priya dar shin i

Upload: nandigama-vagdevi

Post on 09-Apr-2018

222 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/7/2019 Priya Dar Shin i

    1/70

    ONLINE LIBRARY MANAGEMENT SYSTEM

    PRIYADARSHINI INSTITUTE OF TECHNOLOGY & SCIENCE INFORMATION TECHNOLOGY

    Page | 1

    1.INTRODUCTION

    1.1 INTRODUCTION TO THE ONLINE LIBRARY MANAGEMENT SYSTEM:

    The mission of the Library Management System Project is to create an integrated

    information about the books for members and administration. Our goal is to focus on customers,

    services and integration for end users .

    1.2 OBJECTIVES OF THE PRAPOSED SYSYEM

    1. Integration of systems at the data, function and institution level,

    The objective of library management system is to provide quality data in a timely

    fashion through systems that are completely integrated. This will provide opportunities for

    operational efficiency and a base for decision support activities at various levels.

    2. Collection of information at the source,

    The objective of this System is to provide facilities for authorized users to enter

    information into the system directly, instead of passing the information (usually on paper) to

    another individual at another location to enter into the system.

    3 .Balance local and institutional information requirements,

    The objective of Library Management System is to provide the necessary support for the

    institutional level activities conducted by the Colleges, Library Management to limited people.

    4 . Less paper driven SIS systems,

    By collecting data at the source and providing wider electronic access the intention of

    Library Management System is to reduce the paper driven aspects of the existing systems.

    5.Streamline approval procedures,

    Often approval mechanisms become very routine in nature and may not meet the original

    approval objective. The intention is to question the existing approval procedures, and where

    possible develop less cumbersome procedures, perhaps employing exception processing and

    electronic approval.

  • 8/7/2019 Priya Dar Shin i

    2/70

    ONLINE LIBRARY MANAGEMENT SYSTEM

    PRIYADARSHINI INSTITUTE OF TECHNOLOGY & SCIENCE INFORMATION TECHNOLOGY

    Page | 2

    6.Better decision support systems,

    The objective of this system is to provide a well-integrated suite of data and online

    modeling tools to support various decision-making processes .

    7. Integration of systems with office automation tools,

    The intention of Library Management System is not only to have data easily portable to

    word processors, spreadsheets, etc., but to use these tools as an integral part of applications. For

    example, admissions letters could be easily prepared in a word processor and triggered from the

    admission decision process where the applicants name, address, program etc. are merged into the

    letter.

  • 8/7/2019 Priya Dar Shin i

    3/70

    ONLINE LIBRARY MANAGEMENT SYSTEM

    PRIYADARSHINI INSTITUTE OF TECHNOLOGY & SCIENCE INFORMATION TECHNOLOGY

    Page | 3

    2. PROBLEM ANALYSIS

    A Library Management System is one which maintains the different kinds of books for

    the members and also availability of the books requested by him. Library is maintained by the

    administrator.

    2.1 EXISTING SYSTEM

    By using the present system, work is done manually. So, each and every transaction takes

    much time to complete. Whenever user requires any information, the searching and update

    process also takes more time and it is difficult to search particular information form a file. As the

    transactions of the books increases there is more information to be processed and stored. If this isdone by maintaining manual records, the whole process becomes complicated and difficult for

    understanding and retrieval of the information.

    2.2 DRAWBACKS AND LIMITATIONS IN THE EXISTING SYSTEM:

    The disadvantages of this sort of environments are:

    1. The work is done manually so that it takes much time to transact a transaction.

    2. More number of labors is needed.

    3. As there are thousands of records; Searching process is a difficult task.

    4. Maintaining data (member details, book details etc.) is difficult .

    2.3 PROPOSED SYSTEM

    By using the proposed system, the whole system is computerized. So, each and every

    transaction takes less time to complete . Whenever user requires any information, the

    searching process also takes less time and it is easy to search particular from a file.

    Large data are stored for information and design making. It maintains all the informationabout the members and book. Lots of information is stored for future reference. This software

    will allow members to register. Only registered members will be allowed to lend an item form

    the system administrator can enter the information into the system directly. System will allow

    searching for items in the system based on author name, book name, user name etc. System will

  • 8/7/2019 Priya Dar Shin i

    4/70

    ONLINE LIBRARY MANAGEMENT SYSTEM

    PRIYADARSHINI INSTITUTE OF TECHNOLOGY & SCIENCE INFORMATION TECHNOLOGY

    Page | 4

    generate any alerts if a member is not returning any items. Login/password required accessing

    this software.

    2.4 ADVANTAGES OF THE PROPOSED SYSTEM:

    There are various advantages in the usage of this proposed system. The major ones are:

    1. There is no need of paper based aspects for maintaining the information. Paper work is

    reduced to minimum as well the information is stored in the computer itself.

    2. On entering the required input we can get the required information at any time.

    3. A fast and more efficient service to all members. As there are number of records; searching

    process is an easy task.

    4. Transaction is faster.

  • 8/7/2019 Priya Dar Shin i

    5/70

    ONLINE LIBRARY MANAGEMENT SYSTEM

    PRIYADARSHINI INSTITUTE OF TECHNOLOGY & SCIENCE INFORMATION TECHNOLOGY

    Page | 5

    3 . SOFTWARE REQUIREMNT SPECIFICATION

    SRS is the starting point of the software development activity. As the system grows more

    complex the goals of the system cannot be easily comprehended. SRS is the means of translatingthe ideas in the mind of the clients into a formal document. Thus the output of the phase is set of

    formally required specified requirements after requirement analysis is done.

    A good SRS provides many benefits, Some of them are:

    1. Establishing the base for agreement between client and supplier on what the software

    product will do.

    2. Reduce the developing cost Careful development of SRS will avoid inconsistencies

    and will reduce the cost in the future development process, providing a reference for a validation

    of the final product.The SRS document is divided into many sections and subsections

    ..

    3.1 PURPOSE:

    The purpose of this document is to design a library that provides various facilities for its

    members and performs few of the major actions.

    3.2 SCOPE:This document is the only one that describes the requirement of the system. It is meant

    for use by the administrators and will also be the basis for validating the final delivered system.

    Any change made to the requirements in the future will have to go through a formal change

    approval process. The developer is responsible for asking for clarification where necessary and

    will not make any alterations without permission of the client.

    3.3 DEVELOPERS RESPONSIBILTIES OVERVIEW :

    The responsibilities of the developer are

    1. Developing the system

    2. Checking the functionality of the developed system.

    General Description:

    Product Function Overview:

  • 8/7/2019 Priya Dar Shin i

    6/70

    ONLINE LIBRARY MANAGEMENT SYSTEM

    PRIYADARSHINI INSTITUTE OF TECHNOLOGY & SCIENCE INFORMATION TECHNOLOGY

    Page | 6

    The proposed applicati on software to be developed is for SRS that performs few of the major

    actions. The major modules in the system are:

    1. Insert a New member

    2. Delete a member

    3. Issue

    4. Renewal

    5. Return

    6. Insert a book

    7. Delete a book

    8. Search

    9. Book details

    10. Member detailsThis system allows to add/edit/delete members in the system. The basic information like

    Name, Address, Ph no etc of the member is stored while inserting. It is important to save the

    exact Book Id and member Id when issuing the book. The administrator can add/delete a book

    from the library. Any user can search a book based on author, book name. Member details and

    also book details can be viewed.

    USER CHARACTERISTICS

    The user has the functionality to view the details of the book. The user is given a Member

    Id. Using this Member Id he can borrow the book.

    GENERAL CONSTRAINTS:

    The system should be able to run under any Windows Environment, provided it should

    have a web server, which supports JSP and oracle 8 Database Manager Installed.

    3.4 FUNCTIONAL REQUIREMENTS

    General Description Of Inputs and Outputs Forms Data Input :

    1 Administrator Login

    2 Member ID

    3 Book Id

    4 Author name

  • 8/7/2019 Priya Dar Shin i

    7/70

    ONLINE LIBRARY MANAGEMENT SYSTEM

    PRIYADARSHINI INSTITUTE OF TECHNOLOGY & SCIENCE INFORMATION TECHNOLOGY

    Page | 7

    5 Book name

    OUTPUT

    The output is the details of the member or book depending on the book.

    3.5 EXTERNAL INTERFACE REQUREMENTS

    3.5.1 USER INTERFACE

    Only one user command is required and later the system will prompt the user for

    necessary input or action whenever necessary.

    3.5.2 ERROR MESSAGE

    INVALID ADMINISTRATOR DETAILS is the message displayed by the system

    when the administrator gives in wrong username or password while entering the administrator module.

    3.5.3 SOFTWARE CONSTRAINTS

    The system is supposed to run under Windows 9X/ XP /Me /2000 environment that have

    been equipped with SQL Database Manager.

    Front End-ASP.NET

    Back End-SQL.

    3.5.4 HARDWARE CONSTRAINTS

    Processor Pentium IV

    RAM-128 MB

    Hard Disk- 20 GB

    3.5.5 ACCEPTAMCE CRITERIA

    Before accepting the system the developer will have to demonstrate thats the system

    works all the specification as conceived at the time of design. The developer will have to show

    by suitable test cases that all conditions are met without any discrepancy.

  • 8/7/2019 Priya Dar Shin i

    8/70

    ONLINE LIBRARY MANAGEMENT SYSTEM

    PRIYADARSHINI INSTITUTE OF TECHNOLOGY & SCIENCE INFORMATION TECHNOLOGY

    Page | 8

    4. SYSTEM ANALYSIS

    The software application to be developed is modeled after the traditional Library. Here,

    the Library system is used to demonstrate the maintenance of the library. Few of the major

    actions are implemented. When administrator performs a particular action the data base gets

    updated.

    4.1 INTRODUCTION TO .NET FRAMEWORK

    The Micr osoft .NET F ra mework is a software technology that is available with several

    Microsoft Windows operating systems. It includes a large library of pre-coded solutions to

    common programming problems and a virtual machine that manages the execution of programs

    written specifically for the framework. The .NET Framework is a key Microsoft offering and is

    intended to be used by most new applications created for the Windows platform.

