Professional Documents
Culture Documents
MOBILE INTEGRATION
CONTENTS:
1. Introduction
1.1 Introduction:
A nation's most important and precious resource is its children who constitute its hope for
continued achievement and productivity. There is no more crucial period of life than the age upto
six years. It is during this period that the child is most malleable and it is then that man y barriers
to normal development are erected. All educators have stressed the importance of the home in
the early education of the child. The quality and nature of the parental nurturance that a child
receives will profoundly influence his future development. But only few homes provide the right
type of environment to the growing child. Many children are denied the opportunities for healthy
all round development. In learning to adjust to the world in which the child is growing up, he
develops certain kinds of behaviors which are annoying or embarrassing to the adults with whom
he comes in contact. Adults frequently label such behaviors as problem behaviors and try to
correct them. This usually makes the situation worse. What adults call problem behavior may be
perfectly normal for the child at his age and level of development. Through ignorance of what is
socially acceptable behavior, the child tries to express his natural impulses in ways that give him
satisfaction but which are not socially acceptable. So these behaviors make life difficult and
unsatisfactory for parents as well as the child.
This project is developed to automate the process of managing Student documents. In this project
Parents are given the entire Information about their children’s activities. In this system each
project has individual phase work. Each phase work has different information about their
children. Different information is like, Activities, Attendance, Fees, Test Marks, Student
Information, Parent Information, Different Courses, Admin Rating for different Semesters.
Most of the parents keep their children far away from them to give higher education. In
this situation their children may spoil their life for their independence, because they are far from
their parents or some other reasons, as well as the parents cannot have continuous touch with
their children.
Hence this system provides the information about the students who are away from their parents
over the mobile phone and also through the internet.
RAM : 128MB
Presentation : ASP.NET.
Database : MS Access.
Language : C#.
ASP.NET and MS-Access have been used to develop this software which is a basically a
web based project.
Microsoft has a time-honored reputation for creating innovative technologies and wrapping them
in buzzwords that confuse everyone. Microsoft now has a whole new technology called .NET.. The .NET
Framework is not a single application—it’s actually a collection of technologies bundled into one
marketing term. The .NET Framework includes languages such as C# and VB .NET, an engine for
hosting programmable web pages and web services (ASP.NET), a model for interacting with databases
(ADO.NET), and a class library stocked with tools for everything from writing files to reading XML.
DOT NET framework is designed to deploy application across the enterprise and to scale to
nearly size needed. Among the modern programming environments,.NET framework plays a pivotal role.
In the field of development, it can apply in to multiple purposes very easily. Like any other product of
Microsoft,.NET framework is also very easy to use. We can easily develop the application and enhance it
using .NET technologies.
3.3 Introduction to C#
C#,(pronounced as C Sharp) the new language introduced in the .NET Framework, is derived from C++.
However, C# is a modern, objected-oriented type-safe language C# represents the next step in the
ongoing revolution of programming languages.
C# is a modern, object oriented language that enables programmers to quickly build a wide range
of applications for the new Microsoft .NET platform, which provides tools and services that fully
exploit both computing and communications. The C# language is an evolution of C and C++.
C# is a true object oriented language. It does not merely provide the capability to
implement object oriented principles, it enforces this principles.
3.3.3 Security
C# considers security as part of its language. C# language compiler, interpreter and run
time environment were each developed in security in mind.
3.3.4 Reliability
3.3.5 Simplicity
The C# was designed to be a simple language to learn, building on the syntax and many
features of C++. However in order to promote security, reliability and simplicity C# has left out
those elements of C and C++ that contribute to errors and program complexity.
The C# provides many language features tat make it preferable to C or C++ for modern
software development. On the top of this list is C# intrinsic support for multithreading which is
lacking in both C and C++.
The original definition of ASP.NET, right at the start of the chapter, portrayed ASP.Net as a
powerful and flexible technology for creating dynamic web pages, and this holds true. However
as you know it isn’t the only way to develop WebPages, so lets refine our definition a little so it
reads as follows.
ASP.NET is a powerful and flexible server side technology for creating dynamic web pages.
Secondly, ASP.Net is one of a set of technology that comprises the dot net framework. For now,
you can now think of it as a giant tool kit for creating all sort of applications and in particular, for
creating applications on the web. When you install ASP.Net you will install .Net framework at
the same time. You will use bits and pieces of .Net framework.
3.5 Features:
ASP.NET combines unprecedented developer productivity with performance reliability and
development.
1. Developer Productivity:
• Easy programming
• Flexible language option
• Great tool
• Rich class framework
2. Improved Performance and scalability
• Compiled execution,
• Rich output caching
3. Enhanced Reliability:
• Avoids memory leak,
• Avoids deadlock
• Crash protection.
