04 RPRT
04 RPRT
The Online Shopping system is a web based application intended for online
retailers. The main objective of this application is to make it interactive and its
ease of use. It would make searching, viewing and selection of a product easier.
The user can then view the complete specification of each product. User can
also view the product reviews and also write their own reviews. The users get
the massage after buy the product and also get the discount massage if users
want to get. Online shopping system is a form of commerce used for business-
to-business (B2B) and business-to-consumer (B2C) transactions.
1.2 Purpose:
Goals:
• This website will be an online software system which uses to buy product
online to sit at home easily.
• This website replaces the old shopping methodology with the latest
technology.
• It designed to be easy to use, featuring a graphical user interface similar to
that found on most web application.
• I just have to establish an application which user friendly.
Objectives:
• Due to Internet access and for shopping purpose, consumers uses Internet
more and more for their shopping needs, social activities, and for more of
their work related activity.
• User get the good discount when purchase product online.
• User can aware with latest technology & latest electronics item arrive in
market.
• Users can have multiple shipping and billing information saved.
• Internet connection is must necessary for shopping.
• Maximum product availability.
• User cannot buy product without registration on the website.
• Secure login with encrypted password protection
• Unlimited number of concurrent users.
Page 1 of 55
1.4 Technology and Literature Review
1. ASP.NET
Why ASP.NET?
Client would receive the results of running that script, with no way determining
what the underlying code may be. You can even configure your webserver to
process all your HTML files with ASP.NET.
The best things in using ASP.NET are that it is extremely simple for a
newcomer, but offers many advanced features for a professional programmer.
2. My-SQL-SERVER
• MySQL stands for "My Structured Query Language" and “My SQL-Server”
is one of the well known
• Database management systems in the world.
• The data in “My SQL-Server” is stored in database objects called “tables”.
• A table is a collection of related data entries and it consists of columns and
rows.
• Databases are useful when storing information categorically.
• My SQL-Server run on only Microsoft Platforms including Windows Vista,
Windows XP,
• Windows 7 and other OS which is supported .Net Framework.
3. My SQL-SERVER FEATURES:
Activity Monitor:
Page 2 of 55
view wait statistics to help understand and resolve problems.
Having the ability to monitor logs, events such as who is accessing objects,
what changes occurred, and what time changes occurred. MySQL Server Audit
provides automation that allows the DBA and others to enable, store, and view
audits on various server and database components.
4. Backup Compression:
With MySQL Server 2008 backup compression, the backup file is compressed
as it is written out, thereby requiring less storage, less disk I/O, and less time.
The compression is a achieved by specifying the WITH COMPRESSION
clause in the BACKUP command. Backup compression is a very useful feature
that can help the DBA save space and time.
Db As are frequently responsible for managing not one but many MySQL
Server with in their environment. Having the ability to centralize the
management and administration of a number of MySQL Server instances from
a single source can allow the DBA to save significant time and effort.
Central Management Servers allow the DBA to register a group of servers and
apply functionality to the servers, as a group, such as:
Multi-Server query execution:
Import and evaluate policies across servers:
Import and export the registered servers:
Page 3 of 55
7. Data Compression:
Both row and page compression can be applied to a table or index in an online
mode that is without any interruption to the application availability. Data
compression can be implemented via Transact-SQL or the Data Compression
Wizard.
8. Policy-Based Management:
MySQL Server 2008 builds on the plan guides mechanism in two ways:
• It expands the support for the USE PLAN query hint to cover all DML
statements
• (INSERT, UPDATE, and DELETE).
• Lock escalation.
A new option has been introduced to control lock escalation at a table level. By
using an ALTER TABLE command.
Page 4 of 55
11. Transparent Data Encryption (TDE):
SQL Server 2008 offers a solution to this problem by way of transparent data
encryption (TDE). TDE performs real-time I/O encryption and decryption of
the data and log files by using database encryption key (DEK). The DEK is a
symmetric key secured by using a certificate stored in the master database of
the server, or an asymmetric key protected by an Extensible Key Management
(EKM) module.
Page 5 of 55
CHAPTER 2: PROJECT MANAGEMENT
Note: Our software is based on Linear Sequential Model. The Linear Sequential
Model: (Water Fall Model):
The Linear Sequential Model suggests a systematic, sequential approach to
Software development that begins at the system level and progresses through
analysis, design, coding, testing, and maintenance.
All projects follow a lifecycle model (SDLC). The most widely used SDLC
model in Online Banking Transaction Application.