    The pre-coded solutions that form the framework's Base Class Library cover a large

    range of programming needs in a number of areas, including user interface, data access, database

    connectivity, cryptography, web application development, numeric algorithms, and network

    communications. The class library is used by programmers, who combine it with their own code

    to produce applications.

    Programs written for the .NET Framework execute in a software environment that

    manages the program's runtime requirements. Also part of the .NET Framework, this runtime

    environment is known as the Common Language Runtime (CLR). The CLR provides the

    appearance of an application virtual machine so that programmers need not consider the

    capabilities of the specific CPU that will execute the program. The CLR also provides other

    important services such as security, memory management, and exception handling. The class

    library and the CLR together compose the .NET Framework.

  • 8/7/2019 Priya Dar Shin i

    9/70

    ONLINE LIBRARY MANAGEMENT SYSTEM

    PRIYADARSHINI INSTITUTE OF TECHNOLOGY & SCIENCE INFORMATION TECHNOLOGY

    Page | 9

    PRINCIPAL DESIGN FEATURES:

    INTEROPERABILITY:

    Because interaction between new and older applications is commonly required, the .NET

    Framework provides means to access functionality that is implemented in programs that

    execute outside the .NET environment. Access to COM components is provided in the

    System.Runtime.InteropServices and System.EnterpriseServices namespaces of the

    framework; access to other functionality is provided using the P/Invoke feature.

    COMMON RUNTIME ENGINE :

    The Common Language Runtime (CLR) is the virtual machine component of the.NET framework. All .NET programs execute under the supervision of the CLR,

    guaranteeing certain properties and behaviors in the areas of memory management,

    security, and exception handling.

    BASIC CLASS LIBRARY:

    The Base Class Library (BCL), part of the Framework Class Library (FCL), is a

    library of functionality available to all languages using the .NET Framework. The BCL

    provides classes which encapsulate a number of common functions, including file reading

    and writing, graphic rendering, database interaction and XML document manipulation.

    SIMPLIFIED DEPLOYMENT:

    Installation of computer software must be carefully managed to ensure that it does not

    interfere with previously installed software, and that it conforms to security requirements. The

    .NET framework includes design features and tools that help address these requirements.

  • 8/7/2019 Priya Dar Shin i

    10/70

    ONLINE LIBRARY MANAGEMENT SYSTEM

    PRIYADARSHINI INSTITUTE OF TECHNOLOGY & SCIENCE INFORMATION TECHNOLOGY

    Page | 10

    SECURITY:

    The design is meant to address some of the vulnerabilities, such as buffer overflows, that

    have been exploited by malicious software. Additionally, .NET provides a common security

    model for all applications.

    PORTABILITY:

    The design of the .NET Framework allows it to theoretically be platform agnostic, and

    thus cross-platform compatible. That is, a program written to use the framework should run

    without change on any type of system for which the framework is implemented. Microsoft's

    commercial implementations of the framework cover Windows, Windows CE, and the Xbox

    360. In addition, Microsoft submits the specifications for the Common Language Infrastructure

    (which includes the core class libraries, Common Type System, and the Common IntermediateLanguage), the C# language, and the C++/CLI language to both ECMA and the ISO, making

    them available as open standards. This makes it possible for third parties to create compatible

    implementations of the framework and its languages on other platforms.

    ARCHITECTURE:

    Visual overview of the Common Language Infrastructure (CLI)

  • 8/7/2019 Priya Dar Shin i

    11/70

    ONLINE LIBRARY MANAGEMENT SYSTEM

    PRIYADARSHINI INSTITUTE OF TECHNOLOGY & SCIENCE INFORMATION TECHNOLOGY

    Page | 11

    COMMON LANGUAGE INFRASTRURE:

    The core aspects of the . NET f ra mework lie within the Common Language Infrastructure,

    or CLI . The purpose of the CLI is to provide a language-neutral platform for application

    development and execution, including functions for exception handling, garbage collection,

    security, and interoperability. Microsoft's implementation of the CLI is called the

    C ommon Langu a ge Runt ime or CL R.

    ASSEMBLIES:

    The intermediate CIL code is housed in .NET assemblies. As mandated by specification,

    assemblies are stored in the Portable Executable (PE) format, common on the Windows platformfor all DLL and EXE files. The assembly consists of one or more files, one of which must

    contain the manifest, which has the metadata for the assembly. The complete name of an

    assembly (not to be confused with the filename on disk) contains its simple text name, version

    number, culture, and public key token. The public key token is a unique hash generated when the

    assembly is compiled, thus two assemblies with the same public key token are guaranteed to be

    identical from the point of view of the framework. A private key can also be specified known

    only to the creator of the assembly and can be used for strong naming and to guarantee that the

    assembly is from the same author when a new version of the assembly is compiled (required to

    add an assembly to the Global Assembly Cache).

    METADATA:

    All CLI is self-describing through .NET metadata. The CLR checks the metadata to

    ensure that the correct method is called. Metadata is usually generated by language compilers but

    developers can create their own metadata through custom attributes. Metadata contains

    information about the assembly, and is also used to implement the reflective programming

    capabilities of .NET Framework.

  • 8/7/2019 Priya Dar Shin i

    12/70

    ONLINE LIBRARY MANAGEMENT SYSTEM

    PRIYADARSHINI INSTITUTE OF TECHNOLOGY & SCIENCE INFORMATION TECHNOLOGY

    Page | 12

    SECURITY:

    NET has its own security mechanism with two general features: Code Access Security

    (CAS), and validation and verification. Code Access Security is based on evidence that is

    associated with a specific assembly. Typically the evidence is the source of the assembly

    (whether it is installed on the local machine or has been downloaded from the intranet or

    Internet). Code Access Security uses evidence to determine the permissions granted to the code.

    Other code can demand that calling code is granted a specified permission. The demand causes

    the CLR to perform a call stack walk: every assembly of each method in the call stack is checked

    for the required permission; if any assembly is not granted the permission a security exception is

    thrown.

    When an assembly is loaded the CLR performs various tests. Two such tests are

    validation and verification. During validation the CLR checks that the assembly contains valid

    metadata and CIL, and whether the internal tables are correct. Verification is not so exact. The

    verification mechanism checks to see if the code does anything that is 'unsafe'. The algorithm

    used is quite conservative; hence occasionally code that is 'safe' does not pass. Unsafe code will

    only be executed if the assembly has the 'skip verification' permission, which generally means

    code that is installed on the local machine.

    .NET Framework uses appdomains as a mechanism for isolating code running in a

    process. Appdomains can be created and code loaded into or unloaded from them independent of

    other appdomains. This helps increase the fault tolerance of the application, as faults or crashes

    in one appdomain do not affect rest of the application. Appdomains can also be configured

    independently with different security privileges. This can help increase the security of the

    application by isolating potentially unsafe code. The developer, however, has to split the

    app l ica t ion into sub dom ai ns; it i s not done by the CL R.

  • 8/7/2019 Priya Dar Shin i

    13/70

    ONLINE LIBRARY MANAGEMENT SYSTEM

    PRIYADARSHINI INSTITUTE OF TECHNOLOGY & SCIENCE INFORMATION TECHNOLOGY

    Page | 13

    C l a ss l ibrar y

    N ames pac es in the B CL

    System

    System. CodeDom

    System. Collections

    System. Diagnostics

    System. Globalization

    System. IO

    System. Resources

    System. Text

    System.Text.RegularExpressions

    Microsoft . NET F ra mework includes a set of standard cl a ss l ibrari es. The class library is

    organized in a hierarchy of namespaces. Most of the built in APIs are part of either System.* or

    Microsoft.* namespaces. It encapsulates a large number of common functions, such as file

    reading and writing, graphic rendering, database interaction, and XML document manipulation,

    among others. The .NET class libraries are available to all .NET languages. The .NET

    Framework class library is divided into two parts: the Ba se C l a ss Librar y and the F ra mework

    C l a ss Librar y.

    The Ba se C l a ss Librar y (BCL) includes a small subset of the entire class library and is

    the core set of classes that serve as the basic API of the Common Language Runtime. The

    classes in mscorlib.dll and some of the classes in System.dll and System.core.dll are considered

    to be a part of the BCL. The BCL classes are available in both .NET Framework as well as its

    alternative implementations including .NET Compact Framework, Microsoft Silver light andMono.

    The F ra mework C l a ss Librar y (FCL) is a superset of the BCL classes and refers to the

    entire class library that ships with .NET Framework. It includes an expanded set of libraries,

    including Win Forms, ADO.NET, ASP.NET, Language Integrated Query, Windows Presentation

  • 8/7/2019 Priya Dar Shin i

    14/70

    ONLINE LIBRARY MANAGEMENT SYSTEM

    PRIYADARSHINI INSTITUTE OF TECHNOLOGY & SCIENCE INFORMATION TECHNOLOGY

    Page | 14

    Foundation, Windows Communication Foundation among others. The FCL is much larger in

    scope than standard libraries for languages like C++, and comparable in scope to the standard

    libraries of Java.

    MEMORARY MANAGEMENT:

    The .NET Framework CLR frees the developer from the burden of managing memory

    (allocating and freeing up when done); instead it does the memory management itself. To this

    end, the memory allocated to instantiations of .NET types (objects) is done contiguously from

    the managed heap, a pool of memory managed by the CLR. As long as there exists a reference to

    an object, which might be either a direct reference to an object or via a graph of objects, the

    object is considered to be in use by the CLR. When there is no reference to an object, and it

    cannot be reached or used, it becomes garbage. However, it still holds on to the memoryallocated to it. .NET Framework includes a garbage collector which runs periodically, on a

    separate thread from the application's thread, that enumerates all the unusable objects and

    reclaims the memory allocated to them.

