mba project

Published on May 2016 | Categories: Types, School Work | Downloads: 76 | Comments: 0 | Views: 366
of 58
Download PDF   Embed   Report

Comments

Content

1
INTRODUCTION OF THE ORGANIZATION

 Overview :
CMC Limited a Tata Enterprise is a premier information technology company
with an all India presence having ISO 9001-2000 certification for its R&D
center & System Integration (NR group). CMC Limited has been conducting
computer-training program for various organizations since 1978. Large and
complex project management capabilities since its incorporation in 1975,
CMC has an enviable record of successfully building IT solutions for massive
and complex infrastructure and market projects.


Departmental Functions:

Take, for instance, just three of the many major projects undertaken by
CMC:
 A passenger ticketing and reservations system for Indian Railways,
which runs 6,000 passenger trains carrying over 10million passengers a
day, on a 90,000-km railway network covering around 8,000 railway
stations.
 Cargo handling system is a comprehensive online real time cargo
handling system to integrate all complex and varied activities of
container terminals. This system has been implemented for several
Indian and International ports.
 An online transaction processing system for the Bombay Stock
Exchange, which handles millions of securities trading transactions
every day.

2
CMC LTD has been imparting corporate trainings for the renowned
leading organizations like Tech Mahindra, HCL Technologies, Tata
Consultancy Services Tata motors and so on. We have already Trained
400 employees of Tech Mahindra & more than 800 employees of HCL
under ILP since July 2006. We are also proud to have world-class
trainers for providing in-depth understanding of the topics. Apart from
that we have tie-ups with various academic institutions imparting
technical education such as engineering colleges pan India for Project
based Industrial training on .Net / JAVA / PHP / Embedded Systems and
Oracle

OPERATING SYSTEM

3

Windows Seven is a line of operating systems developed by Microsoft for use
on personal computers, including home and business desktops, laptops, tablet
PCs, and media center PCs. Prior to its announcement on July 22, 2008R2,
Windows Seven was known by its codename "Longhorn”. The release of
Windows Seven came more than five years after the introduction of its
predecessor, Windows XP, the longest time span between successive releases of
Microsoft Windows desktop operating systems.
Windows Seven contains many changes and new features, including an updated
graphical user interface and visual style dubbed Aero, a redesigned search
function, multimedia tools including Windows DVD Maker, and redesigned
networking, audio, print, and display sub-systems. Seven aims to increase the
level of communication between machines on a home network, using peer-topeer technology to simplify sharing files and media between computers and
devices. Windows Seven includes version 3.0 of the .NET Framework, allowing
software developers to write applications without traditional Windows APIs.

4
Microsoft's primary stated objective with Windows Seven has been to improve
the state of security in the Windows operating system. One common criticism of
Windows XP and its predecessors is their commonly exploited security
vulnerabilities and overall susceptibility to malware, viruses and buffer
overflows.
 NEW OR CHANGED FEATURES:
Windows Seven developed features and functionalities not present in its
predecessors, especially those from Windows XP. Few of them are:
 Windows Aero: The new hardware-based graphical user interface
is named Windows Aero, which Jim Allchin stated is an acronym
for Authentic, Energetic, Reflective, and Open. The new interface
is intended to be cleaner and more aesthetically pleasing Laptop
users report, however, that battery life is shortened with the feature
enabled.
 Windows Shell: The new Windows shell is significantly different
from Windows XP. Windows Explorer's task pane has been
removed, integrating the relevant task options into the toolbar. A
"Favorite links" pane has been added, enabling one-click access to
common directories. The address bar has been replaced with a
breadcrumb navigation system. The Start menu has changed as
well; it no longer uses ever-expanding boxes when navigating
through Programs. The word "Start" itself has been removed in
favor of a blue Windows Pearl.
 Instant Search (also known as search as you type) : Windows
Seven features a new way of searching called Instant Search, which
is significantly faster and more in-depth (content-based) than the
search features found in any of the previous versions of Windows.
 Windows Sidebar: A transparent panel anchored to the side of the
screen where a user can place Desktop Gadgets, which are small
applets designed for a specialized purpose (such as displaying the
weather or sports scores). Gadgets can also be placed on other parts
of the desktop.
 Windows Internet Explorer 8: IE8 in Windows Seven runs in
isolation from other applications in the operating system (protected
mode); exploits and malicious software are restricted from writing
to any location beyond Temporary Internet Files without explicit
user consent.

5
 Disk Management: The Logical Disk Manager in Windows Seven
supports shrinking and expanding volumes on-the-fly.
 Parental controls: Allows administrators to control which
websites, programs and games each Limited user can use and
install. This feature is not included in the Business or Enterprise
editions of seven.
 Games and Games Explorer: Games included with Windows
have been modified to showcase Seven's graphics capabilities.
New games are Chess Titans, Mahjong Titans and Purble Place. A
new Games Explorer special folder contains shortcuts and
information to all games on the user's computer.
 Windows Side Show: Enables the auxiliary displays on newer
laptops or on supported Windows Mobile devices. It is meant to be
used to display device gadgets while the computer is on or off.
 Windows Mail: A replacement for Outlook Express that includes a
new mail store that improves stability, and features integrated
Instant Search. It has the Phishing Filter like IE8 and Junk mail
filtering that is enhanced through regular updates via Windows
Update.
 Windows Photo Gallery: A photo and movie library management
application. It can import from digital cameras, tag and rate
individual items, adjust colors and exposure, create and display
slideshows (with pan and fade effects) and burn slideshows to
DVD.
 Windows Media Player 11: New features in this version include
word wheeling (or "search as you type"), a new GUI for the media
library, photo display and organization, the ability to share music
libraries over a network with other Windows Seven machines,
Xbox 360 integration, and support for other Media Center
Extenders.

