Sei sulla pagina 1di 34

Chapter 1

1.1 ORGANIZATION PROFILE

1.1.1 SMAAK TECHNOLOGIES Our "Brilliant Business" strategy builds on our proficiency in consulting, development technology and outsourcing perfect source to help clients perform at the highest positions so they can craft sustainable value for their customers and shareholders. By using our industry experience, service-offering expertise and technology standards, we recognize new business and technology trends and develop solutions to help clients.

1.1.2 The Organization Smaak Technologies is a leading solution provider for Internet based applications. Established in2012, The Company has been promoted by some highly experienced Professionals dedicated to provide total IT solutions under one roof. It possesses not only the latest technology gadgets but also the most knowledgeable and experience hands to offer most user friendly customizedsolutions.

Smaak Technologies provides high quality on site services for software development and the end users on a broad range of hardware & software platforms and latest technologies. Within the first year of its operations, Smaak Technologies has carved a niche for itself in the IT industry and has increased its business by acquiring some major domestic projects. No doubt the company has been able to make a name for itself in a relatively short span of time only because of its ability and commitments to ensure customer satisfaction by rewarding quality work on right time and in a right manner.

1.1.3 The Mission At Smaak Technologies with Technical proficiency and expertise, we cohesively integrate graphic design with web page layout, with interactive programming, with database driven content, to plan, build and deploy e- business and to emerge as one of the top IT service provider. 1

1.1.4 Philosophy The business philosophy of the company is to lay emphasis on Human Values and Personal Relations. 'At Smaak Technologies - Technology meets emotions and limits are higher than the sky.' Great stress is laid on proper communication, transparency and human relations, which forms an integral part of the corporate culture. At Smaak Technologies, we not only develop products but we develop relationships. We at Smaak Technologies believe in teamwork. With every new day the quest for acquiring new competencies continues. Forever searching, experimenting, innovating, learning, moving ahead with our sincere efforts and dedication, shaping the future, and challenging our Competencies to create new opportunities, is a neverending process in the company 1.2ABSTRACT A common example of a workflow is a leave approval workflow, where a student requests leave and the lecturer approve it, reject it or send it back to the student for corrections. If lecturer is approved mean its going to head of the department for approval. Once he approved student getting update leave granted. Typically, the process is paper or email-based. The Student fills out a paper form and hands it to the lecturer for a signature. Using Live Forms, you can automate this workflow so that it is completely electronic and paperless. Further, you can integrate the workflow with a leave management system your database or custom system so that the leave approvals are stored online.

Chapter 2
2. SYSTEM CONFIGURATION 2.1 HARDWARE CONFIGURATION

Processor RAM Hard Disk Capacity Display Device

: : : :

Minimum 4 core Minimum 4 GB 250 GB 14 Color Monitor

2.2 SOFTWARE CONFIGURATION

Operating System Presentation Layer Business Layer Application Layer Database Layer

: :

Windows server 2008 R2 / Windows 7 SharePoint server 2010 Visual Studio 2010

: :

SharePoint server 2010 SQL Server 2008

2.2.1 Internet The Internet is the World Largest Computer Network. It is precisely being called as

Network of Networks. The various separate network in the World are interlinked to form one entity that are communicated through a Protocol usually TCP/IP (Transmission Control Protocol / Internet Protocol). The Internet is also known as CYBERSPACE, INFORMATION SUPER HIGHWAY.

A set of computer networks that made up of a large number of smaller networks using different networking Protocols. The Worlds largest computing network consisting of over two million computer supporting over 20 million users in almost 200 different countries. The 3

Internet is growing a phenomenal rate between 10 and 15 percent. So any size estimates are quickly out of date. Internet is originally established to meet the original needs of the U.S Defence Industry. But it has grown into a huge global network serving Universities, Academic Researches, Commercial Interest and Government agencies, both in the U.S and Overseas. The Internet

uses TCP/IP Protocols and many of the Internet hosts run the Unix Operating System.

