Top Banner

of 69

Final Music Report

Apr 05, 2018

Download

Documents

seema ghai
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
  • 8/2/2019 Final Music Report

    1/69

    P R O J E C T R E P O R T(MCA-601(N2))

    ON

    MUSIC BEATS

    Submitted to Punjab Technical University, Jalandhar

    In partial fulfillment of the requirements

    For the degree of

    MASTER OF COMPUTER APPLICATIONS

    (Session 2009-2012)

    Submitted To: - SubmittedBy:-Mr.Amandeep S. Patti Isha Johar(Head of Computer Dept.) Savleen Kaur

    PrabhjotKaur

    Rahul Chaurasia

    Punjab Col lege o f Technical Educat ion

  • 8/2/2019 Final Music Report

    2/69

    Baddowal (Ludhiana)

    CERTIFICATE

    This is to certify that this project entitled Music Beats submitted by Savleen Kaur, IshaJohar, Prabhjot Kaur, Rahul Chaurasia of MCA final year (session 2009-2012) developed

    by them during the industrial training at BETASOFT SYSTEMS, PANCHKULA.

    We also certify that this project fulfills the requirements that are necessary

    in the project submitted by the student of the Industrial training. We find that the abovementioned project is suitable in the partial fulfillments of the requirement for the award of

    degree of Master of Computer Application.

    Mr. Vishal Sood

    Internal Project Guide

    PCTE, Ludhiana

  • 8/2/2019 Final Music Report

    3/69

    DECLARATION

    I hereby declare that this project entitled MUSIC BEATS assigned to me during our 6

    month industrial project training at BETASOFT SYSTEMS,PANCHKULA has been made

    by our team comprising of four members.

    During the development of this project emphasis was given on the client

    requirement. As I am submitting this project for the partial fulfillments of the requirementfor the award of degree of Master of Computer Application, I wish to declare that this

    project is developed by me and my team-mates and none of its component is copied from

    anywhere.

    Isha Johar(94972131808)

    Savleen Kaur(94972131847)

    Prabhjot Kaur(94972131832)Rahul Chaurasia(94972131834)

    MCA 3rd

  • 8/2/2019 Final Music Report

    4/69

    ABSTRACT

    Music Beats is a computerized online facility to the users who search for the latest albums

    and songs thus achieving high performance, accuracy, reliability and any category of song

    can be searched via this website.

    In this system, there is a registration process for the User. The Administrator of the site

    verifies the Category of user after his registration and if satisfied, he will authenticate the

    user.

    This program serves the needs of people in Searching as well as Downloading songs.

    There are mainly three categories for searching criteria .ie. Hindi,Punjabi and English.

    Music Beats is a website that also provide plan facility to the user.Initially he will treated

    as a free user who has a download limit of downloading 10 songs.There is another plan

    which is silver plan which provides the download limit of 50 songs and last one is the goldplan which provides a download limit of 100 songs

    The concept of Master Pages and Content Pages is used.

    Web User Controls are used to enhance Reusability.

    Security is implemented.

    State Management is used.

  • 8/2/2019 Final Music Report

    5/69

    ACKNOWLEDGEMENT

    The satisfaction that accompanies that the successful completion of any task would be

    incomplete without the mention of people whose ceaseless cooperation made it possible,whose constant guidance and encouragement crown all efforts with success. Our Project

    Report is in culmination of many forces that has been working together in unison. We are

    therefore deeply indebted to all those without whose support, it would have beenimpossible to achieve this stage of work.

    It is our distinct honor and indeed a great privilege to have worked under the dynamicleadership and able guidance of my mentor Mr. Anoop Dhiman for his whole hearted

    help, kind inspiration, keen interest, constructive criticism and most valuable suggestions in

    this part of the project report.

    We are profoundly grateful to the staff members of BETASOFTSYSTEMS(PANCHKULA) for their assistance in providing us the relevant literature.

    We would like to express my deepest sense of gratitude and heartfelt thanks to all the Staff

    members of PCTE, who remained the source of inspiration for us to accomplish the

    project well in time, but also throughout my MCA course.

    Finally words fail us to express my thanks to my parents and friends whose constant

    motivation I would never have been able to complete this project. I am also very thankful to

    our respective Director Dr.Mangla who gave us an opportunity to present this project.

    PREFACE

  • 8/2/2019 Final Music Report

    6/69

    This project has been composed with the aim of covering a part of MCAsyllabus as prescribed by PUNJAB TECHNICAL UNIVERSITY,JALANDHAR. A lot of

    effort has been made to make this project report interesting and a learning experience for

    the leader. The report has been explained with the help of diagrams and figures. The subjectmatter has been compiled in a simple, illustrative and lucid manner.

    During my M.C.A. Programme, as a part of it, I joined BETASOFTSYSTEMS(PANCHKULA) , as a vocational trainee in VI Semester. My assignment

    could be defined as development of software Music Beats. Through this system it was

    proposed to computerize the various standards. Seeing the friendly interface provided by

    ASP.NET Framework (4.0) as the front end and SQL Server 2008 as the back end.

    This report briefly describes the systematic approach adopted to develop the system by

    efficiently using the latest facilities. The report follows the sequential actions of thedifferent phases in the system development life cycle.

    In the beginning I have provided an abstract into the general features of the project. As Iproceed I delve into more intricate details regarding the working of the project.

    INDEX

    S. No. TABLE OF CONTENTS Page No.

  • 8/2/2019 Final Music Report

    7/69

    1 Introduction of Company

    2 Introduction of Project

    -Statement about the problem

    -Overview of the Project-Modules of Project

    -Objectives of Project3 System Analysis

    4 Feasibility Study

    5 Project Plan

    6 System Design-Data Flow Diagram

    7Three-Tier Web Application Development

    8 Technology Used

    9 Database Tables10 Implementation and Testing

    11 Screen Layouts of Project

    12 Conclusion and Future Work

    13 References

  • 8/2/2019 Final Music Report

    8/69

    COMPANY PROFILE

    Project Undertaken: Music BeatsEstimated duration: Approx. 5 months.

    Name of Organization & Address: BETASOFT SYSTEMS

    S.C.O.398,2ND Floor,Sector 20,Panchkula-134 109 Haryana(India)

    TEL: +91-172-4677163

    External Supervisor Name: Mr. Anoop Dhiman

    External Supervisor Designation: Training Head

    Nature of Project/Job assigned: WEB SITE

    Introduction to Company

    Betasoft Systems is a global IT Services and Consulting Company offering software, web

    solutions to client all over the globe. Betasoft Systems was founded to develop innovative

    productivity software for the world market. Betasoft array of Services and Support include

    Networking,Administration,ERP and DBA Services.

  • 8/2/2019 Final Music Report

    9/69

    Services and Solutions:-

    Technology Staffing: Hiring well qualified, experienced people is good for

    business. Matching our workforce needs with the best talent in the marketplace is the

    cornerstone of our business. Whether you need a single resource, a team or a steady

    pipeline of IT professionals, we can meet the most diverse workforce needs with people

    committed to your success. They will respond on command with proactive, consultative

    and collaborative solutions designed to meet the needs of your enterprise. They will

    work with you to deliver the right team of BSS contractors.

    Outsourcing:-

    Application Services: They offer the full range of IT services from strategic IT

    consulting to systems integration to outsourcing. In times of economic uncertainty, Beta

    Soft Systems application outsourcing approach can help you to effectively reduce costs

    while industrializing your capabilities for the long haul.

    Testing Services: Expertise on both the business and technical sides of testing has

    enabled us to create innovative approaches that deliver accelerated results. They use

    an established testing methodology and employ a wide range of industry-standard

    testing tools that leverage established methodologies to provide your organization with

    superior software quality, enhanced business readiness and real competitive

    advantage. They work hard to encourage a spirit of innovation in all of our testing

    professionals and to share continually what we learn with customers.

    Project Management

    Creates and executes project work plans and revises as appropriate to meet

    changing needs and requirements.

    Identifies resources needed and assigns individual responsibilities.

    Manages day-to-day operational aspects of a project and scope.

    Reviews deliverables prepared by team before passing to client.

    Effectively applies our methodology and enforces project standards.

    Prepares for engagement reviews and quality assurance procedures.

    Minimizes our exposure and risk on project.

    Ensures project documents are complete, current, and stored appropriately.

