You are on page 1of 69

PROJECT REPORT

(MCA-601(N2))
ON

MUSIC BEATS
Submitted to Punjab Technical University, Jalandhar In partial fulfillment of the requirements For the degree of

MASTER OF COMPUTER APPLICATIONS (Session 2009-2012)

Submitted To: By:Mr.Amandeep S. Patti (Head of Computer Dept.) Kaur Rahul Chaurasia

Submitted
Isha Johar Savleen Kaur Prabhjot

Punjab College of Technical Education

Baddowal (Ludhiana)

CERTIFICATE
This is to certify that this project entitled Music Beats submitted by Savleen Kaur, Isha Johar, Prabhjot Kaur, Rahul Chaurasia of MCA final year (session 2009-2012) developed by them during the industrial training at BETASOFT SYSTEMS, PANCHKULA. We also certify that this project fulfills the requirements that are necessary in the project submitted by the student of the Industrial training. We find that the above mentioned project is suitable in the partial fulfillments of the requirement for the award of degree of Master of Computer Application. Mr. Vishal Sood Internal Project Guide PCTE, Ludhiana

DECLARATION
I hereby declare that this project entitled MUSIC BEATS assigned to me during our 6 month industrial project training at BETASOFT SYSTEMS,PANCHKULA has been made by our team comprising of four members. During the development of this project emphasis was given on the client requirement. As I am submitting this project for the partial fulfillments of the requirement for the award of degree of Master of Computer Application, I wish to declare that this project is developed by me and my team-mates and none of its component is copied from anywhere. Isha Johar(94972131808) Savleen Kaur(94972131847) Prabhjot Kaur(94972131832) Rahul Chaurasia(94972131834) MCA 3rd

ABSTRACT
Music Beats is a computerized online facility to the users who search for the latest albums and songs thus achieving high performance, accuracy, reliability and any category of song can be searched via this website. In this system, there is a registration process for the User. The Administrator of the site verifies the Category of user after his registration and if satisfied, he will authenticate the user. This program serves the needs of people in Searching as well as Downloading songs. There are mainly three categories for searching criteria .ie. Hindi,Punjabi and English. Music Beats is a website that also provide plan facility to the user.Initially he will treated as a free user who has a download limit of downloading 10 songs.There is another plan which is silver plan which provides the download limit of 50 songs and last one is the gold plan which provides a download limit of 100 songs

The concept of Master Pages and Content Pages is used. Web User Controls are used to enhance Reusability. Security is implemented. State Management is used.

ACKNOWLEDGEMENT
The satisfaction that accompanies that the successful completion of any task would be incomplete without the mention of people whose ceaseless cooperation made it possible, whose constant guidance and encouragement crown all efforts with success. Our Project Report is in culmination of many forces that has been working together in unison. We are therefore deeply indebted to all those without whose support, it would have been impossible to achieve this stage of work. It is our distinct honor and indeed a great privilege to have worked under the dynamic leadership and able guidance of my mentor Mr. Anoop Dhiman for his whole hearted help, kind inspiration, keen interest, constructive criticism and most valuable suggestions in this part of the project report. We are profoundly grateful to the staff members of BETASOFT SYSTEMS(PANCHKULA) for their assistance in providing us the relevant literature. We would like to express my deepest sense of gratitude and heartfelt thanks to all the Staff members of PCTE, who remained the source of inspiration for us to accomplish the project well in time, but also throughout my MCA course. Finally words fail us to express my thanks to my parents and friends whose constant motivation I would never have been able to complete this project. I am also very thankful to our respective Director Dr.Mangla who gave us an opportunity to present this project.

PREFACE

This project has been composed with the aim of covering a part of MCA syllabus as prescribed by PUNJAB TECHNICAL UNIVERSITY,JALANDHAR. A lot of effort has been made to make this project report interesting and a learning experience for the leader. The report has been explained with the help of diagrams and figures. The subject matter has been compiled in a simple, illustrative and lucid manner. During my M.C.A. Programme, as a part of it, I joined BETASOFT SYSTEMS(PANCHKULA) , as a vocational trainee in VI Semester. My assignment could be defined as development of software Music Beats. Through this system it was proposed to computerize the various standards. Seeing the friendly interface provided by ASP.NET Framework (4.0) as the front end and SQL Server 2008 as the back end. This report briefly describes the systematic approach adopted to develop the system by efficiently using the latest facilities. The report follows the sequential actions of the different phases in the system development life cycle. In the beginning I have provided an abstract into the general features of the project. As I proceed I delve into more intricate details regarding the working of the project.

INDEX
S. No. TABLE OF CONTENTS Page No.

1 2

3 4 5 6 7 8 9 10 11 12 13

Introduction of Company Introduction of Project -Statement about the problem -Overview of the Project -Modules of Project -Objectives of Project System Analysis Feasibility Study Project Plan System Design -Data Flow Diagram Three-Tier Web Application Development Technology Used Database Tables Implementation and Testing Screen Layouts of Project Conclusion and Future Work References

COMPANY PROFILE
Project Undertaken: Music Beats Estimated duration: Approx. 5 months. Name of Organization & Address: BETASOFT SYSTEMS S.C.O.398,2ND Floor,Sector 20,Panchkula-134 109 Haryana(India) TEL: +91-172-4677163 External Supervisor Name: Mr. Anoop Dhiman External Supervisor Designation: Training Head Nature of Project/Job assigned: WEB SITE

Introduction to Company

Betasoft Systems is a global IT Services and Consulting Company offering software, web solutions to client all over the globe. Betasoft Systems was founded to develop innovative productivity software for the world market. Betasoft array of Services and Support include Networking,Administration,ERP and DBA Services.

Services and Solutions:Technology Staffing: Hiring well qualified, experienced people is good for business. Matching our workforce needs with the best talent in the marketplace is the cornerstone of our business. Whether you need a single resource, a team or a steady pipeline of IT professionals, we can meet the most diverse workforce needs with people committed to your success. They will respond on command with proactive, consultative and collaborative solutions designed to meet the needs of your enterprise. They will work with you to deliver the right team of BSS contractors.

Outsourcing:Application Services: They offer the full range of IT services from strategic IT consulting to systems integration to outsourcing. In times of economic uncertainty, Beta Soft Systems application outsourcing approach can help you to effectively reduce costs while industrializing your capabilities for the long haul. Testing Services: Expertise on both the business and technical sides of testing has enabled us to create innovative approaches that deliver accelerated results. They use an established testing methodology and employ a wide range of industry-standard testing tools that leverage established methodologies to provide your organization with superior software quality, enhanced business readiness and real competitive advantage. They work hard to encourage a spirit of innovation in all of our testing professionals and to share continually what we learn with customers.

Project Management

Creates and executes project work plans and revises as appropriate to meet changing needs and requirements. Identifies resources needed and assigns individual responsibilities. Manages day-to-day operational aspects of a project and scope. Reviews deliverables prepared by team before passing to client. Effectively applies our methodology and enforces project standards. Prepares for engagement reviews and quality assurance procedures. Minimizes our exposure and risk on project. Ensures project documents are complete, current, and stored appropriately.

Betasoft Technology domain contains following technologies:


.net platform based languages P.H.P Java based technologies Designing Suites 4-G Languages

Services provided by Betasoft Softwares


Software development Web development Consultancy Search engine optimization Independent software testing Hardware and network solutions

Business Analysts:Analysis and Solution Definition:

Quickly understands the business issues and data challenges of client's organization and industry. Identifies client organization's strengths and weaknesses and suggests areas of improvement. Reviews and edits requirements, specifications, business processes and recommendations related to proposed solution. Develops functional specifications and system design specifications for client engagements.

Technical Recommendation and Testing:

Leads testing efforts. Ensures issues are identified, tracked, reported on and resolved in a timely manner. Communicates needed changes to development team.