2.2.2 Windows Server 2008 Windows Server 2008 is built from the same code base as Windows Vista; therefore, it shares much of the same architecture and functionality. Since the code base is common, it automatically comes with most of the technical, security, management and administrativefeatures new to Windows Vista such as the rewritten networking stack (native IPv6, native wireless, speed and security improvements); improved image-based installation, deployment and recovery; improved diagnostics, monitoring, event logging and reporting tools; new security features such as BitLocker and ASLR (address space layout randomization); improved Windows Firewall with secure default configuration; .NET Framework 3.0 technologies, specifically Windows Communication Foundation, Microsoft Message Queuing and Windows Workflow Foundation; and the core kernel, memory and file system improvements. Processors and memory devices are modeled as Plug and Play devices, to allow hot-plugging of these devices. This allows the system resources to be partitioned dynamically using Dynamic Hardware Partitioning; each partition has its own memory, processor and I/O host bridge devices independent of other partitions. Windows NT 3.x-style file save dialog in Server Core Notepad (Windows Explorer is removed, along with its file dialogs) Windows Server 2008 includes a variation of installation called Server Core. Server Core is a significantly scaled-back installation where no Windows Explorer shell is installed. All configuration and maintenance is done entirely through command-line interface windows, or by connecting to the machine remotely using Microsoft Management Console. However, Notepad and some control panel applets, such as Regional Settings, are available.

Server Core does not include the .NET Framework, Internet Explorer, Windows PowerShell or many other features not related to core server features. A Server Core machine can be configured for several basic roles: Domain controller/Active Directory Domain Services, ADLDS (ADAM), DNS Server, DHCP server, file server, print server, Windows Media Server, IIS 7 web server and Hyper-V virtual server. Server Core can also be used to create a cluster with high availability using failover clustering or network load balancing.

Andrew Mason, a program manager on the Windows Server team, noted that a primary motivation for producing a Server Core variant of Windows Server 2008 was to reduce the attack surface of the operating system, and that about 70% of the security vulnerabilities in Microsoft Windows from the prior five years would not have affected Server Core.

2.2.3 Active Directory roles Active Directory roles are expanded with identity, certificate, and rights management services. Active Directory, until Windows Server 2003, allowed network administrators to centrally manage connected computers, to set policies for groups of users, and to centrally deploy new applications to multiple computers. This role of Active Directory is being renamed as Active Directory Domain Services (ADDS). A number of other additional services are being introduced, including Active Directory Federation Services (ADFS), Active Directory Lightweight Directory Services (AD LDS), (formerly Active Directory Application Mode, or ADAM), Active Directory Certificate Services (ADCS), and Active Directory Rights Management Services (ADRMS). Identity and certificate services allow administrators to manage user accounts and the digital certificates that allow them to access certain services and systems. Federation management services enable enterprises to share credentials with trusted partners and customers, allowing a consultant to use his company user name and password to log in on a client's network. Identity Integration Feature Pack is included as Active Directory Met directory Services. Each of these services represents a server role. 2.2.2.10 Failover Clustering Windows Server 2008 offers high-availability to services and applications through Failover Clustering. Most server features and roles can be kept running with little to no downtime. 5

In Windows Server 2008 and Windows Server 2008 R2, the way clusters are qualified changed significantly with the introduction of the cluster validation wizard.[11] The cluster validation wizard is a feature that is integrated into failover clustering in Windows Server 2008 and Windows Server 2008 R2. With the cluster validation wizard, an administrator can run a set of focused tests on a collection of servers that are intended to use as nodes in a cluster. This cluster validation process tests the underlying hardware and software directly, and individually, to obtain an accurate assessment of how well failover clustering can be supported on a given configuration. Note: This feature is only available in Enterprise and Datacenter editions of Windows Server. 2.2.5 Self-healing NTFS In Windows versions prior to Windows Vista, if the operating system detected corruption in the file system of an NTFS volume, it marked the volume "dirty"; to correct errors on the volume, it had to be taken offline. With self-healing NTFS, an NTFS worker thread is spawned in the background which performs a localized fix-up of damaged data structures, with only the corrupted files/folders remaining unavailable without locking out the entire volume and needing the server to be taken down. The operating system now features S.M.A.R.T. detection techniques to help determine when a hard disk may fail. 2.2.6 Hyper-V Hyper-V is hypervisor-based virtualization software, forming a core part of Microsoft's virtualization strategy. It virtualizes servers on an operating system's kernel layer. It can be thought of as partitioning a single physical server into multiple small computational partitions. Hyper-V includes the ability to act as a Xeon virtualization hypervisor host allowing Xeon-enabled guest operating systems to run virtualized.[13] A beta version of Hyper-V shipped with certain x86-64 editions of Windows Server 2008, prior to Microsoft's release of the final version of Hyper-V on 26 June 2008 as a free download. Also, a standalone version of Hyper-V exists; this version supports only x86-64 architecture.[14] While the IA-32 editions of Windows Server 2008 cannot run or install HyperV, they can run the MMC snap-in for managing Hyper-V.

