BBDMS Report Edited
BBDMS Report Edited
system
INTRODUCTION
System Development:
The process of building systems has always been complex with system
becoming larger, the costs and complexities get multiplied. So the need for better
methods for developing systems is widely recognized to be effective and the applied
model should meet a few basic requirements.
and implementation.
databasedesigns,normalizationsandstructuredprogramming
techniques.
The model should separate the logical system from the physical system.
Based on the above requirements of the system model, system study has been made.
Various methodologies have been applied for system study, evolving design
Project:
Attendance Management System is software developed for daily student attendance in
schools, colleges and institutes. It facilitates to access the attendance information of a particular
student in a particular class. The information is sorted by the operators, which will be provided
by the teacher for a particular class. This system will also help in evaluating attendance
Dept. of BCA,University College of Arts and Page
Commerce 1
Blood Bank and Donor Management
system
SYSTEM ANALYSIS
Preliminary Investigation:
Project clarification
Feasibility study
Project appraisal
Project clarification is the process of selecting a project request for further study.
When a system development or modification request is made, the first systems
activity, the preliminary investigation, begins the activity has three parts: Request
clarification, feasibility study and project appraisal. Many requests from employees
and users in organization are not clearly stated.
Therefore before any systems investigation can be considered, the project request
must be examined to determine preciously what the originator wants. This is called
Request clarification.
As important outcome of the preliminary investigation is the determination that the
system request in feasible.
Feasibility Study:
The feasibility study is performed to determine whether the proposed system is viable
considering the Technical, Operational and Economical factors. After going through
feasibility study we can have a clear-cut view of the system’s benefits and drawbacks.
Technical Feasibility:
Operational Feasibility:
Economical Feasibility:
As the necessary hardware and software are available in the market at a low cost, the
initial investment is the only cost incurred and does not need any further
enhancements. Hence it is economically feasible.
The system is feasible in all respects and hence it encourages taking up the system
design.
Gathering Information:
The analysis through collection of data plays the wider role in the analysis of the
system. So the data is collected at different levels of management to keep track of full
Questioners:
The data is collected through questioners by filling a set of questions from the
different levels of management. The questions made by questioners are three different
types.
They are,
Structured questioners:
Unstructured questioners:
Semi-structured questioners:
Interviews:
Interviews were conducted to collect the information. The interviews were conducted
at two levels.
Formal Group Interviews: the interviews conducted for formal
groups i.e., the hierarchical (official) groups in the firm.
Informal Group Interviews: the interviews were conducted for informal groups i.e., the groups formed out side the comp
Observation:
The data is also collected by observation of the firm. The data is collected by
observing on the site at different timings and at different situations like when the firm
Record Review:
To collect the data and to get a clear idea of the firm some of the data is also collected
from the past records of the firm. This information helps very much to get a clear idea
of the firm i.e., the different problems occurred in different seasons and some
exception conditions. This very much gives a clear idea of exceptional conditions.
System Study:
Present system:
There are certain features limiting the process of the present system.
Proposed system:
The proposed system, Online Blood Bank site overcomes the drawbacks of the present
system. The Blood Bank helps the people who are in need of a blood by giving them
overall details regarding the donors with the same blood group and with in their city.
The people in need of blood can search for the donors by giving their
The person’s time and work is reduced very much which prevails in
Limitation:
Blood Bank and Donor Management
system
In this project the searching can be done for donors for majority of
In this project the contact person’s details are given for the limited
cities only.
SYSTEM REQUIREMENTS
Software Environment:
This specifies the environment for development, operation and maintenance of the
product.
Technology used:
Http
Http Basics
PHP
Dept. of BCA,University College of Arts and Page
Commerce 6
Blood Bank and Donor Management
system
MYSQL
HTML
JAVASCRIPT
HTTP:
The Hypertext Transfer Protocol is stateless, TCP/IP based protocol used for
communicating on the World Wide Web. HTTP defines the precise manner in which
Web clients communicate with Web servers. HTTP/1.0 is the most common version in
use today. Oddly enough, this protocol is not officially recognized as an Internet
standard. It is documented in the informational RFC 1945. Its successor, HTTP/1.1, is
currently a proposed Internet standard and many browsers and servers now support
this new version.
