Projet Report
Projet Report
CHAPTER
Chapter 1
1.1
1.2
1.3
1.4
1.5
Chapter 2
2.1
2.2
Chapter
3.1
3.2
Chapter
4.1
4.2
4.3
Chapter
Chapter
6.1
6.2
6.3
6.4
6.5
Chapter
Chapter
8.1
5
6
7
8
DESCRIPTION
Introduction
Introduction
Objectives of the project
Existing System
Proposed System
Description of the project
Software Requirement
Specification
tools and environment user
Hardware / software specification
Analyse document
System study and analysis
System requirements
Design specification
Modular design
System Design
Database Design
Coding
Testing
System testing
Unit testing
Integrity testing
Validation testing
Test case
Screen Layouts
Conclusions
Conclusion
Bibliography
PAGE NO.
2
3
4
4
4
4
5
6
8
9
10
12
20
21
21
32
35
47
48
53
53
53
55
55
61
62
62
Page 1
CHAPTER:1
INTRODUCTION
Page 2
Page 3
Page 4
CHAPTER:2
SOFTWARE
REQUIREMENT
SPECIFICATION
Page 5
Back end
Page 6
Page 7
RAM
Hard disk
Monitor
Keyboard
Normal or Multimedia
Mouse
Compatible mouse
Software Requirements
Front End
HTML5
Language
PHP
Back End
MySQL
Operation System
Windows XP or above
Browser
Page 8
Page 9
CHAPTER:3
ANALYSIS DOCUMENT
Page 10
Technical feasibility
The technical issue usually raises during the feasibility stage of the investigation
include the following:
Does the necessary technology exist to do what is suggested?
Does the proposed equipment have the technical capacity to hold the
data required to use the new system?
Will the proposed system have provided the adequate response to
inquiries, regardless or the location of the system?
Can the system be upgrade if developed?
Are there technical guarantee of accuracy, reliability, ease of access and
data security?
Operational study
Proposed projects are beneficial if only the can be turned out into information
system. That will meet the organizations operating requirements. Operational
feasibility aspect of the project is to be taken as an important part of the project
implementation. Some of the issues raised are to test the operational feasibility of
the project including the following:
Is there sufficient support for the management from the user?
Will the system be used and work properly if it is being developed
and implemented?
Will there be any resistance from the user that will undermine the
possible application benefit?
Page 11
Economic feasibility
A system can be developed technically that will be used if installed must still be a
good investment for the organization. In the economical feasibility, the
development cost in creating the system is evaluated against the ultimate benefit
derived from the new systems. Financial must equal or exceed the costs.
The system is economically feasible. It does not require any addition hardware or
software. Since the interface for the system is developed using the existing
resources and technologies available at NIC, there is normal expenditure and
economical feasibility for certain.
Page 12
Page 13
Page 14
Page 15
Page 16
Page 17
Page 18
Wall
The wall is a place where the account owner can express his current feeling or
thoughts with a wall status. Other users can add their thoughts by creating wall
Page 19
Non-Functional Specification
Secure access of confidential data by user name and password. This
application is secure for every kind of its users, because if any user logout
from any session then nobody will be able to access his profile without
knowing his confidential password.
24 X 7 availability
Better component design to get better performance at peak time.
The database used here is robust, reliable & fast. So users will have to wait
for the output very short time.
This application can be accessed from any type of platform.
There is no case of redundancy in the database so it will not take extra
memory space.
Username & password are sent to the users via email after registration.
Page 20
CHAPTER:4
DESIGN SPECIFICATIONS
Page 21
Page 22
Page 23
The actors, usually individuals involved with the system defined according
to their roles.
The use cases, which are the specific roles played by the actors within and
around the system.
The relationships between and among the actors and the use cases.
Login/Registration
<<include>>
Regester for login
<<include>>
Login
Validate user
User
<<include>>
Request for forgetted passward
<<include>>
Home Page
Page 24
Page 25
User
Reply to Message
Blog Page
Profile Page
Page 26
Add friend
User
Write message on friends wall
Delete friends
Page 27
Photo Page
User
Context Diagram
The highest level data flow diagram is the context diagram.