Project Execution:

Assists in enforcement of project deadlines and schedules. Takes input from supervisor and appropriately and accurately applies comments/feedback. Communicates and applies project standards. Manages resources in accordance with project schedule.

Quality Assurance Testing:

Effective communication and report writing skills. Good leadership capabilities to lead projects to successful completion. Basic knowledge of applicable software to infer statistical data. Familiarity with the tools, concepts and methodologies of quality management.

Software Developers:

Requirements gathering, synthesis and review. Work scoping and planning. Source code control. Producing technical and non-technical documentation.

Vision and Values


Betasoft Systems Inc-A leader in technology execution,IT and Communication Staffing services.Their promise is providing world class technology execution delivered with customer service thatss second to none.Their mission is to provide end to end business for a dynamic environment where business and technology converge. Innovation - Technological innovation was the genesis of Betasoft and remains a true competitive advantage, for their customers. Today, as industry leader they not only respond to the needs of theirr customers but also create opportunities for them.
1.

Performance - Their networks and systems are the fastest, most secure in world.To their customers, this means reliability and dependability.
2. 3.

the

Integrity - They set standards of performance and integrity above and beyond what is expected, and have a compliance program that demonstrates Betasofts commitment to the highest standards of ethics and integrity in business. Respect They believe in giving respect to their clients by serving them in a satisfied manner.
4.

Betasoft works closely with communities and government leaders around the world. As a result, they are keenly aware of social needs and the tremendous impact that they can provide as a committed corporate neighbour.They also contribute their own time and resources to community. Betasoft Systems was started keeping in mind to provide the world class solutions to world.Here they emphasize on "Quality" rather then "Quantity". Acritical core value of their firm is to treat their clients and candidates with the highest level of personal respect.this allows them to be confident in their ability to deliver the best service,which through search has been recognised as outstanding within the industry.With thus strong dedication to those whom they serve,is easy for them to see how they consistently prove that great people really prove great results. Being in IT business for over many years now, Betasoft Systems has a strong team of skilled experienced IT experts. Our clientele starts from small business companies to large enterprises who realize that they need a professional internet solution to generate revenue streams, establish communication channels or streamline business operations. One-step Internet Solutions Vendor Whether you need an appealing website design or complex multi-tier internet system development or custom programming using latest technologies (e.g. Web 2.0) Betasoft Systems has the required experience and expertise to do it all.

Full-Cycle Development Services At Betasoft Systems, they support a full-cycle development process from requirements definition and specification, architecture design, coding, testing and validation to product maintenance and support. Depending on the specific requirements their experts will take the client step by step through each phase of solution development providing their client with a sound advice on technology and application options. Experience and Expertise Betasoft Systems have completed hundreds of projects in different domains and also built a large database of knowledge that enables us to deliver the right solutions that address the needs of clients. Betasoft Systems Quality Initiatives are based on a 3Q approach: Quality personnel, Quality Process and Quality Communications. Each project at Betasoft Systems is under constant control of a dedicated quality assurance department that monitors project activities and results at each development phase. Web Designing & Web Development We consider following aspects of a web design:* Appealing and professional style * Consistent overall layout * Dependable corporate identity * Usability

INTRODUCTION OF PROJECT

STATEMENT ABOUT THE PROBLEM


In present scenario, there are a lot of problems especially with the security and the mp3 files which are available online are corrupted and harm our systemIt.So in order to provide safe and better servcie to the people we created this website. People have to search for various kinds of songs in various languages which are available in different websites but we are providing three different languages song under one website.By which it will convenient for the user to search over the internet. A discussion with my project guide produced enthusiastic response and I decided to take the challenge. In the present system all the work is computerized and proper security is provided for the system.

OVERVIEW OF PROJECT
Music Beats is a website that will integrate all facts related to a song website, including uploading,authorising and unauthorising the user,searching,check log of multiple users,uploading of song files,downloading,play music online.This will integrate all functions into a single integrated software program. In this system, there is a registration process for the User. User can be anonymous user and authorised user.If the user is an anonnymous user then he can only view the website but cannot download anything.If the user is an authorised user then he has the facility of downloading mp3 files.The Administrator of the site verifies the user after his registration and if satisfied, the user will be able to take full tour of the website.. Once the User have registered themselves, they can access the various services of this system. Different registered users can search and download songs unlimited. There are mailny two panels: Admin Panel User Panel In the Admin Panel administrator can upload songs.Administrator can give authorisation to the user or delete any user if admin founds any any mischevious data in the user profile.Admin canalso view lof file of multiple users. Admin can also search songs to check whether he has uploaded particular song or not. In the User Panel there are two categories of user .ie. Anonymous user and Registered User.If user is an Anonymous User then he can only search songs and play his selection.But he cannot download.And If the user is a Registered User then the user can download unlimited songs according to his choice.Admin can update, delete and insert the appropriate information according to requirements.User can also edit his or her profile, can also change picture,change password as well as his other personal details.User can also make an appeal by going to the Contact Us page and on that page he can give his or her suggestions or feedback which will be send to the admin.Like he can ask for uploading particular movie song.By this page website demand can be improved.
Music Beats will integrate all functions into a single integrated software program that will

run on a single database so that the various modules can work


Music Beats is module based.But Modules work under two different panels.Under Admin

Panel activities of a particular functional area i.e. module will cover all Uploading of mp3 file activities in the website.Under User Panel activities of module will cover downloading of mp3 files and playing them online.In Music Beats all the modules will be linked to each other.

Music Beats Includes:o o o

o o
o

The concept of Master Pages and Content Pages is used. Web User Controls are used to enhance Reusability. Provision of Emailing is also provided Validation checks are implemented; Security is provided. State Management is used.

MODULES DESCRIPTION Music Beats includes the following modules:Under Admin Panel Upload Songs Authorising User Log Search Deleting User

Uploading Songs:-It includes uploading various categories of song like hindi,punjabi and english.On the click of the button uploading can be done.Admin can upload latest songs and latest albums of varous categories. Music Beats will update the songs list time to time. It will provide security to the user and the user will be protected from various malwares. Authorising User:- Administrator can upload songs.Administrator can give authorisation to the user in order to0 give full access to the user. Log:- Administrator can view log session of various users. Search: - In this module user can search or view various songs.In this admin can also search songs to check whether he has uploaded particular song or not

Deleting User: - If admin founds any any mischevious data in the user profile.Admin canalso view lof file of multiple users. Under User Panel Songs Download Play Dashboard

Songs: - In this module user can search for different categories of songs. Download: - If the user is authenticated by the the admin then the user can unlimited songs. Play: - If the user wants to play songs online then he can play his selection. Dashboard: - In this user can update his/her information like change his/her picture,change password or can also edit his/her personal details.

OBJECTIVES OF PROJECT
The following objectives have been set: Smooth flow of data without any hurdles. Adequate validation checks for data entry. Adequate security of data. Facility to update data from time to time. Prompt and specific retrieval of data. Flexibility in the system according to the changing environment. Controlling redundancy in storing the same data multiple times. Accuracy, timeliness and comprehensiveness of the system output. Stability and operability by people of average intelligence. Enhancement in the completion of work within the constraints of time. Timely and accurate information. Increased customer Response Time

SIGNIFICANCE OF PROJECT
Music Beats will integrate all functionalities of the Music Website into single database.

It will streamline all the upload and download procresses and give result on a click of button. The main significance of Music Beats is integration of providing various facilities to the user in a single platform, which reduces the need for search under different websites.

