Documentation Payroll
Documentation Payroll
XXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXX
Done by
1
CERTIFICATE
This is to certify that Mr. XXXX, bearing Roll No. XXXXXXXXXXX have
EXTERNAL
ACKNOWLEDGMENT
2
My express thanks and gratitude and thanks to Almighty God, my parents and
other family members and friends without whose unsustained support, I could not have
made this career in XXXX.
Finally I would like to thank my friends for their cooperation to complete this
project.
XXXXXXX
3
ABSTARCT
The main aim of the project is to develop an application which helps in providing a
company payroll system which is the sum of all financial records of salaries, wages,
bonuses and deductions.
2. Payroll
The payroll module consists of loans, pay slip and generating reports
In Loans details are with the following information like employee name, employee code,
loan amount, paid amount, balance amount and from to which date
Pay slip consists information of an employee pay slip like no of days present, loss of pay,
allowances, deductions etc;
Generating reports for all the modules
4
CONTENTS
1. INTRODUCTION
2. SYTEM STUDY
3.2 INPUTDESIGN
3.3OUTPUT DESIGN
CONCLUSION
BIBLIOGRAPHY
APPENDICES
A. DATA FLOW DIAGRAMS
B. TABLE STRUCTURE
C. SAMPLE OUTPUT
D. OUTPUT/REPORT
5
INTRODUCTION
6
HERITAGE IT SOLUTIONS
A leader in interactive business solutions, HIS delivers more than just consulting,
interactive website development, multimedia solutions, electronic business tools, online
marketing, hosting, management and technical support. We help build businesses and
make business management a pleasure.
HIS offers a one-stop solution for all your present and future IT requirements.
Multimedia Presentations, Websites & Portals, Document Management Systems (DMS),
Intranet Architecture, Customized Software Packages, Business Processing Outsourcing
(BPO).
These days when technology is changing every minute, HIS fulfills your need of an IT
partner that has the resources and willpower to stay abreast with the latest development,
analyze the current requirements and predict the future trends and thus help you to always
stay one step ahead of the competition.
Quality
7
Vision
To develop a strong Client base with an equally effective Support structure which acts as
a catalyst for effective deployment of futuristically complete and credible IT solutions.
We strive to achieve this by focusing individually on each project and build a healthy
relationship with our Customers.
Management
After having brought the company from the conceptualization stage onward, the
management is confident that technologies, work force and determination are poised for
growth and wide acceptance.
The management is continually identifying some more niche segments, where the
presence is desirable to ensure globalization of the organization's presence.
Team
Our Team is a complete and strategic mix of professionals from Technology, Consulting,
Business Management and Client Servicing domains. The Team has some of the most
talented and spirited people within the industry. Whether it comes to innovation, deadline
based delivery, quality consciousness, cutting-edge solutions; collective achievement is
simply a way of life. Almost obviously, we have engineers and technology associates
from premier institutions and colleges who are powerhouses of corporate and technology
services experience.
Our software engineers provide superior results on a wide variety of platforms and
programming environments. Our database systems experts create sophisticated data marts
and other Internet solutions that make up the core of your web business. The creative
team can conjure up magic on your Internet business screen and the client servicing
associates will assist you through every stage of the project and complete it within crucial
deadlines.
8
Services
Heritage IT Solutions (HIT) offers a one-stop solution for all your present and future IT
requirements. Our services includes
• Multimedia Presentation
o Slideshow Presentation
o Flash Animation
o Intro Design
• Intranet Architecture
9
Clients
10
HARDWARE & SOFTWARE SPECIFICATIONS
• HARDWARE REQUIREMENTS:
.
RAM : 256MB
Processor : P-IV
Memory : 32MB
• SOFTWARE REQUIREMENTS:
11
SYSTEM STUDY
12
PROBLEMS IN THE EXISTING SYSTEM
DRAWBACKS
• Searching for a particular employee through a book is strenuous
• Details may be incomplete or inaccurate
• However payroll calculation, year-end reporting, and recording employee data in
a book is strenuous
• It is less user-friendly.
PROPOSED SYSTEM
The development of the new system contains the following activities, which try to
automate the entire process keeping in view of the database integration approach.
• The system makes the overall project management much easier and flexible.
• The most obvious benefit of payroll software is that payroll calculations can
be completed in a fraction of the time that it takes to workout manually.
13
SCOPE OF THE PROJECT
This Document plays a vital role in the development life cycle (SDLC) as it describes the
complete requirement of the system. It is meant for use by the developers and will be the
basic during testing phase. Any changes made to the requirements in the future will have
to go through formal change approval process.
WATER FALL MODEL was being chosen because all requirements were known
beforehand and the objective of our software development is the
computerization/automation of an already existing manual working system.
Changed
Requirements
Communicated
Requirements
Requirements
Specification
Requirements
Engineering
Design
Specification
Design
Executable Maintenance
Software
Programming Modules
Integrated
Process Software
Product
Integration
Delivered
Product Software
Product Product
Output Delivery
Input
14
The developer is responsible for:
• Developing the system, which meets the SRS and solving all the requirements of
the system?