6
Security-related:
Improved security was a primary design goal for seven. User Account Control,
or UAC is perhaps the most significant and visible of these changes. UAC is a
security technology that makes it possible for users to use their computer with
fewer privileges by default, with a view to stopping malware from making
unauthorized changes to the system. This was often difficult in previous
versions of Windows, as the previous "limited" user accounts proved too
restrictive and incompatible with a large proportion of application software, and
even prevented some basic operations such as looking at the calendar from the
notification tray. In Windows Seven, when an action is performed that requires
administrative rights (such as installing/uninstalling software or making systemwide configuration changes), the user is first prompted for an administrator
name and password; in cases where the user is already an administrator, the user
is still prompted to confirm the pending privileged action. Regular use of the
computer such as running programs, printing, or surfing the Internet does not
trigger UAC prompts. User Account Control asks for credentials in a Secure
Desktop mode, in which the entire screen is dimmed, and only the authorization
window is active and highlighted.

BACK END

7

 SQL Server 2008R2
SQL Server is SQL-compliant RDBMS. SQL-compliant means it use the ANSI
(American National Standard Institute) version of Structured Query Language
or ‘SQL’. Structured Query Language is a command that allow us to modify or
retrieve information from the database.
Client /Server mean that SQL Server is designed to store data in the central
location (the server) and deliver it on demand to numerous other locations (the
client). SQL Server is also a Relational Database Management System
(RDBMS).

FEATURES OF SQL SERVER 2008R2
For Database Administration:
Online Restore: With SQL Server 2008R2, database administrators are able to
perform a restore operation while an instance of SQL Server is running. Online
restore improves the availability of SQL Server because only the data being
restored is unavailable; the rest of the database remains online and available.
Fast Recovery: A new faster recovery option improves availability of SQL
Server databases. Administrators can reconnect to a recovering database after
the transaction log has been rolled forward.

8
SQL Server Management Studio: SQL Server 2008R2 includes SQL Server
Management Studio, a new integrated suite of management tools with the
functionality to develop, deploy, and troubleshoot SQL Server databases, as
well as enhancements to previous functionality.
Data Partitioning: Data partitioning is enhanced with native table and index
partitioning that enables efficient manageability of large tables and indexes.
For Development:
Hosted Common Language Runtime: With SQL Server 2008R2 developers
can create database objects using familiar languages such as Microsoft Visual
C# .NET and Microsoft Visual Basic .NET. Developers can also create two new
objects—user-defined types and aggregates.
Native XML Support: Native XML data can be stored, queried, and indexed in
a SQL Server database—allowing developers to build new classes of connected
applications around Web services and across any platform or device.
ADO.NET version 2.0: From new support for SQL Types to Multiple Active
Result Sets (MARS), ADO.NET in SQL Server 2008R2 evolves dataset access
and manipulation to achieve greater scalability and flexibility.
Security Enhancements: The security model in SQL Server 2008R2 separate
users from objects, provides fine-grain access, and enables greater control of
data access. Additionally, all system tables are implemented as views, providing
more control over database system objects.
ENTERPRISE MANAGER
SQL Server Enterprise Manager is a graphical tool that allows easy
configuration and management of Microsoft SQL Server and SQL 2008R2
program group.
SQL Server Enterprise Manager can also be used to





Manage Logins, permission and users.
Create a database
Take back-up of database and transaction logs
Manage tables

Query Analyzer

9
The SQL Server Query Analyzer allows us to create adhoc queries and run them
interactively. We may also execute Transact-SQL statements stored in text file
and view the result in result plane or result grid. The Query Analyzer also has a
color-coded editor to assist the user with checking of syntax. It also has context
sensitive help.
Queries are processed in two steps
 Interpret – First the queries are checked for syntax.
 Execute - Then the processing take place.
SQL Stored Procedures
A precompiled collection of Transact-SQL statements stored under a name and
processed as unit. SQL SERVER supplies stored procedures for managing SQL
SERVER and displaying information about databases and users. SQL SERVER
supplied stored procedures are called System stored procedures. A stored
procedure is a group of Transact-SQL statements compiled into a single
execution plan.
Benefits of Stored Procedures
 Precompiled execution: SQL Server compiles each stored procedure
once and then reutilizes the execution plan. This results in tremendous
performance boosts when stored procedures are called repeatedly.
 Reduced client/server traffic: If network bandwidth is a concern in your
environment, you'll be happy to learn that stored procedures can reduce
long SQL queries to a single line that is transmitted over the wire.
 Efficient reuse of code and programming abstraction: Stored
procedures can be used by multiple users and client programs. If you
utilize them in a planned manner, you'll find the development cycle takes
less time.
 Enhanced security controls: You can grant users permission to execute
a stored procedure independently of underlying table permissions.

10
FRONT END

Microsoft Visual Studio is an integrated development environment (IDE) from
Microsoft. It is used to develop console and graphical user interface applications
along with Windows forms applications ,web sites, web applications, and web
services in both native code together with managed code for all platforms
supported by Microsoft Windows, Windows mobile, Windows CE, .NET
Framework, .NET compact framework and Microsoft Silverlight.

FEATURES OF VISUAL STUDIO 2010:
 Multi-Targeting support.
 Web Designer and CSS support.
 ASP.NET AJAX and JavaScript support.

