SlideShare a Scribd company logo
Page | 1
INTRODUCTION
1.1. PROJECT DESCRIPTION
This project is about developing a web based mail client connecting to windows server
running a Mail Server. Today’s world is all depend upon email system. It also becomes a
significant need of the businesses. That’s where, professionals must know mailing system and
aware with that, how it works, how can to create a self-hosted mailing system and other
technical aspects To give learners a wide knowledge about it, here, we make available Free
Php projects for students along with source code. Students can download this free source
from the website easily. Source code will help you to understand and modify the software in
an effortless manner. This project has the following main functionality.
Electronic mail, most commonly referred to as email or e-mail since c 1993, is a method of
exchanging digital messages from an author to one or more recipients. Modern email operates
across the Internet or other computer networks. Some early email systems required the author
and the recipient to both be online at the same time, in common with instant messaging.
Today's email systems are based on a store-and-forward model. Email servers accept,
forward, deliver, and store messages. Neither the users nor their computers are required to be
online simultaneously; they need connect only briefly, typically to a mail server, for as long
as it takes to send or receive messages. Historically, the term electronic mail was used
generically for any electronic document transmission. For example, several writers in the
early 1970s used the term to describe fax document transmission. As a result, it is difficult to
find the first citation for the use of the term with the more specific meaning it has today.
An Internet email message consists of three components, the message envelope, the message
header, and the message body. The message header contains control information, including,
minimally, an originator's email address and one or more recipient addresses. Usually
descriptive information is also added, such as a subject header field and a message
submission date/time stamp.
Originally a text-only (ASCII) communications medium, Internet email was extended to
carry, e.g. text in other character sets, multi-media content attachments, a process
standardized in RFC 2045 through 2049. Collectively, these RFCs have come to be called
Multipurpose Internet Mail Extensions (MIME). Subsequent RFCs have proposed standards
for internationalized email addresses using UTF-8.
Electronic mail predates the inception of the Internet and was in fact a crucial tool in creating
it,[5] but the history of modern, global Internet email services reaches back to the early
ARPANET. Standards for encoding email messages were proposed as early as 1973 (RFC
561). Conversion from ARPANET to the Internet in the early 1980s produced the core of the
current services. An email message sent in the early 1970s looks quite similar to a basic text
message sent on the Internet today.
Page | 2
Email is an information and communications technology. It uses technology to communicate
a digital message over the Internet. Users use email differently, based on how they think
about it. There are many software platforms available to send and receive. Popular email
platforms include Gmail, Hotmail, Yahoo! Mail, Outlook, and many others.
Network-based email was initially exchanged on the ARPANET in extensions to the File
Transfer Protocol (FTP), but is now carried by the Simple Mail Transfer Protocol (SMTP),
first published as Internet standard 10 (RFC 821) in 1982. In the process of transporting email
messages between systems, SMTP communicates delivery parameters using a message
envelope separate from the message (header and body) itself.
1. Receiving/Sending/Organizing mails.
2. Sending mail using send mail.
3. Performing Admin functions like managing new user, resetting passwords etc.
4. Compose an email.
5. Send an email
6. Receive an email
7. Saving an email in the form of draft
8. Showing the detail of the received mail
9. Saving the email ids in contact list
10. Secured by password
11. Recovery of the password
1.1.1 What is E-mail?
1. What is Email?
Electronic mail (email) is the term given to an electronic message, usually a form of simple
text message,that a user types at a computer system and is transmitted over some form of
computer network to another user, who can read it.
Email once consisted of a number of proprietary email systems. Originally these email
systems could only send and receive email in an office where every person was equipped
with the same software. With the expansion of the Internet, some manufacturers of these
proprietary email systems introduced the capability of connecting to the Internet for the
transfer of messages outside of the local network. This can take the form of a software
interface that converts the local messages into a recognized standard form suitable for
transfer over the Internet. These systems are more common in establishments that have used
email for longer than most, and are renowned for minor problems with access to global
Internet email, (e.g. problems with sending or receiving attachments) however such problems
are slowly disappearing. There is a page containing a brief history of email if you are
interested. Since the Internet has grown in popularity, proprietary systems have become less
popular, with more businesses moving over to Internet standards for local network mail
services. This has the advantages of usually being less expensive, simpler, no longer being
tied to a particular vendor and allows the IT Manager to have a wider choice of email client
applications, or different hardware platforms.
