Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Finalpr 120507110612-phpapp01
1. i
Project Report
On
SOCIAL NETWORK
Submitted as a partial fulfillment of the requirements for the award of the
degree of
Bachelors of Technology
In
Computer Science & Engineering
Submitted By:
SANA KHURSHEED
(Roll No- 24400110004)
Under The Guidance of
Mr. Avijit Chowdhuri
(Assistant Professor)
DEPARTMENT OF COMPUTER SCEINCE AND ENGINEERING
2. ii
TECHNO INDIA , BANIPUR.
(Approved by AICTE and affiliated to WBUT)
May, 2014
Certificate
This is to certify that this project entitled “Social network” submitted by
Sana Khursheed student of Computer Science and Engineering
Department, Techno India , Banipur in the partial fulfillment of the
requirement for the award of Bachelors of Technology (Computer
Science &Engineering) Degree of WBUT, is a record of students own
study carried under my supervision & guidance.
This report has not been submitted to any other university or institution
for the award of any degree.
Name of Project Guide
Designation
Mr. Avijit Chowdhuri
Project Co-ordinator
3. iii
Acknowledgement
Any task in the world cannot be accomplished on a sole basis. It directly or indirectly
needs the overt or covert support of their acquaintances, beloved ones or their faculty
heads. We have culminated our project with the aid of not only our friends but the
assistance provided by our faculties cannot be neglected.
Thus we would like to give a sincere thanks to my institute “Techno India , Banipur”
for providing me the platform in which we have put my raw knowledge of concepts to
an implementation level. The availabilities of laboratories with skilled technicians
made our job easier. The facility of internet provided us with the ease which helped us
to reach the implementation level fast.
We would like to honor our MentorMr. Avijit Chowdhuri, for the incredible support
he gave us. He fostered and encouraged us to pursue it to finish it to the rising stars.
His motivation acted as a strength for us.
Our acknowledgement cannot be complete without mentioning this name who have
not only supported us but also showered his experience drops on our project which
makes it embellishing and a full-fledged technology. Being a project guide, Mr.Avijit
Chowdhuri was not centralized by vesting all the power of project to himself. In spite
of this he delegated his knowledge to us which helped us to learn a lot.
A special thanks to all faculty members who were keen to respond our queries.
Support of our colleagues cannot be snubbed.
Last but not least we would like to thank our parents for supporting us to complete our
presentation report in all ways.
4. iv
Abstract
Social network sites (SNSs) are increasingly attracting the attention of academic and
industry researchers intrigued by their affordances and reach. This special theme
section of the Journal of Computer-Mediated Communication brings together
scholarship on these emergent phenomena. In this introductory article, we describe
features of SNSs and propose a comprehensive definition. We then present one
perspective on the history of such sites, discussing key changes and developments.
After briefly summarizing existing scholarship concerning SNSs, we discuss the
articles in this special section and conclude with considerations for future research.
5. v
INTRODUCTION
Since their introduction, social network sites (SNSs) such as MySpace, Facebook,
Cyworld, and Bebo have attracted millions of users, many of whom have integrated
these sites into their daily practices. As of this writing, there are hundreds of SNSs,
with various technological affordances, supporting a wide range of interests and
practices. While their key technological features are fairly consistent, the cultures that
emerge around SNSs are varied. Most sites support the maintenance of pre-existing
social networks, but others help strangers connect based on shared interests, political
views, or activities. Some sites cater to diverse audiences, while others attract people
based on common language or shared racial, sexual, religious, or nationality-based
identities. Sites also vary in the extent to which they incorporate new information and
communication tools, such as mobile connectivity, blogging, and photo/video-sharing.
Scholars from disparate fields have examined SNSs in order to understand the
practices, implications, culture, and meaning of the sites, as well as users' engagement
with them. This special theme section of the Journal of Computer-Mediated
Communication brings together a unique collection of articles that analyze a wide
spectrum of social network sites using various methodological techniques, theoretical
traditions, and analytic approaches. By collecting these articles in this issue, our goal
is to showcase some of the interdisciplinary scholarship around these sites.
The purpose of this introduction is to provide a conceptual, historical, and scholarly
context for the articles in this collection. We begin by defining what constitutes a
social network site and then present one perspective on the historical development of
SNSs, drawing from personal interviews and public accounts of sites and their
changes over time. Following this, we review recent scholarship on SNSs and attempt
to contextualize and highlight key works. We conclude with a description of the
articles included in this special section and suggestions for future research.