• Demonstrating the system and installing the system at client's location after the
acceptance testing is successful.
• Submitting the required user manual describing the system interfaces to work on it
and also the documents of the system.
• Conducting any user training that might be needed for using the system.
• Maintaining the system for a period of one year after installation.
Creating Database:
This tutorial will help you get started with Microsoft Access and may solve some
of your problems, but it is a very good idea to use the Help Files that come with
Microsoft Access, or go to Microsoft's web site located at
http://microsoft.com/office/access/default.htm for further assistance.
First of all you need to understand how Microsoft Access breaks down a database.
Some keywords involved in this process are: Database File, Table, Record, Field,
and Data-type. Here is the Hierarchy that Microsoft Access uses in breaking down
a database.
15
Database File: This is your main file that encompasses
the entire database and that is saved to your hard-drive
or floppy disk.
Example) StudentDatabase.mdb
Table:A table is a collection of data about a specific
topic. There can be multiple tables in a database.
Example #1) Students
Example #2) Teachers
Field:Fields are the different categories within a Table.
Tables usually contain multiple fields.
Example #1) Student LastName
Example #2) Student FirstName
Datatypes:Datatypes are the properties of each field. A
field only has 1 datatype.
FieldName) Student LastName
Datatype) Text
• Two Ways
1. Double click on the Microsoft Access icon on the desktop.
16
The above picture gives you the option to:
1. When Microsoft Access first starts up, a dialog box is automatically displayed
with options to create a new database or open an existing one. If this dialog box is
displayed, click Access Database Wizards, pages, and projects
17
And then click OK.
2. If you have already opened a database or closed the dialog box that displays when
Microsoft Access starts up, click New Database on the toolbar.
3. On the Databases tab, double-click the icon for the kind of database you want to
create.
1. When Microsoft Access first starts up, a dialog box is automatically displayed
with options to create a new database or open an existing one. If this dialog box is
displayed, click Blank Access Database, and then click OK.
If you have already opened a database or closed the dialog box that displays when
Microsoft Access starts up, click New Database on the toolbar, and then double-
click the Blank Database icon on the General tab.
2. Specify a name and location for the database and click Create. (Below is the
screen that shows up following this step)
18
Tables
A table is a collection of data about a specific topic, such as students or contacts. Using a
separate table for each topic means that you store that data only once, which makes your
database more efficient, and reduces data-entry errors.
19
1. If you haven't already done so, switch to the Database Window You can press F11 to
switch to the Database window from any other window.
20
1. The attribute of a variable or field that determines what kind of
data it can hold. For example, in a Microsoft Access database, the
Text and Memo field data types allow the field to store either text
or numbers, but the Number data type will allow the field to store
numbers only. Number data type fields store numerical data that
will be used in mathematical calculations. Use the Currency data
type to display or calculate currency values. Other data types are
Date/Time, Yes/No, Auto Number, and OLE object (Picture).
3. Under the Description column, enter the text that describes what you field
is. (This field is optional).
Primary Key
• One or more fields (columns) whose values or value uniquely identify each record
in a table. A primary key does not allow Null values and must always have a
unique value. A primary key is used to relate a table to foreign keys in other
tables.
• NOTE: You do not have to define a primary key, but it's usually a good idea. If
you don't define a primary key, Microsoft Access asks you if you would like to
create one when you save the table.
• For our tutorial, make the Soc Sec # field the primary key, meaning that every
student has a social security number and no 2 are the same.
o To do this, simply select the Soc Sec # field and select the primary key
button
Switching Views
21
• To switch views form the datasheet (spreadsheet view) and the design view,
simply click the button in the top-left hand corner of the Access program.
Displays the view, which allows you Displays the view, which allows you to enter fields,
to enter raw data into your database data-types, and descriptions into your database
table. table.
Entering Data
• Click on the Datasheet View and simply start "chugging" away by entering the
data into each field. NOTE: Before starting a new record, the Soc Sec # field
must have something in it, because it is the Primary Key. If you did not set a
Primary Key then it is OK.
Manipulating Data
22
• Adding a new row
o Simply drop down to a new line and enter the information
• Updating a record
o Simply select the record and field you want to update, and change its data
with what you want
• Deleting a record
o Simply select the entire row and hit the Delete Key on the keyboard
23
5. Select Phone Number option
6. Click on Next
7. Leave! (999) 000-0000 the way it is. This is a default.
8. Click Next
9. Select which option you want it to look like
10. Click Next
11. Click Finish
• Selecting a value from a dropdown box with a set of values that you assign to it.
This saves you from typing it in each time
o Example)Choosing a city that is either Auburn, Bay City, Flint, Midland,
or Saginaw
1. Switch to Design View
2. Select the field you want to alter (City)
3. At the bottom select the Lookup Tab
4. In the Display Control box, select Combo Box
5. Under Row Source Type, select Value List
6. Under Row Source, enter the values how you want them
displayed, separated by a comma. (Auburn, Bay City, Flint,
Midland, Saginaw)
24
NOTE: This will not alphabetize them for you, so you will
have to do that yourself. It should look something like this:
7. Select in the datasheet view and you should see the change when
you go to the city field.