HTTP Basics:
conversation between a Web browser and Web server goes something like this: the
client opens a connection to the server, the client makes a request to the server, the
CLIENT
Dept. of BCA,University of Arts and Commerce Page
WEB SERVER
College 7
Blood Bank and Donor Management
system
Server Responds
Connection Closed
Connectionless Protocol:
HTTP is a connectionless protocol. As you may have guessed, the difference between
a connectionless and a connection-oriented protocol is in the way they handle
connections. Using a connectionless protocol, the client opens a connection with the
server, sends a request, receives a response, and closes the connection. Each request
requires its own connection. With a connection-oriented protocol, the client connects
to the server, sends a request, receives response, and then holds the connection open in
order to service future requests.
The connectionless nature of HTTP is both strength and a weakness. Because it holds
a connection open only long enough to service the request, very few server resources
are required to service large numbers of users. In fact many popular Web sites service
millions of users in a single day. The drawback to a connectionless protocol is that a
connection must be established with every request. Opening a new connection with
each request incurs a performance penalty that translates into additional delays for the
user.
Stateless Protocol:
The stateless nature of HTTP is both strength and a weakness. It is strength in that its
stateless nature keeps the protocol simple and straightforward. It also consumes fewer
resources on the server and can support more simultaneous users since there are no
client credentials and connections to maintain. The disadvantage is in the overhead
required to create a new connection with each request and the inability to track a
single user as he traverses a Web site.
PHP
What is PHP?
PHP is a server scripting language, and a powerful tool for making dynamic and
interactive Web pages.
Syntax –
<!DOCTYPE html>
html>
<html>
html>
<body>
body>
<?php
echo "My first PHP script!";
script!";
?>
</body>
/body>
</html>
/html>
PHP files can contain text, HTML, CSS, JavaScript, and PHP code
Blood Bank and Donor Management
system
PHP code are executed on the server, and the result is returned to the browser as plain HTML
PHP files have extension ".php"
With PHP you are not limited to output HTML. You can output images, PDF files,
and even Flash movies. You can also output any text, such as XHTML and XML.
Why PHP?
MYSQL
MySQL is a popular database management system. It has a free and open source
version. With its rich features, it has been the choice for many database driven PHP
applications.
MySQL History
MySQL was founded by Michael Widenius and David Axmark in 1994. It was then
developed under the company MySQL AB where the company provided both open
source and commercial licenses. In January 2008, Sun Microsystems acquired
MySQL AB and in January 2010, Oracle acquired Sun Microsystems making MySQL
owned by Oracle.Since Oracle is primarily a proprietary software company, concerns
have been raised about the future of MySQL. MySQL forks like MariaDB and
Control Language. These three languages support the complete spectrum of Relational
Data processing activity. In fact most SQL based product all access to the data through
SQL.
There are four standard DML statements. They are select, delete, insert and update.
Why to Use?
Oracle greatly supports RDBMS features. Also it supports high security to the data
and faster accessing capability. It can be run on a variety of platforms and operating
environment.
Hyper Text Markup Language is the standard language for creating documents for the
World Wide Web. An HTML document is a text file, which contains the elements, in
the form of tags that a web browser uses to display text, multimedia objects, and
hyperlinks using HTML; we can format a document for display and add hyperlinks to
other documents.
The user interface has been designed in HTML hence can be browsed in any web
browser.
These have been used to separate data form presentation. By using these style sheets
throughout the project, a uniform look and feel can be maintained for all the HTML
elements and tags that have been used in the project. If there is any revamp the way
the content has been presented in the website, the changes can be made to the
appropriate style sheet, which will be reflected across all the style sheets.
JavaScript
JavaScript Tutorial for beginners and professionals is a solution of client side dynamic
pages.
JavaScript is an object-based scripting language (programming language) that is
lightweight and cross-platform
JavaScript is not compiled but translated. The JavaScript Translator is responsible
to translate the JavaScript code.