11
 Project Designer.
 JavaScript Intellisense.
 LINQ – Language Integrated Query.
 Windows Presentation Foundation (WPF).
 Enhanced Debugger.
 New Reporting Features.
 Organize your "using" statements
 Editing Nested Master Pages
 Visual Studio 2010 Split View.
.NET FRAMEWORK
We'll close our introductory look at the .NET platform with a list of new
features that are unique to ASP.NET and the chapter in which each will be
discussed.
Web Forms
A new feature that, in combination with an editor such as Visual
Studio .NET provides the ASP.NET developer the same drag and drop
development convenience enjoyed by Visual Basic developers for years.
Web Forms improve the speed of development by encapsulating
frequently used features into server controls, which are declared using a
tag-based syntax similar to HTML and XML.
Web services
Web services allow developers to expose the functionality of their
applications via HTTP and XML so that any client who understands these
protocols can call them. Web services can make the task of application
integration easier, particularly in situations in which application-toapplication integration is made difficult by firewalls and/or differing
platforms.

12
Server controls
Server controls are declared using an HTML-like syntax, making them
easier to work with for page UI designers. They are executed on the
server, returning HTML to the browser. Server controls may be
manipulated on the server programmatically and provide power and
flexibility for applications that must support a variety of browsers.

Validation
One group of server controls is designed to simplify the task of validating
user input. It includes controls to validate required fields, to compare one
field to another or to a specific value for validation, and to validate user
input using regular expressions, which allow you to specify a format that
user input must follow to be valid.
Improved security
ASP.NET offers tighter integration with Windows-based authentication,
as well as two new authentication modes: forms-based authentication
(which allows users to enter authentication credentials in a standard
HTML form, with the credentials validated against your choice of
backend credential store) and Passport authentication (which makes use
of Microsoft's Passport authentication service).
Features in ASP.NET v1.1
In Version 1.1 of the .NET Framework, several features have been added that
are of interest to ASP.NET developers. These include:
Request Validation
Request Validation, when enabled (the default), checks all forms of
posted input (form fields, query string, etc.) and raises an exception if any
HTML or script code is found. This can help prevent cross-site scripting
attacks in your applications.

13
Side by side execution
Starting with ASP.NET 1.1, you can choose which version of the .NET
Framework your application will run against. Assuming you have both
Version 1.0 and Version 1.1 installed, you can configure individual
applications to run against either version.
Built-in mobile control support
In Version 1.0, support for targeting mobile devices such as cell phones
and PDAs was provided via a set of controls available as a separate
download. In Version 1.1, these controls have been fully integrated into
the .NET Framework, and a new application type has been added to
Visual Studio .NET 2003 to support development of ASP.NET
applications for mobile devices.
ADO.NET enhancements
In Version 1.0, developers wishing to access data from Oracle and/or ODBC
data sources had to download and install a separate data provider for these data
sources. In Version 1.1, the ODBC and Oracle data providers have been
integrated into the .NET Framework.
ASP.NET Web Applications
The ASP.NET Web Application is the type of application most developers will
work with on a regular basis. The terminology comes from the description used
in the Visual Studio .NET environment to describe the project type used to
create this type of application. You may also hear this type of application
described as an ASP.NET Web Forms Application. For reasons we'll explore in
the next chapter, we prefer the former term.
An ASP.NET Web Application, in its simplest form, consists of a directory
made available via HTTP using the IIS administration tool or through the Web
Sharing tab of a folder's Properties dialog (or by creating a web application
project in Visual Studio .NET) and at least one ASP.NET page, designated by
the .aspx file extension. This file (or files), whose structure we'll discuss in
detail in the next chapter, typically contains a mix of HTML and server-side
code. This HTML and server-side code combine to create the final output of the
page, typically consisting of HTML markup that is sent to the client browser.

14
ASP.NET Mobile Web Applications
The ASP.NET Mobile Web Application is a subtype of Web Application specific
to developing for mobile devices such as cell phones and PDAs. The primary
thing that distinguishes a mobile web application from a standard web
application in ASP.NET is the use of the ASP.NET mobile controls, which are
built into the .NET Framework as of Version 1.1. These include the mobile
Form control and standard controls such as labels, textboxes, and panels, as well
as mobile-specific controls such as the TextView, PhoneCall, and Selection List
controls. Note that both mobile Web Forms pages (those that use the mobile
controls) and standard Web Forms pages can coexist within the same
application, if desired.
To simplify development of ASP.NET applications for mobile devices, Visual
Studio .NET 2003 provides an ASP.NET Mobile Web Application project
template. This template includes a default mobile Web Form, as well as a
special section added to the Web.config file called <deviceFilters>, which
contains settings for device-specific rendering.
ASP.NET Web Services
The other type of application available to ASP.NET developers is the ASP.NET
Web Service. Like ASP.NET Web Applications, there are a number of terms
floating around for this type of application. (Microsoft refers to web services as
"XML Web Services," perhaps in hopes of a positive association between web
services and the XML standard.) A web service is an application that exposes
programmatic functionality to clients over the Internet or an intranet using the
underlying plumbing of a developing W3C standard called SOAP. In simple
terms, it can be seen as a simple function call across the Internet.
.aspx Files
. aspx files, also known as ASP.NET pages or Web Forms, are the meat and
potatoes of an ASP.NET Web Application. These files contain the HTML tags,
server controls, and code that present a user interface to your users, and process
their requests (or call helper functions in business-tier components to do so).
Like the global.asax file, .aspx files may either contain code directly or refer to
a code-behind class that contains the code for that page. Note that the codebehind used, if any, must inherit from the Page class in the System.Web.UI
namespace.