Page | 3
2. What are the benefits of Email?
Email has become one of the driving forces behind connecting businesses to the Internet. It
offers fast, economical transfer of messages anywhere in the world. As local telephone calls
are free in most parts of the US, messages destined to long-distance destinations become
effectively free to send. Outside of the US, local calls tend to be chargeable, therefore the
email system can reduce the telephone bill considerably. The substantial cost-cutting
associated with these facts have encouraged many businesses to invest in an implementation
of email services. Email has considerable benefits over traditional paper based memo's and
postal systems:
Messages can be sent at any time across the world as easily as across the office, to a group of
people or a single recipient, without the sender leaving their desk. Messages can be logged,
ensuring some form of record is held, and messages are stored when the recipient is away
from their desk. The recipient can collect their mail when they want, from wherever they are.
Mobile users can collect their mail whilst out visiting customers, or at other locations. The
person you are sending the message to gets it directly, without passing through any third
party. Environmentally friendly! Unless requested, email messages require no paper or
resources other than storage space on a computer disk drive.
3. What is an email client?
An email client is an application that is used to read, write and send email. In simple terms it
is the user interface to the email system. The client usually consists of a combination of a
simple text editor, address book, filing cabinet and communications module. The text editor
allows for the creation of the message itself, and usually includes simple spell checking and
formatting facilities. The ability to allow files or documents to be attached to the message is
also available. For example a diagram or schematic could be attached to an email message,
offering the recipient the chance to see a project's progress, and comment on it with a reply.
The address book allows the users to store commonly used email addresses in an easy to get
at format, reducing the chance of addressing errors.
The filing cabinet allows for the storage of email messages, both sent and received, and
usually gives some form of search function, allowing the easy retrieval of a desired message.
The final, but most important, section of the email client is the element that deals with the
actual communication of email messages to and from an email server. How this actually
occurs will be described later in this.
4. What is a mail server?
A mail server is an application that receives email from email clients or other mail servers. It
is the workhorse of the email system.
Page | 4
A mail server usually consists of a storage area, a set of user definable rules, a list of users
and a series of communication modules.
The storage area is where mail is stored for local users, and where messages that are in transit
to another destination are temporarily stored. It usually takes the form of a simple database of
information.
The user defined rules determine how the mail server should react when determining the
destination of a specific message, or possibly react to the sender of the message. For
example: specific email addresses can be barred, or certain users can be restricted to only
sending messages within the company. The list of users is a database of user accounts that the
mail server recognizes and will deal with locally.
The communications modules are the components that actually handle the transfer of
messages to and from other mail servers and email clients. Depending upon the requirements
of the mail server there may be a number of different modules installed for use. What these
modules do and how they communicate will be dealt with later in this.
A person, sometimes called a Postmaster, maintains the mail server and the list of user
accounts that it supports.
Most mail servers are designed to operate without any manual intervention during normal
operation. They wait for a message to be sent to them and process it accordingly, or collect
messages from other mail servers at predetermined intervals.
Email Basics - Overview of Email Services
The following examples will start with a fictional computer network, and will lead through
the basics of how email functions, and it's relevance to the Internet. An example email system
to illustrate the basics could be as follows:
a. Simple office email system
Fig-1.1
Email is required within a company, but not out to the rest of the world. A very simple email
system could be installed and maintained, giving interoffice communications:
Simple office email system
In the above example, the three workstations are connected to a computer network within a
company office. If one user wishes to send email to another user, then the message is simply
Page | 5
typed and sent to the mail server, addressed to the recipient using their email name, which
would simply be the first name of a user, such as "Tom".