4. Easy Deployment
• Dynamic update of application.
ASP.NET is a unified Web development platform that provides the services necessary for
you to build enterprise-class Web applications. While ASP.NET is largely syntax compatible
with Active Server Pages (ASP), it provides a new programming model and infrastructure that
allow you to create a powerful new class of applications. ASP.NET is part of the .NET
Framework and allows you to take full advantage of the features of the common language
runtime, such as type safety, inheritance, language interoperability, and versioning.
Web Forms allow us to build powerful forms-based Web pages. When building these pages, you can use
ASP.NET server controls to create common UI elements, and program them for common tasks. These
controls allow you to rapidly build a Web Form out of reusable built-in or custom components,
simplifying the code of a page.
IIS server includes a broad range of administrative features for managing Web sites and your
Web server. With programmatic features like ASP, ASP.NET, you can create and deploy
scalable, flexible Web applications.
3.8 ADO.NET
Accessing a database in an Internet application is a completely different scenario than
accessing a database in a typical desktop or client/server program.
ADO.NET is the Microsoft’s latest data access model. ADO.NET allows you to interact
with relational databases and other data sources. Quite simply, ADO.NET is the technology that
ASP.NET applications use to communicate with a database, whether they need to add a new
customer record, log a purchase, or display a product catalog.
ADO.NET has a few characteristics that make it different from previous data access technologies such as:
Microsoft Access is a computer database application used to create and manage computer-based
databases on desktop computers and/or on a network. Microsoft Access can be used for personal
information management (PIM), in a small business to organize and manage all data, or in an enterprise to
communicate with servers.
Large corporate computing shops have been using complex expensive database products for years. These
full featured heavily optimized software systems are the only for a big organization to manage its
volumes of corporate information. A database is simply put, a collection of data. MS Access is not a
database, it’s a computer software that enables the user to create maintain and manage electronic
databases. This category of software’s is known as database system. A DBMS acts as a broker between
the physical database and the users of the database. The database is an organized collection of data. A
DBMS for a relational system is often called a relational database management system (RDBMS).
Where does MS Access fit into all of this? We need some way to interact with the database we
need to define tables and retrieve, add, update or delete data. MS Access is used to express database
operations for relational data form. MS Access is the industry standard language that most database
programmers speak and it is used by most RDBMS packages.
The area in which databases have experienced the most explosive growth is in web application
development. as the demand for more complex and robust web applications grows , so does the need for
databases. A database backend can support many critical functions on the web. Virtually any web content
can be driven by a database. Here’s how a web page interacts with a database. The database in your web
server or another machine that your server can talk to. You put a form on the web page that the user fills
in with a query or data to submit when the forms query is sent to your server; it runs a program that you
wrote that extracts data submitted by the user. These programs most often come in the form of ASP.NET
scripts.
GSMOUT Objects
The GsmOut object communicates through a serial port, USB port, Bluetooth connection,
infrared port or any Windows telephony compliant device. It is recommended to use Windows
'Phone and Modem' devices, for example 'Standard 9600 bps Modem', or 'Nokia 6310i Phone'. If
a Windows telephony device is used, settings are controlled by the Windows telephony driver,
and can be configured through the 'Phone and Modem' settings:
To select a 'Phone and Modem' device in the toolkit's object, assign an existing telephony name
to the Device property:
Device - the literal Windows telephony device string, for instance: 'Standard 9600 bps
Modem'. Alternatively, we can use a port directly, for instance: 'COM1'. As a result,
device properties must be setup properly before receiving messages:
Device - The actual COM port, formatted as COMx, where x represents the COM port
number;
Device Hw Flow Control - Hardware flow control is used to regulate commands from PC
to device and visa versa; default: On;
Device Sw Flow Control - Software flow control is used to regulate data from device to
device; default: Off;
Device Speed - The speed to be used to communicate with the GSM modem or GSM
phone; default: 0 (which means that factory defaults are used for modem
communications);
Device Settings - The number of data bits, parity bits and stop bits; default: 8 data bits, no
parity, 1 stop bit;
Device Init String - The modem initialization string is used to initialize the modem;
default value: '' (which means a generic initialization string will be used).