15
.ascx Files
.ascx files are used to implement what are known as ASP.NET user controls.
User controls are a technique for code reuse that lies somewhere between the
function of the #Include directive in classic ASP (which you can still use in
ASP.NET, if you choose) and the function of custom ASP.NET Server Controls.
User controls are made up of HTML tags, server controls, and code (or any
combination of the above), and can be reused through a simple tag-based
syntax. They have the advantages of being simpler to develop than custom
server controls, as well as offering greater functionality than includes (such as
the ability to expose properties and methods).
Web Forms are an ASP.NET technology used to create programmable web
pages. They are the primary building block of ASP.NET Web Applications. The
main goal of Web Forms is to bring the same productivity to web applications
that Visual Basic brought to Windows applications. Web Forms consist of the
user interface (UI) and the UI logic written on the server side. The UI and UI
logic can reside either in the same file or in separate files.
Web Forms in ASP.NET offer a number of advantages over ASP and other
technologies for generating web applications. ASP.NET Web Forms:
 Provide support for any HTML 3.2-compliant browser. Even ASP.NET
Server Controls that provide advanced client-side functionality will
gracefully degrade for browsers that do not support DHTML or script.
These controls will, however, take advantage of such support in browsers
such as Internet Explorer 5.0 or later.
 Are built on the Common Language Runtime and provide all the benefits
of the runtime, such as managed execution, type safety, and inheritance.
 Can be built with any Common Language Runtime language, including
C#, Visual Basic .NET, and JScript .NET.
 Can be created using rapid application development tools such as Visual
Studio .NET. You can build a Web Forms page simply by dragging and
dropping controls from the VS.NET toolbox onto the page.

16
 Provide a rich set of server controls that provide almost all the
functionality required for a web application. ASP.NET ships with a broad
array of built-in server controls.
 Offer a flexible programming model, in which code may be included in
the same file as the Web Form, as in the classic ASP model or in separate
module files, referred to as code-behind files. Code-behind promotes the
separation of code and content, which can improve your code's
readability, maintainability, and reusability.
 Preserve the state of the page and its controls between requests with the
inclusion of state management features. Provide an extensible model that
allows you to develop your own controls or purchase third-party controls
to add functionality to your application.
Web Services
The primary purpose of ASP.NET web services is to provide access to
application functionality through standard web protocols (including HTTP and
XML), regardless of the application's location or the platform on which it is
built. When your application exposes functionality as a web service, that
functionality can be consumed by clients on any platform, presuming the clients
understand XML and SOAP and can communicate via the HTTP protocol. More
plainly, a web service is a function that is called over the Internet.
An ASP.NET web service can be very simple or it can provide complex
functionality. It can return a variety of data types—from simple strings and
integer values to complex data types such as classes and datasets.
Web services are traditionally thought of as providing only business services
(e.g., you call a method, perhaps passing in some parameters, and you receive a
return value), but there's no reason why you can't create a web service that
returns a chunk of HTML. Doing so would allow you to provide cross-platform
access to functionality similar to that provided by ASP.NET Server Controls,
albeit with some performance overhead.
ASP.NET Configuration
When working with ASP.NET, you'll be called on to configure your ASP.NET
applications. One major advantage that ASP.NET has over classic ASP is that
most of the important configuration options for ASP.NET applications are stored

17
in configuration files that reside in the web application directory. This makes it
considerably easier to deploy an application from one server to another or to
replicate an application across a web farm, since the application's configuration
information will be copied along with the Web Form Pages, code-behind
classes, and assemblies that make up the application.
ASP.NET Security
Security is an extremely complicated subject, and ASP.NET security is no
exception. This chapter discusses the approaches you can take to secure your
ASP.NET applications. Absent from the discussion are the topics of network,
server, and infrastructure security. This should not be interpreted to mean these
topics are unimportant. On the contrary, without properly securing any
supporting servers and infrastructure, the measures you take to secure your
application with the tools made available by the .NET Framework will be for
naught. A discussion of these topics, however, is beyond the scope of this book.
The security section of the Microsoft TechNet web site, referenced at the end of
this chapter, contains a wealth of information on how to secure your servers and
network properly, including tools to assist you in this important task.
The importance of securing your applications cannot be stressed enough.
Failure to devote the time and resources to get security right can result in data
loss, application failure or hijacking, as well as loss of revenue and/or
reputation. And it's important that security be considered from the very
beginning. Application security added as an afterthought is little better than no
security at all.
Securing access to an application or to the resources belonging to an application
involves two processes: authentication and authorization. This chapter
explains how these processes relate to ASP.NET and how each fits into the
overall scheme of allowing or preventing access to ASP.NET application
resources.
The discussion focuses on the three authentication methods the ASP.NET
runtime provides: Windows, Forms, and Passport. The chapter also discusses
ACL-based and URL authorization, as well as strategies for obtaining secure
access to data and securing web services. The discussion also touches briefly on
code access security, which underlies the ASP.NET security model.