6. vi
PURPOSE
A social networking service is an online service, platform, or site that focuses on
facilitating the building of social networks or social relations among people who, for
example, share interests, activities, backgrounds, or real-life connections. A social
network service consists of a representation of each user (often a profile), his/her
social links, and a variety of additional services. Most social network services
are web-based and provide means for users to interact over the Internet, such as e-
mail and instant messaging. Online community services are sometimes considered as
a social network service, though in a broader sense, social network service usually
means an individual-centered service whereas online community services are group-
centered. Social networking sites allow users to share ideas, activities, events, and
interests within their individual networks.
Social networking sites are not only for you to communicate or interact with other
people globally but, this is also one effective way for business promotion. A lot of
business minded people these days are now doing business online and use these social
networking sites to respond to customer queries. It isn't just a social media site used to
socialize with your friends but also, represents a huge pool of information from day to
dayliving.
7. vii
SYSTEM DESCRIPTION
TECHNOLOGIES USED:
C# : Programming Interface
C#
C# is a small, simple, safe, object oriented, interpreted or dynamically optimized, byte
coded, architectural, garbage collected, multithreaded programming language with a
strongly typed exception-handling for writing distributed and dynamically extensible
programs.
C# is an object oriented programming language. C# is a high-level, third generation
language like C, FORTRAN, Small talk, Pearl and many others. You can use C# to
write computer applications that crunch numbers, process words, play games, store
data or do any of the thousands of other things computer software can do.
C# supports this application and the follow features make it one of the best
programming languages.
It is simple and object oriented.
It helps to create user friendly interfaces.
It is very dynamic.
TOOLS USED: 1. ASP.NET technology
2. Visual studio IDE.
Front end – C#
Back end- SQL server 2008.
8. viii
MODULE DESCRIPTION
The entire project is divided into certain modules –
1. Register / Login part.
2. Send message.
3. Send scraps.
4. Search people.
5. Delete friends.
6. View profile.
9. ix
SYSTEM SPECIFICATIONS
Hardware Requirements
• Intel Core2 duo processor.
• 1 GB Ram.
Software Requirements
• Microsoft Visual Studio 2010
• Microsoft SQL Server 2008 R2
• Microsoft Office 2007
•
Operating System
• Windows XP/Windows Vista/windows7
•
• These are the minimum requirements to run this software and now a days
we have much better configuration then the above.
•
10. x
ANALYSIS
FEASIBILITY STUDY
Feasibility study is made to see if the project on completion will serve the purpose of
the organization for the amount of work, effort and the time that spend on it.
Feasibility study lets the developer foresee the future of the project and the usefulness.
A feasibility study of a system proposal is according to its workability, which is the
impact on the organization, ability to meet their user needs and effective use of
resources. Thus when a new application is proposed it normally goes through a
feasibility study before it is approved for development.
The document provide the feasibility of the project that is being designed and lists
various areas that were considered very carefully during the feasibility study of this
project such as Technical, Economic and Operational feasibilities. The following are
its features:
TECHNICAL FEASIBILITY
The system must be evaluated from the technical point of view first. The assessment
of this feasibility must be based on an outline design of the system requirement in the
terms of input, output, programs and procedures. Having identified an outline system,
the investigation must go on to suggest the type of equipment, required method
developing the system, of running the system once it has been designed.
Technical issues raised during the investigation are:
Does the existing technology sufficient for the suggested one?
Can the system expand if developed?
The project should be developed such that the necessary functions and
performance are achieved within the constraints. The project is developed within
latest technology. Through the technology may become obsolete after some period of
time, due to the fact that never version of same software supports older versions, the
system may still be used. So there are minimal constraints involved with this project.
The system has been developed using Java the project is technically feasible for
development.
We as Analysts have identified the existing computer systems (hardware & software)
of the concerned department and have determined whether these technical resources
are sufficient for the proposed system or not. We have found out thus, that the project
is technically very much feasible. The hardware and software requirements are:
11. xi
ECONOMIC FEASIBILITY
The developing system must be justified by cost and benefit. Criteria to ensure that
effort is concentrated on project, which will give best, return at the earliest. One of the
factors, which affect the development of a new system, is the cost it would require.