  • 8/2/2019 Final Music Report

    10/69

    Betasoft Technology domain contains following technologies:

    .net platform based languages

    P.H.P

    Java based technologies

    Designing Suites 4-G Languages

    Services provided by Betasoft Softwares

    Software development

    Web development

    Consultancy

    Search engine optimization

    Independent software testing

    Hardware and network solutions

    Business Analysts:-Analysis and Solution Definition:-

    Quickly understands the business issues and data challenges of client's

    organization and industry.

    Identifies client organization's strengths and weaknesses and suggests areas of

    improvement.

    Reviews and edits requirements, specifications, business processes and

    recommendations related to proposed solution.

    Develops functional specifications and system design specifications for client

    engagements.

    Technical Recommendation and Testing:-

    Leads testing efforts.

    Ensures issues are identified, tracked, reported on and resolved in a timely

    manner.

    Communicates needed changes to development team.

  • 8/2/2019 Final Music Report

    11/69

    Project Execution:-

    Assists in enforcement of project deadlines and schedules.

    Takes input from supervisor and appropriately and accurately applies

    comments/feedback.

    Communicates and applies project standards.

    Manages resources in accordance with project schedule.

    Quality Assurance Testing:-

    Effective communication and report writing skills.

    Good leadership capabilities to lead projects to successful completion.

    Basic knowledge of applicable software to infer statistical data.

    Familiarity with the tools, concepts and methodologies of quality management.

    Software Developers:-

    Requirements gathering, synthesis and review.

    Work scoping and planning.

    Source code control.

    Producing technical and non-technical documentation.

  • 8/2/2019 Final Music Report

    12/69

    Vision and Values

    Betasoft Systems Inc-A leader in technology execution,IT and Communication Staffingservices.Their promise is providing world class technology execution delivered with

    customer service thatss second to none.Their mission is to provide end to end business for

    a dynamic environment where business and technology converge.

    1. Innovation - Technological innovation was the genesis of Betasoft and remains a

    true competitive advantage, for their customers. Today, as industry leader they not onlyrespond to the needs of theirr customers but also create opportunities for them.

    2. Performance - Their networks and systems are the fastest, most secure in the

    world.To their customers, this means reliability and dependability.

    3. Integrity - They set standards of performance and integrity above and beyond what

    is expected, and have a compliance program that demonstrates Betasofts commitment to

    the highest standards of ethics and integrity in business.

    4. Respect They believe in giving respect to their clients by serving them in a

    satisfied manner.

    Betasoft works closely with communities and government leaders around the world. As aresult, they are keenly aware of social needs and the tremendous impact that they can

    provide as a committed corporate neighbour.They also contribute their own time and

    resources to community.

    Betasoft Systems was started keeping in mind to provide the world class solutions toworld.Here they emphasize on "Quality" rather then "Quantity". Acritical core value of

    their firm is to treat their clients and candidates with the highest level of personal

    respect.this allows them to be confident in their ability to deliver the best service,which

    through search has been recognised as outstanding within the industry.With thus strong

    dedication to those whom they serve,is easy for them to see how they consistently prove

    that great people really prove great results.

    Being in IT business for over many years now, Betasoft Systems has a strong team of

    skilled experienced IT experts. Our clientele starts from small business companies to large

    enterprises who realize that they need a professional internet solution to generate revenuestreams, establish communication channels or streamline business operations.

    One-step Internet Solutions Vendor

    Whether you need an appealing website design or complex multi-tier internet system

    development or custom programming using latest technologies (e.g. Web 2.0) Betasoft

    Systems has the required experience and expertise to do it all.

  • 8/2/2019 Final Music Report

    13/69

    Full-Cycle Development Services

    At Betasoft Systems, they support a full-cycle development process from requirements

    definition and specification, architecture design, coding, testing and validation to product

    maintenance and support. Depending on the specific requirements their experts will takethe client step by step through each phase of solution development providing their client

    with a sound advice on technology and application options.

    Experience and Expertise

    Betasoft Systems have completed hundreds of projects in different domains and also built

    a large database of knowledge that enables us to deliver the right solutions that addressthe needs of clients.

    Betasoft Systems Quality Initiatives are based on a 3Q approach: Quality personnel,

    Quality Process and Quality Communications. Each project at Betasoft Systems is underconstant control of a dedicated quality assurance department that monitors project activities

    and results at each development phase.

    Web Designing & Web Development

    We consider following aspects of a web design:-* Appealing and professional style

    * Consistent overall layout

    * Dependable corporate identity* Usability

    INTRODUCTION OF PROJECT

    STATEMENT ABOUT THE PROBLEM

    In present scenario, there are a lot of problems especially with the security and the mp3 files

    which are available online are corrupted and harm our systemIt.So in order to provide safeand better servcie to the people we created this website.

    People have to search for various kinds of songs in various languages which are available in

    different websites but we are providing three different languages song under one website.By

    which it will convenient for the user to search over the internet. A discussion with myproject guide produced enthusiastic response and I decided to take the challenge. In the

    present system all the work is computerized and proper security is provided for the system.

  • 8/2/2019 Final Music Report

    14/69

    OVERVIEW OF PROJECT

    Music Beats is a website that will integrate all facts related to a song website, including

    uploading,authorising and unauthorising the user,searching,check log of multiple

    users,uploading of song files,downloading,play music online.This will integrate allfunctions into a single integrated software program.

    In this system, there is a registration process for the User. User can be anonymous user

    and authorised user.If the user is an anonnymous user then he can only view the website but

    cannot download anything.If the user is an authorised user then he has the facility of

    downloading mp3 files.The Administrator of the site verifies the user after his registrationand if satisfied, the user will be able to take full tour of the website..

    Once the User have registered themselves, they can access the various services of thissystem. Different registered users can search and download songs unlimited.

    There are mailny two panels:Admin Panel

    User Panel

    In the Admin Panel administrator can upload songs.Administrator can give authorisation to

    the user or delete any user if admin founds any any mischevious data in the user

    profile.Admin canalso view lof file of multiple users. Admin can also search songs to checkwhether he has uploaded particular song or not.

    In the User Panel there are two categories of user .ie. Anonymous user and RegisteredUser.If user is an Anonymous User then he can only search songs and play his

    selection.But he cannot download.And If the user is a Registered User then the user can

    download unlimited songs according to his choice.Admin can update, delete and insert theappropriate information according to requirements.User can also edit his or her profile, can

    also change picture,change password as well as his other personal details.User can also

    make an appeal by going to the Contact Us page and on that page he can give his or her

    suggestions or feedback which will be send to the admin.Like he can ask for uploadingparticular movie song.By this page website demand can be improved.

    Music Beats will integrate all functions into a single integrated software program that will

    run on a single database so that the various modules can work

    Music Beats is module based.But Modules work under two different panels.Under Admin

    Panel activities of a particular functional area i.e. module will cover all Uploading of mp3file activities in the website.Under User Panel activities of module will cover downloading

    of mp3 files and playing them online.In Music Beats all the modules will be linked to each

    other.

  • 8/2/2019 Final Music Report

    15/69

    Music Beats Includes:-

    o The concept of Master Pages and Content Pages is used.

    o Web User Controls are used to enhance Reusability.

    o Provision of Emailing is also provided

    o Validation checks are implemented;o Security is provided.

    o State Management is used.

    MODULES DESCRIPTION

    Music Beats includes the following modules:-

    Under Admin Panel-

    Upload Songs

    Authorising User

    Log

    Search

    Deleting User

    Uploading Songs:-It includes uploading various categories of song like hindi,punjabi and

    english.On the click of the button uploading can be done.Admin can upload latest songs

    and latest albums of varous categories. Music Beats will update the songs list time to time.

    It will provide security to the user and the user will be protected from various malwares.

    Authorising User:- Administrator can upload songs.Administrator can give authorisation

    to the user in order to0 give full access to the user.

    Log:- Administrator can view log session of various users.

    Search: - In this module user can search or view various songs.In this admin can also

    search songs to check whether he has uploaded particular song or not

    Deleting User: - If admin founds any any mischevious data in the user profile.Admin

    canalso view lof file of multiple users.

    Under User Panel-

    Songs

    Download

    Play

    Dashboard

  • 8/2/2019 Final Music Report

    16/69

    Songs: - In this module user can search for different categories of songs.