Our JavaScript tutorial include all points of Statements , Comments, Variables,
Operators, Arithmetic, Assignment, Data Types, Functions, Objects, Scope, Events,
Strings, String Methods, Numbers, Number Methods, Math, Date Methods , Arrays,
Array Methods, Booleans, Comparisons, Conditions, Switch, Loop For, Loop While,
Break, Type Conversion, RegExp, Errors, Debugging etc
JavaScript Examples
The JavaScript example is the easiest to code. The reason being there are three places
where the code can be placed
Here are the three places where the JavaScript can be saved.
One is within the existing body tag, it can be saved in the head tag and last but not the
least it can be saved in the external JavaScript file.
The script tag present in the JavaScript file mentions that we are using the JavaScript.
Next the text or the actual script used this is the content which will provide
information to the browser for the data. The document.Write() is the function which is
used in order to display the dynamic content using the JavaScript.
There are three main places where the JavaScript code can be embedded are
mentioned below:
Hardware Configuration:
RAM : 64 MB RAM
Software Configuration:
System design is the process of planning a new system or to replace the existing
system. Simply, system design is like the blueprint for building, it specifies all the
System design phase follows system analysis phase. Design is concerned with
identifying functions, data streams among those functions, maintaining a record of the
Design is the bridge between system analysis and system implementation. Some of the
Abstraction
Modularity
Verification
mponent sub problems. Abstraction allows system designer to make step-wise refinement, which at each stage of the desig
Modularity is concerned with decomposing of main module into well-defined manageable units with well-d
clarity, which in turn eases implementation, Debugging, Testing, Documenting and
Maintenance of the software product. Modularity viewed in this sense is a vital tool in
. A design is verifiable if it can be demonstrated that the design will result in implementation that satisfies the customer’s re
customer’s needs.
Some of the important factors of quality that are to be considered in the design of
Reliability:
The software should behave strictly according to the original specification and should
Extensibility:
Reusability:
The software should be developed using a modular approach, which permits modules
The System Design briefly describes the concept of system design and it contains four
sections. The first section briefly describes the features that the system is going to
provide to the user and the outputs that the proposed system is going to offer.
The second section namely Logical Design describes the Data Flow Diagrams, which
show clearly the data movements, the processes and the data sources, and sinks, E-R
diagrams which represent the overall logical design of the database, and high-level
process structure of the system.
The process of design involves “conceiving and planning out in the mind” and making
a drawing pattern, or sketch of the system. In software design there are two types of
Details or internal design involves conceiving, planning out, and specifying the
internal structure and processing details of the software product. The goal of internal
modularity system consists interfaces among the units. Modularity enhances design
decomposition of a large system into smaller, more manageable units with well-
defined relationships to the other units. The system design is verifiable if it can be
demonstrated that the design will result in an implementation that satisfies the
customer’s requirements.
Preliminary Design:
Preliminary design is basically concerned with deriving an overall picture of the
system. Deriving entire system into modules and sub-modules while keeping
Cohesion and Coupling factors in mind. Tools, which assist in preliminary design
Code design:
The purpose of code is to facilitate the identification and retrieval for items of
only one place where the identified entity or the attribute can be entered in the code;
conversely there must be a place in the code for everything that is to be identified.
This mutually exclusive feature must be built into any coding system.
The codes for this system are designed with two features in mind. Optimum human
oriented use and machine efficiency. Length of the code range from length of one to
attributes.
The code structure is expansible allowing for growth of its set
entities.
The codes are also easily storable for producing reports in a
Input Design:
Input design is a part of overall system design, which requires very careful attention.
user staff.
In this system input screens are designed very carefully so that no inaccurate data
will enter the database. The data is made as easy as possible. For simplifying the
data entry many facilities are given.
Each and every screen in this system is facilitated by many pushbuttons so that the
user can easily work with this system.
Output Design:
Outputs from computer systems are required primarily to communicate the results of
processing to users.They are also to provide a permanent hard copy of these results
The various types of outputs are required by this system are given below:
Blood Bank and Donor Management
system
which require special attention because they, project the image of the concern.
Internal outputs, whose destination is within the concern and
which require careful design because they are the user’s main interface within
the computer.