Relationships
After you've set up multiple tables in your Microsoft Access database, you need a way of
telling Access how to bring that information back together again. The first step in this
process is to define relationships between your tables. After you've done that, you can
create queries, forms, and reports to display information from several tables at once.
25
A relationship works by matching data in key fields - usually a field with the same name
in both tables. In most cases, these matching fields are the primary key from one table,
which provides a unique identifier for each record, and a foreign key in the other table.
For example, teachers can be associated with the students they're responsible for by
creating a relationship between the teacher's table and the student's table using the
TeacherID fields.
Having met the criteria above, follow these steps for creating relationships between
tables.
1. In the database window view, at the top, click on Tools ---> Relationships
2. Select the Tables you want to link together, by clicking on them and selecting the
Add Button
3. Drag the primary key of the Parent table (Teacher in this case), and drop it into the
same field in the Child table (Student in this case.)
26
4. Select Enforce Referential Integrity
o When the Cascade Update Related Fields check box is set, changing a
primary key value in the primary table automatically updates the matching
value in all related records.
o When the Cascade Delete Related Records check box is set, deleting a
record in the primary table deletes any related records in the related table
5. Click Create and Save the Relationship
PROJECT DESIGN
27
INPUT DESIGN
Input design is a part of overall system design. The main objective during the input
design is as given below:
• To produce a cost-effective method of input.
• To achieve the highest possible level of accuracy.
• To ensure that the input is acceptable and understood by the user.
INPUT STAGES:
The main input stages can be listed as below:
• Data recording
• Data transcription
• Data conversion
• Data verification
• Data control
28
• Data transmission
• Data validation
• Data correction
INPUT TYPES:
It is necessary to determine the various types of inputs. Inputs can be categorized as
follows:
• External inputs, which are prime inputs for the system.
• Internal inputs, which are user communications with the system.
• Operational, which are computer department’s communications to the
system?
• Interactive, which are inputs entered during a dialogue.
INPUT MEDIA:
At this stage choice has to be made about the input media. To conclude about the
input media consideration has to be given to;
• Type of input
• Flexibility of format
• Speed
• Accuracy
• Verification methods
• Rejection rates
• Ease of correction
• Storage and handling requirements
• Security
• Easy to use
• Portabilility
Keeping in view the above description of the input types and input media, it can be said
that most of the inputs are of the form of internal and interactive. As
Input data is to be the directly keyed in by the user, the keyboard can be considered to be
the most suitable input device.
29
OUTPUT DESIGN
Outputs from computer systems are required primarily to communicate the results of
processing to users. They are also used to provide a permanent copy of the results for
later consultation. The various types of outputs in general are:
• External Outputs, whose destination is outside the organization.
• Internal Outputs whose destination is with in organization and they are the
User’s main interface with the computer.
• Operational outputs whose use is purely with in the computer department.
• Interface outputs, which involve the user in communicating directly with
OUTPUT DEFINITION
The outputs should be defined in terms of the following points:
Type of the output
Content of the output
Format of the output
Location of the output
Frequency of the output
Volume of the output
Sequence of the output
OUTPUT MEDIA:
30
In the next stage it is to be decided that which medium is the most appropriate for the
output. The main considerations when deciding about the output media are:
Keeping in view the above description the project is to have outputs mainly
coming under the category of internal outputs. The main outputs desired according to the
requirement specification are: The outputs were needed to be generated as a hot copy
and as well as queries to be viewed on the screen. Keeping in view these outputs, the
format for the output is taken from the outputs, which are currently being obtained after
manual processing. The standard printer is to be used as output media for hard copies.
A data flow diagram is graphical tool used to describe and analyze movement of
data through a system. These are the central tool and the basis from which the other
components are developed. The transformation of data from input to output, through
processed, may be described logically and independently of physical components
associated with the system. These are known as the logical data flow diagrams. The
physical data flow diagrams show the actual implements and movement of data between
people, departments and workstations. A full description of a system actually consists of
a set of data flow diagrams. Using two familiar notations Yourdon, Gane and Sarson
notation develops the data flow diagrams. Each component in a DFD is labeled with a
descriptive name. Process is further identified with a number that will be used for
identification purpose. The development of DFD’s is done in several levels. Each
process in lower level diagrams can be broken down into a more detailed DFD in the next
31
level. The lop-level diagram is often called context diagram. It consists of a single
process bit, which plays vital role in studying the current system. The process in the
context level diagram is exploded into other process at the first level DFD.
The idea behind the explosion of a process into more process is that understanding
at one level of detail is exploded into greater detail at the next level. This is done until
further explosion is necessary and an adequate amount of detail is described for analyst to
understand the process.