The context diagram shows the interaction of the system with its environment in
terms of data flows
The context diagram defines the boundary of the system (the scope of the system)
Only the data flows which leave the system and the data flows which come from
outside the system are shown.
Page 28
UUuUUUUUU
USER
Response received
ADMIN
Login
Views Personal detail
Response received
Send Invitation
Views Mail Message
Detail
Page 29
Page 30
It is based on a
An Entity Set: It is a set of entities of the same type that share the same
properties, or attributes. The set of all persons who are customers at a given bank,
example, can be defined as the entity set customer.
Attributes: Attributes are units that describe the characteristics or properties of
entities. In a database, entities are represented by tables and attributes by columns.
For example, a customer entity might have numerous attributes such as code, name
and addresses. Similarly, the goods entity may have attributes like code and price.
They are drawn in elliptical shapes along with the entity rectangles.
Page 31
Page 32
Page 33
Page 34
Data Dictionary
Table Friends
Column
Type
Null Default
member_id int(11)
No
datetime
datetime
No
status
varchar(11
No
)
friends_wit
int(11)
h
Comments
No
Table Indexes
Keyname
Type
No
like_id
No
Table Members
Column
Type
Null Default
Comments
UserName varchar(10) No
EmailId
varchar(80) No
Password
varchar(30) No
Gender
varchar(30) No
Country
Varchar(30) no
Page 35
CHAPTER:5
CODING
Page 36
Connection to database
<?php
$db_conx = mysqli_connect("localhost", "root", "", "socialn");
// Evaluate the connection
if (mysqli_connect_errno()) {
echo mysqli_connect_error();
exit();
} else {
//echo "Successful database connection";
}
?>
Page 37
Home page
<?php
include_once("php_includes/check_login_status.php");
$sql = "SELECT username, avatar FROM users WHERE activated='1'
ORDER BY RAND() LIMIT 15"; //in where avatar is NOT NULL AND
$query = mysqli_query($db_conx, $sql);
$usernumrows = mysqli_num_rows($query);
$userlist = "";
while($row = mysqli_fetch_array($query, MYSQLI_ASSOC)){
$u = $row["username"];
$avatar = $row["avatar"];
$profile_pic = 'user/'.$u.'/'.$avatar;
$userlist .= '<a title="'.$u.'"><img src="'.$profile_pic.'" alt="'.$u.'"
style="width:100px; height:100px; margin:10px;"></a> '; // put b/w a
tag
<img
src="'.$profile_pic.'"
alt="'.$u.'"
style="width:100px;
Page 38
Page 39
<div id="pageMiddle">
<div id="leftm">
<!--<h3>Total users: <?php //echo $usercount; ?></h3>-->
<h3>Random people chosen from our database</h3>
<?php echo $userlist; ?>
</div>
<div id="rightm"">
<img src="images/n1.jpg">
</div>
</div>
<?php include_once("template_pageBottom.php"); ?>
</body>
</html>
Page 40
Notification code
<?php
include_once("php_includes/check_login_status.php");
// If the page requestor is not logged in, usher them away
if($user_ok != true || $log_username == ""){
header("location: index.php");
exit();
}
$notification_list = "";
$sql = "SELECT * FROM notifications WHERE username LIKE
BINARY '$log_username' ORDER BY date_time DESC";
$query = mysqli_query($db_conx, $sql);
$numrows = mysqli_num_rows($query);
if($numrows < 1){
$notification_list = "You do not have any notifications";
} else {
Page 41
.=
"<p><a
href='user.php?
Page 42
'<img
src="images/avatardefault.jpg"
alt="'.$user1.'" class="user_pic">';
KOSHYS INSTUTITES OF MANAGEMENT STUDIES
Page 43
.=
'<div
id="friendreq_'.$reqID.'"
class="friendrequests">';
$friend_requests
.=
'<a
href="user.php?u='.$user1.'">'.
$user1pic.'</a>';
$friend_requests .= '<div class="user_info" id="user_info_'.
$reqID.'">'.$datemade.' <a href="user.php?u='.$user1.'">'.$user1.'</a>
requests friendship<br /><br />';
$friend_requests
.=
'<button
onclick="friendReqHandler(\'accept\',\''.$reqID.'\',\''.