2.2.7 Windows System Resource Manager Windows System Resource Manager (WSRM) is integrated into Windows Server 2008. It provides resource management and can be used to control the amount of resources a process or a user can use based on business priorities. Process Matching Criteria, which is defined by the name, type or owner of the process, enforces restrictions on the resource usage by a process that matches the criteria. CPU time, bandwidth that it can use, number of processors it can be run on, and allocated to a process can be restricted. Restrictions can be set to be imposed only on certain dates as well. 2.2.8 Server Manager Server Manager is a new roles-based management tool for Windows Server 2008.[15] It is a combination of Manage Your Server and Security Configuration Wizard SCW from Windows Server 2003. Server Manager is an improvement of the Configure my server dialog that launches by default on Windows Server 2003 machines. However, rather than serve only as a starting point to configuring new roles, Server Manager gathers together all of the operations users would want to conduct on the server, such as, getting a remote deployment method set up, adding more server roles etc., and provides a consolidated, portal-like view about the status of each role. 2.2.9 SharePoint server 2010 Microsoft SharePoint is a Web application platform developed by Microsoft. First launched in 2001, SharePoint has historically been associated with intranet content management and document management, but recent versions have significantly broader capabilities. SharePoint comprises a multipurpose set of Web technologies backed by a common technical infrastructure. By default, SharePoint has a Microsoft Office-like interface, and it is closely integrated with the Office suite. The web tools are designed to be usable by non-technical users. SharePoint can be used to provide intranet portals, document & file management, collaboration, social networks, extranets, websites, enterprise search, and business intelligence. It also has system integration, process integration, and workflow automation capabilities.

Enterprise application software (e.g. ERP or CRM packages) often provide some SharePoint integration capability, and SharePoint also incorporates a complete development stack based on web technologies and standards-based APIs. As an application platform, SharePoint provides central management, governance, and security controls for implementation of these requirements. The SharePoint platform integrates directly into IIS - enabling bulk management, scaling, and provisioning of servers, as is often required by large organizations or cloud hosting providers. In 2008, the Gartner Group put SharePoint in the "leaders" quadrant in three of its Magic Quadrants (for search, portals, and enterprise content management). SharePoint is used by 78% of Fortune 500 companies.[citation needed] Between 2006 to 2011, Microsoft sold over 36.5 million user licenses. Microsoft has two versions of SharePoint available at no cost, but it sells premium editions with additional functionality, and provides a cloud service edition as part of their Office 365 platform (previously BPOS). The product is also sold through a cloud model by many thirdparty vendors.

The SharePoint wheel

The SharePoint wheel Microsoft's SharePoint 2010 marketing refers to the "SharePoint Wheel" to describe what SharePoint's tools can facilitate inside organizations. The wheel refers to six outcomes:

Sites: A site is a contextual work environment. Once SharePoint is configured, these sites can be created without any requirement for specialized knowledge. A context for a site may be organization-wide, or it may be specific to an individual team or group. Communities: A community is a place where communication and understanding happens. Communities can occur around any context, and will typically develop around either shared knowledge, or shared activities (such as collaboration). Content: SharePoint provides management of documents and work items that need to be stored, found, and collaborated on, updated, managed, documented, archived, traced or restored in accordance with relevant compliance or governance policies. Search: Look for relevant communities, content, people, or sites: search is based on keywords, refinement, and content analysis. Insights: Information from any part of the organization can be surfaced inside useful contexts, providing information that can improve effectiveness. Composites: SharePoint enables no-code integration of data, documents and processes to provide composite applications ("mash-ups" based on internal data). 2.2.10 Applications The most common uses of SharePoint include: 2.2.10.1 Intranet portal A SharePoint intranet portal is a way to centralize access to enterprise information and applications on a corporate network. It is a tool that helps a company manage its data, applications and information more easily. This has organizational benefits such as increased employee engagement, centralizing process management, reducing new staff on-boarding costs, and providing the means to capture and share tacit knowledge (e.g. via tools such as wikis/blogs).