The following are some of the important financial questions asked during preliminary
investigation:
The costs conduct a full system investigation.
The cost of the hardware and software.
The benefits in the form of reduced costs or fewer costly errors.
Since the system is developed as part of project work, there is no manual cost to
spend for the proposed system. Also all the resources are already available, it give an
indication of the system is economically possible for development.
BEHAVIORAL FEASIBILITY
This includes the following questions:
Is there sufficient support for the users?
Will the proposed system cause harm?
The project would be beneficial because it satisfies the objectives when developed
and installed. All behavioral aspects are considered carefully and conclude that the
project is behaviorally feasible.
6.3 USER CHARACTERISTICS:
1. Can login or register
2. Can search people.
3. Can send message.
4. Can delete friends.
5. Can send scraps.
12. xii
SOFTWARE INTEGRATION & VERIFICATION:
Each unit is developed independently and can be tested for its functionality. This is
the so called Unit Testing. It simply verifies if the modules or units to check if they
meet their specifications. This involves functional tests at the interfaces of the
modules, but also more detailed tests which consider the inner structure of the
software modules. During integration the units which are developed and tested for
their functionalities are brought together. The modules are integrated into a complete
system and tested to check if all modules cooperate as expected.
SYSTEM VERIFICATION:
After successfully integration including the related tests the complete system has to be
tested against its initial requirements. This will include the original hardware and
environment, whereas the previous integration and testing phase may still be
performed in a different environment or on a test bench
.
OPERATION & MAINTENANCE:
The system is handed over to the customer and will be used the first time by him.
Naturally the customer will check if his requirements were implemented as expected
but he will also validate if the correct requirements have been set up in the beginning.
In case there are changes necessary it has to be fixed to make the system usable or to
make it comply with the customer wishes. In most of the "Waterfall Model"
descriptions this phase is extended to a never ending phase of "Operations &
Maintenance". All the problems which did not arise during the previous phases will
be solved in this last phase
.
DESIGN STRATEGY:
A good system design strategy is to organize the program modules in such a way that
are easy to develop and later to, change. Structured design techniques help developers
to deal with the size and complexity of programs. Analysts create instructions for the
developers about how code should be written and how pieces of code should fit
together to form a program. It is important for two reasons:
First, even pre-existing code, if any, needs to be understood, organized and
pieced together.
13. xiii
Second, it is still common for the product team to have to write some code and
produce original programs that support the application logic of the system.
There are two main design strategies: Top-down and Bottom-up strategies.
BOTTOM-UP
In our project we follow bottom up design strategy because we are aware of the
modules of our project and we decide how to combine these modules to provide larger
ones; to combine those to even larger ones, and so on, till we arrive at one big module
which is the whole of the desired program.
In a bottom-up approach the individual base elements of the system are first specified
in great detail. These elements are then linked together to form larger subsystems,
which then in turn are linked, sometimes in many levels, until a complete top-level
system is formed. This strategy often resembles a "seed" model, whereby the
beginnings are small, but eventually grow in complexity and completeness.
DATA FLOW DIAGRAM
Data flow oriented techniques advocate that the major data items handled by a system
must be first identified and then the processing required on these data items to
produce the desired outputs should be determined. The DFD (also called as bubble
chart) is a simple graphical formalism that can be used to represent a system in terms
of input data to the system, various processing carried out on these data, and the
output generated by the system. It was introduced by De Macro (1978), Gane and
Sarson (1979).The primitive symbols used for constructing DFD’s are:
Symbols used in DFD
A circle represents a process.
A rectangle represents external entity
14. xiv
A square defines a source or destination of the system.
An arrow identifies dataflow.