For example: if Fred wants to send a message to Tom, he types his message on his email
client, addressing it to Tom. His email client then sends the message to the mail server, where
it is stored for Tom. When Tom next checks to see if there is any mail for him, his email
client will collect his messages and allow him to read them. Because this email system works
only within the office, each recipient can be referred to using only their email name.
This system could easily be expanded to allow for remote users if some form of dial in
support is added to the network using a modem (A modem is a device that sends computer
signals down a telephone line, effectively making a telephone system a part of a computer
network). This would increase the flexibility of the system enormously.
b. Remote user with access to office email
Fig-1.2
Remote user with access to office email When John wants to send email to Paul, he types his
message within his email client, then, when he wants it to, his email client dials into his
company computer network using a modem and telephone line, sends his message to Paul,
then collects any waiting messages for him. Once the messages have been collected, the
modem disconnects from the phone line, and John can read any messages that were collected.
Because John's computer connected using the telephone lines, he can collect his mail from
anywhere he can plug his modem into a telephone socket. If the company also had another
remote user who also connected through the telephone network, then messages could also be
transferred to them as easily as to one of the workstations in the office. The advantages and
flexibility of an email system starts to become clearer when compared against traditional
memo and telephone systems.The next step is to allow email messages to be able to be sent to
another office or company.
c. Simple email between two offices
Page | 6
Fig-1.3
Simple email between two offices This diagram shows a simple email system to give internal
email between two offices, which are connected via a telephone line.
Mail is sent internally within an office using the same methods as discussed earlier, but as
there are two separate sites, this adds an additional complication in addressing the recipient.
As can be seen in the above diagram, there are two Toms available to send email to. How can
you specify the correct Tom to send your message to? There are two ways:
Change Tom's email name to be something else. This usually is implemented by using the
users second name or initial, such as "S" of the second name "Smith", so the second Tom's
email name would be "Tom.S" (there is no actual standard way of implementing email
names, other than trying to keep them short and easy to remember).
Refer to users at a separate office or site with an additional piece of information which
defines their location, such as "local office." So to send mail to Tom at the Local Office, you
would address his messages to "Tom@local.office". Notice the "@" symbol which is read as
"at" and that there are no spaces allowed within an email name or address.
The second method is the preferred option as it allows for future expansion of the system,
especially if there is the potential for a number of local offices. These could be referred to as
"Local.Office.A" "Local.Office.B" or possibly by location, such as "New.York.Office" and
so forth. These addresses are known as "Domains" and simply give the location of the user
who the message is destined for within the company. (Note that these are not "Internet
Domains", but internal company ones).Note that the telephone line would only be used
intermittently, when mail was destined for the other office, and could also be used for remote
users as well. Using a combination of the discussed options so far, it can be seen that a
comprehensive company email system can be assembled without too many problems.The
Page | 7
options discussed so far only allow for internal email with a company or organization. The
next example is to allow for email access to the global Internet.
d. A single user dialling into an Internet Service Provider (ISP)
Fig-1.4
A single user dialling into an Internet Service Provider (ISP) When a single user dials into the
Internet via an Internet Service Provider (ISP) they are effectively dialling into the ISP's
network in the same way as in the earlier example Remote user with access to office email.
The only major difference is that the ISP's computer network is itself connected to the
Internet, and may have a large number of modems to support their users. The home users
email is stored at the ISP's mail server in exactly the same way as within the simple company
email system introduced above. The home user can connect to the ISP's network, send their
messages and collect their waiting email, then disconnect. The only complexity added is for
the actual addressing of the Home user, and the recipients of the messages that the home user
wants to send. Due to the Internet actually consisting of a large number of smaller networks,
much like the ones shown in Simple email between two offices, an email address needs to be
specific in defining the recipients Domain. Can you imagine how many "Toms" exist on the
Internet!
This brings us back to the subject of "Domains".
Each network connected to the Internet has a Domain name associated with it, to ensure
email --and other traffic-- gets directed to the right recipient. In the above diagram the ISP
would have their own domain name, which points any email destined for a user in their
domain to their mail server.