2.2.10.2 Enterprise content and document management SharePoint is often used to store and track electronic documents or images of paper documents. It is usually also capable of keeping track of the different versions created by different users.

In addition to being a platform for digital record management systems that meet government and industry compliance standards, SharePoint also provides the benefit of a central location for storing and collaborating on documents, which can significantly reduce emails and duplicated work in an organization.

2.2.10.3 Extranet sites SharePoint can be used to provide password-protected, web-facing access to people outside an organization. Organizations often use functionality like this to integrate third parties into supply chain or business processes, or to provide a shared collaboration environment. SharePoint provides an Alternative Access Mapping, or AAM, which allows the same 'site' to be surfaced via a number of different URLs, each URL can have its own authentication technology allowing the same site to be both an intranet on one network while an extranet to outside users. 2.2.10.4 Internet sites Using the 'Publishing' features, SharePoint can be used to manage larger public websites. 2.2.10.5 Configuration and customization Web-based configuration SharePoint offers a fluent ribbon user that should be familiar to users of Microsoft Office 2007 and later. This interface provides a general user interface for manipulating data, page editing ability, and the ability to add functionality to sites. Manipulate content in lists & libraries, pages and sites. Copy, create, delete, or rename lists & libraries, pages, sites and web-parts Manage user permissions, and view document/page version histories Manage definitions and properties of lists & libraries, pages, sites and web-parts & many others.

2.2.10.6SharePoint Designer Integration & Development Models The SharePoint 'Client Object Model' (available for JavaScript, Silverlight, and .NET), and REST/SOAP APIs can be referenced from within a custom page or feature. 10

'Sand-boxed' plugins can be uploaded by any end-user who has been granted permission. These are security-restricted, and can be governed at multiple levels (including resource consumption management). In multi-tenant cloud environments, these are the only customizations that are typically allowed. Farm features are typically fully trusted code that need to be installed at a farm-level. Service applications It is possible to integrate directly into the SharePoint SOA bus, at a farm level. Customizations may be surfaced via Application-to-application integration with SharePoint Extensions to SharePoint functionality (e.g. custom workflow actions) 'Web Parts' (also known as "portlets", "widgets", or "gadgets") that provide New functionality when added to a page Pages/sites or page/site template Core platform functionality Sites 2.2.10.7 SharePoint 2010 Enterprise - 'Create Site' screen A SharePoint Site is a collection of pages, lists, and libraries configured for the purpose of achieving an express goal. A site may contain sub-sites, and those sites may contain further sub-sites. Typically, sites need to be created from scratch, but sites can also be created according to pre-defined templates that provide packaged functionality. Examples of Site templates in SharePoint include: Blogs, MySites, collaboration (team) sites, document workspaces, groupwork sites, and meeting workspaces. Sites have navigation, themes/branding, custom permissions, workflows, and have the ability to be configured or customized in a number of ways. In order to achieve a greater degree of maintainability, sites typically inherit site-level settings from their parent sites. 2.2.10.8 Lists& libraries Lists and libraries are stored in SharePoint Sites. A List can be thought of as a collection of pieces of information all of which (typically) have the same properties.

11

This could be considered similar to a database table. For instance, you can have a list of links called "my links", where each item has a URL, a name, and a description. Lists have many features such as workflows, item-level or list-level permission, version history tracking, multiple content-types, external data sources, and many more features. Some of these features depend on the version of SharePoint that is installed. A Library is a list where each item in the list refers to a file that is stored in SharePoint. Libraries have all the same behaviors as lists, but because libraries contain files, they have extra features. One of these is the ability to be opened and modified through a compatible WebDAV client (e.g. Windows Explorer). Microsoft SharePoint comes with some pre-defined list and library definitions. These include: Announcement Lists, Blogs, Contacts, Discussion Boards, Document Libraries, External Content (BCS) lists, Pages, Surveys, and Tasks. Some of these pre-defined lists have additional integration. For example, lists based on the contact content-type, and lists created using the calendar list template can be synced directly with Microsoft Outlook.