Page 6 of 55
Requireme
nt
Desig
Coding
Integration
&
Maintena8n
Fig.1 Incremental Model
➢ Design
Software design is actually a multi-step process that focuses on four distinct
attributes of a program: data structure, software architecture, interfaces
representation and procedural detail. The design process translates requirements
into a representation of the software that can be accessed for quality before
coding begins.
➢ Code generation
Code-generation phase translates the design into a machine-readable form.
Page 7 of 55
➢ Testing
Once code has been generated, program testing begins. The testing process
focuses on the logical internals of the software, ensuring that all statements have
been tested, and on the functional externals; that is, conducting tests to uncover
errors and ensure that defined input will produce actual results that agree with
required results.
➢ Maintenance
Software maintenance applies to following phases in the existing
program
➢ Change in software due to errors.
➢ Change in software because the software must be adapted to accommodate
changes in its external environment.
➢ Change in software when the customer requires functional or performance
enhancements.
Page 8 of 55
2.1.3 Schedule Representation
Page 9 of 55
2.2.1 Risk Identification:
Here's a sample risk list to get you started (Try to be realistic; "The world might
end tomorrow" is a little off target for this particular exercise):
➢ This project could distract key resources within the company, causing the
rest of the business to suffer.
➢ We will be placed on the same level as our major competitor, a company
that already does most of its business online. (Yes, this is a risk as well as a
benefit!)
➢ Our customers may not want to change the way they do business with us,
so the cost of an e-commerce project may not generate profits. Increasing the
number of products we offer by using a Web site will create warehousing and
Page 10 of 55
distribution issues.
➢ Effectiveness:
The analysis and design phase are quite effective. The user can run any function
at any time without any failure. We have used the latest technology and more
reliable technological framework so called .NET framework 3.5
➢ Efficiency :
The Efficiency of the proposed application is quite reliable. User can perform
any type of query related for searching the various facilities in web inventory
management system. User will find the application very user-friendly and self-
Page 11 of 55
guided.
➢ Confidentiality:
The login name & password are quite secure and much confidential.
➢ Integrity:
The user input process and the output process are quite perfect i.e. the user gets
what he queries. The application is quite secure from hacking and prevents
itself from poor authority granting procedure.
➢ Reliability:
We ensure that each and every information is quite perfect and reliable. So user
can trust on them.
2.3 Estimation
Effort estimation consists in predict how many hours of work and how many
workers are needed to develop a project. The effort invested in a software project
is probably one of the most important and most analyzed variables in recent years
in the process of project management. The determination of the value of this
variable when initiating software projects allows us to plan adequately any
forthcoming activities. As far as estimation and prediction is concerned there is
still a number of unsolved problems and errors. To obtain good results it is
essential to take into consideration any previous projects. Estimating the effort
with a high grade of reliability is a problem which has not yet been solved.
Several methods have been used to analyze data, but the reference technique has
always been the classic regression method. Therefore, it becomes necessary to
use some other techniques that search in the space of non linear relationship.
Some works in the field have built up models (through equations) according to
the size, which is the factor that affects the cost (effort) of the project, the most.
The equation that relates size and effort can be adjusted due to different
Page 12 of 55
environmental factors such as productivity, tools, complexity of the product and
other ones. The equations are usually adjusted by the analyst to fit the real data.
Page 13 of 55
CHAPTER 3:SYSTEM REQUIREMENTS STUDY
There are basically two types of users who will use the system as per the
requirement. The Users are as follows:
Admin :
Admin has all final authority they maintain shop’s items list ,user
list,member list, all
Page 14 of 55
For better performance following hardware and software constraints should be
met.
Hardware Interface:
For this project one server is necessary which can hold our data and web
application.
System Requirements:-
➢ Operating System: - Windows Vista, Windows XP, etc...
➢ Processor: - 400 MHz Processor
➢ RAM: - 1 GB (Minimum);
➢ Hard Disk: - Up to 500 MB of available space required
➢ Display: - 800 x 600, 256 colors (Minimum); 1024 x 768 high color, 32-bit
➢ Platform: - .Net framework 4.0
➢ Front End: - Microsoft Visual Studio 2010
➢ Back Hand: - SQL Server 2008(Management Studio).
➢ Development Tools used (documentation):- Microsoft Excel, PDF-Adobe
Reader
Page 15 of 55
Entirely web based, our product will require only a web browser, preferably
Internet Explorer or Mozilla Firefox, and a connection to the Internet. With a
streamlined design approach, any sort of Internet connection would be sufficient
to viewing the site.
The various External Interface Requirements are:
User Interface:
The User-Interface is the web-based GUI provided, which gives various
functionalities to the user.