    The .NET Garbage Collector (GC) is a non-deterministic, compacting, mark-and-sweep

    garbage collector. The GC runs only when a certain amount of memory has been used or there is

    enough pressure for memory on the system. Since it is not guaranteed when the conditions to

    reclaim memory are reached, the GC runs are non-deterministic. Each .NET application has a setof roots, which are pointers to objects on the managed heap ( mana ged obje cts). These include

    references to static objects and objects defined as local variables or method parameters currently

    in scope, as well as objects referred to by CPU registers. When the GC runs, it pauses the

    application, and for each object referred to in the root, it recursively enumerates all the objects

    reachable from the root objects and marks them as reachable. It uses .NET metadata and

    reflection to discover the objects encapsulated by an object, and then recursively walk them. It

    then enumerates all the objects on the heap (which were initially allocated contiguously) using

    reflection. All objects not marked as reachable are garbage. This is the mark phase. Since the

    memory held by garbage is not of any consequence, it is considered free space. However, this

    leaves chunks of free space between objects which were initially contiguous. The objects are

    then com pac ted together, by using memory to copy them over to the free space to make them

    contiguous again. Any reference to an object invalidated by moving the object is updated to

  • 8/7/2019 Priya Dar Shin i

    15/70

    ONLINE LIBRARY MANAGEMENT SYSTEM

    PRIYADARSHINI INSTITUTE OF TECHNOLOGY & SCIENCE INFORMATION TECHNOLOGY

    Page | 15

    reflect the new location by the GC. The application is resumed after the garbage collection is

    over.

    The GC used by .NET Framework is actually gene ra t ional . Objects are assigned a

    gene ra t ion; newly created objects belong to Gene ra t ion 0 . The objects that survive a garbage

    collection are tagged as Gene ra t ion 1 , and the Generation 1 objects that survive another

    collection are Gene ra t ion 2 objects. The .NET Framework uses up to Generation 2 objects.

    Higher generation objects are garbage collected less frequently than lower generation objects.

    This helps increase the efficiency of garbage collection, as older objects tend to have a larger

    lifetime than newer objects. Thus, by removing older (and thus more likely to survive a

    collection) objects from the scope of a collection run, fewer objects need to be checked and

    compacted.

    VERSIONS:

    Microsoft started development on the .NET Framework in the late 1990s originally under

    the name of Next Generation Windows Services (NGWS). By late 2000 the first beta versions of

    .NET 1.0 were released.

  • 8/7/2019 Priya Dar Shin i

    16/70

    ONLINE LIBRARY MANAGEMENT SYSTEM

    PRIYADARSHINI INSTITUTE OF TECHNOLOGY & SCIENCE INFORMATION TECHNOLOGY

    Page | 16

    The . NET F ra mework stack.

    Version Version Numb er R elease Date

    1.0 1.0.3705.0 2002-01-05

    1.1 1.1.4322.573 2003-04-01

    2.0 2.0.50727.42 2005-11-07

    3.0 3.0.4506.30 2006-11-06

    3.5 3.5.21022.8 2007-11-09

    4.2 ASP.NET:

    SERVER APPLICATION DEVELOPMENT:

    Server-side applications in the managed world are implemented through runtime hosts.

    Unmanaged applications host the common language runtime, which allows your custom

    managed code to control the behavior of the server. This model provides you with all the features

    of the common language runtime and class library while gaining the performance and scalability

    of the host server.

    The following illustration shows a basic network schema with managed code running in

    different server environments. Servers such as IIS and SQL Server can perform standard

    operations while your application logic executes through the managed code.

    SERVER-SIDE MANAGED CODE:

    ASP.NET is the hosting environment that enables developers to use the .NET Framework

    to target Web-based applications. However, ASP.NET is more than just a runtime host; it is a

    complete architecture for developing Web sites and Internet-distributed objects using managedcode. Both Web Forms and XML Web services use IIS and ASP.NET as the publishing

    mechanism for applications, and both have a collection of supporting classes in the .NET

    Framework.

    XML Web services, an important evolution in Web-based technology, are distributed,

    server-side application components similar to common Web sites. However, unlike Web-based

  • 8/7/2019 Priya Dar Shin i

    17/70

    ONLINE LIBRARY MANAGEMENT SYSTEM

    PRIYADARSHINI INSTITUTE OF TECHNOLOGY & SCIENCE INFORMATION TECHNOLOGY

    Page | 17

    applications, XML Web services components have no UI and are not targeted for browsers such

    as Internet Explorer and Netscape Navigator. Instead, XML Web services consist of reusable

    software components designed to be consumed by other applications, such as traditional client

    applications, Web-based applications, or even other XML Web services. As a result, XML Web

    services technology is rapidly moving application development and deployment into the highly

    distributed environment of the Internet.

    If you have used earlier versions of ASP technology, you will immediately notice the

    improvements that ASP.NET and Web Forms offers. For example, you can develop Web Forms

    pages in any language that supports the .NET Framework. In addition, your code no longer needs

    to share the same file with your HTTP text (although it can continue to do so if you prefer). Web

    Forms pages execute in native machine language because, like any other managed application,

    they take full advantage of the runtime. In contrast, unmanaged ASP pages are always scriptedand interpreted. ASP.NET pages are faster, more functional, and easier to develop than

    unmanaged ASP pages because they interact with the runtime like any managed application.

    The .NET Framework also provides a collection of classes and tools to aid in

    development and consumption of XML Web services applications. XML Web services are built

    on standards such as SOAP (a remote procedure-call protocol), XML (an extensible data format),

    and WSDL ( the Web Services Description Language). The .NET Framework is built on these

    standards to promote interoperability with non-Microsoft solutions.

    For example, the Web Services Description Language tool included with the .NET

    Framework SDK can query an XML Web service published on the Web, parse its WSDL

    description, and produce C# or Visual Basic source code that your application can use to become

    a client of the XML Web service. The source code can create classes derived from classes in the

    class library that handle all the underlying communication using SOAP and XML parsing.

    Although you can use the class library to consume XML Web services directly, the Web

    Services Description Language tool and the other tools contained in the SDK facilitate your

    development efforts with the .NET Framework.

    If you develop and publish your own XML Web service, the .NET Framework provides a

    set of classes that conform to all the underlying communication standards, such as SOAP,

    WSDL, and XML. Using those classes enables you to focus on the logic of your service, without

  • 8/7/2019 Priya Dar Shin i

    18/70

    ONLINE LIBRARY MANAGEMENT SYSTEM

    PRIYADARSHINI INSTITUTE OF TECHNOLOGY & SCIENCE INFORMATION TECHNOLOGY

    Page | 18

    concerning yourself with the communications infrastructure required by distributed software

    development.

    Finally, like Web Forms pages in the managed environment, your XML Web service will run

    with the speed of native machine language using the scalable communication of IIS.

    ACTIVE SERVER PAGES.NET:

    ASP.NET is a programming framework built on the common language runtime that can

    be used on a server to build powerful Web applications. ASP.NET offers several important

    advantages over previous Web development models:

    y Enh anced Pe r for mance. ASP.NET is compiled common language runtime code running on

    the server. Unlike its interpreted predecessors, ASP.NET can take advantage of early

    binding, just-in-time compilation, native optimization, and caching services right out of the

    box. This amounts to dramatically better performance before you ever write a line of code.

    y W or ld-C l a ss Tool Su ppor t . The ASP.NET framework is complemented by a rich toolbox and

    designer in the Visual Studio integrated development environment. WYSIWYG editing,

    drag-and-drop server controls, and automatic deployment are just a few of the features this

    powerful tool provides.

    y Powe r and Flex ibil ity. Because ASP.NET is based on the common language runtime, the

    power and flexibility of that entire platform is available to Web application developers. The.NET Framework class library, Messaging, and Data Access solutions are all seamlessly

    accessible from the Web. ASP.NET is also language-independent, so you can choose the

    language that best applies to your application or partition your application across many

    languages. Further, common language runtime interoperability guarantees that your existing

    investment in COM-based development is preserved when migrating to ASP.NET.

    y S im pl ici ty. ASP.NET makes it easy to perform common tasks, from simple form submission

    and client authentication to deployment and site configuration. For example, the ASP.NET

    page framework allows you to build user interfaces that cleanly separate application logic

    from presentation code and to handle events in a simple, Visual Basic - like forms processing

    model. Additionally, the common language runtime simplifies development, with managed

    code services such as automatic reference counting and garbage collection.

  • 8/7/2019 Priya Dar Shin i

    19/70

    ONLINE LIBRARY MANAGEMENT SYSTEM

    PRIYADARSHINI INSTITUTE OF TECHNOLOGY & SCIENCE INFORMATION TECHNOLOGY

    Page | 19

    y Mana geabil ity. ASP.NET employs a text-based, hierarchical configuration system, which

    simplifies applying settings to your server environment and Web applications. Because

    configuration information is stored as plain text, new settings may be applied without the aid

    of local administration tools. This "zero local administration" philosophy extends to

    deploying ASP.NET Framework applications as well. An ASP.NET Framework application

    is deployed to a server simply by copying the necessary files to the server. No server restart

    is required, even to deploy or replace running compiled code.

    y S ca l abil ity and Avai l abil ity. ASP.NET has been designed with scalability in mind, with

    features specifically tailored to improve performance in clustered and multiprocessor

    environments. Further, processes are closely monitored and managed by the ASP.NET

    runtime, so that if one misbehaves (leaks, deadlocks), a new process can be created in its

    place, which helps keep your application constantly available to handle requests.

    y C ustom izabil ity and Extens ibil ity. ASP.NET delivers a well-factored architecture that allows

    developers to "plug-in" their code at the appropriate level. In fact, it is possible to extend or

    replace any subcomponent of the ASP.NET runtime with your own custom-written

    component. Implementing custom authentication or state services has never been easier.

    y

    Securi ty. With built in Windows authentication and per-application configuration, you can beassured that your applications are secure.