So, for example, if the ISP is called "Provider" and the domain that they own on the Internet
could be called "provider.com" (We'll go into more details on the domain name later in this
FAQ) then all email to the home user is directed to "home.user@provider.com" which will
Page | 8
result in the mail being stored on the ISP's mail server, ready to collect by the home user
email client.
A single office user could also use the same system to collect and send mail using an ISP, but
this would not have any direct relationship, or link, to the internal email systems that have
already been discussed.
e. Multiple user dialling in to an ISP
Fig-1.5
A number of users on a network dialling in to an ISP
In this example Fred and Paul have two email addresses: One for internal mail within a
company, and one for Internet email. This can sometimes occur if most of the email that a
user reads or sends is internal within a company network, yet the user wants access to global
Internet email. Each user would have an email account on both the company mail server and
the ISP's mail server.
An Internet email user can contact Fred and Paul using email directly. However if an Internet
user wanted to send a message to Tom, then they could not without having to send it to either
Fred or Paul and asking them to forward the message.
This arrangement allows for company email within the confines of the office network, but
gives Internet email facilities to users who need them, in this case Fred and Paul. If Tom
wanted to send email to an Internet address, rather than within the confines of the company,
then he would have to ask either Fred or Paul to send it on his behalf.
Note that there may not actually be individual modems for all users, but some form of
modem sharing may occur.
If there were more than two Internet email users, then connecting the office network mail
server --rather than individual machines--to the Internet would probably be more efficient and
flexible. Tom would then have been able to send his email message to another company
himself, rather than asking another user to do it for him.
Page | 9
f. A company network connected to an ISP
Fig-1.6
A company network connected to an ISP In this example the company network is connected
to the ISP's network by modem.
This adds the additional complication that the email addresses within the company network
must be of a form that other users on the Internet can use. As the company network is
connected to the Internet through an ISP, then the company could use the "Internet Domain"
of the ISP for addressing their own email -- which means that each user could be addressed in
the form "user@company.provider.com" (note that this is one possible method of addressing:
each service provider may have their own way of addressing individual companies) or they
could register their own Internet Domain. This would mean that a user is addressed as
"user@company.com" where "company.com" is the Internet domain registered.
When Fred, Paul or Tom want to send email to a recipient on the Internet, they send the
message in the same way as sending it internally within the office, but also must specify the
"Domain" of the person they are trying to contact within the email address.
For example, if Tom wants to send a message to "Fred" who is an email user within another
company in the US, then he would address the mail message to "Fred@thecompany.com"
where "thecompany.com" is the domain for the company where Fred is based. (Domains will
be discussed more fully later in this FAQ).
With this arrangement the company mail server sends and collects email on behalf of the
office network users. The users themselves never actually connect to the Internet. This allows
the local Company Network and telephone connection to be used efficiently with the most
flexibility.
Page | 10
Used in conjunction with dial-in remote users to the company network, as discussed earlier,
this system would allow for remote users to have access to global Internet email when
dialling in to the Company Network.
g. A Company Network connected to the Internet
Fig-1.7
A Company Network connected to the Internet
This gives all the flexibility of internal email within the company, but also allows Internet
access for remote users to the company mail server for collecting and sending messages. The
Internet connection would have to be full time in order to implement this arrangement.
Note that the actual physical "Internet Connection" could be one of a number of different
connection methods, depending upon the potential traffic requirements to and from the
Internet. Also some form of Firewall protection would be a sensible option. (A Firewall
allows specified traffic through it, preventing unauthorised access both into the company
network, and out onto the Internet).
Remote users could access the company network either via a direct dialled connection, or via
the Internet. Also local dial-in users could access the Internet through the Internet
Connection, effectively turning the Company into a private ISP!
h. More on Domain Names
Domains were introduced earlier, with the examples "Local.Office.A" ,"Local.Office.B" or
"New.York.Office." which would allow the easy addressing of users within a department.