18
Error Handling, Debugging, and Tracing
Most code samples in this book don't include code intended to handle errors. It's
not that error handling isn't important, but error handling can add complexity,
and for the most part we've tried to keep the sample code as simple and clear as
possible. Since you'll need to deal with errors in the real world of application
programming, the first part of this chapter discusses the variety of techniques
available in ASP.NET for handling errors, including custom error pages and
structured exception handling—a new feature of Visual Basic .NET.
In addition to handling errors in ASP.NET applications, most developers want to
figure out what's causing those errors. To that end, the latter part of this chapter
discusses debugging using either the .NET Framework SDK debugger or Visual
Studio .NET. The chapter also covers use of the ASP.NET trace feature to
troubleshoot application problems.
Code Access Security
Code access security is a new .NET runtime feature that can dramatically reduce
the likelihood of applications performing damaging actions by putting
significant restrictions in place on untrusted or partially trusted code.
Microsoft developed the Object Oriented Programming language C# (C Sharp).
It created just-in-time C# compilers and a rich layer of standard data types and
services it calls the Common Language Infrastructure (CLI). The combination
of C# and the CLI, as packaged in June's beta 2 release of the .NET software
developer's kit, supports the creation of text and graphical applications, serverside Web apps, components, and Web services. C# follows the time-honored
Microsoft practice of invention through improvement. C# weaves together the
best traits of C++, Java, JavaScript (now ECMAScript), and Visual Basic (VB).
C#'s varied lineage makes it elegant, safe, and easy to learn. C# was developed
to provide portability for distributed applications over network and internet. The
language alone isn't enough to make an application: The accompanying CLI
ensures that all C# programs will have a standard set of data types and classes
covering everything from output formatting to network I/O. Microsoft's CLI is a
key part of .NET. It standardizes data types so that all CLI-compliant software,
regardless of programming language or platform, can share data without
subjecting it to compute-intensive, error-prone translation. The CLI's closest
relative is the Java Runtime Environment and its standard classes, but the
difference is key: The CLI is built to support any programming language.
Programmers involved in a project can code in the languages they like best.

19

PROBLEM DEFINITION
Today the organizations are growing fast and are increasing in size also. The
digital age has created a worldwide economy, where customers, suppliers,
partners are found around the globe. To compete, a company must find ways to

20
communicate instantly and share knowledge across boundaries of time and
distance that were once almost impossible to bridge.
“INTRA MAILING SYSTEM” provides fast, easy and secure access tools for
communicating within the organization network through mail, text, images and
instant messages. It aims at connecting all the people within an organization in
its various departments. INTRA MAILING SYSTEM meets the need of the
employees in the organization for communicating with each other within their
units without the use of internet connection.
Problem Definition in Brief
 At connecting all the people in an organization and within its multiple
branches.
 We can reduce the number of workers and speed up the information
transferring by providing the computer based system for their needs.
 It also provides high security for the information.
Problem in Detail
If an employee sends a request to another employee for transferring some
information and the respective employee does not respond to his request
in the first chance. The employee has to request again and there is no
system to claim the higher authorities about the respective employee
using the same system. Also the data was sent in the form of complete
FORMS as there was no possibility of sending data in the form of partial
pages .If Administrator wants to add new record of any user then the
blank control is Present already even if he or she doesn’t want to add new
user then also that control of the add new is always displayed.
ROLES TO BE ASSIGNED
There will be two roles in this application, namely
 ADMIN
 MEMBER
ROLE OF ADMIN:

21
In Brief:
Login:-The user and the Administrator needs to login for their respective
Accounts .Every user has its own user id and password. if the user id and
password of the user
Administrator Module: In administrator module we have five options:
1. Compose Mail.
2. Inbox
3. Sent Mail.
4. Record Book
5. Delete User.

Compose mail:
When the Administrator selects the Compose mail option, then the
form will be opened for composing a mail. After composing a
mail .user clicks the Send Button. Then the user can send mail to
any other user who has a user id in the organization.
Inbox:
In Inbox option, the user can check for the mails. If the user has
any mails, then the mails are displayed. He will check the mails
and can delete the unnecessary mails. If the user has no mails then
the message No Mails is displayed.
Sent Mail:
In Sent Mail option, the user can check for the sent mails from his
account. If the user has any mails, then the mails are displayed. He
will check the mails and can delete the unnecessary mails. If the
user has no mails then the message No Mails is displayed.

22
Draft:

In Draft option, the user can check for the mails. If the user has any
mails, then the mails are displayed. He will check the mails and
can delete the unnecessary mails. If the user has no mails then the
message No Mails is displayed. In this only those messages are
stored which are saved to draft.
Profile:
In Profile option, the user can check for his personal information If
the user wants to update his personal information or wants to
change the password of his own account, he can update by just
clicking on the update button.
Record Book:
When the admin selects the “Record Book” tree list option, then
the no. of users who currently are using the system are displayed. If
the administrator has to see the record’s of the security etc. He has
to just click the respective names under the record book and the
respective record will be shown in the grid view.
Delete User:
When the administrator selects the option “Delete User”, he will
delete an existing user, if any.
Create Account:
When the Administrator selects the Create Account a form will
open in which the Administrator fills all the details related the new
user.
Record Book:-The record book option is a tree list in which I have kept the
options to show the records of all the users from the different departments
which helps the administrator to view the e_id’s .if the administrator has to send
the mail to a particular employee he can send the mail by just typing the e_id of
the employee in the compose mail box.
Normal User:

23
In user module we have two options.
1. Compose Mail
2. Inbox
3. Sent Mail
4. Draft
5. Profile
Compose mail:
When the user selects the Compose mail option, then the form will be
opened for composing a mail. After composing a mail .user clicks the
Send Button. Then the user can send mail to any other user who has a
use id in the organization. In this Compose mail page user can send
mail to all the HR’s, security personals etc. if the user has to send the
mail to a particular employee he can type the employee id of that
particular person in the text box of the employee id and click send.
Also the user has the option of saving the composed mail to draft.
Inbox:
In Inbox option, the user can check for the mails. If the user has any
mails, then the mails are displayed. He will check the mails and can
delete the unnecessary mails. If the user has no mails then the message
No Mails is displayed.
If the user wants to delete any mail from the inbox he has to just select
the check box of that particular mail .If the user wants to read any
particular email in detail he has to just click on the subject of the mail
a new page will open and the user will see the message in detail. if the
user needs to print all the mails from a particular Id he can click on the
show details link button and the report will be shown .The user needs
to click the print icon and the report will be printed to pdf.
Sent Mail:
In Sent Mail option, the user can check for the sent mails from his
account. If the user has any mails, then the mails are displayed. He
will check the mails and can delete the unnecessary mails. If the user
has no mails then the message No Mails is displayed.