    LANGUAGE SUPPORT:

    The Microsoft .NET Platform currently offers built-in support for three languages: C#,

    Visual Basic, and Java Script.

    WHAT IS ASP.NET WEB FORMS?

    The ASP.NET Web Forms page framework is a scalable common language runtime

    programming model that can be used on the server to dynamically generate Web pages.

    Intended as a logical evolution of ASP (ASP.NET provides syntax compatibility with

    existing pages), the ASP.NET Web Forms framework has been specifically designed to address a

    number of key deficiencies in the previous model. In particular, it provides:

  • 8/7/2019 Priya Dar Shin i

    20/70

    ONLINE LIBRARY MANAGEMENT SYSTEM

    PRIYADARSHINI INSTITUTE OF TECHNOLOGY & SCIENCE INFORMATION TECHNOLOGY

    Page | 20

    y The ability to create and use reusable UI controls that can encapsulate common functionality

    and thus reduce the amount of code that a page developer has to write.

    y The ability for developers to cleanly structure their page logic in an orderly fashion (not

    "spaghetti code").

    y The ability for development tools to provide strong WYSIWYG design support for pages

    (existing ASP code is opaque to tools).

    ASP.NET Web Forms pages are text files with an .aspx file name extension. They can be

    deployed throughout an IIS virtual root directory tree. When a browser client requests .aspx

    resources, the ASP.NET runtime parses and compiles the target file into a .NET Framework

    class. This class can then be used to dynamically process incoming requests. (Note that the .aspx

    file is compiled only the first time it is accessed; the compiled type instance is then reused across

    multiple requests).

    An ASP.NET page can be created simply by taking an existing HTML file and changing

    its file name extension to .aspx (no modification of code is required). For example, the following

    sample demonstrates a simple HTML page that collects a user's name and category preference

    and then performs a form post back to the originating page when a button is clicked:

    ASP.NET provides syntax compatibility with existing ASP pages. This includes support

    for code render blocks that can be intermixed with HTML content within an .aspx file.

    These code blocks execute in a top-down manner at page render time.

    CODE-BEHIND WEB FORMS:

    ASP.NET supports two methods of authoring dynamic pages. The first is the method

    shown in the preceding samples, where the page code is physically declared within the

    originating .aspx file. An alternative approach--known as the code-behind method--enables the

    page code to be more cleanly separated from the HTML content into an entirely separate file.

  • 8/7/2019 Priya Dar Shin i

    21/70

    ONLINE LIBRARY MANAGEMENT SYSTEM

    PRIYADARSHINI INSTITUTE OF TECHNOLOGY & SCIENCE INFORMATION TECHNOLOGY

    Page | 21

    INTRODUCTION TO ASP.NET SERVER CONTROLS :

    In addition to (or instead of) using code blocks to program dynamic content,

    ASP.NET page developers can use ASP.NET server controls to program Web pages. Server

    controls are declared within an .aspx file using custom tags or intrinsic HTML tags that contain a

    r unat="se r ver " attributes value. Intrinsic HTML tags are handled by one of the controls in the

    System.W eb.U I .Html C ont r ols namespace. Any tag that doesn't explicitly map to one of the

    controls is assigned the type of System.W eb.U I .Html C ont r ols.HtmlGene ricC ont r ol.

    Server controls automatically maintain any client-entered values between round trips to

    the server. This control state is not stored on the server (it is instead stored within an < in put

    ty pe="h idden"> form field that is round-tripped between requests). Note also that no client-side

    script is required.In addition to supporting standard HTML input controls, ASP.NET enables developers to

    utilize richer custom controls on their pages. For example, the following sample demonstrates

    how the < a s p:a d r ot a tor > control can be used to dynamically display rotating ads on a page.

    1. ASP.NET Web Forms provide an easy and powerful way to build dynamic Web UI.

    2. ASP.NET Web Forms pages can target any browser client (there are no script library or

    cookie requirements).

    3. ASP.NET Web Forms pages provide syntax compatibility with existing ASP pages.

    4. ASP.NET server controls provide an easy way to encapsulate common functionality.

    5. ASP.NET ships with 45 built-in server controls. Developers can also use controls built by

    third parties.

    6. ASP.NET server controls can automatically project both uplevel and downlevel HTML.

    7. ASP.NET templates provide an easy way to customize the look and feel of list server

    controls.

    8. ASP.NET validation controls provide an easy way to do declarative client or server data

    validation.

  • 8/7/2019 Priya Dar Shin i

    22/70

    ONLINE LIBRARY MANAGEMENT SYSTEM

    PRIYADARSHINI INSTITUTE OF TECHNOLOGY & SCIENCE INFORMATION TECHNOLOGY

    Page | 22

    4.3 C#.NET:

    ADO.NET OVERVIEW: ADO.NET is an evolution of the ADO data access model that directly addresses user

    requirements for developing scalable applications. It was designed specifically for the web with

    scalability, statelessness, and XML in mind.

    ADO.NET uses some ADO objects, such as the C onne ct ion and C ommand objects, and also

    introduces new objects. Key new ADO.NET objects include the Dat a set, D at a Reader , and Dat a

    Ad ap ter .

    The important distinction between this evolved stage of ADO.NET and previous data

    architectures is that there exists an object -- the D at aSet -- that is separate and distinct from any

    data stores. Because of that, the Dat aSet functions as a standalone entity. You can think of the

    DataSet as an always disconnected recordset that knows nothing about the source or destinationof the data it contains. Inside a Dat aSet , much like in a database, there are tables, columns,

    relationships, constraints, views, and so forth.

    A Dat a Ad ap ter is the object that connects to the database to fill the Dat aSet. Then, it

    connects back to the database to update the data there, based on operations performed while the

    Dat aSet held the data. In the past, data processing has been primarily connection-based. Now, in

    an effort to make multi-tiered apps more efficient, data processing is turning to a message-based

    approach that revolves around chunks of information. At the center of this approach is the

    Dat a Ad ap ter , which provides a bridge to retrieve and save data between a Dat aSet and its source

    data store. It accomplishes this by means of requests to the appropriate SQL commands made

    against the data store.

    The XML-based Dat aSet object provides a consistent programming model that works

    with all models of data storage: flat, relational, and hierarchical. It does this by having no

    'knowledge' of the source of its data, and by representing the data that it holds as collections and

    data types. No matter what the source of the data within the Dat aSet is, it is manipulated through

    the same set of standard APIs exposed through the Dat aSet and its subordinate objects.

  • 8/7/2019 Priya Dar Shin i

    23/70

    ONLINE LIBRARY MANAGEMENT SYSTEM

    PRIYADARSHINI INSTITUTE OF TECHNOLOGY & SCIENCE INFORMATION TECHNOLOGY

    Page | 23

    While the Dat aSet has no knowledge of the source of its data, the managed provider has

    detailed and specific information. The role of the managed provider is to connect, fill, and persist

    the Dat aSet to and from data stores. The OLE DB and SQL Server .NET Data Providers

    (System.Data.OleDb and System.Data.SqlClient) that are part of the .Net Framework provide

    four basic objects: the C ommand, C onne ct ion, D at a Reader and Dat a Ad ap ter . In the remaining

    sections of this document, we'll walk through each part of the Dat aSet and the OLE DB/SQL

    Server .NET Data Providers explaining what they are, and how to program against them.

    The following sections will introduce you to some objects that have evolved, and some that are

    new. These objects are:

    y C onne ct ions . For connection to and managing transactions against a database.

    y C ommands . For issuing SQL commands against a database.y Da t a Reader s. For reading a forward-only stream of data records from a SQL Server data

    source.

    y Da t aSet. For storing, Remoting and programming against flat data, XML data and relational

    data.

    y Da t a Ad ap ter s. For pushing data into a Dat aSet , and reconciling data against a database.

    When dealing with connections to a database, there are two different options: SQL Server

    .NET Data Provider (System.Data.SqlClient) and OL DB .NET Data Provider

    (System.Data.OleDb). In these samples we will use the SQL Server .NET Data Provider. These

    are written to talk directly to Microsoft SQL Server. The OLE DB .NET Data Provider is used to

    talk to any OLE DB provider (as it uses OLE DB underneath).

    CONNECTIONS:

    Connections are used to 'talk to' databases, and are represented by provider-specific

    classes such as Sql C onne ct ion. Commands travel over connections and resultsets are returned in

    the form of streams which can be read by a Dat a Reader object, or pushed into a Dat aSet object.

  • 8/7/2019 Priya Dar Shin i

    24/70

    ONLINE LIBRARY MANAGEMENT SYSTEM

    PRIYADARSHINI INSTITUTE OF TECHNOLOGY & SCIENCE INFORMATION TECHNOLOGY

    Page | 24

    COMMANDS:

    Commands contain the information that is submitted to a database, and are represented by

    provider-specific classes such as Sql C ommand. A command can be a stored procedure call, an

    UPDATE statement, or a statement that returns results. You can also use input and output

    parameters, and return values as part of your command syntax. The example below shows how

    to issue an INSERT statement against the Nor thwind database.

    DATAREADERS:

    The Dat a Reader object is somewhat synonymous with a read-only/forward-only cursor

    over data. The Dat a Reader API supports flat as well as hierarchical data. A Dat a Reader object is

    returned after executing a command against a database. The format of the returned Dat a Reader

    object is different from a recordset. For example, you might use the Dat a Reader to show theresults of a search list in a web page.

    DATASETS AND DATAADAPTERS:

    DataSets

    The Dat a set object is similar to the ADO Recor dset object, but more powerful, and with

    one other important distinction: the Dat aSet is always disconnected. The Dat aSet object

    represents a cache of data, with database-like structures such as tables, columns, relationships,

    and constraints. However, though a Dat aSet can and does behave much like a database, it is

    important to remember that Dat aSet objects do not interact directly with databases, or other

    source data. This allows the developer to work with a programming model that is always

    consistent, regardless of where the source data resides. Data coming from a database, an XML

    file, from code, or user input can all be placed into Dat aSet objects. Then, as changes are made

    to the Dat aSet they can be tracked and verified before updating the source data. The Get C hanges

    method of the Dat aSet object actually creates a second DatSet that contains only the changes to

    the data. This Dat aSet is then used by a Dat a Ad ap ter (or other objects) to update the original

    data source.