SYSTEM ANALYSIS
Systems analysis is a process of collecting factual data, understand the processes involved, identifying problems and recommending feasible suggestions for improving the system functioning. This involves studying the business processes, gathering operational data, understand the information flow, finding out bottlenecks and evolving solutions for overcoming the weaknesses of the system so as to achieve the organizational goals. Analysis is a detailed study of the various operations performed by a system and their relationship within and outside of the system. In journal view system is collection of people, procedures and equipments. People are not an important component of any information system. Information is produced and used by people in an organization in their everyday activities to make decisions. Information system establishes procedures ensuring that right people receive right data at right time. These procedures determine what is to be done at it enter and passed through the system. System analysis is the method that is used to analyze the system, design them and build them. Analysis is used to gain an understanding of existing and what is required in system. The analysis phase ends with the system description and a set of requirement of the new system. Analysis is a process of diagnosis the situation with the boundaries of system kept in mind to produce a report based own findings. Planning for information system development is done within in the framework of organizations overall MIS plan. Identification of need Detailed information requirement analysis of organization is collected from present system. As a person has to be changed with the prevailing conditions of society, in the same a system has to be changed accordingly. Computerized organization is the todays demand. In comparison to the old system, the computerized system is more reliable and cost effective. In the present organization, the data is scattered whereas the data should be integrated at one place so that the modifications can be made easily and it becomes easy for any authorized person to get information from these files. Preliminary investigation To meet the above-mentioned requirement, we need a system that has the tools of ASP.NET. It should be a simple system because the user going to use it are not much familiar with these kind of systems so it should be a simple, easy to use an understandable to all persons.The first step in the system development life cycle is to determine the feasibility of the system .The purpose is to evaluate project request. It is the collecting of information that helps committee members to evaluate the merits of the project request and make an informed judgment about the feasibility of the proposed project.

Following should be accomplished: a. Clarify and understand the project request. b. Determine the size of the project. c. Determine the technical and operational feasibility. d. Report findings to the management Objectives 1. Efficiency: when all the work is done by computer then it will increase the efficiency, so all the activities will be done fastely. 2. This system also save time for calculations.

SYSTEM REQUIREMENTS
METHODOLOGY ADOPTED Prototyping Model has been used for software development according to which a throwaway prototype of the proposed system, based on the currently known requirements, is given to the user so that he has a fair idea about how the proposed system is going to be like. This will help him in deciding the interface, input and output requirements. It can be easily adjudged that inputs and outputs are big in number, can increase exponentially and may create a big chaos if not restricted properly. As the user spends some time on the prototype, he will become more precise about his own input and output requirements. This prototype will provide him with an environment analogous to the proposed systems environment. Because of object oriented support in .NET, various concepts (like reusability, polymorphism, isolation etc.) are already there but for the efficient management of system components, Component based Software Engineering will also be exercised which will help in a resultant library of components, the benefit of which will be reusability and fast development. Because of lack of hierarchical structure in object oriented approach, there is no meaning of Bottom-up or Top-down testing. Testing will begin from the most rudimentary levels of the system and will move towards higher level components which will be based on design phase rather than coding phase. In little words, it can be said that CLUSTER Testing will be exercised to scrutinize all the parts and their associative functionality.

HARDWARE AND SOFTWARE TO BE USED The system must have the following hardware requirements:Software Environment: 1) Microsoft .Net Framework 4.0 2) Visual Studio 2010 3) Microsoft SQL Server 2008 Hardware Environment:
1) PC with Intel Core i5 Processor, 2.66 GHz

2) 2 GB RAM 3) Minimum 50 GB free Hard Disk space. 4) Mouse or Similar Pointing device. Technology Used: 1) ASP .NET 4.0 2) C# .NET 3) ADO .NET Entity Framework Database Used: SQL Server 2008

FEASIBILITY STUDY
Depending on the results of the initial investigation, the survey is expanded to a more detailed feasibility study. Feasibility study is a test of system proposal according to its work ability, impact on the organization, ability to meet user needs, and effective use of resources. The objective for this phase is not to solve the problem but to acquire a sense of scope. During the study, the problem definition is crystallized and aspects of the problem to be included in the system are determined. Web Information processing systems are capital investments because resources are being spent currently in order to achieve benefits to be received over a period of time following completion. There should be a careful assessment of each project before it is begun in terms of economic justification, technical feasibility, operational impact and adherence to the master development plan. We started the project by listing the possible queries that the user might want to be satisfied. And on these lines we guided the project further. The three main points, kept in mind at the time of project, are: Possible (To build it with the given technology and resources) Affordable (given the time and cost constraints of the organization) Acceptable (for use by the eventual users of the system) The three major areas to consider while determining the feasibility of a project are: -ECONOMICAL FEASIBILITY An evaluation of development cost weighed against the ultimate income or benefit derived from the developed system. Today, software is the most expensive element of virtually all computer-based systems. A large cost estimation error can make the difference between profit and loss. Estimation of resources, cost, and schedule for a software engineering effort requires experience, access to good historical information, and the courage to commit to quantitative predictions. Estimation carries inherent risk and this risk leads to uncertainty. Project complexity has a strong effect of the uncertainty inherent in planning. Complexity, however, is a relative measure that is affected by familiarity with past effort. Project size is another important factor that can affect the accuracy and efficiency of estimates. As size increases, the interdependency among various elements of the software grows rapidly. Software cost and effort estimation will never be an exact science. Too many variables-human, technical, environmental, political-can affect the ultimate cost of software and effort applied to develop it. However, software project estimation can be transformed from a black art to a series of systematic steps that provide estimates with acceptable risk. The system is not too costly according to the features of the application. The cost of the project is balanced. The cost of the project might be increase or decrease as according to requirement of the end user. The system has developed systematically.

TECHNICAL FEASIBILITY This involves financial consideration to accommodate technical enhancements. If the budget is a serious constraint, then the project is judged not feasible. The analyst thinks about the technical feasibility of the system. In the proposed system, the application has made in this way so that it is technically feasible for the distribution promotion. There are some certain types of control being used in the system to make the application more users friendly i.e. the grid view is used. The system has made in such a way that it is being used for a single user as well as multi-user environment. The operating systems are Windows 2000/2003 Windows XP. Thus we see that the system is more technically feasible regarding to operating system. We are using Microsoft SQL Server 2005 as backend for maintaining the database. SQL Server is a relational database management system of an object that is formed by the database and an instance of the SQL Server. SQL Server 2005 is Windows based RDBMS. This is one of the powerful RDBMS due to its menu driven facility. This provides a better service to the user in the sense of taking the backup of data and then restores it. We can easily mirror the database in the SQL Server 2005. OPERATIONAL FEASIBILITY This application is very easy to operate as it is made user friendly. Main consideration is users easy access to all the functionality of the application.

PROJECT PLAN
SYSTEM ANALYSIS INTRODUCTION: System analysis is the process of studying the business processors and procedures, generally referred to as business systems, to see how they can operate and whether improvement is needed. This may involve examining data movement and storage, machines and technology used in the system, programs that control the machines, people providing inputs, doing the processing and receiving the outputs. INVESTIGATION PHASE The investigation phase is also known as the fact-finding stage or the analysis of the current system. This is a detailed study conducted with the purpose of wanting to fully understand the existing system and to identify the basic information requirements. Various techniques may be used in fact-finding and all fact obtained must be recorded. INVESTIGATION As it was essential for us to find out more about the present system, we used the following methods to gather the information: 1. Observation: - Necessary to see the way the system works first hand. 2 Document sampling: - These are all the documents that are used in the are necessary to check all the data that enters and leaves the system. system. They