A DFD is also known as a “bubble Chart” has the purpose of clarifying system
requirements and identifying major transformations that will become programs in system
design. So it is the starting point of the design to the lowest level of detail. A DFD
consists of a series of bubbles joined by data flows in the system.
DFD SYMBOLS:
32
Process that transforms data flow.
Data flow
Data Store
CONSTRUCTING A DFD:
Several rules of thumb are used in drawing DFD’s:
1. Process should be named and numbered for an easy reference. Each name should be
representative of the process.
2. The direction of flow is from top to bottom and from left to right. Data Traditionally
flow from source to the destination although they may flow back to the source. One
way to indicate this is to draw long flow line back to a source. An alternative way is
to repeat the source symbol as a destination. Since it is used more than once in the
DFD it is marked with a short diagonal.
33
3. When a process is exploded into lower level details, they are numbered.
4. The names of data stores and destinations are written in capital letters. Process and
dataflow names have the first letter of each work capitalized
A DFD typically shows the minimum contents of data store. Each data store should
contain all the data elements that flow in and out.
Questionnaires should contain all the data elements that flow in and out. Missing
interfaces redundancies and like is then accounted for often through interviews.
1. The DFD shows flow of data, not of control loops and decision are controlled
considerations do not appear on a DFD.
2. The DFD does not indicate the time factor involved in any process whether the
data flows take place daily, weekly, monthly or yearly.
3. The sequence of events is not brought out on the DFD.
CURRENT PHYSICAL:
In Current Physical DFD process label include the name of people or their
positions or the names of computer systems that might provide some of the overall
34
system-processing label includes an identification of the technology used to process the
data. Similarly data flows and data stores are often labels with the names of the actual
physical media on which data are stored such as file folders, computer files, business
forms or computer tapes.
CURRENT LOGICAL:
The physical aspects at the system are removed as mush as possible so that the
current system is reduced to its essence to the data and the processors that transform them
regardless of actual physical form.
NEW LOGICAL:
This is exactly like a current logical model if the user were completely happy with
he user were completely happy with the functionality of the current system but had
problems with how it was implemented typically through the new logical model will
differ from current logical model while having additional functions, absolute function
removal and inefficient flows recognized.
NEW PHYSICAL:
The new physical represents only the physical implementation of the new system.
PROCESS
1) No process can have only outputs.
2) No process can have only inputs. If an object has only inputs than it must be a
sink.
3) A process has a verb phrase label.
DATA STORE:
35
1) Data cannot move directly from one data store to another data store, a process
must move data.
2) Data cannot move directly from an outside source to a data store, a process,
which receives, must move data from the source and place the data into data
store
3) A data store has a noun phrase label.
SOURCE OR SINK
The origin and /or destination of data.
1) Data cannot move direly from a source to sink it must be moved by a process
2) A source and /or sink has a noun phrase land
DATA FLOW
1) A Data Flow has only one direction of flow between symbol. It may flow in
both directions between a process and a data store to show a read before an
update. The later is usually indicated however by two separate arrows since
these happen at different type.
2) A join in DFD means that exactly the same data comes from any of two or
more different processes data store or sink to a common location.
3) A data flow cannot go directly back to the same process it leads. There must
be at least one other process that handles the data flow produce some other
data flow returns the original data into the beginning process.
4) A Data flow to a data store means update (delete or change).
5) A data Flow from a data store means retrieve or use.
6) A data flow has a noun phrase label more than one data flow noun phrase can
appear on a single arrow as long as all of the flows on the same arrow move
together as one package.
36
Payroll
USER Services ADMINISTRATOR
DFD LEVEL 1
Loans
Allowances/Deductions Reports
EMPLOYEE MASTER
ADMINISTRATION Store
ALLOWANCES/DEDUCTIONS
37
Add Allowances/Deduction Details
ADMINISTRATION Store
LOANS
ADMINISTRATION
N Store
38
SELECTED SOFTWARE
Overview of .Net
The .NET Framework is a new computing platform that simplifies application
development in the highly distributed environment of the Internet. The .NET Framework
is designed to fulfill the following objectives:
• To provide a consistent object-oriented programming environment whether object
• Code is stored and executed locally, executed locally but Internet-distributed, or
executed remotely.
• To provide a code-execution environment that minimizes software deployment
and versioning conflicts.
39
• To provide a code-execution environment that guarantees safe execution of code,
including code created by an unknown or semi-trusted third party.
• To provide a code-execution environment that eliminates the performance
problems of scripted or interpreted environments.
• To make the developer experience consistent across widely varying types of
applications, such as Windows-based applications and Web-based applications.
• To build all communication on industry standards to ensure that code based on the
.NET Framework can integrate with any other code.
The .NET Framework has two main components: the common language runtime and
the .NET Framework class library. The common language runtime is the foundation of
the .NET Framework. You can think of the runtime as an agent that manages code at
execution time, providing core services such as memory management, thread
management, and remoting, while also enforcing strict type safety and other forms of
code accuracy that ensure security and robustness. In fact, the concept of code
management is a fundamental principle of the runtime. Code that targets the runtime is
known as managed code, while code that does not target the runtime is known as
unmanaged code. The class library, the other main component of the .NET Framework, is
a comprehensive, object-oriented collection of reusable types that you can use to develop
applications ranging from traditional command-line or graphical user interface (GUI)
applications to applications based on the latest innovations provided by ASP.NET, such
as Web Forms and XML Web services.