2.2.10.9Web-parts Web-parts are sections that can be inserted into Pages in SharePoint sites. These sections are UI Widgets whose typical uses are Displaying content defined in the web-part's settings (e.g. custom content or an iFrame) Displaying items from Lists/Libraries (this can be customized in SharePoint Designer, using XSLT&CAML) Providing access to features in the SharePoint platform (e.g. Search) Providing a user interface into other products (e.g. Microsoft Reporting Services, Microsoft Office PerformancePoint Server or a variety of third party systems). Web-parts based on completely custom code can be built in Microsoft Visual Studio 2010 and uploaded by end-users to SharePoint as packaged, sandboxed features. Due to the prevalence of SharePoint, third-party vendors often provide SharePoint webparts for intranet sites. Web-parts also support connections to other web-parts on the page, providing the ability to construct relatively complex pages without the need to build additional code. 12

SharePoint Web-parts were formerly implemented separately from ASP.NET Web-parts, but as of SharePoint 2007, SharePoint's Web-parts are now based on it.

2.2.10.10Pages SharePoint has three primary page content-types: Wiki pages, Web-part pages, and Publishing Pages. Unlike prior versions of SharePoint, the default page type is a 'Wiki Page', which enables free-form editing based on the ribbon toolbar. It is possible to insert Web-parts into any page type.

2.2.10.11 Search SharePoint Foundation contains a limited search engine. Microsoft produces a free product called Microsoft Search Server Express to complement SharePoint Foundation. Different SharePoint search versions offer different features, including the ability to search within documents and except in cloud environments across external data sources (such as file systems). You can read a SharePoint Enterprise Search features deep comparison. 2.3 MODULES: 1. Admin Students Detail Workflow creation Permission assign for students Permission assign for Lecturer Permission assign for HOD

2. Approvers (lecturer & HOD) View Student details Edit Student details Edit the approval page Approve the student leave

13

3. Users (Students) Create leave details View Student leave history Edit Student leave history

Admin:The Admin module is the top level module for creating users (students) and providing permissions to the users and lectures and HODs. The admin is the responsible for the maintain the whole students and lecturers leave details .And also admin have a full rights for delete the oldest leave details and update the leave management system. Admin can only view the leave details of both students and lecturers. The admin creates the workflow and assign the permission to the students and lecturers and HODs.

Approvers:The lecturer accepted the leave approval from student and approves it, reject it or send it back to the student with reason. The approvers can able to view the students leave details and also able to edit the students leave form. The approvers can edit the approval form and if suppose the corresponding approver was busy in the sense the approval form will be redirected to another approver.

Users :Students were created and applied the leave or edit the already applied leave and view the leave history. If the students were applied the workflow will be stared. The workflow was the serial process, if the lecture granted the leave request from the student, after that the request goes to the HOD: otherwise the student got the acknowledgement from the lecturer (rejected by lecturer).

14

SYSTEM ANALYSIS

15

16

17

18

19

20

21

22

23

24

25

26

27

28

SYSTEM TESTING

29

Chapter 5 5 SYSTEM TESTING


The development of software systems involves a series of production activities where opportunities for injection of human fallibilities are enormous. Errors may begin to occur at the very inception of the process where the objectives may be erroneously or imperfectly specified, as well as[errors that occur in] later design and development stage. Because of human inability to perform and communicate with perfection, software development is accompanied by a quality assurance activity. System testing begins by testing program modules separately followed by testing bundled modules as a unit .The total system as a single unit is tested for recovery and feedback after various major failures to ensure that no data are lost during the emergency. 5.1 ONLINE RESPONSE: Online systems must have a response time that will not cause a hardship to the user. One way to list this to input transactions on as many CRTY screens as would normally be used in peak hours of the time the response to each online function is performed quickly to establish a performance level. 5.2 RECOVERY AND SECURITY: A forced system failure is indeed to test a backup recovery procedure for fill integrity. Inaccurate data are entered to see how the system responds inters of error detection and protection. System testing is the stage of implementation, which is aimed at ensuring that the system works accurately and efficiently as expected before live operation commences. It verifies that the whole set of programs hangs together. System testing requires a test plan that consists of several keys The implementation of newly designed package is important in adopting a successful new system.