3 Questionnaires: - These were conducted to get views of the other employees who are currently employed in the system. ANALYSIS OF THE INVESTIGATION Strengths of the System 1. No complex equipment: - The equipment that is used is very simple and no special skills have to be mastered to be able to operate the system. Therefore no training is required for the employees. 2. Low cost: -There is little money spent in maintaining the present system other than buying the necessary office equipment and the ledgers. SYSTEM SECURITY System security is a vital aspect when it comes to developing a system. The system should ensure the facility of preventing unauthorized personnel from accessing the information and the data within the system. The system should provide total protection for each users

information so that the integrity of data is sustained and also prevent hackers from hacking the system. The proposed system ensures the security and the integrity of data. This is done by providing a password login system for each authorized users. And for example the System Administrator has access to all kinds of information. By providing this facility information is properly managed and information is protected. For example the system administrators day to day tasks are lessened and easier because he doesnt have to have a constant eye on the system and worry about hackers hacking the system. SOFTWARE REQUIREMENT SPECIFICATION The software requirement specification is produced at the culmination of the analysis task. The function and performance allocated to software as part of system engineering are refined by establishing a complete information description, a detailed functional description, a representation of system behavior, an indication of performance requirement and design constraints appropriate validation criteria, and other information pertinent to requirement. The introduction to software requirements specification states the goals and objectives of the software, describing it in the context of the computer based system. The Information Description provides a detailed description of the problem that the software must solve. Information content, flow and structure are documented. A description of each function required to solve the problem is presented in the Functional Description. Validation Criteria is probably the most important and ironically the most often neglected section of the software requirement specification. Software requirement specification can be used for different purpose. Here are the major uses. Statement of user needs A main purpose of the product specification is to define the need of the products user. Sometimes, the specification may be a part of a contract sign between the producer and the user. It could also form part of the user manuals. A users needs are sometimes not clearly understood by the developer. If this is the case, a careful analysis involving much interaction with the user should be devoted to reaching a clear statement of requirements, in order to avoid possible misunderstandings. Sometimes, at the beginning of a project, even the user has no clear idea of what exactly the desired product is. Even an exact formation of system functions and performance may be missing an initial description produced by an inexperienced user. A statement of the requirements for the implementation: Specifications are also used as a reference point during product implementation. In fact, the ultimate goal of the implementation is to build a product that needs specification.

SYSTEM DESIGN
INTRODUCTION: System design is the process of developing specifications for a candidate system that meet the criteria established in the system analysis. Major step in system design is the preparation of the input forms and the output reports in a form applicable to the user. The main objective of the system design is to make the system user friendly. System design involves various stages as: Data Entry Data Correction Data Deletion Processing Sorting and Indexing Report Generation System design is the creative act of invention, developing new inputs, a database, offline files, procedures and output for processing business to meet an organization objective. System design builds information gathered during the system analysis. DATABASE DESIGN: The overall objective in the development of the database technology has been to treat data as an organizational resource and as an integrated whole. Database management system allows data to be protected and organize separately from other resources. Database is an integrated collection of data. The most significant of data as seen by the programs and data as stored on the direct storage access storage devices. This is the difference between logical and physical data. The organization of data in the database aims to achieve free major objectives: Data Integration Data Integrity Data Independence The databases are implemented using a DBMS package. Each particular DBMS has unique characteristics and general techniques for Database Design. The proposed Management Information System stores the information relevant for processing in the Microsoft SQL Server Database. This MS SQL Server contains tables, where each table is called a field or column. A table also contains records which is a set of fields. All records, in a table the same set of fields with different information. Each table contains key fields that establish relationships in a MS SQL server database and how the records are stored. There are primary key fields that uniquely identify a record in a table. There are also fields that contain the primary key from another table called foreign keys. It is a known fact that the program cannot be written until the data are defined, so the database must be defined. The starting point for this process is data dictionary. The records data structures and elements to be stored in each database are identified and extracted. Next the analyst codes the source statements library. Eventually, the programmer will

incorporate the source code into the various programs, thus assuring consistency and simplifying the coding process. The databases have been designed in such a way that there is no duplication of information and loss of information. VERIFICATION: A verification check ensures that data i9s correctly transferred into a computer from the medium that it was originally stored on. Verification checks are usually used to check that a data entry worker has correctly typed information written on a data collection form into a computer. Methods of Verification: The two most common methods of verification are: On-Screen prompts: After a user has entered some data it is redisplayed on the screen. The user is prompted to read the data and confirm that it has been entered correctly. If the user has entered any data incorrectly he should response that the data is inaccurate and retypes the incorrect parts. Dual Inputs: This method is used when data is entered through the keyboard. The data to be entered is typed in twice by two different operations. The two copies of data are been compared, any difference are detected, the operators will be prompted to retype the sections that differ until both copies agree/. When the two copies agree the computer assumes that the data has been entered correctly. VALIDATION: A validation check is an automatic check made by computer to ensure that any data entered into the computer is sensible. A validation check does not make sure that data has been entered correctly. It only ensures that data is sensible. For this reason validation checks are not usually as effective as verification checks. They can however be carried out automatically by the computer and therefore require less work by the computer operators making them cheaper to use. Methods of validation: There are many different methods of validations. The most appropriate method to use will depend upon what data is being entered. The most common methods are listed here. Presence Checks: checks that data has been entered into the field and that it has not been left blank, e.g. checks that Project ID is always entered into each record in a database of project details. Type Checks: checks that an entered value is of particular type. E.g. checks that a field is varchar, a number, etc. Length Checks: checks that an entered value, e.g. Project ID is no longer than a particular number of characters. Format Checks: Checks that an entered value has a particular format. E.g. a date must be consist of mm-dd-yy format. Validation checks can be performed by any piece of software. If the user tries to do unauthorized operations the appropriate error messages are produced by the systems.

DATA DICTIONARY:
In our DFD, we give names to data flows, processes, and data stores. Although the names are descriptive of the data, they do not give details. So the following the DFD, our interest is to build some structured place to keep details of the contents of data flow, processes, and data store. A data dictionary is a structured repository of data about data. It is a set of rigorous definition of all DFD data element and data structure. A data dictionary has many advantages. The most obvious is documentation; it is valuable reference in any organization. Another advantage is improving analyst/user communication by establishing consistent definition of various elements, terms and procedures. During implementation, it serves as a common base against which programmers who are working on the system compare data description. Also control information maintained for each data element is cross referenced in the data dictionary. E.g. program that use a given data element are cross referenced in a data dictionary, which makes it easy to identify them and make any necessary changes. Finally, a data dictionary is an important step in building a database. Most database management system has a data dictionary as a standard feature.

INPUT DESIGN:
The input design is the link between the information system and the user. It comprises developing specification and procedure for data preparation and those steps that are necessary to put transaction data into a usable form for processing data entry. The activity of putting data into the computer for processing can be achieved by instructing the computer to read data from a written or printed document or it can occur by having people key data directly into the system. The design of inputs focuses on controlling the amount of inputs required, controlling errors, avoiding delay, avoiding extra steps and keeping the process simple. The system needs the following information for processing: Information regarding Project Details Information regarding Project Design Details Information regarding Category, Location Details

OUTPUT DESIGN:
In output design, emphasis is given on producing a hard copy of the information required as the output on the CRT screen in some predefined manner. Computer output is the most important and direct source of information to the use. Output design is a process that involves designing necessary outputs that should be given to various users according to their requirements. Efficient, intelligible output design should improve the systems relationship with the user and help in decision making. Since the reports are directly referred by the management for taking the decisions and to draw conclusions, they must be designed with utmost care and the details in the reports must be simple, descriptive and clear to the user. The options for the outputs and reports are given the system menu.

DATA FLOW DIAGRAM(DFD)

User Authentication DFD Login

User

Admin

Anonymous User

Registered User

Login DFD

ADMIN Login

Search

Upload songs

User Status

Log

Admin Panel DFD

User Login

Tbprofile

Check Authenticat ion

Login Successful

Wait For User Response

Search

Dashboar d

Downloa d Downl;oa d

Play

HR management DFD

User Panel DFD

Search

Songs Admi n User

Registered User Play Downlo ad

Anonymous User Play

Search DFD

Upload

Hindi

English

Punjabi

Tbhindi

Tbenglis h

Tbpunjab i

Song Uploaded

Upload DFD

Admin

User Status Authoris e Unauthor ise

User is registered

User cannot register

User Status DFD

Three-Tier Web Application Development


To implement a web application client-server architecture is required. The most popular client-server architectures are the two-tier and the three-tier architecture. In web application development, three-tier architecture refers to separating the application process into three specific layers. What the user sees via a web browser is called the presentation tier and is content served from a web server. The middle tier performs the business logic processing that occurs, for example, when a user submits a form. The back end consists of the data tier which handles the database processing and access to the data. This system is designed based on a traditional three-tier architecture used by many web applications. Three-tier architecture includes a presentation layer, business rules/ logic layer, and the data layer. The three-tier architecture is shown in Figure.