The .NET Framework can be hosted by unmanaged components that load the common
language runtime into their processes and initiate the execution of managed code, thereby
creating a software environment that can exploit both managed and unmanaged features.
The .NET Framework not only provides several runtime hosts, but also supports the
development of third-party runtime hosts.
For example, ASP.NET hosts the runtime to provide a scalable, server-side environment
for managed code. ASP.NET works directly with the runtime to enable Web Forms
applications and XML Web services, both of which are discussed later in this topic.
40
Internet Explorer is an example of an unmanaged application that hosts the runtime (in
the form of a MIME type extension). Using Internet Explorer to host the runtime enables
you to embed managed components or Windows Forms controls in HTML documents.
Hosting the runtime in this way makes managed mobile code (similar to Microsoft®
ActiveX® controls) possible, but with significant improvements that only managed code
can offer, such as semi-trusted execution and secure isolated file storage.
The common language runtime manages memory, thread execution, code execution,
code safety verification, compilation, and other system services. These features are
intrinsic to the managed code that runs on the common language runtime.
With regards to security, managed components are awarded varying degrees of trust,
depending on a number of factors that include their origin (such as the Internet, enterprise
network, or local computer). This means that a managed component might or might not
be able to perform file-access operations, registry-access operations, or other sensitive
functions, even if it is being used in the same active application.
The runtime enforces code access security. For example, users can trust that an
executable embedded in a Web page can play an animation on screen or sing a song, but
cannot access their personal data, file system, or network. The security features of the
runtime thus enable legitimate Internet-deployed software to be exceptionally featuring
rich.
The runtime also enforces code robustness by implementing a strict type- and code-
verification infrastructure called the common type system (CTS). The CTS ensures that
all managed code is self-describing. The various Microsoft and third-party language
compilers generate managed code that conforms to the CTS. This means that managed
code can consume other managed types and instances, while strictly enforcing type
fidelity and type safety.
In addition, the managed environment of the runtime eliminates many common software
issues. For example, the runtime automatically handles object layout and manages
references to objects, releasing them when they are no longer being used. This automatic
41
memory management resolves the two most common application errors, memory leaks
and invalid memory references.
The runtime also accelerates developer productivity. For example, programmers can write
applications in their development language of choice, yet take full advantage of the
runtime, the class library, and components written in other languages by other developers.
Any compiler vendor who chooses to target the runtime can do so. Language compilers
that target the .NET Framework make the features of the .NET Framework available to
existing code written in that language, greatly easing the migration process for existing
applications.
While the runtime is designed for the software of the future, it also supports software of
today and yesterday. Interoperability between managed and unmanaged code enables
developers to continue to use necessary COM components and DLLs.
The common type system defines how types are declared, used, and managed in the
runtime, and is also an important part of the runtime's support for cross-language
integration. The common type system performs the following functions:
Establishes a framework that enables cross-language integration, type safety, and high
performance code execution.
42
Provides an object-oriented model that supports the complete implementation of many
programming languages.
Defines rules that languages must follow, which helps ensure that objects written in
different languages can interact with each other.
Describes concepts and defines terms relating to the common type system.
Type Definitions
Describes user-defined types.
Type Members
Describes events, fields, nested types, methods, and properties, and concepts such as
member overloading, overriding, and inheritance.
Value Types
Delegates
Describes the delegate object, which is the managed alternative to unmanaged function
pointers.
Arrays
43
Interfaces
Pointers
Related Sections
Provides a reference to the classes, interfaces, and value types included in the
Microsoft .NET Framework SDK.
Describes the run-time environment that manages the execution of code and provides
application development services.
Cross-Language Interoperability
The common language runtime provides built-in support for language interoperability.
However, this support does not guarantee that developers using another programming
language can use code you write. To ensure that you can develop managed code that can
be fully used by developers using any programming language, a set of language features
and rules for using them called the Common Language Specification (CLS) has been
defined. Components that follow these rules and expose only CLS features are considered
CLS-compliant.
This section describes the common language runtime's built-in support for language
interoperability and explains the role that the CLS plays in enabling guaranteed cross-
language interoperability. CLS features and rules are identified and CLS compliance is
discussed.
44
Language Interoperability
Describes built-in support for cross-language interoperability and introduces the Common
Language Specification.
Explains the need for a set of features common to all languages and identifies CLS rules
and features.
Discusses the meaning of CLS compliance for components and identifies levels of CLS
compliance for tools.
Describes how types are declared, used, and managed by the common language runtime.
Explains the common language runtime's mechanism for describing a type and storing
that information with the type itself.
