Reecha Mittal Reecha Mittal 80802218036
Reecha Mittal Reecha Mittal 80802218036
Reecha Mittal Reecha Mittal 80802218036
COM
PROJECT REPORT
ON
80802218036
Training And
(Signature of student)
Name of Student : Reecha Mittal
Univ. Roll No.
: 80802218036
Certified that the above statement made by the student is correct to the best of our
knowledge and belief.
ACKNOWLEDGEMENT
Learning is an active process. We learn by doing. Only knowledge that is used remains in
your mind. College has been a place where we learnt the basics and made our foundations
strong. We started as laymen and under the valuable guidance of Lecturers at college we
are now in Third year in MCA. At this point of time, an exposure to the corporate world is
most important as a step ahead to applying the knowledge gained during our MCA to real
life situations. My training at AVAPTECH TRAINING AND DEVELOPMENT UNIT
proved to be really beneficial for me. The congenial atmosphere at work is the biggest
advantage!
It gives us immense pleasure to have an opportunity to express our heartiest gratitude to
lecturers Mr.Valjeet Patial and Technical Tutor at AVAPTECH
DEVELOPMENT
TRAINING AND
HEALTH INDIA.COM.
The cooperation of our trainer Mr.Valjeet Patial was excellent. It was the coordinated
efforts of his only that the project was able to complete well within the time.
I am also thankful to the Institute for lending us the support and providing us with all the
required facilities.
Reecha Mittal
3|Page
TABLE OF CONTENTS
Introduction
Software Methodology
SDLC
Feasibility Study
System Analysis
System Design
Data Flow Diagrams(DFD)
ER Diagrams
Database Description
System Testing
System Objective
SnapShot
Conclusion
Future Scope
References
4|Page
INTRODUCTION
5|Page
the
Engineering /MCA
has
an
excellent
infrastructure
with Air-conditioned
labs,
and
classrooms and fully equipped library. The lab extended to the trainees is
unparalleled with every trainee having an independent system access for the
entire training period.
In Short , AvapTech
Establish itself as an excellence for imparting education and training to generate quality
manpower in areas of information Electronics and Communication Technology (ICET).
Facilitate education and training institutes in the non-formal sector.
Develop a mechanism for dynamic revision of course curriculum and development of the
learning materials in the textbook, CD-ROM and web-based form.
Impact continuing education/refresher training and corporate training to engineering
graduates, working professionals and others.
Develop and implement new schemes of courses in emerging areas as required by
Industries and others.
Undertake develop projects and provide services in IT and related areas.
7|Page
8|Page
To consider system and data requirements throughout the entire life of the
system.
To foster realistic expectations of what the system will and will not
provide.
9|Page
Phases of SDLC
1.
Development
phase begins.
2.
3.
resources,
activities,
schedules,
tools
and
reviews
are
defined.
10 | P a g e
Design Phase: The physical characteristics of the system are designed during
this phase. The operating environment is established, major subsystems and
their inputs and outputs are defined and processes are allocated to the
resources. Everything requiring user input or approval must be documented and
reviewed by the user. The physical characteristics of the system are specified
and a detailed design is prepared. Subsystems are identified during design are
used to create a detailed structure of the system. Each subsystem is partitioned
into one or more design units or modules. Detailed logic specifications are
prepared for each software module.
6.
7.
Integration and Test Phase: The various components of the system are
integrated and systematically tested. The user tests the system to ensure that
the
functional
requirements, as
defined
in
the
functional
requirements
9.
and
needed
system
modifications
are
incorporated.
The
12 | P a g e
PLATFORM USED
Windows XP Professional
Windows (Operating System)
a)
Window derived from its name from the on-screen WINDOWS that it used
to display informations.
b)
c)
FRONT-END USED
PHP
Introduction to PHP
PHP is a scripting language originally designed for producing dynamic web pages. It has
evolved to include a command line interface capability and can be used in standalone
graphical applications.
While PHP was originally created by Rasmus Lerdorf in 1995, the main implementation of
PHP is now produced by The PHP Group and serves as the de facto standard for PHP as
there
is
no
formal
specification.