Presentation Tier: The Presentation Tier or User Interface is the portion the user sees when they open a web page in the browser. It is as simple as you reading this article all the way to searching a catalog and purchasing a product using a shopping cart. It is what is presented to the user on the client side within their web browser. If you were to view the source code, you would only see code such as HTML, JavaScript, and Cascading Style Sheets Viewing source code on a web page, you would NOT see database queries or loops or calls to classes or any behind-the-scenes processing. In ASP.net and utilizing Visual Studio developers can separate the user interface from the business logic and data access layer with various tools. Languages used in this layer are typically HTML, DHTML, CSS and java script. The Presentation Layer, also called the Client tier, is responsible for thepresentation of data, receiving user events, and controlling the user interface. The userinteraction with the system is entirely through this layer. Business Logic or Application Tier:-The Business Logic, Functional Process Logic, Business Rules (all pertaining to the same thing), are kept in a separate layer. In ASP.net, this is where you define your classes and source code. This can be in the App_Code folder for your classes and methods. Web languages typically used in ASP.net are VB and C#. You would not use HTML or JavaScript in this layer. In this layer you typically define your classes, functions, sub procedures, properties, etc. The Business Rules/Logic layer is the middleman between the presentation layerand the data layer. This middle tier was introduced to overcome the deploymentlimitation (whenever the application logic changed the application had to be redistributedat each and every client) in the two-tier architecture. The middle tier provides processmanagement where business logic and rules are executed and can accommodate hundreds of users. Data Access Tier:-In ASP.net, the Data Access layer is where you define your typed datasets and table adapters. It is where you define your queries or stored procedures. The business tier may then make use of this functionality. In your classes, rather than defining ad hoc queries, you may use a Table Adapter to access the Data Access Layer. The Data layer is responsible for data storage. Primarily this tier (layer) consists of one or more relational databases and/or file systems

TECHNOLOGY USED

Overview of the .NET Framework


The .NET Framework is a new computing platform that simplifies application development in the highly distributed environment of the Internet. The .NET Framework is designed to fulfill the following objectives: o To provide a consistent object-oriented programming environment whether object code is stored and executed locally, executed locally but Internet-distributed, or executed remotely. o To provide a code-execution environment that minimizes software deployment and versioning conflicts. o To provide a code-execution environment that guarantees safe execution of code, including code created by an unknown or semi-trusted third party. o To provide a code-execution environment that eliminates the performance problems of scripted or interpreted environments. o To make the developer experience consistent across widely varying types of applications, such as Windows-based applications and Web-based applications. o To build all communication on industry standards to ensure that code based on the .NET Framework can integrate with any other code.

The .NET Framework has two main components:

o The common language runtime and o The .NET Framework class library. Features of the Common Language Runtime The common language runtime manages memory, thread execution, code execution, code safety verification, compilation, and other system services. These features are intrinsic to the managed code that runs on the common language runtime. With regards to security, managed components are awarded varying degrees of trust, depending on a number of factors that include their origin (such as the Internet, enterprise network, or local computer). This means that a managed component might or might not be able to perform file-access operations, registry-access operations, or other sensitive functions, even if it is being used in the same active application. The runtime enforces code access security. For example, users can trust that an executable embedded in a Web page can play an animation on screen or sing a song, but cannot access their personal data, file system, or network. The security features of the runtime thus enable legitimate Internet-deployed software to be exceptionally featuring rich. The runtime also enforces code robustness by implementing a strict type- and codeverification infrastructure called the common type system (CTS). The CTS ensures that all managed code is self-describing. The various Microsoft and third-party language compilers generate managed code that conforms to the CTS. This means that managed code can consume other managed types and instances, while strictly enforcing type fidelity and type safety. In addition, the managed environment of the runtime eliminates many common software issues. For example, the runtime automatically handles object layout and manages references to objects, releasing them when they are no longer being used. This automatic memory management resolves the two most common application errors, memory leaks and invalid memory references. The runtime also accelerates developer productivity. For example, programmers can write applications in their development language of choice, yet take full advantage of the runtime, the class library, and components written in other languages by other developers. Any compiler vendor who chooses to target the runtime can do so. Language compilers that target the .NET Framework make the features of the .NET Framework available to existing code written in that language, greatly easing the migration process for existing applications. While the runtime is designed for the software of the future, it also supports software of today and yesterday. Interoperability between managed and unmanaged code enables developers to continue to use necessary COM components and DLLs. The runtime is designed to enhance performance. Although the common language runtime provides many standard runtime services, managed code is never interpreted. A feature called just-in-time (JIT) compiling enables all managed code to run in the native machine language of the system on which it is executing. Meanwhile, the memory manager removes the possibilities of fragmented memory and increases memory locality-of-reference to further increase performance. Finally, the runtime can be hosted by high-performance, server-side applications, such as Microsoft SQL Server and Internet Information Services (IIS). This infrastructure enables

you to use managed code to write your business logic, while still enjoying the superior performance of the industry's best enterprise servers that support runtime hosting. .NET Framework Class Library The .NET Framework includes classes, interfaces, and value types that expedite and optimize the development process and provide access to system functionality. To facilitate interoperability. Between languages, the .NET Framework types are CLS compliant and can therefore be used from any programming language whose compiler conforms to the common language specification (CLS).The .NET Framework types are the foundation on which .NET applications, components, and controls are built. The .NET Framework includes types that perform the following functions: o o o o o o Represent base data types and exceptions. Encapsulate data structures. Perform I/O. Access information about loaded types. Invoke .NET Framework security checks. Provide data access, rich client-side GUI, and server-controlled, client-side GUI.

The key features of the .NET Framework Common Language Runtime Application Domain Runtime Hosts Common Type System Metadata and Self Describing Components Cross Language Interoperatablity .Net Framework Security

Why .NET? 1) Interoperability between languages and execution environments 2) Uniformity in schema or formats for Data Exchange using XML, XSL 3) Extend or use existing code that is valid 4) Programming complexity of environment is reduced

ASP.NET:
ASP.NET is a technology that allows us to build and control dynamic Web pages easily. It also provides many enhancements to take advantage of new technology as we can interact with databases, personalize Web pages for visitors, display page on mobile devices (such as cell phones), and even build an entire e-commerce site from scratch. Previously internet works on request/response model that is an integral part of client/server model. Although this is a marvelous way of communicate and distribute information, it's rather simple and static. When the process is over, once client receives the requesting page from the server the server has no idea what the client is doing unless it makes another request. There is another model for communicating between server and clients, known as eventdriven model.ASP.NET work on this model, it detects action and responds to them i.e. the server waits around for something to happen on the client. Once it does, the server takes action and performs some piece of functionality. Of course, a Web, server can not know what you are thinking, but it can respond to your actions. If you type some text on Web page, the server responds to it. If you click an image, the server responds. COMPARISON OF ASP AND ASP.NET: 1) Classic ASP was built on the top of the Windows operating system and IIS (Internet Information Server). It was always a separate entity, and therefore its functionality was limited. ASP.NET, on the other hand, is an integral part of the system under the .NET Framework. It shares many 9f the same objects that traditional applications would use and all .NET objects available for ASP. NETs consumption. 2) Instead of being limited to six inherent objects in ASP, ASP.NET has a plethora of useful components it can build form. 3) ASP also made it abundantly clear that client and server were two separate entities, Whereas ASP. NET ties together the client and the server through clever use of server-side and client-side code, all invisible to the developer. 4) ASP.NET code is compiled, whereas classic ASP used interpreted scripting languages. Using compiled code means an automatic boost in performance over ASP applications. 5) In classic ASP, nearly all of the code was executed in code render blocks (that is, inside <%...%> tags). In ASP.NET, this type of code isnt compiled and isnt recommended for frequent use. Instead, you use the code declaration blocks, which are compiled and provide better performance. Following are some of the significant new features of ASP.NET: 1) ASP.NET uses compiled code written in Common Language Runtime languages such as Visual Basic and C#. Unlike previous versions of Active Server Pages, this version does not use interpreted scripting languages such as VBScript. 2) ASP.NET pages are built out of server-side controls. Web server controls enable you to represent and program against Hypertext Markup Language (HTML) elements using an intuitive object model.