receiving the
SMS messages
Device Settings Number In/Out O Identifier string
indicating data
bits, parity and
stop bits
Device Speed Number In/Out O The baud rate of
the
communication
session
Device Hw Flow Number In/Out O Hardware flow
Control control
Device Init String In/Out O Initialization
String string for the
device
Storage Number In/Out O Preferred status
report storage
GsmIn Objects:
The GsmIn object enables receiving of SMS messages using a GSM Modem or a modem-
capable GSM phone. The GsmIn object communicates through a serial port, USB port, Bluetooth
connection, infrared port or any Windows telephony compliant device. SMS messages can be
received from different types of storage. The storage location depends on the type of hardware:
GSM phones usually store incoming SMS messages in their internal memory; GSM modems
usually keep SMS messages on the SIM card. It is recommended to read from the default
storage. Some devices (including Wave Com GSM modems) have a special storage for delivery
reports. This enables you to verify the delivery of a message. The 'GsmIn' object supports the
following storage locations:
• Default - use default device settings;
• SIM Memory - use SIM memory;
• Device Memory - use device memory;
• Any - use any device memory;
SMS messages are always received in 'batches', i.e. all incoming SMS messages are read from
the message storage and stored in the SMS and Pager Toolkit internal message queue. This
queue is a FIFO (First-In-First-Out) queue.
To read all messages from the selected storage, use the following function:
• Receive - Receive incoming SMS messages and place them in the internal message
queue. Optionally, delete all messages from device storage.
• After calling the 'Receive' function, messages can be fetched one-by-one using the
GetFirstMessage/GetNextMessage functions:
• GetFirstMessage - Fetch first SMS message from the toolkit's internal message queue.
• GetNextMessage - Fetch next SMS message from the toolkit's internal message queue.
• After each function call, you should check the result of the function. The result of the last
called function is stored in the 'LastError' property. All other functions will also store
their result in this 'LastError' property.
Requirement analysis gives a broad definition of the system according to the need to understand
the various concerned activities precisely. According to the requirements collected from the
clients and through the meeting analysis is done and a specification is prepared.
• Admin can View all the courses which are available in the database.
• He can view all the details about the student with photograph.
• He has the search option to get the information about the particular student.
• He can register new student information along with the username, password and the
mobile number of the parents and along with the photograph of the student.
• He can also be able to change the password which has been provided to the parents.
• He can also update the student’s information like marks, attendance, percentage and
behavior.
• Parents can view the marks scored by the student in a particular semester.
• They can view the percentage of the student scored in the particular semester.
• They can view the behavior of the student along with the photograph.
• They also get the information about there child over the cell phone once he sends the
request to the server.
• Advanced search options have been provided to find the information about the marks,
percentage and attendance as per year wise and semester wise.
IS IS
ADMIN? PARENTS
?
Y Y
View Behavior
Add/delete Subjects
Change password
Update marks, attendance and
behavior
Change password
Stop
• Administrator
• Parents
In the Login form the user has can select any one type and can login with the user name and
password from the database “User database”. If the user is a valid user than the corresponding
home page will be displayed
• If user selects as “ Admin” , than after the authentication the administrator home page
will be displayed
• If user selects as “Parents “, than after the authentication the Parents home page will be
displayed.
• He can update the marks, attendance and the behavior of the students.
• He has the options to change the password and also has the option to change the
password of the parents.
The admin can register the New student details in this form the following fields will be provided:
• Parents Information like parents name, Email ID , password and mobile number
Parent Module:
Parent home page:
In the parent module the parent will be having the following options.
• The user can view the marks of the student.
• The user can view the attendance of the student.
• The user can view the behavior of the student.
• The user has the option to change his password.
• By selecting the gateway, the mobile modem will be connected to the system and the
handshaking signals will be exchanged with the server and the mobile modem.
• The server reads the message from the mobile inbox once mobile receives the message to
its inbox through the command GsmIn.
• The server responds to the message using the function GsmOut through the GSM
mobile.
• The server responds to the client mobile only when it receives the valid key word.
• If the valid key word is not received the error message will be sent to the client mobile.
• By click on the cancel button the connection between the mobile and the server will be
disconnected.
The following options have been provided for the parent’s module:
• They can change the mobile number using the pervious number (Which is already in the
server database).
• They can change the password.
• By sending the keyword to the server mobile the parent’s can view the behavior of the
student.
• By sending the keyword to the server mobile the parent’s can view the semester marks.
• Also has the option to disconnect the connection between the client mobile and parent’s
mobile.
Testing accomplishes a variety of things, but most importantly it measures the quality of the
software we are developing. This view presupposes there are defects in the software waiting to be
discovered and this view is rarely disproved or even disputed.
Several factors contribute to the importance of making testing a high priority of any
software development effort. These include:
• Reducing the cost of developing the program.
• Ensuring that the application behaves exactly as we explain to the user for the vast majority of
programs, unpredictability is the least desirable consequences of using an application.