Page | 11
Taking the "New York Office" as an example, it is fine for use internally within a company,
but does not give enough information to be used on the Internet.
As can be seen, these domain names are suitable for internal use within a company, but as
there are potentially a large number of company with a New York Office, this cannot be used
on its own. This description is simply not sufficient for Internet Email, which has to give an
unique address for every user.
The way to expand on this would be to add the company name to the domain: So the example
"New York Office" could become "ny.office.company.com" which would be fine for
addressing Internet email, as it would give a legal usable address, for example:
Tom, based at the Company New York Office, would be addressed to on the Internet as
"tom@ny.office.company.com." This gives full information on how to address a message to
Tom, with no chance of it going to the wrong person. If you are wondering what the "com"
part of the domain name is for, it simply specifies the type of domain, or the location of the
network that the domain is referring to. This section of the domain name is referred to as the
"top level" of the domain.
"Com" specifies "commercial organisation" and tends to refer to an American company,
although other non-US companies also have "com" top levels to their domain. Some
examples of these are: apple.com, microsoft.com or pepsi.com
A few other possible variations of "Top Level" domains are:
GOV Government
ORG Non-Profit Organisation
EDU Educational Establishment
Please note that recently a number of new top level domains have been made available, but
are not get in general use. A few of the new domains are: firm, store, web, arts, rec, info,
nom.
Other endings available give the country of the network, in two letter format. A few examples
are:
UK United Kingdom
JP Japan
GM Gambia
AQ Antarctica
Note that top level domains, normally outside the of the US, are sometimes combined and
that "co." (referring to "Company" ) is usually also added before the country, for example:
Page | 12
open.gov government office in the United Kingdom. nissan.co.jp The Nissan Car company
in Japan.
6. What is an Email address?
An example email address looks like this:
Example email address diagram
This address is made up of two parts:
Email account -This is a particular users email account name that, in this case, the
vicomsoft.com mail server can deal with.
Domain name - This is a name that a company has registered so that they can use it on the
Internet. Other examples are: apple.com, or microsoft.com.
If a person or company has not registered their own domain name then they may be using
their Internet Service Provider's (ISP) domain name, for example: netcom.com, or aol.com.
This is usually a less expensive option than registering your own domain name, but does
mean that you have to use your ISP's domain name all the time.
In the above example "vicomsoft.com" is the domain name that has been registered so that
Vicomsoft can use it on the Internet.
For further information on registering domain names please see the reference URLs at the
end of section 2.
7. How does email get from one email client to another email client?
Email client diagram
Fig-1.8
Fred wants to send an email message to joe@acompany.com. The email client on Fred's
machine sends the message to the email server as shown in fig 1.8
The mail server checks to see if it has an account with the user name "Joe." If this account
exists then the message is stored, ready for Joe to collect. If there is not an account for Joe,
the message is returned, with an explanation that Joe does not have an account, so the
message could not be delivered.
Page | 13
Joe checks his email at a later time. Joe's email client asks the email server if there is any
mail for Joe.
As there is mail waiting for Joe--from Fred-- the email client downloads the waiting
message from the mail server. Joe can then read the email message and reply to Fred, if he
wants, using his email client.
If Fred had sent mail to "tom@acompany.com", instead of "Joe@acompany.com" and
Tom did not have an email account created on the mail server, Fred would receive a message
back telling him that Tom did not have an email account, so his message could not be
delivered.
8. How does email get from one email client to another when they are at different locations?
Email clients at different locations
Fig-1.9
Fred wants to send an email message across the world to "paul@bcompany.com"
He creates his email message with his email client, which sends the message to the
acompany.com mail server.
The mail server compares the domain name of the destination email address (i.e.
bcompany.com) with the domain name it has been told to look after (i.e. acompany.com).
These domain names are different, therefore the acompany.com mail server will send the
message to the mail server that looks after email for the bcompany.com domain. (How it
finds the bcompany.com mail server will be dealt with in Part two of this FAQ)
Paul checks his email at a later time. His email client asks his email server if there is any
mail for Paul.