3) ASP.NET includes a new technology called Web Services. You can use Web Services to access methods and properties and transfer database data across the Internet. 4) ASP.NET is part of Microsoft's .NET Framework. You can access thousands of .NET classes in your code that enable you to perform such wondrously diverse tasks as generating images on-the-fly and saving an array to a file. 5) ASP.NET includes page and data caching mechanisms that enable you to easily and dramatically improve the performance of your Web site.

State Management
Web pages rarely are stand alone. Web applications almost always need to track users who visit multiple pages, whether to provide personalization, store information about a user or to track usage for reporting purposes. State management is the process by which you maintain state and page information over multiple requests for the same or different pages. Types of State Management
1. Client Side State Management:-This stores information on the client's computer by

embedding the information into a Web page, a uniform resource locator (URL), or a cookie. The techniques available to store the state information at the client end are listed down below: a) View State Asp.Net uses View State to track the values in the Controls. You can add custom values to the view state. It is used by the Asp.net page framework to automatically save the values of the page and of each control just prior to rendering to the page. When the page is posted, one of the first tasks performed by page processing is to restore view state. b) Control State If you create a custom control that requires view state to work properly, you should use control state to ensure other developers dont break your control by disabling view state. c) Hidden fields Like view state, hidden fields store data in an HTML form without displaying it in the user's browser. The data is available only when the form is processed. d) . Cookies Cookies store a value in the user's browser that the browser sends with every page request to the same server. Cookies are the best way to store state data that must be available for multiple Web pages on a web site. e) Query Strings - Query strings store values in the URL that are visible to the user. Use query strings when you want a user to be able to e-mail or instant message state data with a URL. 2. Server Side State Management a) Application State - Application State information is available to all pages, regardless of which user requests a page.

b) Session State Session State information is available to all pages opened by a user during a single visit. Both application state and session state information is lost when the application restarts. To persist user data between application restarts, you can store it using profile properties.

ASP.NET Web Application Security


Essentially, securing an ASP.NET Web application entails controlling access to its resources. The ASP.NET security framework accomplishes this by working in conjunction with the various security subsystems present in the machine where ASP.NET is installed. This includes security provided by the operating system (NTFS file access permissions) as well as security provided by IIS (host or IP address authorization). And since ASP.NET is built on the Microsoft .NET Framework, the ASP.NET application developer also has access to all of the built-in security features of the .NET Framework, such as code access security and role-based user-access security. It is imperative to understand how the various security subsystems interact, to be able to secure your ASP.NET application effectively. Basically, to enable security for an ASP.NET application, you need to configure the application to implement, at the very least, the two fundamental functionalities described in the following table. Security function Authentication Authorization Description The process of obtaining identification credentials from a user ( such as name and password ), and validating those credentials against some authority. The process of controlling access to resources based on the authenticated identification credentials ( such as role).

ASP.NET implements authentication through authentication providers, the modules that contain the code to authenticate user credentials.

The ASP.NET Ajax Library


The ASP.NET Ajax Library is an open-source JavaScript library that can be used with both ASP.NET Web Forms and ASP.NET MVC applications.

a) The ASP.NET Ajax Library includes the very popular, open-source, jQuery library. JQuery enables you to easily retrieve and manipulate elements from a HTML document by using selector syntax similar to the syntax used in Cascading Style Sheets. b) The ASP.NET Ajax Library includes the Ajax Control Toolkit. The Ajax Library contains more than 30 controls that enable you to easily create rich, interactive web pages. For example, you can use the Ajax Library controls to display HTML editors, auto-complete textboxes, cascading dropdown lists, picture slide shows, and modal popup dialog boxes. c) The ASP.NET Ajax Library includes a powerful client data access library. By taking advantage of ASP.NET Ajax client templates and client data-binding, you can build a database-driven web application that executes entirely within the web browser.

SQL SERVER 2008


Database Design A decade ago, database was unique to large corporations with mainframes. Today it is recognized as a standard of MIS and is available for virtually every size of computer.

Before the database concept became operational, users had programs that own data independent of other users. It was a conventional file environment, common data are available and used by several users. Instead of each program managing its own data, data across application are shared by authorized users with the data base software managing the data as an entity. A program now requests data through the data base management system, which determines data sharing.
a) Controlled redundancy:-Redundancy data occupies space and therefore, is

b)

c) d) e)

wasteful. If versions of the same data are in different phases of updating, the system often gives conflicting information. A unique aspect data base design is storing only once, which controls redundancy and improves system performance. Accuracy and Integrity:-The accuracy of a database ensures that quality and contents remains constant. Integrity controls detect data inaccuracies where they occur. As IMPRO uses SQL Server 2005 for storing the data. The database design becomes very crucial and important part of the system. Data Integration:-It refers to the fact that the data is stored physically at different locations, but logically the information is centralized. Data Integrity:-Data Integrity means storing all the data. This leads to more consistency, less redundancy and reduces direct access storage requirement. Data Independence:-Data Independence is the insulation of application programs from changing aspects of physical data organization.

SQL Server is an SQL-compliant RDBMS. SQL-compliant means it use the ANSI (American National Standard Institute) version of Structured Query Language or SQL. Structured Query Language is a command that allow us to modify or retrieve information from the database. Client server means that SQL Server is designed to store data in the central location (the server) and deliver it on demand to numerous other locations (the client). SQL Server is also a Relational Database Management System (RDBMS). FEATURES OF SQL SERVER 2005: Information representation Unique definition of rows Systematic treatment of Null values Guaranteed access High level Update, Insert, and Delete Retrieving information from the database. Accepting query language statements. Enforcing security specifications. Enforcing data integrity specifications Enforcing transaction consistency Managing data sharing Optimizing queries Managing System catalogs

COMPONENTS
1. Enterprise Manager:- SQL Server Enterprise Manager is a graphical tool that

allows easy configuration and management of Microsoft SQL Server and SQL 2000 program group. It is the main administrative console for SQL Server installations. It provides you with a graphical "birds-eye" view of all of the SQL Server installations on your network. You can perform high-level administrative functions that affect one or more servers, schedule common maintenance tasks or create and modify the structure of individual databases SQL Server Enterprise Manager can also be used to: Manage logins, permission and users. Create a database Take back-up of database and transaction logs. Manage tables
2. Query Analyzer:-It offers a quick and dirty method for performing queries against

any of your SQL Server databases. It's a great way to quickly pull information out of a database in response to a user request, test queries before implementing them in other applications, create/modify stored procedures and execute administrative tasks The SQL Server Query Analyzer allows us to create adhoc queries and run them interactively. We may also execute Transact-SQL statements stored in text file and view the result in result plane or result grid. The Query Analyzer also has a colorcoded editor to assist the user with checking of syntax. It also has context sensitive help. Queries are processed in two steps: Interpret- First the Queries are checked for syntax. Execute-Then the processing take place. A database is stored in a very structured manner. Each database requires some way for a user to interact with the information within. Such interaction is performed by a database management system (DBMS). SQL Server is a member of a large category of products known as database management systems (DBMS). The general purpose of a DBMS is to provide for the definition, storage, and management of data in a centralized area that can be shared by many users. SQL Servers database management system is patterned on the relational model. Relational databases allow us to store vast amounts of data with far sampler maintenance and smaller storage requirements than the equivalent flat database. Relations among tables in a relational database are established using keys. A primary key is a field that uniquely identifies a record so it can be referenced from a related table. A foreign key is a field that holds identification values to relate records stored on other tables. Querying the database With each query of the database, we form a virtual table that contains the results of our query. Database queries are made with a specific language named SQL (structured query language).