• Reducing the total cost of ownership. By providing software that looks and behaves as shown in
the documentation, the customers require fewer hours of training and less support from product
experts.
• Developing customer loyalty and word-of-mouth market share.
Unit testing focuses verification on the smallest unit of software design, the software
component or module. Using the component level design description as a guide, important control paths
are tested to uncover errors within the boundary of the module. The unit testing is a white box oriented
testing. First of all the module interface is tested to ensure that the information
properly flows into and out of the program until under test. Then the local data
structure is tested to ensure the data stored temporarily maintains its integrity
during all steps in an execution. Boundary conditions are tested to ensure that the
module operates properly at boundaries established to limit or restrict processing.
All independent paths through the control structure are exercised to ensure that all
statements in a module have been executed at least once. And finally, all errors
handling paths are tested.
In this project the testing is done according to bottom-up approach . Starting with smallest
and lowest level modules and processing one at a time. For each module a driver and
corresponding stubs were also written. If any errors found they were corrected immediately and
the unit was tested again.
the changes break anything that worked prior to the change and by writing new tests where
necessary.
Some strategies and factors considered during this process include the following:
Any errors discovered when combining units are likely related to the interface between
units. This method reduces the number of possibilities to a far simpler level of analysis.
In this software, the bottom-up integration testing approached has been used, starting with
the smallest and lowest level modules and proceeding one at a time. For each module the tests
were conducted and the results were noted down.
User Testing is nothing but the test of the software by the users themselves with live data being
fed to the system. This helps in building really robust system. User testing in this system has
been done extensively ascertain the results.
Sometimes known as the informal peer group review, walkthroughs are one of a handful of
techniques that make a big difference to the chances of success in a software project.
Automation is the use of strategies, tools and artifacts that augment or reduce the need of manual
or human involvement or interaction in unskilled, repetitive or redundant tasks.
Minimally, such a process includes:
• Detailed test cases, including predictable "expected results", which have been developed
from Business Functional Specifications and Design documentation
• A standalone Test Environment, including a Test Database that is restorable to a known
constant, such that the test cases are able to be repeated each time there are modifications
made to the application.
application.
Comprehensive: You can build a suite of tests that covers every feature in your application.
Reusable: You can reuse tests on different versions of an application, even if the user interface
changes.
Better Quality Software: Because you can run more tests in less time with fewer resources
Fast: Automated Tools run tests significantly faster than human users.
Cost Reduction: As the number of resources for regression test are reduced.
Test cases:
TC_ID Verification area Inputs Expected Result Actual Result Status
1 Verification on the Enter the Should display the Displaying the Pass
login screen following: admin home page admin home page
1.Select Admin
2.Username:
Admin
3. Password:
Admin
2 Enter the Should display the Displaying the Pass
following: parent home page parent home page
1.Select Parent
2.Username: aaaa
3. Password: aaaa
3 Verification on the Enter the The application The application Pass
add course page following: should be add the added the entered
1.Course name : entered data in the data in the database
EE database “ “ BIP.mdb”
2.No.of semester: BIP.mdb”
6
3.Enter the
description
4.Click on Add
button
4 Click on View all The course and The course and the Pass
button the semester in semester in the
the database “ database “
BIP.mdb” should BIP.mdb” has been
display in the displayed in the
form of data grid form of data grid
5 Verification on Enter the The application The application is Pass
change password following: should accept the accepting the data
page 1.Old password: data and the and the password
Admin password should has been updated in
2.New password: be updated in the the database“
bbbb database“ BIP.mdb”
3. Confirm BIP.mdb”
password: bbbb
6 Verification on the Click on the view The link should The link has been Pass
view attendance attendance link connect to the connected to the
page view attendance view attendance
page and should page and displayed
display the the attendance of
attendance of the the student in the
student form of data grid
7 Verification on Enter the The application The application is Pass
change password following: should accept the accepting the data
page for parent’s 1.Old password: data and the and the password
module Admin password should has been updated in
2.New password: be updated in the the database“
bbbb database“ BIP.mdb”
3. Confirm BIP.mdb”
password: bbbb
8 Verification on the select the should display the Mark has been Pass
view marks page following: marks of the displayed in the
1. sem : 5 student in the form of data grid
2. month : Jan form of data grid according to sem,
3.Year : 2008 month and year.
9 Verification on the Enter the Should display the The behavior of the Pass
view behavior page following : behavior of the student has been
1.Name: aaaa student from the displayed from the
2.Course: EE database“ database“
3. Click on View BIP.mdb” BIP.mdb”
button