Operation outputs, whose use is purely within the computer
department, E.g., program listings, usage statistics etc,
Interactive outputs, which involves the user in communicating
directly with the computers.
,University Page
Dept. of BCACollege of Arts and Commerce 20
Admin Blood Seekers
Blood Bank and Donor Management
system
I Level – DFD:
Registration
Blood Donors
Life Saving
Contacts
Blood
Bank
Paging
Blood Seekers Services
Search
Registration
Blood Donors
Life Saving
Contacts
Blood
Bank
Paging Services
Blood Seekers
Search
UML Diagram
Manage Blood
Admin Panel Groups
Add Donor
Manage Donor
Manage Inquiries
Manage Website
Donor
Become a Donor
Can Enquire
ER Diagram
data and makes possible to treat data as a separate resource. Usually centralized data
The most significant different between RDBMS and other type of Data Management
is the separation of data as seen by the program and data as store of on the direct
access storage device. This is the difference between logical and physical data.
Data Dictionary:
The efficiency of an application developed using RDBMS mainly depend upon the
database tables, the fields in each table and the way the tables are opened using the
The database tables used in this system are created keeping the above points in mind.
The tables used are given below.
MYSQL Table Structure
Home Page
About Us Page
Why Become Donor Page
Contact Us Page
Admin
Dashboard
Change Password
Add Blood Group
System testing is the stage before system implementation where the system is made
error free and all the needed modifications are made. The system was tested with test
data and necessary corrections to the system were carried out. All the reports were
checked by the user and approved. The system was very user friendly with online help
to assist the user wherever necessary.
Test Plan:
A test plan is a general document for the entire project, which defines the scope,
approach to be taken, and schedule of testing, as well as identifying the test item for
the entire testing process, and the personal responsible for the different activities of
testing. This document describes the plan for testing, the knowledge management tool.
Test units
Features to be tested
Test deliverables
Schedule
Personal allocation
Test units:
Test Case specification is major activity in the testing process. In this project, I have
performed two levels of testing.
Unit testing
System testing
Exception handling
as expected.
Alpha Testing:
This was done at the developer’s site by a customer. The software is used in a natural
setting with the developer “looking over the shoulder” of the user and recording errors
Beta Testing:
This was conducted at one or more customer sites by the end-user of the software.
Unlike alpha testing, the developer is generally not present. Therefore, the beta test is
developer. The customer records all problems that are encountered during beta testing
reported during beta tests, software engineers make modifications and then prepare for
Error report
The test case specification for system testing has to be submitted for review before the
During the software-testing phase each module of software is thoroughly tested for
bugs and for accuracy of output. The system developed is very user-friendly and the
detailed documentation is also given to the user as online help wherever necessary.
The implementation phase normally ends with the formal test involving all the
components.
The entire system was developed using the PHP, HTML, JavaScript, Personal Web
Server, and MYSQL as back end. The HTML is used to design the web page. The
Personal Web Server is used to understand the client’s request and to send response to
them. The JAVASCRIPT are used for client-side validations so that the user can enter
only appropriate input in the input fields. The MYSQL is the back end tool where the
database resides.
Hence the design of the entire system is user-friendly and simple the implementation
has been quite easy.
CONCLUSION AND FUTURE
ENHANCEMENT
This project has given me an ample opportunity to design, code, and test and
implements an application. This has helped in putting into practice of various
Software Engineering principles and Database Management concepts like maintaining
integrity and consistency of data. Further, this has helped me to learn more about
MYSQL, PHP, HTML, JAVASCRIPT, Adobe Photoshop 7.0 and Personal Web
Server.
The other features, which the Blood bank services provide, can also be incorporated
into this Blood Bank. The Encryption standards can also be used to make the
transactions more secure. The Socket Secure Layer protocol can also used in
implementing the system, which gives highest security in the Internet.
Future Enhancement:
As there was a little number of contact person’s information given, some people may
face difficulty in getting blood fast. So i like to gather more information regarding the
contact persons in other cities as well as villages and will provide much more services
BIBLIOGRAPHY