24
Draft:
In Draft option, the user can check for the mails. If the user has any
mails, then the mails are displayed. He will check the mails and can
delete the unnecessary mails. If the user has no mails then the message
No Mails is displayed.
Profile:
In Profile option, the user can check for his personal information If the
user wants to update his personal information or wants to change the
password of his own account, he can update by just clicking on the
update button.
After editing all the information the user likes, can click the update button and
all the information is saved to database. Next time when the user clicks the
profile menu it will show the latest information.
FOR MEMBER:
Each member will also have a unique username and password so that no
unauthorized user can access the database. The member may change respective
password if desired.

25

FEASIBILITY STUDY
Feasibility is the measure of how beneficial or practical development of the
system will be to a user. The main aim of feasibility study that we carried out
was to explore whether the site satisfies to be technical, economically, and
operationally feasible or not keeping this aspects in mind, we carefully
evaluated our project to be technically, economically and operationally best
applicable and well organized.
SYSTEM ANALYSIS:
We have carried out the following feasibility checks:
Technical Feasibility
As all the required software and hardware technologies are available, it is
technically feasible to develop the system.
Time Scheduling Feasibility
As by knowing the requirements and the technology it can be completed within
the specified time.
Operational Feasibility
As the operations or functions of the new system can easily fit in the working
environment and the user can adapt to the system with little training, it is
operationally feasible to implement this system.
Economic Feasibility
The organization can afford to implement this system; it is economically
feasible to develop this system.

26

PROPOSED SYSTEM
Overview
The main objective of this system (“Intra Mailing System”) is to develop a
communication interface for the organization. “Intra Mailing System” meets the
needs of the employees in the org. for communicating with each other within
their units. This application provides basic requirements such as
 Mail Management
 File transfer
 Also enhanced features like Web Browsing & utilities.
The Intra Mailing System is very User-Friendly application. Only certain
applications like System Monitoring, instant Messaging, and Chatting between
two users need little training.
Objectives and success criteria of the project:
The success of the application depends upon meeting the following core set
of objectives:
 The product will assist the organization in maintaining record of every
project it undertakes. All the information relevant to the projects like size,
time, effort and departments involved, etc is maintained by this tool.
Advantages of Proposed System







Data will be entered online.
Data will not be outdated.
Reduction in errors.
Easy and effective analysis and compilation of data.
Effective use of resources and administrative cost.
Time Saving

27

SYSTEM DESIGN

System design is more creative process than system analysis because it deals
with the development of the actual mechanics for a new workable system.
System design is the highly significant phase in the software development
where the designer plans “how” a system should be produced in order to
make it functional, reliable and reasonably easy to understand, modify and
maintain. Designing software systems means determining how requirements
are realized and result is a software design document.
A well-designed system is easy to implement, understandable and reliable
and allows for smooth evolution. Without design, we risk building an
unstable system. There are three characteristics that serve as a guide for the
evolution of a good design:
 The design must implement all of the explicit requirements contained
in the analysis model and must accommodate all of implicit
requirements desired by the customer.
 The design must be readable, understandable guide for those who
generate code and for those who test and subsequently support the
software.
 The design should provide a complete picture of the software,
addressing the data, functional and behavioral domain from an
implementation perspective.
Design Phase includes: Data Flow Diagrams
 Flowcharts

28

DATA

FLOW DIAGRAMS

DFD for present system:A data flow diagram (DFD) is a graphical representation of the "flow" of
data through an information system. A data flow diagram can also be used
for the visualization of data processing (structured design). It is common
practice for a designer to draw a context-level DFD first which shows the
interaction between the system and outside entities. This context-level DFD
is then "exploded" to show more detail of the system being modeled.
Level 0 DFD
Database

SendMail

Intra

Mailing System
User

Admin
Receive Mail

Receive Mail

At this point, you should have a good idea of the system boundary. All
components within the system boundary are included within a single
system/process box in the DFD. External entities lie outside the system
boundary; internal entities will become locations for processes. The data flow
arrows to and from the external entities will indicate the system’s relationship

29
with its environment. Remember that information always flows to or from a
process, an external entity, or a data store. You can use a dashed line to show
data flows between external entities that are strictly external to the system at
hand if it will help make the DFD easier to understand.

LEVEL 1 DFD

Enter
Login Success

LogIn

Account

Enter
user name and
Password

Mail Info

Admin

Check Mail

Manage Mail

Reply/Forwa-rd Email

Compose Mail

Enter
Body

User Account

Send Mail

Signout

Subject &

30

User Account :Level 1
Level 1 DFD
It is important that the system relationship with its environment be preserved
no matter how many levels deep you model. In other words, you can’t have new
data flows crossing the system boundary in Level 1. The next section deals with
such non-valid data flows.
The Level 1 DFD provides a high-level view of the system that identifies the
major processes and data stores. Identify or list each incoming and outgoing
data flow with a corresponding process that receives or generates data. Make
sure you refer to your data item table for any missing internal data flows and to
identify data stores. If your table contains documents with the same source and
destination, they might be data stores. Some processes share data stores while
some data stores are used by one process. It may be possible to move the single
process data store inside the process itself. Identify those processes that only
address internal Outputs and outputs, and use one process for each source or
destination from the DFD.
Database Design
As a system data model is derived, many named entities, relationships and so
forth will be identified. The names given to the entities should be chosen to give
the reader some clues to their meaning. However, further description of the
named entities is usually needed to make the model understandable. The
description can be normal or formal. Whatever approach is used, it is always
worth collecting all descriptions in single repository or data dictionary.
A data dictionary is simplistically a list of names used by the system arranged
alphabetically. As well as the name, the dictionary should include description of
the named entity and if the name represents a composite object, there may be a
description of the composition. Other information such as the dare of creation,
the creator and the representation of the entity may also be included depending
on the type of model which is being developed.