The .NET Framework class library is a collection of reusable types that tightly integrate
with the common language runtime. The class library is object oriented, providing types
from which your own managed code can derive functionality. This not only makes the
.NET Framework types easy to use, but also reduces the time associated with learning
new features of the .NET Framework. In addition, third-party components can integrate
seamlessly with classes in the .NET Framework.
For example, the .NET Framework collection classes implement a set of interfaces that
you can use to develop your own collection classes. Your collection classes will blend
seamlessly with the classes in the .NET Framework.
As you would expect from an object-oriented class library, the .NET Framework types
enable you to accomplish a range of common programming tasks, including tasks such as
string management, data collection, database connectivity, and file access. In addition to
45
these common tasks, the class library includes types that support a variety of specialized
development scenarios. For example, you can use the .NET Framework to develop the
following types of applications and services:
Console applications
• ASP.NET applications.
• Windows services.
For example, the Windows Forms classes are a comprehensive set of reusable types that
vastly simplify Windows GUI development. If you write an ASP.NET Web Form
application, you can use the Web Forms classes.
Another kind of client application is the traditional ActiveX control (now replaced by the
managed Windows Forms control) deployed over the Internet as a Web page. This
application is much like other client applications: it is executed natively, has access to
local resources, and includes graphical elements.
In the past, developers created such applications using C/C++ in conjunction with the
Microsoft Foundation Classes (MFC) or with a rapid application development (RAD)
environment such as Microsoft® Visual Basic®. The .NET Framework incorporates
46
aspects of these existing products into a single, consistent development environment that
drastically simplifies the development of client applications.
The Windows Forms classes contained in the .NET Framework are designed to be used
for GUI development. You can easily create command windows, buttons, menus,
toolbars, and other screen elements with the flexibility necessary to accommodate shifting
business needs.
For example, the .NET Framework provides simple properties to adjust visual attributes
associated with forms. In some cases the underlying operating system does not support
changing these attributes directly, and in these cases the .NET Framework automatically
recreates the forms. This is one of many ways in which the .NET Framework integrates
the developer interface, making coding simpler and more consistent.
Unlike ActiveX controls, Windows Forms controls have semi-trusted access to a user's
computer. This means that binary or natively executing code can access some of the
resources on the user's system (such as GUI elements and limited file access) without
being able to access or compromise other resources. Because of code access security,
many applications that once needed to be installed on a user's system can now be safely
deployed through the Web. Your applications can implement the features of a local
application while being deployed like a Web page.
Choosing a Complier
To obtain the benefits provided by the common language runtime, you must use one or
more language compilers that target the runtime.
Compiling translates your source code into MSIL and generates the required metadata.
47
Compiling MSIL to native code
At execution time, a just-in-time (JIT) compiler translates the MSIL into native code.
During this compilation, code must pass a verification process that examines the MSIL
and metadata to find out whether the code can be determined to be type safe.
The common language runtime provides the infrastructure that enables execution to take
place as well as a variety of services that can be used during execution.
Assemblies Overview
It contains code that the common language runtime executes. Microsoft intermediate
language (MSIL) code in a portable executable (PE) file will not be executed if it does
not have an associated assembly manifest. Note that each assembly can have only one
entry point (that is, DllMain, WinMain, or Main).
It forms a security boundary. An assembly is the unit at which permissions are requested
and granted. For more information about security boundaries as they apply to assemblies,
see Assembly Security Considerations
It forms a type boundary. Every type's identity includes the name of the assembly in
which it resides. A type called MyType loaded in the scope of one assembly is not the
same as a type called MyType loaded in the scope of another assembly.
It forms a version boundary. The assembly is the smallest version able unit in the
common language runtime; all types and resources in the same assembly are versioned as
a unit. The assembly's manifest describes the version dependencies you specify for any
dependent assemblies. For more information about versioning, see Assembly Versioning
48
It forms a deployment unit. When an application starts, only the assemblies that the
application initially calls must be present. Other assemblies, such as localization
resources or assemblies containing utility classes can be retrieved on demand. This allows
applications to be kept simple and thin when first downloaded. For more information
about deploying assemblies, see Deploying Applications
It is the unit at which side-by-side execution is supported. For more information about
running multiple versions of the same assembly, see Side-by-Side Execution
Assemblies can be static or dynamic. Static assemblies can include .NET Framework
types (interfaces and classes), as well as resources for the assembly (bitmaps, JPEG files,
resource files, and so on). Static assemblies are stored on disk in PE files. You can also
use the .NET Framework to create dynamic assemblies, which are run directly from
memory and are not saved to disk before execution. You can save dynamic assemblies to
disk after they have executed.
There are several ways to create assemblies. You can use development tools, such as
Visual Studio .NET, that you have used in the past to create .dll or .exe files. You can use
tools provided in the .NET Framework SDK to create assemblies with modules created in
other development environments. You can also use common language runtime APIs, such
as Reflection. Emit, to create dynamic assemblies.
Server-side applications in the managed world are implemented through runtime hosts.
Unmanaged applications host the common language runtime, which allows your custom
managed code to control the behavior of the server. This model provides you with all the
features of the common language runtime and class library while gaining the performance
and scalability of the host server.