C:\Documents
and
History
14 | P a g e
Usage
PHP is a general-purpose scripting language that is especially suited for web development.
PHP generally runs on a web server, taking PHP code as its input and creating web pages
as output. It can also be used for command-line scripting and client-side GUI applications.
PHP can be deployed on most web servers, many operating systems and platforms, and can
be used with many relational database management systems. It is available free of charge,
and the PHP Group provides the complete source code for users to build, customize and
extend for their own use.
PHP primarily acts as a filter, taking input from a file or stream containing text and/or PHP
instructions and outputs another stream of data; most commonly the output will be HTML.
It can automatically detect the language of the user From PHP 4, the PHP parser compiles
input to produce byte code for processing by the Zend Engine, giving improved
performance over its interpreter predecessor.
Originally designed to create dynamic web pages, PHP's principal focus is server-side
scripting, and it is similar to other server-side scripting languages that provide dynamic
content from a web server to a client, such as Microsoft's Active Server Pages, Sun
16 | P a g e
Facebook, Wikipedia
Speed optimization
As with many scripting languages, PHP scripts are normally kept as human-readable
source code, even on production web servers. [41] In this case, PHP scripts will be compiled
at runtime by the PHP engine, which increases their execution time. PHP scripts are able to
be compiled before runtime using PHP compilers as with other programming languages
such as C (the language PHP and its extensions are written in).
Code optimizers aim to reduce the computational complexity of the compiled code by
reducing its size and making other changes that can reduce the execution time with the
overall goal of improving performance. The nature of the PHP compiler is such that there
are often opportunities for code optimization, and an example of a code optimizer is the
Zend Optimizer PHP extension.
Another approach for reducing overhead for high load PHP servers is using PHP
accelerators. These can offer significant performance gains by caching the compiled form
of a PHP script in shared memory to avoid the overhead of parsing and compiling the code
every time the script runs.
17 | P a g e
Syntax
Main article: PHP syntax and semantics
18 | P a g e
19 | P a g e
Functions
PHP has hundreds of base functions and thousands more via extensions. These functions
are well documented on the PHP site, however, the built-in library has a wide variety of
naming conventions and inconsistencies. PHP currently has no functions for thread
programming.
20 | P a g e
Resources
PHP includes free and open source libraries with the core build. PHP is a fundamentally
Internet-aware system with modules built in for accessing FTP servers, many database
servers, embedded SQL libraries such as embedded PostgreSQL, MySQL and SQLite,
21 | P a g e
has
traditionally
used
features
such
as
"magic_quotes_gpc"
and
"magic_quotes_runtime" which attempt to escape apostrophes (') and quotes (") in strings
in the assumption that they will be used in databases, to prevent SQL injection attacks.
This leads to confusion over which data is escaped and which is not, and to problems when
data is not in fact used as input to a database and when the escaping used is not completely
correct. To make code portable between servers which do and do not use magic quotes,
developers can preface their code with a script to reverse the effect of magic quotes when
it is applied.
PHP allows developers to write extensions in C to add functionality to the PHP language.
These can then be compiled into PHP or loaded dynamically at runtime. Extensions have
been written to add support for the Windows API, process management on Unix-like
operating systems, multibyte strings (Unicode), cURL, and several popular compression
formats. Some more unusual features include integration with Internet Relay Chat,
dynamic generation of images and Adobe Flash content, and even speech synthesis. The
PHP Extension Community Library (PECL) project is a repository for extensions to the
PHP language.
Free editors
Windows
CodeLobster
22 | P a g e
Programmer's Notepad
Linux
Geany
gedit
gPHPEdit
Quanta Plus - Supports any protocol that is supported by KDE. (FTP, SSH...)