    The has many XML characteristics, including the ability to produce and consume XML

    data and XML schemas. XML schemas can be used to describe schemas interchanged via

  • 8/7/2019 Priya Dar Shin i

    25/70

    ONLINE LIBRARY MANAGEMENT SYSTEM

    PRIYADARSHINI INSTITUTE OF TECHNOLOGY & SCIENCE INFORMATION TECHNOLOGY

    Page | 25

    WebServices. In fact, a Dat aSet with a schema can actually be compiled for type safety and

    statement completion.

    DATAADAPTERS (OLEDB/SQL):

    The Dat a Ad ap ter object works as a bridge between the Dat aSet and the source data. Using

    the provider-specific SqlD at a Ad ap ter (along with its associated Sql C ommand and

    Sql C onne ct ion) can increase overall performance when working with a Microsoft SQL Server

    databases. For other OLE DB-supported databases, you would use the OleDbD at a Ad ap ter object

    and its associated OleDbCommand and OleDb C onne ct ion objects.

    The Dat a Ad ap ter object uses commands to update the data source after changes have been

    made to the Dat aSet. Using the F ill method of the Dat a Ad ap ter calls the SELECT command;

    using the U pd ate method calls the INSERT, UPDATE or DELETE command for each changedrow. You can explicitly set these commands in order to control the statements used at runtime to

    resolve changes, including the use of stored procedures. For ad-hoc scenarios, a

    C ommandBuilder object can generate these at run-time based upon a select statement. However,

    this run-time generation requires an extra round-trip to the server in order to gather required

    metadata, so explicitly providing the INSERT, UPDATE, and DELETE commands at design

    time will result in better run-time performance.

    1. ADO.NET is the next evolution of ADO for the .Net Framework.

    2. ADO.NET was created with n-Tier, statelessness and XML in the forefront. Two new

    objects, the Dat aSet and Dat a Ad ap ter , are provided for these scenarios.

    3. ADO.NET can be used to get data from a stream, or to store data in a cache for updates.

    4. There is a lot more information about ADO.NET in the documentation.

    5. Remember, you can execute a command directly against the database in order to do inserts,

    updates, and deletes. You don't need to first put data into a Dat aSet in order to insert, update,

    or delete it.

    Also, you can use a Dat aSet to bind to the data, move through the data, and navigate data

    relationships

  • 8/7/2019 Priya Dar Shin i

    26/70

    ONLINE LIBRARY MANAGEMENT SYSTEM

    PRIYADARSHINI INSTITUTE OF TECHNOLOGY & SCIENCE INFORMATION TECHNOLOGY

    Page | 26

    4.4 SQL SERVER -2005:

    A database management, or DBMS, gives the user access to their data and helps them

    transform the data into information. Such database management systems include dBase, paradox,

    IMS, SQL Server and SQL Server. These systems allow users to create, update and extract

    information from their database.

    A database is a structured collection of data. Data refers to the characteristics of people,

    things and events. SQL Server stores each data item in its own fields. In SQL Server, the fields

    relating to a particular person, thing or event are bundled together to form a single complete unit

    of data, called a record (it can also be referred to as raw or an occurrence). Each record is made

    up of a number of fields. No two fields in a record can have the same field name.

    During an SQL Server Database design project, the analysis of your business needs

    identifies all the fields or attributes of interest. If your business needs change over time, youdefine any additional fields or change the definition of existing fields.

    SQL SERVER TABLES:

    SQL Server stores records relating to each other in a table. Different tables are created

    for the various groups of information. Related tables are grouped together to form a database.

    PRIMARY KEY:

    Every table in SQL Server has a field or a combination of fields that uniquely identifies

    each record in the table. The Unique identifier is called the Primary Key, or simply the Key.

    The primary key provides the means to distinguish one record from all other in a table. It allows

    the user and the database system to identify, locate and refer to one particular record in the

    database.

    RELATIONAL DATABASE:

    Sometimes all the information of interest to a business operation can be stored in one

    table. SQL Server makes it very easy to link the data in multiple tables. Matching an employee

    to the department in which they work is one example. This is what makes SQL Server a

    relational database management system, or RDBMS. It stores data in two or more tables and

    enables you to define relationships between the table and enables you to define relationships

    between the tables.

  • 8/7/2019 Priya Dar Shin i

    27/70

    ONLINE LIBRARY MANAGEMENT SYSTEM

    PRIYADARSHINI INSTITUTE OF TECHNOLOGY & SCIENCE INFORMATION TECHNOLOGY

    Page | 27

    FOREIGN KEY:

    When a field is one table matches the primary key of another field is referred to as a

    foreign key. A foreign key is a field or a group of fields in one table whose values match those

    of the primary key of another table.

    REFERENTIAL INTEGRITY:

    Not only does SQL Server allow you to link multiple tables, it also maintains consistency

    between them. Ensuring that the data among related tables is correctly matched is referred to as

    maintaining referential integrity.

    DATA ABSTRACTION:

    A major purpose of a database system is to provide users with an abstract view of the

    data. This system hides certain details of how the data is stored and maintained. Data abstraction

    is divided into three levels. Phys ica l level : This is the lowest level of abstraction at which one describes how the data are

    actually stored.

    C once ptual Level : At this level of database abstraction all the attributed and what data are

    actually stored is described and entries and relationship among them.

    View level : This is the highest level of abstraction at which one describes only part of the

    database.

    ADVANTAGES OF RDBMS:

    y Redundancy can be avoided

    y Inconsistency can be eliminated

    y Data can be Shared

    y Standards can be enforced

    y Security restrictions ca be applied

    y Integrity can be maintained

    y Conflicting requirements can be balanced

    y Data independence can be achieved.

    DISADVANTAGES OF DBMS:

    A significant disadvantage of the DBMS system is cost. In addition to the cost of

    purchasing of developing the software, the hardware has to be upgraded to allow for the

    extensive programs and the workspace required for their execution and storage. While

  • 8/7/2019 Priya Dar Shin i

    28/70

    ONLINE LIBRARY MANAGEMENT SYSTEM

    PRIYADARSHINI INSTITUTE OF TECHNOLOGY & SCIENCE INFORMATION TECHNOLOGY

    Page | 28

    centralization reduces duplication, the lack of duplication requires that the database be

    adequately backed up so that in case of failure the data can be recovered.

    FEATURES OF SQL SERVER (RDBMS):

    SQL SERVER is one of the leading database management systems (DBMS) because it is

    the only Database that meets the uncompromising requirements of todays most demanding

    information systems. From complex decision support systems (DSS) to the most rigorous online

    transaction processing (OLTP) application, even application that require simultaneous DSS and

    OLTP access to the same critical data, SQL Server leads the industry in both performance and

    capability.

    SQL SERVER is a truly portable, distributed, and open DBMS that delivers unmatched

    performance, continuous operation and support for every database.

    SQL SERVER RDBMS is high performance fault tolerant DBMS which is specially designedfor online transactions processing and for handling large database application.

    SQL SERVER with transactions processing option offers two features which contribute to very

    high level of transaction processing throughput, which are

    y The row level lock manager.

    ENTERPRISE WIDE DATA SHARING:The unrivaled portability and connectivity of the SQL SERVER DBMS enables all the

    systems in the organization to be linked into a singular, integrated computing resource.

    PORTABILITY:

    SQL SERVER is fully portable to more than 80 distinct hardware and operating systems

    platforms, including UNIX, MSDOS, OS/2, Macintosh and dozens of proprietary platforms.

    This portability gives complete freedom to choose the database server platform that meets the

    system requirements.

    OPEN SYSTEMS:

    SQL SERVER offers a leading implementation of industry standard SQL. SQL

    Servers open architecture integrates SQL SERVER and non SQL SERVER DBMS with

    industrys most comprehensive collection of tools, application, and third party software products

  • 8/7/2019 Priya Dar Shin i

    29/70

    ONLINE LIBRARY MANAGEMENT SYSTEM

    PRIYADARSHINI INSTITUTE OF TECHNOLOGY & SCIENCE INFORMATION TECHNOLOGY

    Page | 29

    SQL Servers Open architecture provides transparent access to data from other relational

    database and even non-relational database.

    DISTRIBUTED DATA SHARING:

    SQL Servers networking and distributed database capabilities to access data stored on

    remote server with the same ease as if the information was stored on a single local computer. A

    single SQL statement can access data at multiple sites. You can store data where system

    requirements such as performance, security or availability dictate.

    UNMATCHED PERFORMANCE:

    The most advanced architecture in the industry allows the SQL SERVER DBMS to

    deliver unmatched performance.

    SOPHISTICATED CONCURRENCY CONTROL:

    Real World applications demand access to critical data. With most database Systemsapplication becomes contention bound which performance is limited not by the CPU power

    or by disk I/O, but user waiting on one another for data access. SQL Server employs full,

    unrestricted row-level locking and contention free queries to minimize and in many cases

    entirely eliminates contention wait t imes.

    NO I/O BOTTLENECKS:

    SQL Servers fast commit groups commit and deferred write technologies dramatically

    reduce disk I/O bottlenecks. While some database write whole data block to disk at commit time,

    SQL Server commits transactions with at most sequential log file on disk at commit time, On

    high throughput systems, one sequential writes typically group commit multiple transactions.

    Data read by the transaction remains as shared memory so that other transactions may access that

    data without reading it again from disk. Since fast commits write all data necessary to the

    recovery to the log file, modified blocks are written back to the database independently of the

    transaction commit, when written from memory to disk.