31

Table:- User profile: Creating a new User account.

Primary key: Sr. No.
Field

Type

Null

Key

Default

Id

int(10)

NO

NO

AUTO

First Name

Var
char(200)

YES

NO

NULL

Middle Name

varchar(200) YES

NO

NULL

32
Born on

Int(20)

YES

NO

NULL

Gender

varchar(200) YES

NO

NULL

Dname

Varchar(50)

Yes

No

Null

Address

varchar(50)

YES

NO

NULL

Email

varchar(50)

YES

NO

NULL

City

varchar(50)

YES

NO

NULL

State

varchar(50)

YES

NO

NULL

E_id

Nvarchar(50
)

NO

Primary key

Password

varchar(50)

YES

NO

NULL

Confirm password

varchar(50)

YES

NO

NULL

Table:-Administrator: to check the authenticate administrator.

33

Field

Type

Null

Key

Default

E_id
Name
F_name
Dob
State

Int
varchar(50)
varchar(50)
varchar(50)
varchar(50)

N
Y
Y
Y
Y

Pk
No
No
No
No

NULL
NULL
NULL
NULL

Y
Y
Y
Y
Y
Y
Y

No
No
No
No
No
No
No

NULL
NULL
NULL
NULL
NULL
NULL
NULL

Gender
varchar(50)
Adress
varchar(50)
City
varchar(50)
Dname
varchar(50)
Email
varchar(50)
Pass
Nvarchar(50)
Photo
Image
Primary key: Sr. No.

Table:-City: Store cities information.

34

Field

Type

Null

Key

Default

City name

Varchar(50)

Allow

-

Null

SID

Int

Alow

Fk

Null

Field

Type

Null

Key

Default

SID

Int

No

Pk

-

State

Varchar(50)

Yes

No

Null

Primary key: Sr. No.

Table:-State: Stores state information.
Primary key: Sr. No.

35
Table: Draft: Stores information about the mail that not to be sent.

Field

Type

Null

Key

Default

S_no

Int

-

Pk

Null

E_id

nVarchar(50)

Allow

-

Null

Subject

Varchar(50)

Allow

-

Null

Message

Varchar(max) Allow

-

Null

Time

Varchar(50)

Allow

-

Null

Attachment

nVarchar(50)

Allow

-

Null

Primary key: Sr. No.

36

Table:-Inbox: Shows mail stored.

Field

Type

Null

Key

Default

S_no

Int

-

Pk

Auto

E_id

Nvarchr(50)

Allow

-

Null

Subject

Varchar(50)

Allow

-

Null

Message

Varchar(max) Allow

-

Null

Time

Varchar(50)

-

Null

Allow

37
Attachment

Nvarchar(50)

allow

-

Null

Primary key: Sr. No.

Table:-Sent Mail: Send mail to the appropriate user.

Field

Type

Null

Key

Default

38
S_no

Int

-

Pk

Auto

E_id

Nvarchr(50)

Allow

-

Null

Subject

Varchar(50)

Allow

-

Null

Message

Varchar(max) Allow

-

Null

Time

Varchar(50)

Allow

-

Null

Attachment

Nvarchar(50)

allow

-

Null

Primary key: Sr. No.

Activity Diagram of Administrator
Activity of Admin

Log in Mode
Administrator

After Authentication

39

Compose Mail

Send Mail

Create User

Delete

Sign Out

The above figure is the activity diagram of the administrator and explains all the
specified functionalities in a pictographic view. To establish as an administrator,
he should prove his authentication and then is allowed to perform the
administration activities.
The administrator has all the privilege of accessing all the mailboxes. He is also
authorized to create new accounts for the users, delete the existing users. First
the administrator should know the password of the server host (i.e. he should be
the root user) and should know the password.

Activity Diagram of the User
Activity of User

Login
Inbox sent
Inbox

Sent mails

40
Compose
Inbox Draft
Message
Delete

Save as draft

Sign Out

It is an activity diagram of the general user. First of all, the user encounters a
welcome page that prompts him to enter the valid user name (or valid user-id)
and the corresponding password. After a successful user login, he is allowed to
read his mails from the Inbox mailbox. He then can read the mails from the
other mailboxes -Sent, Draft. He can also organize mails between the existing
folders (or mail boxes).Apart from composing mails, he is also allowed to save
the in-complete mails in the Draft mailbox.
He then can logout from the mail service after the successful transactions. Once
the user is logged out, he is only allowed through the login page.