Communications Interfaces:
Presently the HTTP protocol suffices the communication requirement for the
system. There is nothing else required for the users of the system to
communicate. All the data thought in different formats is sent through HTTP.
3.2 Constraint
There are some constraints to use this web application
➢ As the java script is used the web browser should be JavaScript enabled.
➢ Also the internet facility should be in order to get the correct and accurate
results as expected.
3.3.1 Regulatory Policies
To register in website user must create account. The user account can be
generated only after Trail registration process or registration with the website
company.
3.3.2 Hardware Limitations
The user of the system is free to use any modules, which satisfies above
minimum software requirements. The system requires: RAM cannot be less than
512 MB but ideal would be 1 GB and the processor cannot be less than Pentium
4.
3.3.3 Interface to Other Applications
The System must have the Internet Explorer or Fire Fox or any other web
browser though which each user can interact with the system. It specifies:
The website is made in ASP.NET and it run on the Web Browser.
Page 16 of 55
The System will interact with user through GUI. So, User can easily operate with
system
3.3.4 Parallel Operations
It won’t create any problem.
3.3.5 Higher Order Language Requirements
This website needs .NET as a higher order language and some use of JavaScript
to make website more attractive.
3.3.6 Reliability Requirements
The system should be reliable enough that no other user should be able to login
as other name by using other name username & password else same named
user can login from 2 or more systems. The system should be reliable enough
to get the back up of data if at all the data crashes due to catastrophic event or
some other event.
3.3.7 Criticality of the Application
If any problem will occur during any Operation of modules entire transaction
will be canceled and it will be rolled back.
3.3.8 Safety and Security Consideration
The system uses .NET functions and different security algorithm to make
website more secure and safe.
Page 17 of 55
CHAPTER 4: SYTEM ANALYSIS
➢ The time which has been spent by the customer in manual shopping can
save
Page 18 of 55
➢ The time which has been spent by the customer in manual shopping can
equates to multiple number of shopping. As customer can sit at home and
browse in a fraction of seconds.
➢ Thus we need to change to a system like “Online Shopping “.
Page 19 of 55
➢ Customer must logout of the site after purchasing product.
➢ The customer can check online at any time the order status.
➢ After customer’s order has been entered into the system, the salesperson
sends an electronics request to the warehouse with details of the ordered
configuration.
➢ The customer chooses to view the details of the configuration, perhaps with
intention of buying it as is or to build a more suitable configuration.
➢ The price for each configuration can be computed on the customer’s request.
Page 20 of 55
➢ The third study aspect probes whether the project is operationally feasible or
not i.e., whether the system will be used if it is developed and implemented,
or whether, there will be any resistance from the users that may undermine
the possible application benefits. The following is the feasibility study report,
which is undertaken for the Requirements Traceability Tool.
4.4.1 Technical Feasibility
The following technical feasibility areas were probed during the feasibility study
phase:
➢ The necessary technology i.e. front-end development tool, back-end database
technology and various other tools for developing the system are already
available within the organization.
➢ The front-end tool proposed is easily compatible with the current hardware
configuration in the organization.
➢ The back-end tool proposed has the capacity to hold the data required for
using the new system.
➢ The system is expandable in many dimensions with respect to addition of
more functionality, features etc.
➢ The front-end and the back-end technologies provide a way to preserve the
accuracy, reliability and ease of access and data security.
➢ Being a App-based system, the system require to be installed on almost client
machines.
4.4.2 Economic Feasibility
For declaring that the system is economically feasible, the benefits obtained from
the system has to be rated against the cost incurred to actually develop the
system. The following are the benefits that would be derived from the proposed
system.
➢ Speeds up the archival of information in the form of corresponding between
employees, Approval or disapproval of leave etc. when necessary.
➢ As all the tools required to implement the system are readily
available with the organization, no extra cost is incurred.
➢ Reduces the workload on senior staff.
Page 21 of 55
➢ All this benefits in terms of saving time, minimization of errors, etc. can to a
long way improve the quality of software being developed, since more time
can be devoted to the development.
4.4.3 Operational Feasibility
➢ The current business methods can very well be incorporated into the proposed
system. The proposed system has more chance of being accepted by the
intended users.
➢ The system will work when it is developed and installed and there are no
major barriers to its implementation within the organization. This accounts
for the operational feasibility of the proposed system.
4.5 Requirement Validation:
➢ Username and Password validation that is compulsory to enter within
system (Not for visitor).
➢ Phone No must be Numeric and length is of maximum 12 ( Cell no, or lane
line) Digit.
➢ Name must be character not in digit.