SQL Server 2005has many performance improvements and features which allows us to build and manage large databases, query them fast, insert data into them at high rates, partition them for fast loading and backup and store very large objects or whole files. Central, Shared, Accessible, Backed up, Version etc. SQL, as a relational data language supports certain basic functions to control, define and manipulate data. SQL uses the term row to refer to a database record and the term column to refer to database field SQL Profiler: It provides a window into the inner workings of your database. You can monitor many different event types and observe database performance in real time. SQL Profiler allows you to capture and replay system "traces" that log various activities. It's a great tool for optimizing databases with performance issues or troubleshooting particular problems.
3.

Service Manager: It is used to control the MS SQL Server (the main SQL Server process), MSDTC (Microsoft Distributed Transaction Coordinator) and SQL Server Agent processes. An icon for this service normally resides in the system tray of machines running SQL Server. You can use Service Manager to start, stop or pause any one of these services.
4.

Data Transformation Services (DTS):provide an extremely flexible method for importing and exporting data between a Microsoft SQL Server installation and a large variety of other formats. The most commonly used DTS application is the "Import and Export Data" wizard found in the SQL Server program group.
5.

FEATURES User-Defined Functions: SQL Server 2000 introduces the long-awaited support for userdefined functions. User-defined functions can take zero or more input parameters and return a single valueeither a scalar value like the system-defined functions, or a table result. Tablevalued functions can be used anywhere table or view expressions can be used in queries, and they can perform more complex logic than is allowed in a view. 2) Indexed Views:Views are often used to simplify complex queries, and they can contain joins and aggregate functions. In SQL Server 2005 Enterprise or Developer Edition, you can define indexes on views to improve query performance against the view. When creating an index on a view, the result set of the view is stored and indexed in the database. Existing applications can take advantage of the performance improvements without needing to be modified. Indexed views can improve performance for the following types of queries: Joins and aggregations that process many rows Join and aggregation operations that are performed frequently within many
1)

3) queries Decision support queries that rely on summarized, aggregated data that is infrequently updated. 4) Distributed Partitioned Views: SQL Server 2005 expands the ability to create partitioned views by allowing you to horizontally partition tables across multiple SQL Servers. The feature helps you scale out one database server to multiple database servers, while making the data appear as if it comes from a single table on a single SQL Server. In addition, partitioned views are now able to be updated.

New Data types:SQL Server 2005 introduces three new data types. Two of these can be used as data types for local variables, stored procedure parameters and return values, user-defined function parameters and return values, or table columns: 6) Text in Row Data:SQL Server 2005 provides a new text in row table option that allows small text and image data values to be placed directly in the data row, instead of requiring a separate data page. This can reduce the amount of space required to store small text and image data values, as well as reduce the amount of I/O required to retrieve rows containing small text and image data values. 7) Cascading RI Constraints: SQL Server provides the ability to specify the action to take when a column referenced by a foreign key constraint is updated or deleted. You can still abort the update or delete if related foreign key records exist by specifying the NO ACTION option, or you can specify the new CASCADE option, which will cascade the update or delete operation to the related foreign key records. 8) Multiple SQL Server Instances: SQL Server provides support for running multiple instances of SQL Server on the same system. This allows you to simultaneously run one instance of SQL Server 6.5 or 7.0 along with one or more instances of SQL Server 2005. Each SQL Server instance runs independently of the others and has its own set of system and user databases, security configuration, and so on. Applications can connect to the different instances in the same way they connect to different SQL Servers on different machines. 9) XML Support:SQL Server provides native support for XML. This new feature provides the ability to do the following: Return query result sets directly in XML format. Retrieve data from an XML document as if it were a SQL Server table. Access SQL Server through a URL using HTTP. Through Internet Information Services (IIS), you can define a virtual root that gives you HTTP access to the data and XML functionality of SQL Server 2000.
5)

Extensible Markup Language XML


XML stands for Extensible Markup Language XML is a markup language much like HTML XML was designed to carry data, not to display data XML tags are not predefined. You must define your own tags XML is designed to be self-descriptive XML is a W3C Recommendation

XML (Extensible Markup Language) is a set of rules for encoding documents electronically. It is defined in the XML 1.0 Specification produced by the W3C and several other related specifications; all are fee-free open standards.XMLs design goals emphasize simplicity, generality, and usability over the Internet. It is a textual data format, with strong support via Unicode for the languages of the world. Although XMLs design focuses on documents, it is widely used for the representation of arbitrary data structures, for example in web services. There are a variety of programming interfaces which software developers may use to access XML data, and several schema systems designed to aid in the definition of XML-based languages. (a)Markup and Content The characters which make up an XML document are divided into markup and content. Markup and content may be distinguished by the application of simple syntactic rules. All strings which constitute markup either begin with the character "<" and end with a ">", or begin with the character "&" and end with a ";". Strings of characters which are not markup are content. (b) Tag A markup construct that begins with "<" and ends with ">". Tags come in three flavors: start-tags, for example <section>, end-tags, for example </section>, and empty-element tags, for example <line-break/>.

Introduction to IIS
Internet Information Services Architecture IIS is an integral part of the Windows DNA architecture. An important role of IIS is to link clients accessing the system through the Hypertext Transfer Protocol (HTTP) to the other Windows DNA services, such as DHTML, ASP, and so on. In addition, IIS includes a basic set of functionality that systems developers can extend to define customized application architecture. This section contains: IIS Core Functionality: Describes the basic functionality that you can use to build Web applications. IIS and Component Services: Outlines the functionality used to isolate, manage and coordinate processing for transactional ASP applications.

DATABASE TABLES

CITY TABLE

STATE TABLE

COUNTRY TABLE

PROFILE TABLE

HINDI SONGS TABLE

PUNJABI SONGS TABLE

ENGLISH SONGS TABLE

IMPLEMENTATION AND TESTING


IMPLEMENTATION
Implementation is the stage in the project where the theoretical design is turned into the working system and is giving confidence to the new system for the users i.e. will work efficiently and effectively. It involves careful planning, investigation of the current system and its constraints on implementation, design of method to achieve the change over, an evaluation, of change over methods. A part from planning major task of preparing the implementation is education of users. The more complex system is implemented, the more involved will be the system analysis and design effort required just for implementation. An implementation coordinating committee based on policies of individual organization has been appointed. The implementation process begins with preparing a plan for the implementation for the system. According to this plan, the activities are to be carried out; discussions may regarding the equipment have to be acquired to implement the new system.Implementation is the final and important phase. The most critical stage is in achieving a successful new system and in giving the users confidence that the new system will work and be effective. The system can be implemented only after thorough testing is done and if it found to working according to the specification. This method also offers the greatest security since the old system can take over if the errors are found or inability to handle certain types of transaction while using the new system. At the beginning of the development phase a preliminary implementation plan is created to schedule and manage the many different activities that must be integrated into plan. The implementation plan is updated throughout the development phase, culminating in a changeover plan for the operation phase. The major elements of implementation plan are test plan, training plan, equipment installation plan, and a conversion plan. There are three types of implementation: Implementation of a computer system to replace a manual system. Implementation of a new computer system to replace an existing system. Implementation of a modified application to replace an existing one, using the same computer. IMPLEMENTATION TOOLS: Training personnel Conversion Procedures Post-implementation review Training of Personnel involved with system Even well designed system can succeed or fail because of the way they are operated and used. Therefore, the quality of training received by the personal involved with the system in various capacities helps or hinders and may even prevent the successful implementation of management information system. Those who are directly or indirectly related with the system development work must know in detail what must know in detail what their roles will be, how they can make efficient use

of the system and what the system will or will not do for them. Both system operators and users need training. Conversion Methods A conversion is the process of changing from the old system to the new one. It must be properly planned and executed. Four methods are common in use. They are Parallel Systems, Direct Conversion, Pilot System and Phase In method. Each method should be considered in the light of the opportunities that it offers and problems that it may create. In general, system conversion should be accomplished in shortest possible time. Long conversion periods create problems for all persons involved including both analysts and users. Parallel Run Immediate cut off

