Social Networking Mangment System
Social Networking Mangment System
ON
SOCIAL NETWORKING MANAGEMENT
SYSTEM
Session: 2010-11
Sec: A3002
1
ACKNOWLEDGEMENT
Our first experience of project has been successfully, thanks to the support
staff of many friends & colleagues with gratitude. We wish to acknowledge
all of them. However, we wish to make special mention of the following.
First of all we are thankful of our project guide Mr. G.Mahesh Sir
under whose guideline we were able to complete our project. We are
wholeheartedly thankful to him for giving us value able time & attention &
for providing us a systematic way for completing our project in time.
2
TABLE OF CONTENT
6 ER-Diagram 12
15 Output 27-36
16 Advantages 37
17 Bibliography 38
3
INTRODUCTION
Social Networking Management System covers the entire concepts that are
required to setup a Social network, that can have one or more social sites
available for society use but here we will create only one site. Social sites
consist of a number of individuals or organizations known as “nodes”.
It also provides the facility of maintaining the Chat history, Mail history
of users in well organized manner so that it can be extracted and seen by user
easily.
4
PREFACE
The journey of a thousand miles starts with a single step. This project is the
first milestone in the journey of our technical experience.
The information highway has brought an era where intricate problems are
being solved in a fraction of second. The present age is “The Age of
computers”. The computer technology has entered into every walk of life.
The increasing number of computers can be seen employed in offices,
hospitals, railways, banking and a lot more places. Computers not only
allows the enhancement in computation speed but also have bought in
considerable cost effectiveness.
It is important to develop a correlation between the practical and theoretical
aspects of the subject studied. It is more relevant in the field of computers.
Thus in order to test, implement and use the various techniques studied, this
project called “SOCIAL NETWORKING MANAGEMENT SYSTEM”
was taken up that has innumerable advantages over manual car service
centre.
Maninder Singh
REG. NO: - 11009884
5
PROCESS DESCRIPTION
In this project I will divide the project in two modules listed as:
1. Database maintenance.
2. Communication.
In first module (Database Maintenance), I will divide this module into two
parts: -
1. Personal_Detail.
2. Address.
And
In second module (Communication). I will divide this module into two parts:-
1. Mail_History.
2. Chat_History.
I will construct database using ORACLE 10g that will contain the
complete information of the social site users. This will contain the
Personal _Details of the user like: - Name, User_Name and User_Password,
Age, DOB, Nationality in Personal_Detail table. Settings will be done in
such a manner that this information will be stored with privacy settings so
as to provide security to the personal information of users as well as to
avoid any damage to the information.
6
Personal_Detail: -
For these purposes, every user will be provided with a different User_Name
and User_Password. This User_Name and User_Password will be used by
user to access the site.
7
Mail_History: - Name, Sent_Id, Receiver_Id, Sent_Date, Receiver_Date.
The fields Name will be used in both the modules as it will be the only unique
identification of users.
In this project, we will use ORACLE 10g for storing a database as a backend
and Frontend is not implemented but in future it will be implemented.
8
PROPOSED SYSTEM
c) Data can be stored in the computer in the form of files and records.
e) It is very user-friendly.
9
EXISTING SYSTEM
1. Duplication of data.
10
SCOPE OF PROJECT
This project can widely be used as a backend for social site to store and
maintain the complex data of users in database in very simple manner.
It also provides the facility of maintaining the Chat history, Mail history
of users in well organized manner so that it can be extracted and seen by user
easily.
11
ER-DIAGRAM
12
DATA FLOW DIAGRAM
A DFD, also known as “bubble chart” has the purpose of clarifying system
requirements and identifying major transformations that will become
programs in system design. So it is the starting point of the design phase that
functionally decomposes the requirements specifications down to the lowest
level of detail. A DFD consists of a series of bubbles joined by lines.
Data Flow: An arrow represents a data flow: it represents the path over which
data travels in the system. A data flow can move between processes, flow into
or out of data stores, to and from external entities.
Bubbles (Process): A circle or bubble represents that transforms data from
once from to another by performing some tasks with the data.
Data Store: A data store is a place where data is held temporarily from one
transaction to the next or is stored permanently.
External Entity: Which defines a source or destination of system data also
called an external entity.
13
14
PROBLEM ANALYSIS
PROGRAM SPECIFICATION
After the broad stages or modules for a system have been define did this
necessary to move to preparation of detailed DATABASE specification. The
programs or modules are defined according to the functions they perform, not
by the size of the DATABASE. The breakdown of database into smaller
modules makes it easier to debug a system and modify it. Database
Specification must be developed for each module, which involve table name,
purpose for the tables, owner of the project and general information about the
project.