Mac OS X
Smultron
Multiple OS
Aptana
Emacs - Advanced text editor. The nXhtml addon has special support for PHP (and
other template languages).
nano
NetBeans 6.5
pico
PHPanywhere.net
Commercial Editors
Coda
EmEditor
skEdit
SlickEdit
24 | P a g e
25 | P a g e
BACK-END USED
MySQL
Introduction to MySQL Server
MySQL is a relational database management system (RDBMS) which has more than 11
million installations. The program runs as a server providing multi-user access to a number
of databases.s
"MySQL" is officially pronounced /maskjul/ (My S Q L), not "My sequel" /ma
sikwl/. This adheres to the official ANSI pronunciation; SEQUEL was an earlier IBM
database language, a predecessor to the SQL language. However, the developers did not
take issue with the pronunciation "My sequel" or other local variations.
The project's source code is available under terms of the GNU General Public License, as
well as under a variety of proprietary agreements. MySQL is owned and sponsored by a
single for-profit firm, the Swedish company MySQL AB, now a subsidiary of Sun
26 | P a g e
Uses
MySQL is popular for web applications and acts as the database component of the LAMP
platform. Its popularity for use with web applications is closely tied to the popularity of
PHP, which is often combined with MySQL. Several high-traffic web sites (including
Flicker, Face book, Wikipedia, Google (not for searching), Nokia and YouTube) use
MySQL for its data storage and logging of user data.
MySQL is written in C and C++. The SQL parser uses yacc and a home-brewed lexer,
sql_lex.cc
MySQL works on many different system platforms, including AIX, BSDi, FreeBSD, HPUX, i5/OS, Linux, Mac OS X, NetBSD, Novell NetWare, OpenBSD, OpenSolaris,
eComStation , OS/2 Warp, QNX, IRIX, Solaris, Symbian, SunOS, SCO OpenServer, SCO
UnixWare, Sanos, Tru64 and Microsoft Windows. A port of MySQL to OpenVMS is also
available.
Libraries for accessing MySQL databases are available in all major programming
languages with language-specific APIs. In addition, an ODBC interface called MyODBC
allows additional programming languages that support the ODBC interface to
communicate with a MySQL database, such as ASP or ColdFusion. The MySQL server
and official libraries are mostly implemented in ANSI C/ANSI C++.
27 | P a g e
Features
As of April 2009, MySQL offers MySQL 5.1 in two different variants: the MySQL
Community Server and Enterprise Server.
They have a common code base and include the following features:
Cross-platform support
Stored procedures
Triggers
Cursors
Updatable Views
INFORMATION_SCHEMA
Strict mode
Independent storage engines (MyISAM for read speed, InnoDB for transactions
and referential integrity, MySQL Archive for storing historical data in little space)
Transactions with the InnoDB, BDB and Cluster storage engines; savepoints with
InnoDB
28 | P a g e
SSL support
Query caching
Replication with one master per slave, many slaves per master, no automatic
support for multiple masters per slave.
Partial Unicode support (UTF-8 sequences longer than 3 bytes are not supported;
UCS-2 encoded strings are also limited to the BMP)
Distinguishing features
The following features are implemented by MySQL but not by some other RDBMS
software:
Multiple storage engines, allowing you to choose the one that is most effective for
each table in the application (in MySQL 5.0, storage engines must be compiled in;
in MySQL 5.1, storage engines can be dynamically loaded at run time):
o
Partner-developed
storage
engines
(InnoDB,
solidDB,
NitroEDB,
BrightHouse)
o
Revision Engine)
o
There are 3 types of MySQL Server Compilations for Enterprise and Community users:
Standard: The MySQL-Standard binaries are recommended for most users, and
include the InnoDB storage engine.
Max: (not MaxDB, which is a cooperation with SAP AG) is mysqld-max Extended
MySQL Server. The MySQL-Max binaries include additional features that may not
have been as extensively tested or are not required for general usage.
The MySQL-Debug binaries have been compiled with extra debug information,
and are not intended for production use, because the included debugging code may
cause reduced performance.
Beginning with MySQL 5.1, MySQL AB has stopped providing these different package
variants. There will only be one MySQL server package, which includes a mysqld binary
with all functionality and storage engines enabled. Instead of providing a separate debug
package, a server binary with extended debugging information is also included in the
standard package.