49
The following illustration shows a basic network schema with managed code running in
different server environments. Servers such as IIS and SQL Server can perform standard
operations while your application logic executes through the managed code.
ASP.NET is the hosting environment that enables developers to use the .NET Framework
to target Web-based applications. However, ASP.NET is more than just a runtime host; it
is a complete architecture for developing Web sites and Internet-distributed objects using
managed code. Both Web Forms and XML Web services use IIS and ASP.NET as the
publishing mechanism for applications, and both have a collection of supporting classes
in the .NET Framework.
If you have used earlier versions of ASP technology, you will immediately notice the
improvements that ASP.NET and Web Forms offers. For example, you can develop Web
Forms pages in any language that supports the .NET Framework. In addition, your code
no longer needs to share the same file with your HTTP text (although it can continue to
do so if you prefer). Web Forms pages execute in native machine language because, like
any other managed application, they take full advantage of the runtime. In contrast,
unmanaged ASP pages are always scripted and interpreted. ASP.NET pages are faster,
more functional, and easier to develop than unmanaged ASP pages because they interact
with the runtime like any managed application.
The .NET Framework also provides a collection of classes and tools to aid in
development and consumption of XML Web services applications. XML Web services
50
are built on standards such as SOAP (a remote procedure-call protocol), XML (an
extensible data format), and WSDL (the Web Services Description Language). The .NET
Framework is built on these standards to promote interoperability with non-Microsoft
solutions.
For example, the Web Services Description Language tool included with the .NET
Framework SDK can query an XML Web service published on the Web, parse its WSDL
description, and produce C# or Visual Basic source code that your application can use to
become a client of the XML Web service. The source code can create classes derived
from classes in the class library that handle all the underlying communication using
SOAP and XML parsing. Although you can use the class library to consume XML Web
services directly, the Web Services Description Language tool and the other tools
contained in the SDK facilitate your development efforts with the .NET Framework.
If you develop and publish your own XML Web service, the .NET Framework provides a
set of classes that conform to all the underlying communication standards, such as SOAP,
WSDL, and XML. Using those classes enables you to focus on the logic of your service,
without concerning yourself with the communications infrastructure required by
distributed software development.
Finally, like Web Forms pages in the managed environment, your XML Web service will
run with the speed of native machine language using the scalable communication of IIS.
This section describes the programming essentials you need to build .NET applications,
from creating assemblies from your code to securing your application. Many of the
fundamentals covered in this section are used to create any application using the .NET
Framework. This section provides conceptual information about key programming
concepts, as well as code samples and detailed explanations.
51
Accessing Data with ADO.NET
Describes the ADO.NET architecture and how to use the ADO.NET classes to manage
application data and interact with data sources including Microsoft SQL Server, OLE DB
data sources, and XML.
Describes the various communications methods available in the .NET Framework for
remote communications.
Shows how to use Internet access classes to implement both Web- and Internet-based
applications.
Developing Components
Provides an overview of component programming and explains how those concepts work
with the .NET Framework.
Explains the extensive support the .NET Framework provides for developing
international applications.
Explains how to get access to type information at run time by using reflection.
52
Drawing and Editing Images
Provides an overview to a comprehensive and integrated set of classes that work with
XML documents and data in the .NET Framework.
Explains the .NET Framework SDK mechanism called the Code Document Object Model
(CodeDOM) that enables the output of source code in multiple programming languages.
Discusses the various collection types available in the .NET Framework, including stacks,
queues, lists, arrays, and structures.
Describes error handling provided by the .NET Framework and the fundamentals of
handling exceptions.
53
54
SCREENS
55
56
57
58
59
60
61
62
63
64
TESTING
AND
IMPLEMENTATION
65
VALIDATION CHECKS:
In the text boxes like name, address etc., only alphabets and number could be
entered thus if the operator by mistake enters other special characters, it would not be
entered.
In the text boxes like age, telephone number only numbers could be entered.
If the users do not fill any of the fields, which could not be empty, a message
would be displayed asking to enter the required parameters.
When a user starts the applications, a login form will be displayed prompting to
enter the username and password, if even any one of them is not matched with the details
stored in the database, the user will be warned to re-enter the correct details.
While entering the details of new customer, the customer number which cannot be
null value will be automatically generated. This is one greater than the highest number
existing previously.
When the details of one customer are modified even if one parameter is missed a
message will be displayed asking to enter complete details.
66
TEST CASE DESIGN:
Any engineering product can be tested in one of two ways:
White Box Testing: This testing is also called as glass box testing. In this testing,
by knowing the specified function that a product has been designed to perform test can be
conducted that demonstrates each function is fully operation at the same time searching
for errors in each function. It is a test case design method that uses the control structure of
the procedural design to derive test cases. Basis path testing is a white box testing.