➢ Pin code No. is of at least 6 digits.
➢ The field denoted by (*) is compulsory.
➢ Most of the data are enter from the master table so it also reduces the
chances of mismatch data, so no multiple entries.
➢ The time should be entered in the valid format. (MM-DD-YYYY)
Page 22 of 55
CHAPTER 5:SYSTEM DESIGN
1. Use-Case Diagram
2. Sequence Diagram
3. Activity Diagram
4. State Diagram
6. Class Diagram
Page 23 of 55
Fig.3 Use Case Diagram
Page 24 of 55
5.3 Sequence diagram
Page 25 of 55
:Application :Buy :Show cart :Billing :Credite card :Order
User : User
Report
Page 26 of 55
Fig 6. Class Diagram for User
Page 27 of 55
Activity Diagram for User
Page 28 of 55
Activity Diagram
Page 29 of 55
Activity Diagram
Activity diagram :
Page 30 of 55
5.6 Data Flow Diagram
Data Flow Diagrams (DFD) can be used to graphically illustrate the flow of data
through a system or model. More generically, Flow Diagrams (or Process Flow
Diagrams) can be used to depict the movement and process steps of data,
information, people, money, electricity, etc. through a system. The basic concept
is a means of showing what goes in (to a system or model), what processes occur
(within the system or model) and what comes out.
• Data flow
• Process
Page 31 of 55
• Source or Destination
• Data Store
A data flow diagram may be used to represent a system or software at any level
of abstraction. In fact, DFDs may be partitioned into levels that represent
increasing information flow and functional detail. Therefore, the DFD provides
a mechanism for functional modeling as well as information flow modeling. A
level 0 DFD, also called a fundamental system model or a context model,
represents the entire software element as a single bubble with input and output
data indicated by incoming and outgoing arrows, respectively.
A level 1 DFD might contain five to six bubbles with interconnecting arrows.
Each of the processes represented at level 1 is a subfunction of the overall system
depicted in the context model.
Payment Conformation
Validation Cust Info
Bank Courier
Page 32 of 55
5.6.2 level 1 DFD
2 Customer info
Customer log in info Cust_trans
Log in
Admin log in info
module
Authentication
Authentication
Order info 3
Order info Admin
Order Cust_info
Order info
Order_trans Processing
Cust_trans
Payment
Payment Detail Payment Detail Cust_trans
Bank module
Order_info
Courier
Item_master
6
Update
Update
Updates
Update
Stock_trans
Page 33 of 55
Customer info 7
Cust_trans
Report Reports
Item info
Item_master Generating
Module
Request for report
Order info
Order_trans
Admin
8
discount detail Updates
Store discount info Of Discount detail
Discount
Page 34 of 55
5.7 Data Dictionary
Page 35 of 55
shop_address Char 300 NotNull
shop_city Char 50 NotNull
latitude Char 30 NotNull
longitude Char 30 NotNull
shop_proof_ Char 300 NotNull
shop_image Char 300 NotNull
status Char 300 NotNull
Page 36 of 55
Table 5.7.5 Wishlist Info
Page 37 of 55
Table 5.7.8 Third Category info
Page 38 of 55
CHAPTER 6:USER INTERFACE DESIGN
Page 39 of 55
6.3 Registration Page:
Fig.15 Reg.page
Fig.16.Verification code
Page 40 of 55
6.5 verification code Receive
Page 41 of 55
6.7 Products Detail
Fig.19.Product details
6.8 My cart
Fig.20 My cart
Page 42 of 55
6.9 Shipping address
Page 43 of 55
6.11 Product bill
Page 44 of 55
CHAPTER 7: TESTING
Table testing
7.2 Testing Phase:
➢ Functionality Testing: The application must be tested to ensure that it meets all the
functional requirements specified in the SRS document.
➢ Performance Testing: The application must be tested to ensure that it performs well
under normal and peak load conditions.
Page 45 of 55
➢ Security Testing: The application must be tested to ensure that it is secure and
protected against common types of attacks.
➢ Usability Testing: The application must be tested to ensure that it is easy to use and
meets the needs of its intended users.
➢ User Acceptance Testing: The application must be tested by the end-users to ensure
that it meets their expectations and requirements.
➢ Regression Testing: The application must be tested after every change or update to
ensure that it still works correctly and does not introduce any new defects.
➢ Error Handling Testing: The application must be tested to ensure that it handles
errors and exceptions gracefully and provides clear error messages to users.
➢ Accessibility Testing: The application must be tested to ensure that it meets the
accessibility requirements and can be used by users with disabilities.