Start

Flow Chart of Admin
Login

User Name
Password

41

No
Valid

Yes
Home

Search user

View user

Delete existing user

View Mail
Select
Sent Mail

Show Details of user
Start
Compose Mail

Log out
Stop

Flow Chart of User

42
Login

User Name
Password

Valid
No

Yes

Home

View Mail

Search user

Select
Compose Mail

Sent Mail

Log out
Stop

43
HARDWARE AND SOFTWARE REQUIREMENTS

Windows Seven System Requirements
Processor
Memory
Graphics Card
Graphics Memory
HDD Capacity
HDD Free Space
Other Drives

Seven Capable
800 MHz
512 MB
DirectX
9.0
capable
32 MB
20 GB
15GB
DVD-ROM

Seven Premium Ready
1 GHz
1 GB
DirectX 9.0 capable and WDDM 1.0 driver
support
128 MB
40 GB

Sql server Hardware Requirements (32-Bit)
This table shows hardware requirements for installing and running SQL Server
2008R2 on the 32-bit platform.
SQL
Server Processor type1
2008R2 (32-bit)
SQL
Server
2008R2
Pentium
IIIcompatible
processor
or
higher

Processor speed2
Minimum:
MHz

Memory (RAM)3

600 Minimum:
512
MB
Recommended: 1
Recommended: 1 GB or more
GHz or higher
Maximum:
Operating system
maximum

44
Microsoft Visual Studio 2010 Requirements
System software required and used in the development of web application
I.

Operating System

Windows Seven

Environment

.NET Frame Work 3.5,4.0

III.

Development Tool

Visual Studio 2010

IV.

Front-end Tool

ASP.NET using C#

Technology

.NET

Backend Tool

SQL Server 2008R2

Browser

Google
Firefox

II.

V.
VI.
VII.

Chrome

and

Mozilla

It's a web based application, so a robust hardware configuration is required.

45
I/O SCREENS
Welcome Page:
Default.aspx is the welcome page of our project. This page gives information
about the department. This page contains various links that direct to pages that
contain information.

46
Login Page:- The user and the Administrator needs to login for their respective
Accounts .Every user has its own user id and password .if the user id and
password of the user.

47
Inbox Page: In Inbox option, the user can check for the mails. If the user has
any mails, then the mails are displayed.

Sent Mail Page: In Sent Mail option, the user can check for the sent mails
from his account.

48
Draft Page: In Draft option, the user can check for the mails. If the user has any
mails, then the mails are displayed.

49
Admin Profile Page: In Profile option, the Admin can check for his personal
information If the user wants to update his personal information.

50
Record Page: Record Book tree list options, then the no. of users who currently
are using the system are displayed.

51
Create Account Page: When the Administrator selects the Create Account a
form will open in which the Administrator fills all the detail.

52
Compose Mail Page: Compose mail option, and then the form will be opened
for composing a mail. After composing the mail User can clicks the Send
Button.

53
Message Detail Page: The user wants to read any particular email in detail he
has to just click on the subject of the mail a new page will open and the user
will see the message in detail.

54
User Profile Page: User Profile option, the user can check for his personal
information if the user wants to update his personal information.

55
LIMITATIONS

There are some problems in the Existing System, which decrease its usability
in very rapid fashion.
 User can only use this application from the computer which is connected
to WAN.
 If the Main Server has some problem user has to wait till it solve to use
application.

56
CONCLUSION

The project is able to successfully incorporate all the requirements specified by the
user. Proper care has been taken during database design to maintain data integrity
and to avoid redundancy. A client side validation has also been done with utmost
care by considering all the possibilities and requirements of different users to
avoid data inconsistency.
The project is designed and coded in such a way that any further modification that
are needed in future can be easily implemented without affecting the functionality
of the system. The technical documentation provided in the project report helps the
application developers understand the internal architecture of the system and thus
assist them in enhancing the system.

57
BIBLIOGRAPHY

BOOKS:
 C.J.Date, “An Introduction to Database System”,Narosa Publications1998, ISBN: 978-81-85015-58-3.
 David Cockmen, “Oracle Database Development- Tech Media” ,
Publications-1997, ISBN:10, 0672310252.
 Joseph Schmuller, “Teach Yourself UML in 24 Hours”, Techmedia
Publications-1999, ISBN:10: 067232640X.
 Pankaj Jalote, “Integrated Approach to Software Engineering”, Narosa
Publication- 1998, ISBN: 038720881X.
 Matthew MacDonnald, “Beginning ASP.NET 3.5 in C# 2010”, Appress
Second Edition, ISBN: 1430226080.
 Bipin C.Desai, “Introduction to Database System”, Galgotia
Publications, Revised Edition, ISBN: 0538749547.
 Bill Evjen, Scott Hanselman, Devin Rader, “ASP.NET 3.5 In C# and
VB”, Wrox Publications, ISBN: 9780470187579.
 Damien Foggon, “Beginning ASP.NET 2.0 Databases”, Apress Second
Edition, ISBN:10: 1430243805.
 E Balagurusamy, “Programming in C#”, Tata McGraw-Hill Second
Edition 2008, ISBN: 0070667578.
 Elias M.Awad, “System Analysis and Design”, Galgotia Publications
2000, ISBN:81-85989-45-1.
WEB REFERENCES:
www.google.com accessed on 22.01.13
www.codeproject.com accessed on 25.01.13
www.himachaldit.gov.in accessed on 02.02.13
www.w3schools.com/html accessed on 15.02.13
www.w3schools.com/aspnet accessed on 28.02.13
www.microsoft.com/sqlserver/2008R2/en/us/top-30-features.aspx
accessed on 04.03.13
 http://databases.about.com/od/sqlserver/a/storedprocedure.htm accessed
on 017.03.13
 www.msdn.com accessed on 01.04.13
 www.c-sharpcorner.com accessed on 12.05.13







58

Sponsor Documents

Or use your account on DocShare.tips

Hide

Forgot your password?

Or register your new account on DocShare.tips

Hide

Lost your password? Please enter your email address. You will receive a link to create a new password.

Back to log-in

Close