  • 8/7/2019 Priya Dar Shin i

    30/70

    ONLINE LIBRARY MANAGEMENT SYSTEM

    PRIYADARSHINI INSTITUTE OF TECHNOLOGY & SCIENCE INFORMATION TECHNOLOGY

    Page | 30

    5 SYSTEM DESIGN

    Design is the first step in the development phases of any engineered product. Design is

    defined as the process of applying various techniques and principles for the purpose of defining a

    device, a process or a system in sufficient details to permit it to realize physically.

    After the problem definition phase, in which the software requirements are analyzed and

    specified, system design is the first of the three activities ( design, coding and testing) in the

    process of development of software.

    Design activity is one of the main important phases, because in this activity important

    decisions that will ultimately affect the success of the software implementation and its ease of

    maintenance are made. These decisions will have the final bearing upon reliability andmaintainability of the system.

    Design is the only way to accurately translate the users requirements into finished

    software or system. The decision process provides a means to translate requirements into a

    representation of the software. Initially, the representation depicts the holistic view of the

    software that is subsequently refined to achieve a representation that is quite close to the actual

    source code.

    Software design is conducted in two steps:

    1. Preliminary design

    2. Detailed design

    Preliminary design si concerned with retransformation of the requirements into data and software

    architecture. Detailed design focuses on refinements to the architecture representation that lead

    to detailed data structures and algorithms for the software.

    The design process for the software system often has two levels:

    1. System design or Top-Level Design

    2. Detailed Design or Logical Design.5.1 TOP LEVEL DESIGN:

    In system design, the focus is on deciding which modules are needed for the system; the

    specification of these modules and how many modules should be interconnected. Finally the

    system design document is prepared.

  • 8/7/2019 Priya Dar Shin i

    31/70

    ONLINE LIBRARY MANAGEMENT SYSTEM

    PRIYADARSHINI INSTITUTE OF TECHNOLOGY & SCIENCE INFORMATION TECHNOLOGY

    Page | 31

    5.2 LOGICAL DESIGN:

    In detailed design, the internal design of the module, or how the specification of the module can

    be satisfied is decided.

    Some properties for a software system design are:

    1. Verifiability

    2. Completeness

    3. Consistency

    4. Traceability

    5. Simplicity/Understandability

    5.3 DATAFLOW ORIENTED DESIGN AND ANALYSIS TECHNIQUES:This technique uses graphical tools called flow diagram (DFD) to depict the information

    flow through the system and transforms that are applied to it between the input and output stage.

    The DFD Is also known as DATA-FLOW GRAPH. A DFD may be used to represent a system

    or software at any level of abstraction. At the highest level of abstraction, a more procedural is

    taken. The lowest level of abstraction is represented by the actual source code.

    A full description of a system actually consists of a set of DFD s , which comprises of

    various level diagrams that show additional features.

    There are two types of Data Flow diagrams:

    1. Physical DFD s

    2. Logical DFD s

    PHYSICAL DFD :

    The physical DFD is a model of the current system and is used to ensure that current

    system has

    been clearly understood.

    LOGICAL DFD :

    Logical DFD s is the model of the proposed system. They show the requirements on

    which the new system should be built. The logical DFD as th base for drawing the systems

    STRUCTURE

  • 8/7/2019 Priya Dar Shin i

    32/70

    ONLINE LIBRARY MANAGEMENT SYSTEM

    PRIYADARSHINI INSTITUTE OF TECHNOLOGY & SCIENCE INFORMATION TECHNOLOGY

    Page | 32

    CHART. DFD s may be partitioned into levels that represent increasing information flow and

    functional details. Level DFD is also called FUNCTIONAL SYSTME MODEL or

    CONTEXT MODEL and represents entire software elements as a single bubble with input and

    output data indicated by incoming and outgoing arrows respectively connected to the external

    entities. The Level-1 DFD is partitioned to reveal more details exploring the Level-0 DFD,

    which is nothing but a representation of major sub functions of the system in the form of diagram

    does not supply any explicit indication of these sequence of processing.

    A GOOD DFD SHOULD:

    1. Have no data flows that split up into a number of other data flows

    2. Have no crossing lines

    3. Not include flow chart loops of control elements

    4. Not include data flows that act as signal activate processes.

  • 8/7/2019 Priya Dar Shin i

    33/70

    ONLINE LIBRARY MANAGEMENT SYSTEM

    PRIYADARSHINI INSTITUTE OF TECHNOLOGY & SCIENCE INFORMATION TECHNOLOGY

    Page | 33

    6 .DESIGN

    6.1E-R DIAGRAMS:

  • 8/7/2019 Priya Dar Shin i

    34/70

    ONLINE LIBRARY MANAGEMENT SYSTEM

    PRIYADARSHINI INSTITUTE OF TECHNOLOGY & SCIENCE INFORMATION TECHNOLOGY

    Page | 34

    6.2 DFD DIAGRAMS:

  • 8/7/2019 Priya Dar Shin i

    35/70

    ONLINE LIBRARY MANAGEMENT SYSTEM

    PRIYADARSHINI INSTITUTE OF TECHNOLOGY & SCIENCE INFORMATION TECHNOLOGY

    Page | 35

    6.3 TABLES:

    Book Entry:

  • 8/7/2019 Priya Dar Shin i

    36/70

    ONLINE LIBRARY MANAGEMENT SYSTEM

    PRIYADARSHINI INSTITUTE OF TECHNOLOGY & SCIENCE INFORMATION TECHNOLOGY

    Page | 36

  • 8/7/2019 Priya Dar Shin i

    37/70

    ONLINE LIBRARY MANAGEMENT SYSTEM

    PRIYADARSHINI INSTITUTE OF TECHNOLOGY & SCIENCE INFORMATION TECHNOLOGY

    Page | 37

    7.OUTPUT SCREENS

  • 8/7/2019 Priya Dar Shin i

    38/70

    ONLINE LIBRARY MANAGEMENT SYSTEM

    PRIYADARSHINI INSTITUTE OF TECHNOLOGY & SCIENCE INFORMATION TECHNOLOGY

    Page | 38

  • 8/7/2019 Priya Dar Shin i

    39/70

    ONLINE LIBRARY MANAGEMENT SYSTEM

    PRIYADARSHINI INSTITUTE OF TECHNOLOGY & SCIENCE INFORMATION TECHNOLOGY

    Page | 39

  • 8/7/2019 Priya Dar Shin i

    40/70

    ONLINE LIBRARY MANAGEMENT SYSTEM

    PRIYADARSHINI INSTITUTE OF TECHNOLOGY & SCIENCE INFORMATION TECHNOLOGY

    Page | 40

  • 8/7/2019 Priya Dar Shin i

    41/70

    ONLINE LIBRARY MANAGEMENT SYSTEM

    PRIYADARSHINI INSTITUTE OF TECHNOLOGY & SCIENCE INFORMATION TECHNOLOGY

    Page | 41

  • 8/7/2019 Priya Dar Shin i

    42/70

    ONLINE LIBRARY MANAGEMENT SYSTEM

    PRIYADARSHINI INSTITUTE OF TECHNOLOGY & SCIENCE INFORMATION TECHNOLOGY

    Page | 42

  • 8/7/2019 Priya Dar Shin i

    43/70

    ONLINE LIBRARY MANAGEMENT SYSTEM

    PRIYADARSHINI INSTITUTE OF TECHNOLOGY & SCIENCE INFORMATION TECHNOLOGY

    Page | 43

  • 8/7/2019 Priya Dar Shin i

    44/70

    ONLINE LIBRARY MANAGEMENT SYSTEM

    PRIYADARSHINI INSTITUTE OF TECHNOLOGY & SCIENCE INFORMATION TECHNOLOGY

    Page | 44

  • 8/7/2019 Priya Dar Shin i

    45/70

    ONLINE LIBRARY MANAGEMENT SYSTEM

    PRIYADARSHINI INSTITUTE OF TECHNOLOGY & SCIENCE INFORMATION TECHNOLOGY

    Page | 45

  • 8/7/2019 Priya Dar Shin i

    46/70

    ONLINE LIBRARY MANAGEMENT SYSTEM

    PRIYADARSHINI INSTITUTE OF TECHNOLOGY & SCIENCE INFORMATION TECHNOLOGY

    Page | 46

  • 8/7/2019 Priya Dar Shin i

    47/70

    ONLINE LIBRARY MANAGEMENT SYSTEM

    PRIYADARSHINI INSTITUTE OF TECHNOLOGY & SCIENCE INFORMATION TECHNOLOGY

    Page | 47

  • 8/7/2019 Priya Dar Shin i

    48/70

    ONLINE LIBRARY MANAGEMENT SYSTEM

    PRIYADARSHINI INSTITUTE OF TECHNOLOGY & SCIENCE INFORMATION TECHNOLOGY

    Page | 48

  • 8/7/2019 Priya Dar Shin i

    49/70

    ONLINE LIBRARY MANAGEMENT SYSTEM

    PRIYADARSHINI INSTITUTE OF TECHNOLOGY & SCIENCE INFORMATION TECHNOLOGY

    Page | 49

    8 .TESTING

    8.1 LEVELS OF TESTING:

    The basic levels of testing are

    1. Unit Testing2. Integrating Testing

    3. System and Acceptance Testing

    These different levels of testing attempt to detect various types of faults. The relation of

    faults introduced in different phases and the different levels are as shown below.

    8.1.1 UNIT TESTING:

    Unit testing focuses on verification of the smallest unit of software design module. Using

    the detailed design description as a guide, important control paths are tested to uncover errors

    within the boundary of the module . Unit testing is essentially for verification of the code

    produced during the coding phase and hence the goal is to test the internal logic of the module.

    8.1.2 INTEGRATION TESTING

    In this testing, many tested modules are combined into sub systems, which are then

    tested. The goal is to see if the module can be integrated properly, the emphasis being on testing

    interfaces between the modules.