    Download: - If the user is authenticated by the the admin then the user can unlimited

    songs.

    Play: - If the user wants to play songs online then he can play his selection.

    Dashboard: - In this user can update his/her information like change his/her picture,change

    password or can also edit his/her personal details.

    OBJECTIVES OF PROJECT

    The following objectives have been set:

    Smooth flow of data without any hurdles.

    Adequate validation checks for data entry. Adequate security of data.

    Facility to update data from time to time.

    Prompt and specific retrieval of data.

    Flexibility in the system according to the changing environment.

    Controlling redundancy in storing the same data multiple times.

    Accuracy, timeliness and comprehensiveness of the system output.

    Stability and operability by people of average intelligence.

    Enhancement in the completion of work within the constraints of time.

    Timely and accurate information.

    Increased customer Response Time

    SIGNIFICANCE OF PROJECT

    Music Beats will integrate all functionalities of the Music Website into single database.

    It will streamline all the upload and download procresses and give result on a click ofbutton.

    The main significance of Music Beats is integration of providing various facilities to

    the user in a single platform, which reduces the need for search under different websites.

  • 8/2/2019 Final Music Report

    17/69

    SYSTEM ANALYSIS

    Systems analysis is a process of collecting factual data, understand the processes involved,

    identifying problems and recommending feasible suggestions for improving the system

    functioning. This involves studying the business processes, gathering operational data,understand the information flow, finding out bottlenecks and evolving solutions for

    overcoming the weaknesses of the system so as to achieve the organizational goals.

    Analysis is a detailed study of the various operations performed by a system and theirrelationship within and outside of the system. In journal view system is collection of

    people, procedures and equipments. People are not an important component of any

    information system. Information is produced and used by people in an organization in theireveryday activities to make decisions. Information system establishes procedures ensuring

    that right people receive right data at right time. These procedures determine what is to be

    done at it enter and passed through the system. System analysis is the method that is used to

    analyze the system, design them and build them. Analysis is used to gain an understandingof existing and what is required in system. The analysis phase ends with the system

    description and a set of requirement of the new system. Analysis is a process of diagnosis

    the situation with the boundaries of system kept in mind to produce a report based ownfindings. Planning for information system development is done within in the framework of

    organizations overall MIS plan.

    Identification of need

    Detailed information requirement analysis of organization is collected from present system.As a person has to be changed with the prevailing conditions of society, in the same a

    system has to be changed accordingly. Computerized organization is the todays demand.In comparison to the old system, the computerized system is more reliable and costeffective. In the present organization, the data is scattered whereas the data should be

    integrated at one place so that the modifications can be made easily and it becomes easy for

    any authorized person to get information from these files.

    Preliminary investigation

    To meet the above-mentioned requirement, we need a system that has the tools of

    ASP.NET. It should be a simple system because the user going to use it are not much

    familiar with these kind of systems so it should be a simple, easy to use an understandableto all persons.The first step in the system development life cycle is to determine the

    feasibility of the system .The purpose is to evaluate project request. It is the collecting of

    information that helps committee members to evaluate the merits of the project request and

    make an informed judgment about the feasibility of the proposed project.

  • 8/2/2019 Final Music Report

    18/69

    Following should be accomplished:

    a. Clarify and understand the project request.

    b. Determine the size of the project.c. Determine the technical and operational feasibility.

    d. Report findings to the management

    Objectives

    1. Efficiency: when all the work is done by computer then it will increase the efficiency, so

    all the activities will be done fastely.

    2.This system also save time for calculations.

    SYSTEM REQUIREMENTS

    METHODOLOGY ADOPTED

    Prototyping Model has been used for software development according to which athrowaway prototype of the proposed system, based on the currently known requirements,

    is given to the user so that he has a fair idea about how the proposed system is going to belike. This will help him in deciding the interface, input and output requirements.

    It can be easily adjudged that inputs and outputs are big in number, can increase

    exponentially and may create a big chaos if not restricted properly. As the user spendssome time on the prototype, he will become more precise about his own input and output

    requirements. This prototype will provide him with an environment analogous to the

    proposed systems environment.Because of object oriented support in .NET, various concepts (like reusability,

    polymorphism, isolation etc.) are already there but for the efficient management of system

    components, Component based Software Engineering will also be exercised which willhelp in a resultant library of components, the benefit of which will be reusability and fast

    development.

    Because of lack of hierarchical structure in object oriented approach, there

    is no meaning of Bottom-up or Top-down testing. Testing will begin from the mostrudimentary levels of the system and will move towards higher level components which

    will be based on design phase rather than coding phase. In little words, it can be said that

    CLUSTER Testing will be exercised to scrutinize all the parts and their associativefunctionality.

  • 8/2/2019 Final Music Report

    19/69

    HARDWARE AND SOFTWARE TO BE USED

    The system must have the following hardware requirements:-

    Software Environment:

    1) Microsoft .Net Framework 4.02) Visual Studio 2010

    3) Microsoft SQL Server 2008

    Hardware Environment:

    1) PC with Intel Core i5 Processor, 2.66 GHz

    2) 2 GB RAM

    3) Minimum 50 GB free Hard Disk space.

    4) Mouse or Similar Pointing device.

    Technology Used:

    1) ASP .NET 4.0

    2) C# .NET

    3) ADO .NET Entity Framework

    Database Used:

    SQL Server 2008

  • 8/2/2019 Final Music Report

    20/69

    FEASIBILITY STUDY

    Depending on the results of the initial investigation, the survey is expanded to a more

    detailed feasibility study. Feasibility study is a test of system proposal according to its

    work ability, impact on the organization, ability to meet user needs, and effective use ofresources. The objective for this phase is not to solve the problem but to acquire a sense of

    scope. During the study, the problem definition is crystallized and aspects of the problem to

    be included in the system are determined.

    Web Information processing systems are capital investments because resources are being

    spent currently in order to achieve benefits to be received over a period of time followingcompletion. There should be a careful assessment of each project before it is begun in terms

    of economic justification, technical feasibility, operational impact and adherence to the

    master development plan.

    We started the project by listing the possible queries that the user might want to be

    satisfied. And on these lines we guided the project further. The three main points, kept inmind at the time of project, are:

    Possible (To build it with the given technology and resources)

    Affordable (given the time and cost constraints of the organization)

    Acceptable (for use by the eventual users of the system)

    The three major areas to consider while determining the feasibility of a project are: --

    ECONOMICAL FEASIBILITY

    An evaluation of development cost weighed against the ultimate income or benefit

    derived from the developed system. Today, software is the most expensive element ofvirtually all computer-based systems. A large cost estimation error can make the

    difference between profit and loss. Estimation of resources, cost, and schedule for a

    software engineering effort requires experience, access to good historical information,and the courage to commit to quantitative predictions. Estimation carries inherent risk

    and this risk leads to uncertainty. Project complexity has a strong effect of the uncertainty

    inherent in planning. Complexity, however, is a relative measure that is affected by

    familiarity with past effort. Project size is another important factor that can affect theaccuracy and efficiency of estimates. As size increases, the interdependency among

    various elements of the software grows rapidly. Software cost and effort estimation will

    never be an exact science. Too many variables-human, technical, environmental,

    political-can affect the ultimate cost of software and effort applied to develop it.However, software project estimation can be transformed from a black art to a series of

    systematic steps that provide estimates with acceptable risk. The system is not too costlyaccording to the features of the application. The cost of the project is balanced. The cost

    of the project might be increase or decrease as according to requirement of the end user.

    The system has developed systematically.

  • 8/2/2019 Final Music Report

    21/69

    TECHNICAL FEASIBILITY

    This involves financial consideration to accommodate technical enhancements. If the

    budget is a serious constraint, then the project is judged not feasible. The analyst thinks

    about the technical feasibility of the system. In the proposed system, the application hasmade in this way so that it is technically feasible for the distribution promotion. There are

    some certain types of control being used in the system to make the application more users

    friendly i.e. the grid view is used. The system has made in such a way that it is being usedfor a single user as well as multi-user environment. The operating systems are Windows

    2000/2003 Windows XP. Thus we see that the system is more technically feasible

    regarding to operating system. We are using Microsoft SQL Server 2005 as backend

    for maintaining the database. SQL Server is a relational database management system ofan object that is formed by the database and an instance of the SQL Server. SQL Server

    2005 is Windows based RDBMS. This is one of the powerful RDBMS due to its menu

    driven facility. This provides a better service to the user in the sense of taking the backup

    of data and then restores it. We can easily mirror the database in the SQL Server 2005.