History
Milestones in MySQL development include:
Version 3.23: beta from June 2000, production release January 2001
Version 4.0: beta from August 2002, production release March 2003 (unions)
Version 4.1: beta from June 2004, production release October 2004 (R-trees and
B-trees, subqueries, prepared statements)
Version 5.0: beta from March 2005, production release October 2005 (cursors,
stored procedures, triggers, views, XA transactions)
Future releases
Support for parallelization is also part of the roadmap for future versions.
Support for supplementary Unicode characters, beyond the 65,536 characters of the Basic
Multilingual Plane (BMP) is announced for MySQL 6.0.
Foreign key support for all storage engines is targeted for release in MySQL 6.1 (although
it has been present since version 3.23.44 for InnoDB).
A new storage engine is also in the works, called Falcon. A preview of Falcon is already
available on MySQL's website.
31 | P a g e
Criticism
MySQL recently (2008) released version 5.1 with 20 known crashing and wrong result
bugs in addition to the 35 present in version 5.0. Critical bugs sometimes do not get fixed
for long periods of time. An example is a bug with status critical existing since 2003.
32 | P a g e
Competition
In October 2005, Oracle Corporation acquired Innobase OY, the Finnish company that
developed the InnoDB storage engine that allows MySQL to provide such functionality as
transactions and foreign keys. A press release by Oracle that was issued after the
acquisition, mentioned that the contracts that make the company's software available to
MySQL AB would be due for renewal (and presumably renegotiation) some time in 2006.
During the MySQL Users Conference in April 2006, MySQL issued a press release which
confirmed that MySQL and Innobase OY agreed to a multi-year extension of their
licensing agreement.
In February 2006, Oracle Corporation acquired Sleepycat Software, makers of the
Berkeley DB, a database engine onto which another MySQL storage engine was built.
In April 2009, Oracle Corporation entered into an agreement to purchase Sun
Microsystems, current owners of the MySQL intellectual property. Although the deal was
approved by Sun's board of directors, it has not yet been finalized.
33 | P a g e
34 | P a g e
SYSTEM STUDY
FEASIBILITY STUDY
Feasibility studies aim to objectively and rationally uncover the strengths and weaknesses
of the existing business or proposed venture, opportunities and threats as presented by the
environment, the resources required to carry through, and ultimately the prospects for
success
Economic Feasibility : Economic analysis is the most frequently used method for
evaluating
Technical Feasibility : The Technical Feasibility Study assesses the details of how
you will
solves
the
problems,
and
takes
and
how
advantage
it
of
the
satisfies
the
Economic Analysis :
Economic analysis is the most frequently used method for evaluating the
effectiveness of a new
costs,
then
the
must accurately
follows:
1. Development costs; and
2. Operating costs.
This is an analysis of the costs to be incurred in the system and the benefits
derivable out
of the system
Technical Analysis :
36 | P a g e
,and predictability .
Technical analysis begins with an assessment of the technical viability of the proposed
system.
What technologies are required to accomplished system function and performance ?
What new materials, methods, algorithms or processes are required and what is their
development risk ?
How will these obtained from technical analysis from the basis for another go/no-go
decision
on the test system ?
Front-End : PHP
Back-End : MYSQL as Back End
37 | P a g e
SYSTEM ANALYSIS
38 | P a g e
INTRODUCTION
System analysis is the process of studying the business processors and procedures,
generally reffered to as business systems ,to see how they can operate and whether
improvement is needed.
This may involve examining data movement and storage, machines and technology used in
the system, programs that control the machines, people providing inputs, doing the
processing and receiving the outputs.
Investigation Phase :
The investigation phase is also known as the fact-finding stage or the analysis of the
current system. This
is a detailed study conducted with the purpose of wanting to fully understand the existing
system and to identity the basic information requirements. Various techniques may be used
in fact-finding and all fact obtained must be recorded.
A through investigation was done in every effected aspect when determining whether the
purposed system
Is feasible enough to be implemented.
The Constraints and limitations wihin a system are the drawbacks that occur during the
implementation of the system. These limitations and constraints can crop up in almost
every system . The most important fact is to find a way to overcome these problems.
Design
39 | P a g e
Code Generation
Test
Those are required to build and verify the software . Each activity transforms information
in manner that ultimately results in validated computer software .