$user1.'\',\'user_info_'.$reqID.'\')">accept</button> or ';
$friend_requests
.=
'<button
onclick="friendReqHandler(\'reject\',\''.$reqID.'\',\''.
$user1.'\',\'user_info_'.$reqID.'\')">reject</button>';
$friend_requests .= '</div>';
$friend_requests .= '</div>';
}
}
?>
Page 44
<!DOCTYPE html>
<html>
<head>
<meta charset="UTF-8">
<title>Notifications and Friend Requests</title>
<link rel="icon" href="favicon.ico" type="image/x-icon">
<link rel="stylesheet" href="style/style.css">
<script src="js/main.js"></script>
<script src="js/ajax.js"></script>
<script type="text/javascript">
function friendReqHandler(action,reqid,user1,elem){
var conf = confirm("Press OK to '"+action+"' this friend request.");
if(conf != true){
return false;
}
_(elem).innerHTML = "processing ...";
KOSHYS INSTUTITES OF MANAGEMENT STUDIES
Page 45
"<b>Request
Page 46
id="notesBox"><h2>Notifications</h2><?php
echo
$notification_list; ?></div>
<div id="friendReqBox"><h2>Friend Requests</h2><?php echo
$friend_requests; ?></div>
<div style="clear:left;"></div>
<!-- END Page Content -->
</div>
<?php include_once("template_pageBottom.php"); ?>
</body>
</html>
Page 47
CHAPTER:6
TEXTING
Page 48
Page 49
Page 50
Page 51
Page 52
in
Flow
Graph.
While
performing
TEST CHARACTERS :
1.A good test has a high probability of finding an error.
2.A good test is not redundant.
3.A good test should be best of breed.
4.A good test should be neither too simple nor too complex.
Page 53
Page 54
Page 55
of
arguments
transmitted
is
called
modules
e q u a l t o a t t r i b u t e s o f parameters.
U n i t s y s t e m o f a r g u m e n t t r a n s m i t t e d i s c a l l e d m o d u l e s e q u a l
u n i t s y s t e m o f parameter.
Number of attributes and order of arguments to build in functions correct.
Any references to parameters not associated to build in functions correct.
Input only arguments altered.
Global variable definition consistent across module.
Files attributes correct.
Format specifications matches I/O specification.
Files opened before use.
File closed while working is going on.
Page 56
Page 57
required
system
behavior.
Page 58
Page 59
Input Values
Test case
Result
Empty
Successfu
l
Username
Already
Exists or
not
Successfu
l
Password
Empty
Successfu
l
No
Page 60
Password
If wrong
Password
Enter Password
Successfu
l
Password
Length
Successfu
l
Registration:
Sl
Test case
Result
No
Input
Values
1.
Username
Empty
Successfu
l
Empty
Successfu
l
Password
Empty
Successfu
l
Password
Length
Minimum 8 characters
Successfu
Page 61
Confirm
Password
Empty
Successfu
l
Gender
Select
Successfu
l
Country
Select
Successfu
l
Input Values
Test case
Result
1.
Image Title
Null
Successfu
l
Add Image
BROWSE
Successfu
l
Delete Image
Select
Successfu
l
Photos:
Sl
No
Page 62
CHAPTER:7
INPUT/OUTPUT SCREEN
Home page
Page 63
User page
Page 64
Notification page
Page 65
Page 66
CHAPTER:
CONCLUSION
Page 67
CONCLUSION
Social Networking website is a revolutionary idea with a very bright future with
further scope for advancements. The opportunities provided from this medium are
immense and many organizations are making use of this medium to better their
practices. Organizations are no longer at the mercy of the media to advertise or
convey their message. With the help of social networking they can advertise or
communicate in a more efficient way. Similarly people dont have to rely on
newspapers or TV to get their daily dose of news it can all be obtained from a
social networking site. People can follow or get information from any part of the
world.
The world is getting closer every day and everyone wants to be connected. After
all the advantages, the problem that arises is of information overload and security.
Social networks, unlike the common media, do not have a pattern as to how much
information has to be conveyed and where to draw the line. Too much of
information may confuse users. Security might be another area of concern where
people can get illegal access to a users information. The future of social
networking looks very promising but still it has to deal with the problems
associated with it.
BIBLIOGRAPHIE
Page 68