    8.1.3 SYSTEM TESTING:

    the entire software system us tested for various types of failures.TEST DATA AND OUTPUT:

    The above testing is done taking various kinds of test data. Preparing of test data plays a

    vital role in system testing. After preparing the test data the system under study is tested using

    the test data. While testing the systems by using test data, errors are again uncovered and

    corrected by using above testing method and correction s are also noted, for future use.

    The system have been verified and validated by running

    1. TEST DATA

    2. LIVE DATA

  • 8/7/2019 Priya Dar Shin i

    50/70

    ONLINE LIBRARY MANAGEMENT SYSTEM

    PRIYADARSHINI INSTITUTE OF TECHNOLOGY & SCIENCE INFORMATION TECHNOLOGY

    Page | 50

    RUN WITH TEST DATA:

    The test cases are developed using sample data. Specification testing was also done for

    each condition or combination of conditions. Each module is tested independently and they are

    integrated with the main module.

    8.1.4 ACCEPTANCE TESTING:

    This is normally performed with realistic data of the client to demonstrate that the

    software is working satisfactorily. Testing here focuses on the external behavior of the system.

    8.2 TEST CASES :

    To spot all the structural, syntactically and integration errors in the code, a series

    of test cases are prepared and the application was tested rigorously using these cases. The system

    passed most of these, and in case of any discrepancy from the expected behavior, that prtion of

    the module was immediately to make error free.The test case used to evaluate the system are given below:

    TEST CASE When an invalid User Id or Password are given.

    EXPECTED RESULT System should display an error message followed by a screen to reenter

    the id or password.

    OBSERVED RESULT The system displayed the message and the screen to re-enter the details

    TEST CASE When invalid characters are included in any of the fields while entering details of

    the member or book.

    EXPECTED RESULT System should not accept the details entered and should display an

    appropriate error message.

    OBSERVED RESULT The system displayed the message and the user is prompted to re enter

    the details.

    TEST CASE When the book in issue is attempted to be deleted

    EXPECTED RESULT System should display an error message.

    OBSERVED RESULT The system displayed the message and the screen to re-enter the details.

    TEST CASE When an attempt is made to issue a book to the member already having two books.

    EXPECTED RESULT System should display an error messageasking the member to return any

    one of the books already in issue.

    OBSERVED RESULT The system deisplayed the appropriate error message.

    TEST CASE When the data of issue and date of return are entered.

  • 8/7/2019 Priya Dar Shin i

    51/70

    ONLINE LIBRARY MANAGEMENT SYSTEM

    PRIYADARSHINI INSTITUTE OF TECHNOLOGY & SCIENCE INFORMATION TECHNOLOGY

    Page | 51

    EXPECTED RESULT System should verify whether the date of return is after the date of issue

    and if not display an appropriate error message.

    OBSERVED RESULT The system displayed the appropriate error message.

    TEST CASE When the date of issue is entered .

    EXPECTED RESULT I should check whether the date of issue is same as the current date, if not

    should display the appropriate error message.

    OBSERVED RESULT The system displayed the appropriate error message.

    TEST CASE When data format other than the specified one is given as input.

    EXPECTED RESULT System should display error message saying that wrong date format

    entered.

    OBSERVED RESULT The system displayed the appropriate message.

  • 8/7/2019 Priya Dar Shin i

    52/70

    ONLINE LIBRARY MANAGEMENT SYSTEM

    PRIYADARSHINI INSTITUTE OF TECHNOLOGY & SCIENCE INFORMATION TECHNOLOGY

    Page | 52

    9 .APPENDIX:

    Datalayer .cs:

    using System;

    using System.Data;

    using System.Configuration;

    using System.Linq;

    using System.Web;

    using System.Web.Security;

    using System.Web.UI;

    using System.Web.UI.HtmlControls;

    using System.Web.UI.WebControls;using System.Web.UI.WebControls.WebParts;

    using System.Xml.Linq;

    using System.Data.SqlClient;

    ///

    /// Summary description for datalayer

    ///

    public class datalayer

    {

    //SqlConnection con;

    //SqlCommand cmd;

    //SqlDataReader dr;

    public datalayer()

    {

    //

    // TODO: Add constructor logic here//

    }

    public static bool checkuser( string uname, string pwd)

    {

  • 8/7/2019 Priya Dar Shin i

    53/70

    ONLINE LIBRARY MANAGEMENT SYSTEM

    PRIYADARSHINI INSTITUTE OF TECHNOLOGY & SCIENCE INFORMATION TECHNOLOGY

    Page | 53

    SqlConnection con = new SqlConnection ("user id=sa;password=;data

    source=home;database=pubs;Integrated Security=true" );

    string str = "select userid from registration where Userid='" + uname + "' and password='" +

    pwd + "'";

    SqlCommand cmd = new SqlCommand (str, con);

    con.Open();

    SqlDataReader dr = cmd.ExecuteReader();

    if (dr.HasRows)

    return true ;

    else

    return false ;

    con.Close();}

    }

  • 8/7/2019 Priya Dar Shin i

    54/70

    ONLINE LIBRARY MANAGEMENT SYSTEM

    PRIYADARSHINI INSTITUTE OF TECHNOLOGY & SCIENCE INFORMATION TECHNOLOGY

    Page | 54

    Book d etails .cs

    using System;

    using System.Collections;

    using System.Configuration;

    using System.Data;

    using System.Linq;

    using System.Web;

    using System.Web.Security;

    using System.Web.UI;

    using System.Web.UI.HtmlControls;

    using System.Web.UI.WebControls;using System.Web.UI.WebControls.WebParts;

    using System.Xml.Linq;

    using System.Data.SqlClient;

    public partial class bookdetails : System.Web.UI. Page

    {

    protected void Page_Load( object sender, EventArgs e)

    {

    SqlConnection con = new SqlConnection ("user id=sa;password=;data

    source=home;database=pubs;Integrated Security=true" );

    SqlDataAdapter da = new SqlDataAdapter ("select bno,bname,author,edition,publisher from

    bookentry" ,con);

    DataSet ds=new DataSet ();

    da.Fill(ds, "book" );

    GridView1.DataSource = ds.Tables[0];

    GridView1.DataBind();

    }}

  • 8/7/2019 Priya Dar Shin i

    55/70

    ONLINE LIBRARY MANAGEMENT SYSTEM

    PRIYADARSHINI INSTITUTE OF TECHNOLOGY & SCIENCE INFORMATION TECHNOLOGY

    Page | 55

    F orgot P asswor d:

    using System;

    using System.Collections;

    using System.Configuration;

    using System.Data;

    using System.Linq;

    using System.Web;

    using System.Web.Security;

    using System.Web.UI;

    using System.Web.UI.HtmlControls;

    using System.Web.UI.WebControls;using System.Web.UI.WebControls.WebParts;

    using System.Xml.Linq;

    using System.Data.SqlClient;

    public partial class forgotpwd : System.Web.UI. Page

    {

    SqlConnection con, con1;

    SqlCommand cmd, cmd1;

    SqlDataReader dr, dr1;

    protected void Page_Load( object sender, EventArgs e)

    {

    con = new SqlConnection ("user id=sa;password=;data

    source=home;database=pubs;Integrated Security=true" );

    con.Open();

    }

    protected void Button1_Click( object sender, EventArgs e)

    {

    cmd = new SqlCommand ("select * from registration" , con);

    dr = cmd.ExecuteReader();

  • 8/7/2019 Priya Dar Shin i

    56/70

    ONLINE LIBRARY MANAGEMENT SYSTEM

    PRIYADARSHINI INSTITUTE OF TECHNOLOGY & SCIENCE INFORMATION TECHNOLOGY

    Page | 56

    while (dr.Read())

    {

    if (TextBox1.Text == dr[3].ToString())

    {

    if (TextBox2.Text == dr[14].ToString())

    {

    Label6.Visible = false ;

    Panel1.Visible = true ;

    Label5.Text = dr[4].ToString();

    }

    else

    Label6.Visible = true ;

    }

    }

    }

    protected void Button2_Click( object sender, EventArgs e)

    {

    cmd1 = new SqlCommand ("select * from registration where userid='" + TextBox1.Text +

    "'", con);

    dr1 = cmd1.ExecuteReader();

    while (dr1.Read())

    {

    if (TextBox1.Text == dr1[3].ToString())

    {

    Label3.Text = dr1[13].ToString();

    }

    }

    }}

  • 8/7/2019 Priya Dar Shin i

    57/70

    ONLINE LIBRARY MANAGEMENT SYSTEM

    PRIYADARSHINI INSTITUTE OF TECHNOLOGY & SCIENCE INFORMATION TECHNOLOGY

    Page | 57

    Adm in L ogin :

    using System;

    using System.Collections;

    using System.Configuration;

    using System.Data;

    using System.Linq;

    using System.Web;

    using System.Web.Security;

    using System.Web.UI;

    using System.Web.UI.HtmlControls;

    using System.Web.UI.WebControls;using System.Web.UI.WebControls.WebParts;

    using System.Xml.Linq;

    public partial class admin : System.Web.UI. Page

    {

    protected void Page_Load( object sender, EventArgs e)

    {

    }

    protected void Button1_Click( object sender, EventArgs e)

    {

    if (TextBox1.Text == "admin" && TextBox2.Text == "admin" )

    {

    Response.Redirect( @"library\admin\Adminpage.aspx" );

    }

    else

    {

    Response.Write( "invalid credentials" );}}}

  • 8/7/2019 Priya Dar Shin i

    58/70

    ONLINE LIBRARY MANAGEMENT SYSTEM

    PRIYADARSHINI INSTITUTE OF TECHNOLOGY & SCIENCE INFORMATION TECHNOLOGY

    Page | 58

    Delete Book :

    using System;

    using System.Collections;

    using System.Configuration;

    using System.Data;

    using System.Linq;

    using System.Web;

    using System.Web.Security;

    using System.Web.UI;

    using System.Web.UI.HtmlControls;

    using System.Web.UI.WebControls;using System.Web.UI.WebControls.WebParts;

    using System.Xml.Linq;

    using System.Data.SqlClient;

    public partial class deletebook : System.Web.UI. Page

    {

    SqlConnection con;