Basis Path Testing:
i. Flow graph notation
ii. Cyclomatic Complexity
iii. Deriving test cases
iv. Graph matrices
Control Structure Testing:
i. Condition testing
ii. Data flow testing
iii. Loop testing
Black Box Testing: In this testing by knowing the internal operation of a product,
tests can be conducted to ensure that “all gears mesh”, that is the internal operation
performs according to specification and all internal components have been adequately
exercised. It fundamentally focuses on the functional requirements of the software.
The steps involved in black box test case design are:
i. Graph based testing methods
ii. Equivalence partitioning
iii. Boundary value analysis
iv. Comparison testing
SOFTWARE TESTING STRATEGIES:
A software testing strategy provides a road map for the software developer.
Testing is a set of activities that can be planned in advance and conducted systematically.
For this reason a template for software testing a set of steps into which we can place
specific test case design methods should be defined for software engineering process.
Any software testing strategy should have the following characteristics:
67
1. Testing begins at the module level and works “outward” toward the
integration of the entire computer based system.
2. Different testing techniques are appropriate at different points in time.
3. The developer of the software and an independent test group conducts testing.
4. Testing and Debugging are different activities but debugging must be
accommodated in any testing strategy.
Unit Testing: Unit testing focuses verification efforts in smallest unit of software
design (module).
68
Reasonable expectation is defined in the software requirement specification – a
document that describes all user-visible attributes of the software. The specification
contains a section titled “Validation Criteria”. Information contained in that section forms
the basis for a validation testing approach.
VALIDATION TEST CRITERIA:
It is virtually impossible for a software developer to foresee how the customer will
really use a program. Instructions for use may be misinterpreted; strange combination of
data may be regularly used; and output that seemed clear to the tester may be
unintelligible to a user in the field.
69
When custom software is built for one customer, a series of acceptance tests are
conducted to enable the customer to validate all requirements. Conducted by the end user
rather than the system developer, an acceptance test can range from an informal “test
drive” to a planned and systematically executed series of tests. In fact, acceptance testing
can be conducted over a period of weeks or months, thereby uncovering cumulative
errors that might degrade the system over time.
If software is developed as a product to be used by many customers, it is
impractical to perform formal acceptance tests with each one. Most software product
builders use a process called alpha and beta testing to uncover errors that only the end
user seems able to find.
A customer conducts the alpha test at the developer’s site. The software is used in
a natural setting with the developer “looking over the shoulder” of the user and recording
errors and usage problems. Alpha tests are conducted in controlled environment.
The beta test is conducted at one or more customer sites by the end user of the
software. Unlike alpha testing, the developer is generally not present. Therefore, the beta
test is a “live” application of the software in an environment that cannot be controlled by
the developer. The customer records all problems that are encountered during beta testing
and reports these to the developer at regular intervals. As a result of problems reported
during bets test, the software developer makes modification and then prepares for release
of the software product to the entire customer base.
IMPLEMENTATION:
Implementation is the process of having systems personnel check out and put new
equipment into use, train users, install the new application depending on the size of the
organization that will be involved in using the application and the risk associated with its
use, systems developers may choose to test the operation in only one area of the firm, say
in one department or with only one or two persons. Sometimes they will run the old and
new systems together to compare the results. In still other situation, developers will stop
using the old system one-day and begin using the new one the next. As we will see, each
implementation strategy has its merits, depending on the business situation in which it is
considered. Regardless of the implementation strategy used, developers strive to ensure
that the system’s initial use in trouble-free.
70
Once installed, applications are often used for many years. However, both the
organization and the users will change, and the environment will be different over weeks
and months. Therefore, the application will undoubtedly have to be maintained;
modifications and changes will be made to the software, files, or procedures to meet
emerging user requirements. Since organization systems and the business environment
undergo continual change, the information systems should keep pace. In this sense,
implementation is ongoing process.
Evaluation of the system is performed to identify its strengths and weakness. The
actual evaluation can occur along any of the following dimensions.
Operational Evaluation: assessment of the manner in which the system functions,
including ease of use, response time, suitability of information formats, overall reliability,
and level of utilization.
Organization Impact: Identification and measurement of benefits to the
organization in such areas as financial concerns operational efficiency, and competitive
impact. Includes impact on internal and external information flows.
User Manager Assessment: Evaluation of the attitudes of senior and user mangers
within the organization, as well as end-users.
Development Performance: Evaluation of the development process in accordance
with such yardsticks as overall development time and effort, conformance to budgets and
standards, and other project management criteria. Includes assessment of development
methods and tools.
Unfortunately system evaluation does not always receive the attention it merits.
Where properly managed however, it provides a great deal of information that can
improve the effectiveness of subsequent application efforts.
71
CONCLUSION
• The project has been appreciated by all the users in the organization.
• It is easy to use, since it uses the GUI provided in the user dialog.
• User friendly screens are provided.
• The usage of software increases the efficiency, decreases the effort.
• It also provides the user with variable options in administering.
• It has been thoroughly tested and implemented.
72
BIBLIOGRAPHY
SOFTWARE ENGINEERING
By Roger.S. Pressman
MSDN 2005
By Microsoft
73
74