Problem Analysis
Feasibility Analysis
15
PROBLEM ANALYSIS
Preliminary study.
16
FEASIBILITY ANALYSIS
1. FINANCIAL ANALYSIS
2. TECHNICAL ANALYSIS
17
SYSTEM DESIGN
Then we began with the design phase of the system. System design is a
solution, a “HOW TO” approach to the creation of a new system. It translates
system requirements into ways by which they can be made operational. It is a
translational from a user oriented document to a document oriented
programmers. For that, it provides the understanding and procedural details
necessary for the implementation. Here we use Flowchart to supplement the
working of the new system. The system thus made should be reliable, durable
and above all should have least possible maintenance costs. It should overcome
all the drawbacks of the Old existing system and most important of all meet the
user requirements.
18
SOFTWARE REQUIREMENT
SPECIFICATIONS
1) Hardware Requirements:
2) Software Requirements:
19
TESTING
20
The basic levels of testing are: -
1. Unit testing.
2. Integration testing.
3. System testing.
These different levels of testing attempt to detect different types of faults. The
relation of the faults introduced in different phases, and the different levels of
testing are shown: -
1) Unit Testing:
The first level of testing is unit testing. In this different modules are tested
against the specifications produced during design for the modules. Unit testing
is essential for verification of the code produced during the coding phase and
hence the goal is to test the internal logic of the modules.
2) Integration Testing:
The next level of testing is often called integration testing. In this many tested
modules are combined into sub-systems, which are then tested. The goal there
is to see if the modules can be integrated properly, the emphasis being on
testing interfaces between modules. This activity can be considered as testing
the design, and hence the emphasis on testing module interactions.
3) System Testing:
The next level of testing is system testing. Here the entire software system is
tested. The reference document for this process is requirement document, and
the goal is to see if the software meets its requirements. This is essentially a
validation exercise.
21
IMPLEMENTATION
System implementation is the stage when the user has thoroughly tested the
system and approves all the features provided by the system. The various tests
are performed and the system is approved only after all the requirements are
met and the user is satisfied.
The new system may be totally new; replacing an existing manual or
automated system, or it may a major modification to an existing system. In the
either case, proper implementation is essential to provide a reliable system to
meet organization requirements .successful implementation may not guarantee
improvement in the organization using the new system (that is a design
question) ,but improper will prevent it.
22
PROJECT LEGACY
i) Current Status
i) Current Status:
The project has been developed in such a way that user can easily use it.
To use this project user has to follow following steps:
Run or Execute.
23
PSEUDO CODE
24
Create view fullPersonal_detail:
declare cursor c1 is
select Name,User_Name from Personal_detail where User_Password='123a';
rec c1% rowtype;
begin
open c1;
loop
fetch c1 into rec;
exit when c1%notfound;
if c1%found then
dbms_output.put_line('P_Name'||' '||rec.Name);
dbms_output.put_line('U_Name'||' '||rec.User_Name);
end if;
end loop;
close c1;
end;
declare cursor c3 is
select User_Name,Age,State,City from fullPersonal_detail where User_Password='saa';
rec3 c3% rowtype;
begin
open c3;
loop
fetch c3 into rec3;
exit when c3%notfound;
if c3%found then
dbms_output.put_line('P_Name:'||' '||rec3.User_Name);
dbms_output.put_line('P_Age:'||' '||rec3.Age);
dbms_output.put_line('P_State:'||' '||rec3.State);
dbms_output.put_line('P_City:'||' '||rec3.City);
end if;
end loop;
25
close c3;
end;
26
OUTPUT
27
OUTPUT FOR ADDRESS TABLE:
28
OUTPUT FOR MAIL_HISTORY TABLE:
29
OUTPUT FOR CHAT_HISTORY TABLE:
30
OUTPUT FOR VIEW FULLPERSONAL_DETAIL:
31
OUTPUT OF CURSOR C1 FOR PERSONAL_DETAIL:
32
OUTPUT OF CURSOR C3 FOR PERSONAL_DETAIL:
33
OUTPUT OF TRIGGER CUS FOR PERSONAL_DETAIL:
34
OUTPUT OF FULL OUTER JOINS FOR PERSONAL_DETAIL &
ADDRESS:
35
OUTPUT OF LEFT OUTER JOINS FOR PERSONAL_DETAIL &
MAIL_HISTORY:
36
ADVANTAGES:-
This project can widely be used as a backend for social site to store and
maintain the complex data of users in database in very simple manner.
It also provides the facility of maintaining the Chat history, Mail history,
Personal detail of users in well organized manner so that it can be
extracted and seen by user easily.
37
BIBLIOGRAPHY
BOOKS:
38