    OPERATIONAL FEASIBILITY

    This application is very easy to operate as it is made user friendly. Main consideration is

    users easy access to all the functionality of the application.

  • 8/2/2019 Final Music Report

    22/69

    PROJECT PLAN

    SYSTEM ANALYSIS

    INTRODUCTION:System analysis is the process of studying the business processors and procedures,

    generally referred to as business systems, to see how they can operate and whether

    improvement is needed.This may involve examining data movement and storage, machines and technology used in

    the system, programs that control the machines, people providing inputs, doing the

    processing and receiving the outputs.

    INVESTIGATION PHASE

    The investigation phase is also known as the fact-finding stage or the analysis of the current

    system. This is a detailed study conducted with the purpose of wanting to fully understand

    the existing system and to identify the basic information requirements. Various techniquesmay be used in fact-finding and all fact obtained must be recorded.

    INVESTIGATION

    As it was essential for us to find out more about the present system, we used the following

    methods to gather the information: -1. Observation: - Necessary to see the way the system works first hand.

    2 Document sampling: - These are all the documents that are used in the system. They

    are necessary to check all the data that enters and leaves the system.

    3 Questionnaires: - These were conducted to get views of the other employees who arecurrently employed in the system.

    ANALYSIS OF THE INVESTIGATION

    Strengths of the System

    1. No complex equipment: - The equipment that is used is very simple and no special

    skills have to be mastered to be able to operate the system. Therefore no training is requiredfor the employees.

    2. Low cost: -There is little money spent in maintaining the present system other than

    buying the necessary office equipment and the ledgers.

    SYSTEM SECURITY

    System security is a vital aspect when it comes to developing a system. The system should

    ensure the facility of preventing unauthorized personnel from accessing the information and

    the data within the system. The system should provide total protection for each users

  • 8/2/2019 Final Music Report

    23/69

    information so that the integrity of data is sustained and also prevent hackers from hacking

    the system.

    The proposed system ensures the security and the integrity of data. This is done by

    providing a password login system for each authorized users. And for example the System

    Administrator has access to all kinds of information.

    By providing this facility information is properly managed and information is protected.

    For example the system administrators day to day tasks are lessened and easier because hedoesnt have to have a constant eye on the system and worry about hackers hacking the

    system.

    SOFTWARE REQUIREMENT SPECIFICATION

    The software requirement specification is produced at the culmination of the analysis task.

    The function and performance allocated to software as part of system engineering are

    refined by establishing a complete information description, a detailed functionaldescription, a representation of system behavior, an indication of performance requirement

    and design constraints appropriate validation criteria, and other information pertinent torequirement.

    The introduction to software requirements specification states the goals and objectives of

    the software, describing it in the context of the computer based system.

    The Information Description provides a detailed description of the problem that thesoftware must solve. Information content, flow and structure are documented.

    A description of each function required to solve the problem is presented in the Functional

    Description.Validation Criteria is probably the most important and ironically the most often neglected

    section of the software requirement specification.

    Software requirement specification can be used for different purpose. Here are the majoruses.

    Statement of user needs

    A main purpose of the product specification is to define the need of the products user.

    Sometimes, the specification may be a part of a contract sign between the producer and theuser. It could also form part of the user manuals. A users needs are sometimes not clearly

    understood by the developer. If this is the case, a careful analysis involving much

    interaction with the user should be devoted to reaching a clear statement of requirements, inorder to avoid possible misunderstandings.

    Sometimes, at the beginning of a project, even the user has no clear idea of what exactly the

    desired product is. Even an exact formation of system functions and performance may bemissing an initial description produced by an inexperienced user.

    A statement of the requirements for the implementation:

    Specifications are also used as a reference point during product implementation. In fact, the

    ultimate goal of the implementation is to build a product that needs specification.

  • 8/2/2019 Final Music Report

    24/69

    SYSTEM DESIGN

    INTRODUCTION:System design is the process of developing specifications for a candidate system that meet

    the criteria established in the system analysis. Major step in system design is thepreparation of the input forms and the output reports in a form applicable to the user.

    The main objective of the system design is to make the system user friendly. System design

    involves various stages as:

    Data EntryData Correction

    Data Deletion

    ProcessingSorting and Indexing

    Report Generation

    System design is the creative act of invention, developing new inputs, a database, offlinefiles, procedures and output for processing business to meet an organization objective.

    System design builds information gathered during the system analysis.

    DATABASE DESIGN:

    The overall objective in the development of the database technology has been to treat dataas an organizational resource and as an integrated whole. Database management system

    allows data to be protected and organize separately from other resources. Database is an

    integrated collection of data. The most significant of data as seen by the programs and dataas stored on the direct storage access storage devices. This is the difference between logical

    and physical data. The organization of data in the database aims to achieve free majorobjectives:Data Integration

    Data Integrity

    Data Independence

    The databases are implemented using a DBMS package. Each particular DBMS has unique

    characteristics and general techniques for Database Design.

    The proposed Management Information System stores the information relevant forprocessing in the Microsoft SQL Server Database. This MS SQL Server contains tables,

    where each table is called a field or column. A table also contains records which is a set of

    fields. All records, in a table the same set of fields with different information. Each tablecontains key fields that establish relationships in a MS SQL server database and how the

    records are stored. There are primary key fields that uniquely identify a record in a table.

    There are also fields that contain the primary key from another table called foreign keys.

    It is a known fact that the program cannot be written until the data are defined, so thedatabase must be defined. The starting point for this process is data dictionary. The records

    data structures and elements to be stored in each database are identified and extracted. Next

    the analyst codes the source statements library. Eventually, the programmer will

  • 8/2/2019 Final Music Report

    25/69

    incorporate the source code into the various programs, thus assuring consistency and

    simplifying the coding process. The databases have been designed in such a way that there

    is no duplication of information and loss of information.

    VERIFICATION:

    A verification check ensures that data i9s correctly transferred into a computer from themedium that it was originally stored on. Verification checks are usually used to check that a

    data entry worker has correctly typed information written on a data collection form into a

    computer.

    Methods of Verification:

    The two most common methods of verification are:

    On-Screen prompts: After a user has entered some data it is redisplayed on the screen.

    The user is prompted to read the data and confirm that it has been entered correctly. If the user

    has entered any data incorrectly he should response that the data is inaccurate and retypes theincorrect parts.

    Dual Inputs: This method is used when data is entered through the keyboard. Thedata to be entered is typed in twice by two different operations. The two copies of data are been

    compared, any difference are detected, the operators will be prompted to retype the sections that

    differ until both copies agree/. When the two copies agree the computer assumes that the data hasbeen entered correctly.

    VALIDATION:

    A validation check is an automatic check made by computer to ensure that any data entered

    into the computer is sensible. A validation check does not make sure that data has been

    entered correctly. It only ensures that data is sensible. For this reason validation checks are

    not usually as effective as verification checks. They can however be carried outautomatically by the computer and therefore require less work by the computer operators

    making them cheaper to use.

    Methods of validation:

    There are many different methods of validations. The most appropriate method to use will

    depend upon what data is being entered. The most common methods are listed here.

    Presence Checks: checks that data has been entered into the field and that it has not been left

    blank, e.g. checks that Project ID is always entered into each record in a database of project

    details.

    Type Checks: checks that an entered value is of particular type. E.g. checks

    that a field is varchar, a number, etc.Length Checks: checks that an entered value, e.g. Project ID is no longer than a particular number

    of characters.

    Format Checks: Checks that an entered value has a particular format. E.g.

    a date must be consist of mm-dd-yy format.

    Validation checks can be performed by any piece of software. If the user tries to dounauthorized operations the appropriate error messages are produced by the systems.