1) Parallel Run In this approach, the old system and the new system are used simultaneously for some period of time so that the performance of time so that performance of the new system can be monitored and compared with that of the old system. Also in case of failure of the new system, the user can fall back on the old system. The risk of this approach is that the user may never want to shift to new system. 2) Immediate cut-off In this method, the use of the old system cases as soon as the new system is implemented and bought in to place. The old system becomes redundant from day of implementation of the new system. There is the high risk involved in this approach if the new system fails, and then there will not be anything to fall back upon. The advantage of this approach is that both the systems need not be used simultaneously. Implementation Tools in Project The project was implemented using ASP.NET server page, HTML, ASP.NET beans. The implementation work was carried out in window XP/2000 server platform. 1) C#.Net and Asp.Net 2) MySQL Server

POST IMPLEMENTATION REVIEW After the system is implemented and conversion is complete, a review should be conducted to determine whether the system is meeting expectations and where improvements are needed. A post implementation review measures the systems performance against predefined requirement. It determines how well the system continues to meet the performance specifications.

SYSTEM TESTING
The purpose of system testing is to identify and correct errors in the candidate system. Testing is and important element of software quality assurance ad represents the ultimate review of specification, design and coding. The increasing visibility of the software as a system element and the cost associated with a software failure are motivated forces for well planned, through testing. System testing was conducted in order to detect errors and for comparing then the final system with the requirement specification reports, i.e. whether the system meets requirements. During testing the software was executed with the set of test cases and the output of programs for the test cases was evaluated to determine if the program is performing as it was expected to. The term error is used to refer the difference between actual output of the software and the current output. Fault is a condition that causes the software to fail to perform its required function. Software reliability is defined as a required function. Software reliability is defined as the probability that the software will not undergoes failures for a specified times under specified condition. Failure is the inability of a system or a component to perform a required function according to its specification. Different levels of testing were employed for software to make it error free, fault free and reliable. Then system testing was conducted. Here the entire software system was tested. The reference document used for this process was requirement document and the goal was to see if the software meets its requirements. System testing includes the thorough testing of the product. System testing is actually a series of different tests whose primary purpose is to fully exercise the computer based system. The tests are recovery testing: this checks the recovery of the system when failure occurs. This is to ensure that there are recovery procedures for error occurrences. System testing involves unit testing, integration testing, acceptance testing. Careful planning and scheduling are required to ensure that modules will be available for integration into the evolving software product when needed. A test plan has the following steps: Prepare test plan Specify conditions for user acceptance testing

Prepare test data for program testing Prepare test data for transaction path testing Plan user testing Compile/Assemble program Prepare job performance aids Prepare operational documents Objectives of testing. First of all objectives should be clear. Testing as a process of executing a program with the intent of finding errors. To perform testing, test cases are designed. A test case is a particular made up of artificial situation upon which a program is exposed so as to find errors. So a good test case is one that finds undiscovered errors. If testing is done properly, it uncovers errors and after fixing those errors we have software that is being developed according to specifications. Test information flow Testing is a complete process. For testing we need two types of inputs: Software configuration it includes software requirement specification, design specification and source code of program. Software configuration is required so that testers know what is to be expected and tested. Test configuration it is basically test plan and procedure. Test configuration is testing plan that is, the way how the testing will be conducted on the system. It specifies the test cases and their expected value. It also specifies if any tools for testing are to be used. Test cases are required to know what specific situations need to be tested. When tests are evaluated, test results are compared with actual results and if there is some error, then debugging is done to correct the error. Testing is a way to know about quality and reliability. Error rate that is the occurrence of errors is evaluated. This data can be used to predict the occurrence of errors in future. Test case design We know, test cases are integral part of testing. So we need to know more about test cases and how these test cases are designed. The most desired or obvious expectation from the test cases is that it should be able to find most errors with the least amount of time and effort. A software product can be tested in two ways. In first approach, only overall functioning of the product is tested. Inputs are given and outputs ate checked. This approach is called black box testing. It does not care about the internal functioning of the product. The other approach is called white box testing. Here the internal functioning of he product is tested. Each procedure is tested for its accuracy. It is more intensive than black box

testing. But for the overall product both these techniques are crucial. There should be sufficient number of tests in both categories to test the overall product. Basic methods of Testing Unit Testing:-Unit testing was conducted first. Different modules of the software were tested against the specifications produced during design of the modules. Verification of the code produced during the coding phase was done. Each module was tested separately. Unit testing focuses verification effort on the smallest unit of software design module. This uncovers errors within the boundary of a module. Unit testing is actually White box testing both the external things as well as the internal codes are tested. In testing, the interfaces are tested in order to ensure the proper flow of data in and out of the module. The boundary testing is done to ensure that the module keeps the limit of it. All independent paths are tested to ensure that all statements are tested at least once. At last the error path is also tested. Unit testing comprises the set of tests performed by an individual programmer prior to integration of the unit into a larger system. There are four categories of test that can be performed on a program unit Functional Unit Performance Unit Stress Unit Structure Unit Integration Testing:-One of the most difficult aspects of software development is the integration and testing of large untested subsystems. The integrated system frequently fails in significant and mysterious ways and its difficult to fix it. Integration testing exercises several units that have been combined to form a module, subsystem or system. Integration testing focuses on the interfaces between units, to make sure the units work together. The nature of this phase is certainly white box, as we must have knowledge of the units to recognize if we have been successful in focusing them together in the module. White box testing:-White box testing is performed to reveal problems with the internal structure of a program. This requires the tester to have detailed knowledge of the internal structure. A common goal of white box testing is to ensure a test case exercises every path through a program. A fundamental strength that all white box strategies share is that the entire software implementation is taken into account during testing, which facilitates error detection even when software specification is vague or incomplete. The effectiveness or thoroughness of white box testing is commonly expressed in terms of test or code coverage metrics, which measure the fraction of code exercised by test cases. Black Box Testing:-Black box tests are performed to access how well a program meets its requirements, looking for incorrect or missing functionality. Functional tests typically exercise code with valid or nearly valid input for which the expected output is known. This includes concepts such as boundary values.

HOME PAGE

REGISTER PAGE

ERROR MESSAGE PAGE(Wait for 24 hours)

ERROR MESSAGE PAGE(Register Again)

User Home Page

SONGS PAGE

DISPLAY TRACK_ ANONYMOUS USER PAGE

CONTACT US PAGE

ABOUT US PAGE

ADMIN LOGIN PAGE

ADMIN DASHBOARD PAGE

ADMIN UPLOAD SONG PAGE

USER STATUS AUTHORIZE PAGE

USER STATUS UNAUTHORIZE PAGE

CONCLUSION
The system has been developed for the given condition and is found working effectively. The developed system is flexible and changes whenever can be made easy. Using the facilities and functionalities of .Net, the software has been developed in a neat and simple manner, thereby reducing the operators work. The speed and accuracy are maintained in proper way. The user friendly nature of this software developed in .Net framework is very easy to work with both for the higher management as well as other employees with little knowledge of computer. The results obtained were fully satisfactory from the user point of view. The system was verified with valid as well as invalid data in each manner. The system is run with an insight into the necessary modifications that may require in the future. Hence the system can be maintained successfully without much network.

REFERENCES

Bibliography System Analysis and Design by Elias M. Awad

SQL SERVER by Microsoft Press

Websites

www.asp.net Online MSDN www.CodeProject.com

You might also like