Context Diagram
Level 1 DFD
Logout
Login Social like
sharingAdministrator/
User
User Search user
Send Scraps
Check profile
Sent messageDelete friends
15. xv
Use Case Diagram
Login details for
verification and
validation
Login /
Register
User
Login
Manage users
Manages
Search for user
View scraps
Delete user
Send message
16. xvi
Entity relation diagram
USER HOME
MESSAGE PEOPLE
LOGIN/
REGISTER
CAN
SEND SEARCH/
DELETE
USER_ID
USER_NAME
USER_PASS
DELETE_FRIENDS
FEEDBACK
CHECK_PROFILE
CHANGE_PASS
SCRAPS
PHOTOGALLERY
17. xvii
TABLE STRUCTURE
Table login
COLOUMN NAME DATA TYPE
First name Varchar
Middle name Varchar
Last name Varchar
Email (primary key) Varchar
Password Varchar
State Varchar
City Varchar
Pin Int
Table request
Coloumn name Data type
Rid Int
Requestfrom Varchar
Requestto Varchar
Status varchar
Table scrap
Coloumn name Data type
Sid Int
Sname Varchar
Sch Varchar
Sdetails varchar
18. xviii
Table feed
Coloumn name Data type
Fid Int
Name Varchar
Address Varchar
City Varchar
State Varchar
Country Varchar
Phone Int
Mobile Int
Fdate Date
Feedback varchar
Table news
Coloumn name Data type
Anid Int
Anew
Andate Date
Andetails varchar
Table admin login
Coloumn name Data type
Admin id Varchar
Password varchar
19. xix
Table add
Coloumn name Data type
Aaid Int
Aid Int
Aadv Varchar
Aadis Varchar
Aatype Varchar
Photo image
Table profile
Coloumn name Data type
Pid Int
Photo Image
First name Varchar
Middle name Varchar
Last name Varchar
Gender Varchar
Birthday Date
City Varchar
State Varchar
Pin Int
Phone Int
Mobile Int
41. xli
Change password (cs page)
using System;
using System.Data;
using System.Configuration;
using System.Collections;
using System.Web;
using System.Web.Security;
using System.Web.UI;
using System.Web.UI.WebControls;
using System.Web.UI.WebControls.WebParts;
using System.Web.UI.HtmlControls;
using System.Data.SqlClient;
publicpartialclassHome_changepass : System.Web.UI.Page
{
SqlConnection cn =
newSqlConnection(ConfigurationManager.ConnectionStrings[1].ConnectionString);
protectedvoid Page_Load(object sender, EventArgs e)
{
}
protectedvoid btnsubmit_Click(object sender, EventArgs e)
{
try
{
cn.Open();
string sql = "update tbllogin set password='" + txtnpass.Text + "' where
email='" + Session["uname"].ToString() + "' and password='" + txtpass.Text + "'
";
SqlCommand cmd = newSqlCommand(sql, cn);
cmd.ExecuteNonQuery();
cn.Close();
//txt.Text = " ";
//txtapass.Text = " ";
Response.Redirect("~/Home/Home.aspx");
}
catch (Exception ex)
{
Response.Write(ex.ToString());
}
}
}
42. xlii
TESTING
WHAT IS TESTING?
Software testing is a specialized discipline in the process of software development.
Testing is the process of demonstrating that errors are not present.
The purpose of testing is to show that a program performs its intended functions
correctly.
Testing is the process of establishing confidence that a program does what it is
supposed to do.
Levels of Testing
There are three levels of testing:
Unit Testing
Unit testing is the process of taking a module and running it in isolation from the rest
of the software product by using prepared test cases and comparing actual results with
the results predicted by the specifications and design of the Module. As we use
waterfall model for designing our software thus we perform unit testing side by side
after coding every individual module.
Integration Testing
We perform integration testing using bottom up integration and we get positive
Results in test.
System Testing
This type of testing is done when the system is ready to execute with full
functionality.
Acceptance Testing
43. xliii
This type of testing covers all the test cases applied by the customer and comprises of
two main parts
1. Alpha Testing
2.Beta Testing
Functional Testing
Functional testing also known as black box testing is performed on our project. Here
we test the functionality of our program. In functional testing we observe the output
for certain input values and it produces positive results.
49. xlix
CONCLUSION
The project Social Network is completed, satisfying the required design
specifications. The system provides a user-friendly interface. The
software is developed with modular approach. All modules in the system
have been tested with valid data and invalid data and everything work
successfully. Thus the system has fulfilled all the objectives identified
and is able to replace the existing system. The constraints are met and
overcome successfully. The system is designed as like it was decided in
the design phase. The system is very user friendly and will reduce time
consumption. This software has a user-friendly screen that enables the
user to use without any inconvenience.The application has been tested
with live data and has provided a successful result. Hence the software
has proved to work efficiently.