The design task produces a data design, an architectural design, an interface design and
component design.
40 | P a g e
SYSTEM DESIGN
41 | P a g e
SYSTEM DESIGN
System design is the process of developing specification for a candidate system that meet
the criteria established in the system analysis .The plan of the project provides a review of
the different modules in which the project is divided .The modules are designed and tested
individually and then merged together to form an integrated project.
Activity
Timeline
System Design
Start
Develop
System
Requirements
Document
Finish
System
Design
Planning
System
Design
Review
Instrument
Team
Doc's
W.M.K.O.
System
Requirements
Document
System
Design
Proposal
Systems
Engineering
Management
Plan
System
Design
Manual
System
Design Report
System
Design
Review Report
Instrument
Team
Decision
Points
W.M.K.O.
Proceed with
System
Definition
Commit to
System
Design
Proceed to
Preliminary
Design
42 | P a g e
There are four major documentation products that result from the system design phase:
1. System Design Proposal
The System Design Proposal establishes the scope of work, WBS and cost estimate for
the system design phase.
2. Systems Engineering Management Plan
The Systems Engineering Management Plan (SEMP) describes the management
processes that will be used throughout the new instrument development project.
The SEMP includes the following:
Describes the functional requirements and relates them to the system requirements
44 | P a g e
45 | P a g e
The data flow diagram is also known as bubble chart has the purpose of clarifying
system requirements and identifying major transformations that will become programs in
system design so it is the starting point of specification down to the lowest level of detail .
A DFDs consists of a series if bubbles joined by lines. The bubbles represent data
transformation and the lines represent the data flow in the system.
DFD SYMBOLS
46 | P a g e
SODHI
HEALTH
INDIA
REQUEST
REQUEST
RESPONSE
RESPONSE
CUSTOMER
ADMINISTRATOR
47 | P a g e
DATABASE Description
E-R DIAGRAM
48 | P a g e
Tables in database
tbHeadline
s
tbAchiviev
ements
tbFacilities
tbuser
tbOther
Clinicdb
49 | P a g e
Upass
Uname
Admin
50 | P a g e
tbuser
Uname
Upass
tbuser
51 | P a g e
System Testing
52 | P a g e
in phase we went to test the code we wrote. Whether the results gave
desired output on given inputs? Whether it was ready to be installed on the users
computer or some more modifications were needed?
53 | P a g e
A good test case is one that has high probability of finding error, if it
exists.
The software more or less confirms to the quality and reliable standards.
Define test cases to verify the requirements against the SRS document.
Define the test cases to verify the validations and constraints specified in the
design document.
Inspect results The actual results will be inspected with the expected results.
54 | P a g e
Client Needs
Acceptance Testing
Requirements
System Testing
Design
Integration Testing
Code
Unit Testing
55 | P a g e
Levels Of Testing
1. Unit Testing
This is first level of Testing. In this, different modules are tested against the
specification produced during design for the modules. It is essentially for
verification of the code produced during the coding phase, and goal is to test
the internal logic of the modules. It is especially done by the programmer of
the module. A module considered for integration is used by others only after it
has been tested satisfactorily. Due to this association the coding phase is
frequently called coding and unit testing. Structural testing is used mostly at
the unit testing level.
2. Integration Testing
This second level of
subsystems, which are then tested. The goal is to check if modules can be
integrated properly. The emphasis is on testing interfaces between modules. This
testing activity can be considered testing the design. The integration testing is
done to see whether the integration effects any working by giving different
combinations of input.
3. System Testing
In this type of testing, entire software system is tested. The reference document
for this process is the requirements document, and the goal is to se if the
software meets its requirements. This is essentially a validation exercise, and in
many situations it is the only validation activity.
4 Acceptance Testing
This is performed with realistic data of the client to demonstrate that the
software is
process
of
finding
determine
whether the objectives are met and the user requirements are satisfied.
These level of testing are performed when a system is being built from the
components
that
have been
coded. There
is
another
level of
testing, called
features to be added.
that the modification has not any undesired side effect of making
some of the earlier services faulty. Besides ensuring the desired behavior of the
new services, testing has to
maintained, along with the output produced by the old system. These
executed
again
on
the
modified
system
and
its
output
before on these test cases. This is a major task when modifications are to be made
to existing systems.