  • 8/2/2019 Final Music Report

    26/69

    DATA DICTIONARY:In our DFD, we give names to data flows, processes, and data stores. Although the names

    are descriptive of the data, they do not give details. So the following the DFD, our interestis to build some structured place to keep details of the contents of data flow, processes, and

    data store. A data dictionary is a structured repository of data about data. It is a set of

    rigorous definition of all DFD data element and data structure. A data dictionary has manyadvantages. The most obvious is documentation; it is valuable reference in any

    organization. Another advantage is improving analyst/user communication by establishing

    consistent definition of various elements, terms and procedures. During implementation, itserves as a common base against which programmers who are working on the system

    compare data description. Also control information maintained for each data element is

    cross referenced in the data dictionary. E.g. program that use a given data element are cross

    referenced in a data dictionary, which makes it easy to identify them and make anynecessary changes. Finally, a data dictionary is an important step in building a database.

    Most database management system has a data dictionary as a standard feature.

    INPUT DESIGN:The input design is the link between the information system and the user. It comprisesdeveloping specification and procedure for data preparation and those steps that are

    necessary to put transaction data into a usable form for processing data entry. The activity

    of putting data into the computer for processing can be achieved by instructing thecomputer to read data from a written or printed document or it can occur by having people

    key data directly into the system. The design of inputs focuses on controlling the amount of

    inputs required, controlling errors, avoiding delay, avoiding extra steps and keeping the

    process simple.

    The system needs the following information for processing:

    Information regarding Project Details Information regarding Project Design Details

    Information regarding Category, Location Details

    OUTPUT DESIGN:In output design, emphasis is given on producing a hard copy of the information required as

    the output on the CRT screen in some predefined manner. Computer output is the most

    important and direct source of information to the use. Output design is a process thatinvolves designing necessary outputs that should be given to various users according to

    their requirements. Efficient, intelligible output design should improve the systems

    relationship with the user and help in decision making. Since the reports are directly

    referred by the management for taking the decisions and to draw conclusions, they must bedesigned with utmost care and the details in the reports must be simple, descriptive and

    clear to the user. The options for the outputs and reports are given the system menu.

    DATA FLOW DIAGRAM(DFD)

  • 8/2/2019 Final Music Report

    27/69

    User Authentication DFD

    Login DFD

    Admin Panel DFD

    Login

    User

    RegisteredAnonymous

    Admin

    Upload

    songs

    User

    StatusLogSearch

    ADMIN

  • 8/2/2019 Final Music Report

    28/69

    HR management DFD

    User Panel DFD

    User Login

    Check

    Authenticat

    ionTbprofile

    Login

    Successful

    Wait For User

    Response

    Search

    Dashboar

    d

    Downloa

    d

    Downl;oa

    d

    Play

  • 8/2/2019 Final Music Report

    29/69

    Search DFD

    Upload DFD

    Search

    Admi User

    Registered

    Songs

    Play

    PlayDownlo

    ad

    Anonymous

    Upload

    EnglishHindi

    TbhindiTbenglis

    h

    Tbpunjab

    i

    Punjabi

    Song

    Admin

  • 8/2/2019 Final Music Report

    30/69

    User Status DFD

    User

    Authoris

    e

    User is

    Unauthor

    ise

    User cannot

  • 8/2/2019 Final Music Report

    31/69

    Three-Tier Web Application Development

    To implement a web application client-server architecture is required. The most popularclient-server architectures are the two-tier and the three-tier architecture. In web application

    development, three-tier architecture refers to separating the application process into threespecific layers. What the user sees via a web browser is called the presentation tier and is

    content served from a web server. The middle tier performs the business logic processing

    that occurs, for example, when a user submits a form. The back end consists of the data tierwhich handles the database processing and access to the data.

    This system is designed based on a traditional three-tier architecture used by

    many web applications. Three-tier architecture includes a presentation layer, business

    rules/ logic layer, and the data layer. The three-tier architecture is shown in Figure.

  • 8/2/2019 Final Music Report

    32/69

    Presentation Tier: The Presentation Tier or User Interface is the portion the user sees

    when they open a web page in the browser. It is as simple as you reading this article all the

    way to searching a catalog and purchasing a product using a shopping cart. It is what ispresented to the user on the client side within their web browser. If you were to view the

    source code, you would only see code such as HTML, JavaScript, and Cascading Style

    Sheets Viewing source code on a web page, you would NOT see database queries or loopsor calls to classes or any behind-the-scenes processing. In ASP.net and utilizing Visual

    Studio developers can separate the user interface from the business logic and data access

    layer with various tools. Languages used in this layer are typically HTML, DHTML, CSSand java script. The Presentation Layer, also called the Client tier, is responsible for

    thepresentation of data, receiving user events, and controlling the user interface. The

    userinteraction with the system is entirely through this layer.

    Business Logic or Application Tier:-The Business Logic, Functional Process Logic,

    Business Rules (all pertaining to the same thing), are kept in a separate layer. In ASP.net,

    this is where you define your classes and source code. This can be in the App_Code folder

    for your classes and methods. Web languages typically used in ASP.net are VB and C#.You would not use HTML or JavaScript in this layer. In this layer you typically define your

    classes, functions, sub procedures, properties, etc. The Business Rules/Logic layer is themiddleman between the presentation layerand the data layer. This middle tier was

    introduced to overcome the deploymentlimitation (whenever the application logic changed

    the application had to be redistributedat each and every client) in the two-tier architecture.

    The middle tier provides processmanagement where business logic and rules are executedand can accommodate hundreds

    of users.

    Data Access Tier:-In ASP.net, the Data Access layer is where you define your typed

    datasets and table adapters. It is where you define your queries or stored procedures. The

    business tier may then make use of this functionality. In your classes, rather than definingad hoc queries, you may use a Table Adapter to access the Data Access Layer. The Data

    layer is responsible for data storage. Primarily this tier (layer) consists of one or more

    relational databases and/or file systems

    TECHNOLOGY USED

  • 8/2/2019 Final Music Report

    33/69

    Overview of the .NET FrameworkThe .NET Framework is a new computing platform that simplifies application developmentin the highly distributed environment of the Internet. The .NET Framework is designed to

    fulfill the following objectives:

    o To provide a consistent object-oriented programming environment whether objectcode is stored and executed locally, executed locally but Internet-distributed, orexecuted remotely.

    o To provide a code-execution environment that minimizes software deployment and

    versioning conflicts.

    o To provide a code-execution environment that guarantees safe execution of code,

    including code created by an unknown or semi-trusted third party.

    o To provide a code-execution environment that eliminates the performance problems

    of scripted or interpreted environments.

    o To make the developer experience consistent across widely varying types of

    applications, such as Windows-based applications and Web-based applications.

    o To build all communication on industry standards to ensure that code based on

    the .NET Framework can integrate with any other code.

    The .NET Framework has two main components:

  • 8/2/2019 Final Music Report

    34/69

    o The common language runtime and

    o The .NET Framework class library.

    Features of the Common Language Runtime

    The common language runtime manages memory, thread execution, code execution, codesafety verification, compilation, and other system services. These features are intrinsic to

    the managed code that runs on the common language runtime.

    With regards to security, managed components are awarded varying degrees of trust,depending on a number of factors that include their origin (such as the Internet, enterprise

    network, or local computer). This means that a managed component might or might not be

    able to perform file-access operations, registry-access operations, or other sensitivefunctions, even if it is being used in the same active application.

    The runtime enforces code access security. For example, users can trust that an executable

    embedded in a Web page can play an animation on screen or sing a song, but cannot accesstheir personal data, file system, or network. The security features of the runtime thus enable

    legitimate Internet-deployed software to be exceptionally featuring rich.The runtime also enforces code robustness by implementing a strict type- and code-

    verification infrastructure called the common type system (CTS). The CTS ensures that allmanaged code is self-describing. The various Microsoft and third-party language compilers

    generate managed code that conforms to the CTS. This means that managed code can

    consume other managed types and instances, while strictly enforcing type fidelity and typesafety.

    In addition, the managed environment of the runtime eliminates many common software

    issues. For example, the runtime automatically handles object layout and managesreferences to objects, releasing them when they are no longer being used. This automatic

    memory management resolves the two most common application errors, memory leaks and

    invalid memory references.The runtime also accelerates developer productivity. For example, programmers can write

    applications in their development language of choice, yet take full advantage of the

    runtime, the class library, and components written in other languages by other developers.

    Any compiler vendor who chooses to target the runtime can do so. Language compilers thattarget the .NET Framework make the features of the .NET Framework available to existing

    code written in that language, greatly easing the migration process for existing applications.