    SqlCommand cmd;

    protected void Page_Load( object sender, EventArgs e)

    {

    con = new SqlConnection ("user id=sa;password=;data

    source=home;database=pubs;Integrated security=true" );

    con.Open();

    }

    protected void Button2_Click( object sender, EventArgs e)

    {

  • 8/7/2019 Priya Dar Shin i

    59/70

    ONLINE LIBRARY MANAGEMENT SYSTEM

    PRIYADARSHINI INSTITUTE OF TECHNOLOGY & SCIENCE INFORMATION TECHNOLOGY

    Page | 59

    }

    protected void Button1_Click( object sender, EventArgs e)

    {

    }

    protected void Button1_Click1( object sender, EventArgs e)

    {

    con = new SqlConnection ("user id=sa;password=;data

    source=home;database=pubs;Integrated security=true" );

    con.Open();

    cmd = new SqlCommand ("delete bookentry where bno='" + DropDownList1.SelectedItem

    + "'", con);cmd.ExecuteNonQuery();

    Label6.Visible = true ;

    }

    protected void Menu2_MenuItemClick( object sender, MenuEventArgs e)

    {

    }

    protected void Button2_Click1( object sender, EventArgs e)

    {

    con = new SqlConnection ("user id=sa;password=;data

    source=home;database=pubs;Integrated security=true" );

    con.Open();

    SqlDataReader dr;

    cmd = new SqlCommand ("select * from bookentry where bno='" +

    DropDownList1.SelectedItem + "'", con);

    dr = cmd.ExecuteReader();

    while (dr.Read())

    {

  • 8/7/2019 Priya Dar Shin i

    60/70

    ONLINE LIBRARY MANAGEMENT SYSTEM

    PRIYADARSHINI INSTITUTE OF TECHNOLOGY & SCIENCE INFORMATION TECHNOLOGY

    Page | 60

    Label1.Text = dr[1].ToString();

    Label2.Text = dr[2].ToString();

    Label3.Text = dr[3].ToString();

    Label4.Text = dr[4].ToString();

    Label5.Text = dr[5].ToString();

    }

    }

    }

  • 8/7/2019 Priya Dar Shin i

    61/70

    ONLINE LIBRARY MANAGEMENT SYSTEM

    PRIYADARSHINI INSTITUTE OF TECHNOLOGY & SCIENCE INFORMATION TECHNOLOGY

    Page | 61

    F acu lty Details :

    using System;

    using System.Collections;

    using System.Configuration;

    using System.Data;

    using System.Linq;

    using System.Web;

    using System.Web.Security;

    using System.Web.UI;

    using System.Web.UI.HtmlControls;

    using System.Web.UI.WebControls;using System.Web.UI.WebControls.WebParts;

    using System.Xml.Linq;

    using System.Data.SqlClient;

    public partial class Facultydetails : System.Web.UI. Page

    {

    protected void Page_Load( object sender, EventArgs e)

    {

    SqlConnection con = new SqlConnection ("user id=sa;password=;data

    source=home;database=pubs;integrated Security=true" );

    SqlDataAdapter da = new SqlDataAdapter ("select

    Firstname,Lastname,Userid,DOB,Emailaddress,paddress,branch from registration where

    member='faculty'" , con);

    DataSet ds = new DataSet ();

    da.Fill(ds, "stu" );

    GridView1.DataSource = ds.Tables[0];

    GridView1.DataBind();

    }

    protected void Menu2_MenuItemClick( object sender, MenuEventArgs e)

    {}}

  • 8/7/2019 Priya Dar Shin i

    62/70

    ONLINE LIBRARY MANAGEMENT SYSTEM

    PRIYADARSHINI INSTITUTE OF TECHNOLOGY & SCIENCE INFORMATION TECHNOLOGY

    Page | 62

    Issu ing Books :

    using System;

    using System.Collections;

    using System.Configuration;

    using System.Data;

    using System.Linq;

    using System.Web;

    using System.Web.Security;

    using System.Web.UI;

    using System.Web.UI.HtmlControls;

    using System.Web.UI.WebControls;using System.Web.UI.WebControls.WebParts;

    using System.Xml.Linq;

    using System.Data.SqlClient;

    public partial class issuing_books : System.Web.UI. Page

    {

    SqlConnection con;

    SqlCommand cmd;

    protected void Page_Load( object sender, EventArgs e)

    {

    con = new SqlConnection ("user id=sa;password=;data source=.;database=pubs;integrated

    Security=true" );

    con.Open();

    }

    protected void Button1_Click( object sender, EventArgs e)

    {

    string str = "insert into issuebooks values('" +DropDownList1.SelectedItem+ "','" +

    TextBox1.Text + "','" + TextBox2.Text + "','" + TextBox3.Text + "')" ;

    cmd = new SqlCommand (str,con);

  • 8/7/2019 Priya Dar Shin i

    63/70

    ONLINE LIBRARY MANAGEMENT SYSTEM

    PRIYADARSHINI INSTITUTE OF TECHNOLOGY & SCIENCE INFORMATION TECHNOLOGY

    Page | 63

    cmd.ExecuteNonQuery();

    Label1.Visible = true ;

    }

    protected void Button4_Click( object sender, EventArgs e)

    {

    TextBox1.Text = "";

    TextBox2.Text = "";

    TextBox3.Text = "";

    }

    protected void Menu2_MenuItemClick( object sender, MenuEventArgs e)

    {

    }

    }

  • 8/7/2019 Priya Dar Shin i

    64/70

    ONLINE LIBRARY MANAGEMENT SYSTEM

    PRIYADARSHINI INSTITUTE OF TECHNOLOGY & SCIENCE INFORMATION TECHNOLOGY

    Page | 64

    R egistration :

    using System;

    using System.Collections;

    using System.Configuration;

    using System.Data;

    using System.Linq;

    using System.Web;

    using System.Web.Security;

    using System.Web.UI;

    using System.Web.UI.HtmlControls;

    using System.Web.UI.WebControls;using System.Web.UI.WebControls.WebParts;

    using System.Xml.Linq;

    using System.Data.SqlClient;

    public partial class Faculty : System.Web.UI. Page

    {

    SqlConnection con;

    SqlCommand cmd;

    protected void Page_Load( object sender, EventArgs e)

    {

    con = new SqlConnection ("user id=sa;password=;data

    source=home;database=pubs;Integrated Security=true" );

    }

    protected void Button1_Click( object sender, EventArgs e)

    {

    }

    protected void TextBox1_TextChanged( object sender, EventArgs e)

  • 8/7/2019 Priya Dar Shin i

    65/70

    ONLINE LIBRARY MANAGEMENT SYSTEM

    PRIYADARSHINI INSTITUTE OF TECHNOLOGY & SCIENCE INFORMATION TECHNOLOGY

    Page | 65

    {

    }

    protected void RadioButtonList1_SelectedIndexChanged( object sender, EventArgs e)

    {

    }

    protected void RadioButtonList2_SelectedIndexChanged( object sender, EventArgs e)

    {

    }

    protected void Button1_Click1( object sender, EventArgs e)

    {try

    {

    string str = "insert into registration values('" + TextBox11.Text + "','" + TextBox12.Text

    + "','" + RadioButtonList1.SelectedItem + "','" + TextBox3.Text + "','" + TextBox4.Text + "','" +

    TextBox5.Text + "','" + TextBox6.Text + "','" + TextBox7.Text + "','" + TextBox8.Text + "','" +

    TextBox9.Text + "','" + TextBox10.Text + "','" + RadioButtonList2.SelectedItem + "','" +

    DropDownList7.SelectedItem + "','" + DropDownList6.SelectedItem + "','" + TextBox13.Text +

    "')" ;

    cmd = new SqlCommand (str, con);

    con.Open();

    int i = cmd.ExecuteNonQuery();

    if (i > 0)

    Label3.Visible = true ;

    }

    catch (Exception )

    {

    Label4.Visible = true ;

    Label5.Visible = true ;

    Label6.Visible = true ;

  • 8/7/2019 Priya Dar Shin i

    66/70

    ONLINE LIBRARY MANAGEMENT SYSTEM

    PRIYADARSHINI INSTITUTE OF TECHNOLOGY & SCIENCE INFORMATION TECHNOLOGY

    Page | 66

    }

    }

    protected void Menu2_MenuItemClick( object sender, MenuEventArgs e)

    {

    }

    }

  • 8/7/2019 Priya Dar Shin i

    67/70

  • 8/7/2019 Priya Dar Shin i

    68/70

  • 8/7/2019 Priya Dar Shin i

    69/70

    ONLINE LIBRARY MANAGEMENT SYSTEM

    PRIYADARSHINI INSTITUTE OF TECHNOLOGY & SCIENCE INFORMATION TECHNOLOGY

    Page | 69

    10.CONCLUSION

    The results from the test runs of the system with various configurations are quite

    encouraging. It can be definitely said that the new model of ONLINE LIBRARY

    MANAGEMENT SYSTEM is far efficient. The developed system perfectly met all the

    objectives conceived at the design phase of the system.

    No system is absolutely perfect or complete in all respects. There is always some scope

    for further development, even in an otherwise complete and comprehensive system.

    The entire implemented system mainly demonstrates the concept or ONLINE LIBRARY

    MANAGEMENT SYSTEM. This project helps the users from avoiding the m annual stres in

    maintaining the book records. This project can be extended to maintain the CDs as well.

  • 8/7/2019 Priya Dar Shin i

    70/70

    ONLINE LIBRARY MANAGEMENT SYSTEM Page | 70

    11. BIBILOGRAPHY

    1. By browsing the internet.

    2. Database: SQL

    3. Platform: .NET latest versions

    4. www.dotnetdude.com

    5 .www.codeplex.com

    6.www.4shared.com

    7.Dumps of ASP.NET