57 | P a g e
Methods Of Testing
THE BOX APPROACH
Black Box Testing:
Black Box Testing treats a software as a black box- without any knowledge of
internal implementation. This testing method considers module as a single unit and
checks the unit at interface and communication with other modules rather getting
into details at statement level. The module will be treated as a block that will take
some input and generate output. Output for a given set of input combinations are
forwarded to other modules.
Black Box test are designed to uncover functions test requirement without regard
to the internal workings of a program. Black Box testing techniques focus on the
information domain of the software, deriving test cases by portioning the input and
output domain of a program in a manner that provides through test coverage. The
Black Box test is used to demonstrate that software functions are operational, that
input is properly produced, and that the integrity of external information is
maintained. A Black Box test examines some fundamental aspect of a system with
little or no regard for the internal logical structure of the software.
Graph Based testing methods explore the relationship and behavior between
program objects. Equivalence partitioning divides the input classes
of data are
likely to exercise specific software function. Boundary values analysis probes the
programs ability to handle data at the limits of acceptability.
White Box Testing
White Box Testing also known as Glass Box Testing focuses on the internal data
structures and algorithms including the code that implement these. It mainly
emphasis on the program control structure. Test cases are derived to ensure that all
statement in the program control structure and all statement in the program has
58 | P a g e
59 | P a g e
TESTING MECHANISM
Testing is vital to the success of the system. System testing makes a logical
assumption that if all the parts of the system are correct, the goal will be
successfully achieved. Effective testing early in the process translates directly
into long-term cost savings from a reduced number of errors. Another Reason for
system testing is its utility as a user-oriented vehicle before implementation. The
best program is worthless if it doesnt meet user needs.
After developing a test plan, system testing begins by testing program modules
separately, followed by testing by bundled modules as a unit.
61 | P a g e
Head Trainer
9815440929,9888788455
valijeetpatial@gmail.com
62 | P a g e
Maintenance of all records of all type of important information like about various
facilities, headlines.
63 | P a g e
SNAPSHOTS
64 | P a g e
For the information regarding the hospital facility the user has to click one of
the link of these:
65 | P a g e
66 | P a g e
67 | P a g e
Administrator
Login Page:
68 | P a g e
Admin Panel:
69 | P a g e
facilities:
70 | P a g e
Health headlines:
71 | P a g e
72 | P a g e
73 | P a g e
74 | P a g e
Change Password:
75 | P a g e
SYSTEM DATABASE
SUMMARY
SNO
TABLE NAME
DETAILS
1.
Tbuser
details of
Password
Username
and
2.
Tbachievements
3.
Tbothers
4.
Tbfacilities
5.
Tbheadlines
77 | P a g e
TABLE tbfacilities
78 | P a g e
TABLE tbheadlines
79 | P a g e
80 | P a g e
Detail of tbfacilities
81 | P a g e
Detail of tbother:
82 | P a g e
83 | P a g e
The project was started keeping in mind two aspects. Firstly the project fulfills the users
requirement, Secondly it could be used as a utility.
The project undertaken has been successful in covering both the aspects.
Although there is always a scope for improvement, this project has the feature for up
gradation and can be easily up grated to the changing requirements as when required. It
was a small effort from our team of two students to make something exactly of the
requirements or the property dealers.
This project would not have been possible without the support and guidance of the
institution, teachers and the trainer who helped us in every way to complete it in time.
Hope this project paves the way for further such efforts.
84 | P a g e
The SODHI HEALTH INDIA.COM Project is developed while keeping in mind the
necessities of the information of health. So we have tried to bring all possible
developments into our Project. But there is always a good scope for improving the project.
There can be many improvements that can be made but they are all dependent on the
future requirements. There is no need of any improvements to be done at this junction of
time.
85 | P a g e
REFERENCES
Books Referred
Websites Referred
http://www.php.net
http://www.w3schools.com
http://www.google.com
http://www.wikipedia.com
86 | P a g e