.
47
BIBLIOGRAPHY
[1 ] ASP.NET in 21 days [2] Programming in C# [3] Essential Asp.Net with examples in C# [4] Professional ASP.NET 3.5 [5] A First Look At Sql Server 2005
48