    While the runtime is designed for the software of the future, it also supports software oftoday and yesterday. Interoperability between managed and unmanaged code enables

    developers to continue to use necessary COM components and DLLs.

    The runtime is designed to enhance performance. Although the common language runtime

    provides many standard runtime services, managed code is never interpreted. A featurecalled just-in-time (JIT) compiling enables all managed code to run in the native machine

    language of the system on which it is executing. Meanwhile, the memory manager removes

    the possibilities of fragmented memory and increases memory locality-of-reference tofurther increase performance.

    Finally, the runtime can be hosted by high-performance, server-side applications, such as

    Microsoft SQL Server and Internet Information Services (IIS). This infrastructure enables

  • 8/2/2019 Final Music Report

    35/69

    you to use managed code to write your business logic, while still enjoying the superior

    performance of the industry's best enterprise servers that support runtime hosting.

    .NET Framework Class Library

    The .NET Framework includes classes, interfaces, and value types that expedite andoptimize the development process and provide access to system functionality. To facilitate

    interoperability. Between languages, the .NET Framework types are CLS compliant and

    can therefore be used from any programming language whose compiler conforms to thecommon language specification (CLS).The .NET Framework types are the foundation on

    which .NET applications, components, and controls are built. The .NET Framework

    includes types that perform the following functions:

    o Represent base data types and exceptions.

    o Encapsulate data structures.

    o Perform I/O.

    o Access information about loaded types.o Invoke .NET Framework security checks.

    o Provide data access, rich client-side GUI, and server-controlled, client-side GUI.

    The key features of the .NET Framework

    Common Language Runtime

    Application Domain

    Runtime Hosts

    Common Type System

    Metadata and Self Describing Components

    Cross Language Interoperatablity

    .Net Framework Security

    Why .NET?

    1) Interoperability between languages and execution environments2) Uniformity in schema or formats for Data Exchange using XML,

    XSL

    3) Extend or use existing code that is valid4) Programming complexity of environment is reduced

  • 8/2/2019 Final Music Report

    36/69

    ASP.NET:

    ASP.NET is a technology that allows us to build and control dynamic Web pages easily. It

    also provides many enhancements to take advantage of new technology as we can interact

    with databases, personalize Web pages for visitors, display page on mobile devices (such ascell phones), and even build an entire e-commerce site from scratch.

    Previously internet works on request/response model that is an integral part ofclient/servermodel. Although this is a marvelous way of communicate and distribute information, it's

    rather simple and static. When the process is over, once client receives the requesting page

    from the server the server has no idea what the client is doing unless it makes anotherrequest.

    There is another model for communicating between server and clients, known as event-

    driven model.ASP.NET work on this model, it detects action and responds to them i.e. the

    server waits around for something to happen on the client. Once it does, the server takesaction and performs some piece of functionality. Of course, a Web, server can not know

    what you are thinking, but it can respond to your actions. If you type some text on Webpage, the server responds to it. If you click an image, the server responds.

    COMPARISON OF ASP AND ASP.NET:

    1) Classic ASP was built on the top of the Windows operating system and IIS (Internet

    Information Server). It was always a separate entity, and therefore its functionalitywas limited. ASP.NET, on the other hand, is an integral part of the system under the

    .NET Framework. It shares many 9f the same objects that traditional applications

    would use and all .NET objects available for ASP. NETs consumption.2) Instead of being limited to six inherent objects in ASP, ASP.NET has a plethora of

    useful components it can build form.3) ASP also made it abundantly clear that client and server were two separate entities,Whereas ASP. NET ties together the client and the server through clever use of

    server-side and client-side code, all invisible to the developer.

    4) ASP.NET code is compiled, whereas classic ASP used interpreted scripting

    languages. Using compiled code means an automatic boost in performance overASP applications.

    5) In classic ASP, nearly all of the code was executed in code render blocks (that is,

    inside tags). In ASP.NET, this type of code isnt compiled and isntrecommendedforfrequent use. Instead, you use the code declaration blocks, which

    are compiled and provide better performance.

    Following are some of the significant new features of ASP.NET:

    1) ASP.NET uses compiled code written in Common Language Runtime languages

    such as Visual Basic and C#. Unlike previous versions of Active Server Pages, thisversion does not use interpreted scripting languages such as VBScript.

    2) ASP.NET pages are built out of server-side controls. Web server controls enable

    you to represent and program against Hypertext Markup Language (HTML)

    elements using an intuitive object model.

  • 8/2/2019 Final Music Report

    37/69

    3) ASP.NET includes a new technology called Web Services. You can use Web

    Services to access methods and properties and transfer database data across the

    Internet.4) ASP.NET is part of Microsoft's .NET Framework. You can access thousands of

    .NET classes in your code that enable you to perform such wondrously diverse

    tasks as generating images on-the-fly and saving an array to a file.5) ASP.NET includes page and data caching mechanisms that enable you to easily and

    dramatically improve the performance of your Web site.

    State Management

    Web pages rarely are stand alone. Web applications almost always need to track users whovisit multiple pages, whether to provide personalization, store information about a user or

    to track usage for reporting purposes. State management is the process by which you

    maintain state and page information over multiple requests for the same or different pages.

    Types of State Management

    1. Client Side State Management:-This stores information on the client's computer by

    embedding the information into a Web page, a uniform resource locator (URL), or a

    cookie. The techniques available to store the state information at the client end arelisted down below:

    a) View State Asp.Net uses View State to track the values in the Controls. You

    can add custom values to the view state. It is used by the Asp.net pageframework to automatically save the values of the page and of each control just

    prior to rendering to the page. When the page is posted, one of the first tasks

    performed by page processing is to restore view state.b) Control State If you create a custom control that requires view state to workproperly, you should use control state to ensure other developers dont break

    your control by disabling view state.c) Hidden fields Like view state, hidden fields store data in an HTML form

    without displaying it in the user's browser. The data is available only when the

    form is processed.d) . Cookies Cookies store a value in the user's browser that the browser sends

    with every page request to the same server. Cookies are the best way to store

    state data that must be available for multiple Web pages on a web site.

    e) Query Strings - Query strings store values in the URL that are visible to the

    user. Use query strings when you want a user to be able to e-mail or instantmessage state data with a URL.

    2. Server Side State Management

    a) Application State - Application State information is available to all pages,regardless of which user requests a page.

  • 8/2/2019 Final Music Report

    38/69

    b) Session State Session State information is available to all pages opened by a user

    during a single visit.

    Both application state and session state information is lost when the application restarts. To

    persist user data between application restarts, you can store it using profile properties.

    ASP.NET Web Application Security

    Essentially, securing an ASP.NET Web application entails controlling access to its

    resources. The ASP.NET security framework accomplishes this by working in conjunction

    with the various security subsystems present in the machine where ASP.NET is installed.This includes security provided by the operating system (NTFS file access permissions) as

    well as security provided by IIS (host or IP address authorization).

    And since ASP.NET is built on the Microsoft .NET Framework, the ASP.NET application

    developer also has access to all of the built-in security features of the .NET Framework,

    such as code access security and role-based user-access security.It is imperative to understand how the various security subsystems interact, to be able to

    secure your ASP.NET application effectively. Basically, to enable security for an ASP.NETapplication, you need to configure the application to implement, at the very least, the two

    fundamental functionalities described in the following table.

    Security

    functionDescription

    AuthenticationThe process of obtaining identification credentials from auser ( such as name and password ), and validating those

    credentials against some authority.

    AuthorizationThe process of controlling access to resources based on theauthenticated identification credentials ( such as role).

    ASP.NET implements authentication through authentication providers, the modules that

    contain the code to authenticate user credentials.

    The ASP.NET Ajax Library

    The ASP.NET Ajax Library is an open-source JavaScript library that can be used with both

    ASP.NET Web Forms and ASP.NET MVC applications.

  • 8/2/2019 Final Music Report

    39/69

    a) The ASP.NET Ajax Library includes the very popular, open-source, jQuery library.

    JQuery enables you to easily retrieve and manipulate elements from a HTML

    document by using selector syntax similar to the syntax used in Cascading StyleSheets.

    b) The ASP.NET Ajax Library includes the Ajax Control Toolkit. The Ajax Library

    contains more than 30 controls that enable you to easily create rich, interactive webpages. For example, you can use the Ajax Library controls to display HTML

    editors, auto-complete textboxes, cascading dropdown lists, picture slide shows,

    and modal popup dialog boxes.c) The ASP.NET Ajax Library includes a powerful client data access library. By

    taking advantage of ASP.NET Ajax client templates and client data-binding, you

    can build a database-driven web application that executes entirely within the web

    browser.