30

Testing is an important stage in software development .The system test in implementation should be confirmed that the system that the system works as expected. It accounts the largest percentage of technical effort in the software development process. Testing phase in the development cycle validates the codes against the functional specification .Testing is vital to the system goals. The objectives of the testing are to discover errors. To fulfill this objectives a series of test step unit, integration, validation and output testing were planned and executed. Software testing is a critical element of software quality assurance and represents the ultimate review of specification, design and coding. 5.3 TESTING OBJECTIVES Testing is process of executing a program with the intent of finding and error. A good test case is one that has a high probability of finding as yet undiscovered error. A successful test is one that uncovers an as yet undiscovered error. 5.4 TESTING The goal of testing is to improve the programs quality. Quality is assured primarily through some form of software testing. The history of testing goes back to the beginning of the computing field. Testing is done at two Levels of Testing of individual modules and testing the entire system. During the system testing, the system is used experimentally to ensure that the software will run according to the specifications and in the way the user expects. Testing is very tedious and time consuming. Each test case is designed with the intent of finding errors in the way the system will process it. 5.5 LEVELS OF TESTING The software underwent the following tests by the system analyst.

31

5.5.1 WHITE BOX TESTING By using this technique it was tested that all the individual logical paths were executed at least once. All the logical decisions were tested on both their true and false sides. All the loops were tested with data in between the ranges and especially at the boundary values. 5.5.2 BLACK BOX TESTING By the use of this technique, the missing functions were identified and placed in their positions. The errors in the interfaces were identified and corrected. This technique was also used to identify the initialization and termination errors and correct them. 5.5.3 UNIT TESTING It is the verification of a single module usually in the isolated environment. The System Analyst tests each and every module individually by giving a set of known input data and verifying for the required output data. The System Analyst tested the software Top Down model starting from the top of the model. The units in a system are the modules and routines that are assembled to perform a specific function. The modules should be tested for correctness of login applied and should detect errors in coding. This is the verification of the system to its initial objective. This is a verification process when it is done in a simulated environment and it is a validation process when it is done in a line environment. 5.5.4 INTEGRATION TESTING The purpose of unit testing is to determine that each independent module is correctly implemented. This gives little chance to determine that the interface between modules is also correct and for this reason integration testing must be performed. One specific target of integration testing is the interface. Whether parameters match on both sides as to type, permissible ranges, meaning and utilization. Module testing assures us that the detailed design was correctly implemented; now it is necessary to verity that the architectural design specifications were met. Chosen portions of the structure tree of the software are put together. Each sub tree should have some logical reason for being tested.

32

It may be a particularly difficult or tricky part of the code; or it may be essential to the function of the rest of the product. As the testing progresses, we find ourselves putting together larger and longer parts of the tree, until the entire product has been integrated. 5.5.5VALIDATION TESTING The main aim of this testing is to verify that the software system does what it was designed for the system was tested to ensure that the purpose of automating the system Machine Order. Alpha testing was carried out to ensure the validity of the system. 5.5.6 OUTPUT TESTING Asking the users about the format required by them tests the outputs generated by the system under consideration .The output format on the screen is found to be correct as the format was designed in the system design. Output testing was done and it did not result in any change or correction in the system. 5.5.7 USER ACCEPTANCE TESTING The system under consideration is tested for user acceptance by constantly keeping in touch with prospective system users at time of developing and making changes whenever required. The following points are considered. Input screen design Output screen design Online message to guide the user Menu driven system Format of ad hoc queries and reports 5.5.8 PERFORMANCE TESTING Performance is taken as the last part of implementation. Performance is perceived as response time for user queries, report generation and process related activities. 33

5.5.9 NATURE OF TESTING DATA The proper choice of testing data is as important as the test itself. Test data used was live data for opposition and reports modules. Both live as well as artificial data for examination and allocation modules.

34

Potrebbero piacerti anche