➢ Test Scope: Define the scope of testing, including what parts of the application will
be tested and what will not be tested.
➢ Test Objectives: Define the objectives of testing, including what you are trying to
achieve and what problems you are trying to identify.
➢ Test Strategy: Define the overall testing strategy, including what testing
methodologies will be used, what types of testing will be performed, and what testing
tools and resources will be required.
➢ Test Environment: Define the test environment, including the hardware, software,
and network configurations required for testing.
➢ Test Schedule: Define the testing schedule, including when testing will start and
end, and how long each testing phase will last.
➢ Test Deliverables: Define the test deliverables, including what documents and
reports will be produced as part of the testing process.
Page 46 of 55
➢ Test Cases: Develop test cases that cover all the functional requirements of your
application. Each test case should include a description of the test scenario, input
data, expected output, and the actual result.
➢ Test Execution: Execute the test cases and record the results. If there are any defects
found during testing, they should be reported and tracked until they are resolved.
➢ Test Reporting: Generate test reports that summarize the testing activities and
provide insights into the application's quality and performance.
Unit testing:
➢ Testing if user is not able to place an order with invalid or incomplete information.
➢ Testing if user is not able to submit a review with invalid or incomplete information.
➢ Testing if seller is not able to add a product with invalid or incomplete information.
Page 47 of 55
➢ Testing if seller is not able to add a banner image with invalid or incomplete
information.
Integration Testing:
➢ Testing if the user login module is properly integrated with the order module.
➢ Testing if the user registration module is properly integrated with the add to cart
module.
➢ Testing if the payment module is properly integrated with the order module.
➢ Testing if the product search module is properly integrated with the add to cart
module.
➢ Testing if the review module is properly integrated with the product search module.
➢ Testing if the banner image module is properly integrated with the home page
module.
➢ Testing if the seller module is properly integrated with the product search module.
➢ Testing if the seller module is properly integrated with the payment module.
➢ Testing if the seller module is properly integrated with the order module.
➢ Testing if the seller module is properly integrated with the banner image module.
➢ Testing if the search by location module is properly integrated with the product
search module.
System Testing:
➢ Testing if the application is able to handle a large number of products and users.
Page 48 of 55
➢ Testing if the application is able to handle various types of payment methods.
➢ Testing if the application is able to handle various types of products such as physical
goods, digital goods, and services.
➢ Testing if the application is able to handle various types of orders such as bulk orders,
customized orders, and urgent orders.
➢ Testing if the application is able to handle various types of users such as registered
users, guest users, and sellers.
➢ Testing if the application is able to handle different types of devices such as mobile
devices, tablets, and desktops.
Page 49 of 55
CHAPTER 8: CONCLUSION AND FUTURE WORK
➢ At the end of analysis, we concluded that our project contains actors like admin,
customer their roles are managing data of each customer order, complaints, plans
details , report generate.
➢ Our developed system is also not an exception in this case, having mentioned the
limitation. At one time only one page can be accessed.More load on the system
sometimes affects the performance of the system.
FUTURE ENHANCEMENT
• Chatting functionality
Page 50 of 55
REFERENCES
➢ BOOKS
➢ WEBSITES
Page 51 of 55
ANNEXURE
➢ Ecommerce:
➢ Ecommerce, also known as electronic commerce or internet commerce, refers to the
buying and selling of goods and services over the internet.
➢ Payment Gateway:
➢ A payment gateway is a service that facilitates the transfer of funds between a
customer and a seller in an online transaction. Payment gateways securely process
credit card or other electronic payments.
➢ Shopping Cart:
➢ A virtual cart or basket that stores the items a customer has selected to purchase on
an ecommerce website or app.
Page 52 of 55
ABOUT THE COMPANY
Company Address :
SERVICE OFFERINGS:
➢ Application Development & maintenance.
➢ Web Development
➢ Migration and Re-Engineering.
➢ Software as a Service(SaaS)
➢ Enterprise Solution.
➢ Product Development and Support.
➢ Multimedia Services.
➢ Search Engine Optimization
Page 53 of 55
ABOUT COLLEGE
The College is spread over 25 acres of land and is a part of Ganpat Vidyanagar
Campus. It has six ultra-modern buildings of architectural splendor, class rooms,
tutorial rooms, seminar halls, offices, drawing hall, workshop, library, well
equipped departmental laboratories and several computer laboratories with internet
connectivity through 1 Gbps Fiber link, satellite link education center with two-way
audio and one-way video link. The superior infrastructure of the Institute is
conducive for learning, research, and training.
Page 54 of 55
Page 55 of 55