    SQL SERVER 2008

    Database Design

    A decade ago, database was unique to large corporations with mainframes. Today it is

    recognized as a standard of MIS and is available for virtually every size of computer.

  • 8/2/2019 Final Music Report

    40/69

    Before the database concept became operational, users had programs that own data

    independent of other users. It was a conventional file environment, common data are

    available and used by several users. Instead of each program managing its own data, dataacross application are shared by authorized users with the data base software managing the

    data as an entity. A program now requests data through the data base management system,

    which determines data sharing.

    a) Controlled redundancy:-Redundancy data occupies space and therefore, is

    wasteful. If versions of the same data are in different phases of updating, the systemoften gives conflicting information. A unique aspect data base design is storing only

    once, which controls redundancy and improves system performance.

    b) Accuracy and Integrity:-The accuracy of a database ensures that quality and

    contents remains constant. Integrity controls detect data inaccuracies where theyoccur. As IMPRO uses SQL Server 2005 for storing the data. The database design

    becomes very crucial and important part of the system.c) Data Integration:-It refers to the fact that the data is stored physically at different

    locations, but logically the information is centralized.d) Data Integrity:-Data Integrity means storing all the data. This leads to more

    consistency, less redundancy and reduces direct access storage requirement.e) Data Independence:-Data Independence is the insulation of application programs

    from changing aspects of physical data organization.

    SQL Server is an SQL-compliant RDBMS. SQL-compliant means it use the ANSI(American National Standard Institute) version of Structured Query Language or SQL.

    Structured Query Language is a command that allow us to modify or retrieve information

    from the database.Client server means that SQL Server is designed to store data in the central location (the

    server) and deliver it on demand to numerous other locations (the client). SQL Server is

    also a Relational Database Management System (RDBMS).

    FEATURES OF SQL SERVER 2005:

    Information representation

    Unique definition of rows

    Systematic treatment of Null values

    Guaranteed access

    High level Update, Insert, and Delete

    Retrieving information from the database.

    Accepting query language statements.

    Enforcing security specifications. Enforcing data integrity specifications

    Enforcing transaction consistency

    Managing data sharing

    Optimizing queries

    Managing System catalogs

  • 8/2/2019 Final Music Report

    41/69

    COMPONENTS

    1. Enterprise Manager:- SQL Server Enterprise Manager is a graphical tool thatallows easy configuration and management of Microsoft SQL Server and SQL 2000

    program group. It is the main administrative console for SQL Server installations. It

    provides you with a graphical "birds-eye" view of all of the SQL Serverinstallations on your network. You can perform high-level administrative functions

    that affect one or more servers, schedule common maintenance tasks or create and

    modify the structure of individual databasesSQL Server Enterprise Manager can also be used to:

    Manage logins, permission and users.

    Create a database

    Take back-up of database and transaction logs.

    Manage tables

    2. Query Analyzer:-It offers a quick and dirty method for performing queries against

    any of your SQL Server databases. It's a great way to quickly pull information outof a database in response to a user request, test queries before implementing them in

    other applications, create/modify stored procedures and execute administrative tasksThe SQL Server Query Analyzer allows us to create adhoc queries and run them

    interactively. We may also execute Transact-SQL statements stored in text file and

    view the result in result plane or result grid. The Query Analyzer also has a color-coded editor to assist the user with checking of syntax. It also has context sensitive

    help.

    Queries are processed in two steps:

    Interpret- First the Queries are checked for syntax.

    Execute-Then the processing take place.

    A database is stored in a very structured manner. Each database requires some way for auser to interact with the information within. Such interaction is performed by a databasemanagement system (DBMS). SQL Server is a member of a large category of products

    known as database management systems (DBMS). The general purpose of a DBMS is to

    provide for the definition, storage, and management of data in a centralized area that canbe shared by many users. SQL Servers database management system is patterned on the

    relational model. Relational databases allow us to store vast amounts of data with far

    sampler maintenance and smaller storage requirements than the equivalent flat database.Relations among tables in a relational database are established using keys. A primary key

    is a field that uniquely identifies a record so it can be referenced from a related table. A

    foreign key is a field that holds identification values to relate records stored on other

    tables.

    Querying the database

    With each query of the database, we form a virtual table that contains the results of our

    query. Database queries are made with a specific language named SQL (structured query

    language).

  • 8/2/2019 Final Music Report

    42/69

    SQL Server 2005has many performance improvements and features which allows us to

    build and manage large databases, query them fast, insert data into them at high rates,

    partition them for fast loading and backup and store very large objects or whole files.Central, Shared, Accessible, Backed up, Version etc. SQL, as a relational data language

    supports certain basic functions to control, define and manipulate data. SQL uses the term

    row to refer to a database record and the term column to refer to database field

    3. SQL Profiler: It provides a window into the inner workings of your database. You can

    monitor many different event types and observe database performance in real time. SQL Profilerallows you to capture and replay system "traces" that log various activities. It's a great tool for

    optimizing databases with performance issues or troubleshooting particular problems.

    4. Service Manager: It is used to control the MS SQL Server (the main SQL Serverprocess), MSDTC (Microsoft Distributed Transaction Coordinator) and SQL Server Agent

    processes. An icon for this service normally resides in the system tray of machines running SQL

    Server. You can use Service Manager to start, stop or pause any one of these services.

    5. Data Transformation Services (DTS):provide an extremely flexible method for

    importing and exporting data between a Microsoft SQL Server installation and a large variety ofother formats. The most commonly used DTS application is the "Import and Export Data" wizard

    found in the SQL Server program group.

    FEATURES

    1) User-Defined Functions: SQL Server 2000 introduces the long-awaited support for user-

    defined functions. User-defined functions can take zero or more input parameters and return asingle valueeither a scalar value like the system-defined functions, or a table result. Table-

    valued functions can be used anywhere table or view expressions can be used in queries, and they

    can perform more complex logic than is allowed in a view.2) Indexed Views:Views are often used to simplify complex queries, and they can contain

    joins and aggregate functions. In SQL Server 2005 Enterprise or Developer Edition, you can

    define indexes on views to improve query performance against the view. When creating an index

    on a view, the result set of the view is stored and indexed in the database. Existing applicationscan take advantage of the performance improvements without needing to be modified.

    3) Indexed views can improve performance for the following types of queries:

    Joins and aggregations that process many rows

    Join and aggregation operations that are performed frequently within many

    queries

    Decision support queries that rely on summarized, aggregated data that isinfrequently updated.

    4) Distributed Partitioned Views: SQL Server 2005 expands the ability to create

    partitioned views by allowing you to horizontally partition tables across multiple SQL Servers.The feature helps you scale out one database server to multiple database servers, while making

    the data appear as if it comes from a single table on a single SQL Server. In addition, partitioned

    views are now able to be updated.

  • 8/2/2019 Final Music Report

    43/69

    5) New Data types:SQL Server 2005 introduces three new data types. Two of these can be used as

    data types for local variables, stored procedure parameters and return values, user-defined function

    parameters and return values, or table columns:

    6) Text in Row Data:SQL Server 2005 provides a new text in row table option that allows small

    text and image data values to be placed directly in the data row, instead of requiring a separate data page.

    This can reduce the amount of space required to store small text and image data values, as well as reducethe amount of I/O required to retrieve rows containing small text and image data values.

    7) Cascading RI Constraints: SQL Server provides the ability to specify the action to take

    when a column referenced by a foreign key constraint is updated or deleted. You can still abortthe update or delete if related foreign key records exist by specifying the NO ACTION option, or

    you can specify the new CASCADE option, which will cascade the update or delete operation to

    the related foreign key records.

    8) Multiple SQL Server Instances: SQL Server provides support for running multiple instances ofSQL Server on the same system. This allows you to simultaneously run one instance of SQL Server 6.5

    or 7.0 along with one or more instances of SQL Server 2005. Each SQL Server instance runs

    independently of the others and has its own set of system and user databases, security configuration, and

    so on. Applications can connect to the different instances in the same way they connect to different SQLServers on different machines.

    9) XML Support:SQL Server provides native support for XML. This new feature provides theability to do the following:

    Return query result sets directly in XML format.

    Retrieve data from an XML document as if it were a SQL Server table.

    Access SQL Server through a URL using HTTP. Through Internet Information Services (IIS),

    you can define a virtual root that gives you HTTP access to the data and XML functionality of SQL

    Server 2000.

    Extensible Markup Language XML

    XML stands for Extensible Markup Language

    XML is a markup language much like HTML

    XML was designed to carry data, not to display data

    XML tags are not predefined. You must define your own tags

    XML is designed to be self-descriptive

    XML is a W3C Recommendation

  • 8/2/2019 Final Music Report

    44/69

    XML (Extensible Markup Language) is a set of rules for encoding documents

    electronically. It is defined in the XML 1.0 Specification produced by the W3C and several

    other related specifications; all are fee-free open standards.XMLs design goals emphasizesimplicity, generality, and usability over the Internet. It is a textual data format, with strong

    support via Unicode for the languages of the world. Although XMLs design focuses on

    documents, it is widely used for the representation of arbitrary data structures, for examplein web services.

    There are a variety of programming interfaces which software developers may use to access

    XML data, and several schema systems designed to aid in the definition of XML-basedlanguages.

    (a)Markup and Content

    The characters which make up an XML document are divided into markup and content.

    Markup and content may be distinguished by the application of simple syntactic rules. Allstrings which constitute markup either begin with the character "", or

    begin with the character "&" and end with a ";". Strings of characters which are not markup

    are content.

    (b) TagA markup construct that begins with "". Tags come in three flavors:

    start-tags, for example , end-tags, for example , and empty-elementtags, for example .

    Introduction to IIS

    Internet Information Services Architecture

    IIS is an integral part of the Windows DNA architecture. An important role of IIS is to linkclients accessing the system through the Hypertext Transfer Protocol (HTTP) to the other

    Windows DNA services, such as DHTML, ASP, and so on. In addition, IIS includes a basicset of functionality that systems developers can extend to define customized applicationarchitecture.

    This section contains:

    IIS Core Functionality: Describes the basic functionality that you can use to buildWeb applications.

    IIS and Component Services: Outlines the functionality used to isolate, manage andcoordinate processing for transactional ASP applications.

    DATABASE TABLES

    CITY TABLE

  • 8/2/2019 Final Music Report

    45/69

    STATE TABLE

    COUNTRY TABLE

  • 8/2/2019 Final Music Report

    46/69

    PROFILE TABLE

    HINDI SONGS TABLE

  • 8/2/2019 Final Music Report

    47/69

    PUNJABI SONGS TABLE

    ENGLISH SONGS TABLE

  • 8/2/2019 Final Music Report

    48/69

    IMPLEMENTATION AND TESTING

    IMPLEMENTATIONImplementation is the stage in the project where the theoretical design is turned into the

    working system and is giving confidence to the new system for the users i.e. will workefficiently and effectively. It involves careful planning, investigation of the current system

    and its constraints on implementation, design of method to achieve the change over, an

    evaluation, of change over methods. A part from planning major task of preparing theimplementation is education of users. The more complex system is implemented, the more

    involved will be the system analysis and design effort required just for implementation. An

    implementation coordinating committee based on policies of individual organization hasbeen appointed. The implementation process begins with preparing a plan for the

    implementation for the system. According to this plan, the activities are to be carried out;

    discussions may regarding the equipment have to be acquired to implement the newsystem.Implementation is the final and important phase. The most critical stage is in

    achieving a successful new system and in giving the users confidence that the new systemwill work and be effective. The system can be implemented only after thorough testing is

    done and if it found to working according to the specification. This method also offers thegreatest security since the old system can take over if the errors are found or inability to

    handle certain types of transaction while using the new system.

    At the beginning of the development phase a preliminary implementation plan is created toschedule and manage the many different activities that must be integrated into plan. The

    implementation plan is updated throughout the development phase, culminating in a

    changeover plan for the operation phase. The major elements of implementation plan aretest plan, training plan, equipment installation plan, and a conversion plan.

    There are three types of implementation:Implementation of a computer system to replace a manual system.Implementation of a new computer system to replace an existing system.

    Implementation of a modified application to replace an existing one, using the same

    computer.

    IMPLEMENTATION TOOLS:

    Training personnel

    Conversion Procedures

    Post-implementation review

    Training of Personnel involved with system

    Even well designed system can succeed or fail because of the way they are operated and

    used. Therefore, the quality of training received by the personal involved with the system in

    various capacities helps or hinders and may even prevent the successful implementation ofmanagement information system.

    Those who are directly or indirectly related with the system development work must know

    in detail what must know in detail what their roles will be, how they can make efficient use

  • 8/2/2019 Final Music Report

    49/69

    of the system and what the system will or will not do for them. Both system operators and

    users need training.

    Conversion Methods

    A conversion is the process of changing from the old system to the new one. It must be

    properly planned and executed. Four methods are common in use. They are ParallelSystems, Direct Conversion, Pilot System and Phase In method. Each method should be

    considered in the light of the opportunities that it offers and problems that it may create. In

    general, system conversion should be accomplished in shortest possible time. Longconversion periods create problems for all persons involved including both analysts and

    users.

    Parallel Run

    Immediate cut off

    1) Parallel Run

    In this approach, the old system and the new system are used simultaneously for

    some period of time so that the performance of time so that performance of the new

    system can be monitored and compared with that of the old system. Also in case of

    failure of the new system, the user can fall back on the old system. The risk of this

    approach is that the user may never want to shift to new system.

    2) Immediate cut-off

    In this method, the use of the old system cases as soon as the new system is

    implemented and bought in to place. The old system becomes redundant from day

    of implementation of the new system. There is the high risk involved in thisapproach if the new system fails, and then there will not be anything to fall back

    upon. The advantage of this approach is that both the systems need not be used

    simultaneously.

    Implementation Tools in Project

    The project was implemented using ASP.NET server page, HTML, ASP.NET beans. The

    implementation work was carried out in window XP/2000 server platform.

    1) C#.Net and Asp.Net

    2) MySQL Server

  • 8/2/2019 Final Music Report

    50/69

    POST IMPLEMENTATION REVIEW

    After the system is implemented and conversion is complete, a review should be conducted

    to determine whether the system is meeting expectations and where improvements are

    needed. A post implementation review measures the systems performance against

    predefined requirement. It determines how well the system continues to meet theperformance specifications.

    SYSTEM TESTING

    The purpose of system testing is to identify and correct errors in the candidate system.

    Testing is and important element of software quality assurance ad represents the ultimate

    review of specification, design and coding. The increasing visibility of the software as asystem element and the cost associated with a software failure are motivated forces for well

    planned, through testing.System testing was conducted in order to detect errors and for comparing then the final

    system with the requirement specification reports, i.e. whether the system meets

    requirements. During testing the software was executed with the set of test cases and theoutput of programs for the test cases was evaluated to determine if the program is

    performing as it was expected to.

    The term error is used to refer the difference between actual output of the software and the

    current output. Fault is a condition that causes the software to fail to perform its requiredfunction. Software reliability is defined as a required function. Software reliability is

    defined as the probability that the software will not undergoes failures for a specified timesunder specified condition. Failure is the inability of a system or a component to perform arequired function according to its specification. Different levels of testing were employed

    for software to make it error free, fault free and reliable.

    Then system testing was conducted. Here the entire software system was tested.

    The reference document used for this process was requirement document and the goal was

    to see if the software meets its requirements.System testing includes the thorough testing of the product. System testing is actually a

    series of different tests whose primary purpose is to fully exercise the computer based

    system. The tests are recovery testing: this checks the recovery of the system when failure

    occurs. This is to ensure that there are recovery procedures for error occurrences.System testing involves unit testing, integration testing, acceptance testing. Careful

    planning and scheduling are required to ensure that modules will be available for

    integration into the evolving software product when needed.

    A test plan has the following steps:

    Prepare test plan

    Specify conditions for user acceptance testing

  • 8/2/2019 Final Music Report

    51/69

    Prepare test data for program testing

    Prepare test data for transaction path testingPlan user testing

    Compile/Assemble program

    Prepare job performance aids

    Prepare operational documents

    Objectives of testing.

    First of all objectives should be clear.

    Testing as a p