Page | 14
As there is mail waiting for Paul --from Fred-- the email client downloads the waiting
message from the mail server. Paul can then read the email message and reply to Fred, if he
wants, using his email client.
If Fred had sent mail to "tom@bcompany.com", instead of "Paul@bcompany.com" and
Tom did not have an email account created on bcompany.com's mail server, Fred would
receive a message back telling him that Tom did not have an email account on the
bcompany.com mail server, so his message could not be delivered.
9. But what happens when a destination mail server cannot be found by the sending mail
server?
If the destination mail server cannot be found or is extremely busy, a number of different
things can happen:
If the sending mail server cannot find any information at all regarding the destination, then
the message is returned to sender, stating the reason for failure. This usually means that the
message had an incorrectly spelt email address.
If the sending mail server can find information regarding the domain it is trying to contact,
but cannot actually contact the mail server that maintains the destination domain, it will hold
the message for a specified time, before trying again. If it has tried to send the same message
a number of times without success, then it will return the message to the sender, warning that
it had tried a number of times, but failed.
This can happen if the destination mail server is unavailable for some reason, (such as on a
part time connection) or has crashed.
To assist against this type of problem, it is possible for more than one mail server to look
after a domain. If the first mail server cannot be found, then a second machine can be
specified to accept mail on it's behalf. If this mail server cannot be found then a third mail
server can be specified, and so forth. If no mail server at all can be found to contact, then the
sending mail server will wait for a specified time before trying again.
Some larger organizations can have 10 or more mail servers looking after their domain, each
passing mail to the final destination mail server.
This method also makes allowances for when a mail server is extremely busy, as can be the
case with large ISP's mail servers which can process many thousands of messages an hour.
1.2. PURPOSE OF THE PROJECT
This project is developed to create a Mail Server. A Mail server is an application which used
to send and receive mails. This type of application needs to manage mails which send by
registered users. A message has to be composed in compose boxes. This message is stored in
inbox directory of receiver. This file should be combination of the sender’s user-id and sub.
The file transmitted is moved from sender compose to receiver inbox. The recipient can view
the message by selecting the appropriate file no. The main objective is that the working in the
Page | 15
organization will be well planned and organized. The data will be stored properly in data
stores, which will help in retrieval of information as well as its storage. The level of accuracy
in the proposed system will be higher. All operation would be done correctly and it ensures
that whatever information is coming from the center is accurate. This is also provision for the
replying and deleting the message. This utility also enables users, working under different
login names to communicate with each other. We can send files through attachments. In this
we attach the files to the mail by browsing option. From desktop or any drive we can select
files and we will attach them to the mail that we want to send presently and then we send
them to the receiver. Get started quickly with a familiar experience that improves
participation and helps teams get more done. Use the new visual tiles in Project Web App
(PWA), your web app to access Project Server, to quickly begin or flex project portfolio
management capabilities. Choose between devices and browsers – Internet Explorer, Firefox,
Safari, Chrome, and more – to view, edit, submit, and collaborate on project, portfolio, and
everyday work. In professional world all the communications are being done by emails. Now
a day’s mailing server is playing a very important role in our social and economical life. It is
one of the secure and fast communicating mediums for a modern era. The mail server is also
a good source to connect with your friends; it helps people to be active in social life. Social
network helps a person both continue their existing relationship and finding new friends by
reaching out the people you never met before. What is mailing server?
Mailing server is programmed by which you can send emails to your friends, who are
registered with that server. It allows a user to transfer text and data like picture, video, mp3,
etc. However, it has some limitations for the size of the attachment, but you can change it for
your server and as per business needs.
In mailing server, a user can register herself/himself. After registration, they can login with
their existing user id and password. The mailing server allows the user to customize their
profile, change themes as per own interest.
Mailing server is also a very secure system. It provides you security as you needed your
profile is protected with a password. You can change the password when you feel insecure
with the old password. There is also the password recovery system in case you forgot your
password you can recover your profile by verifying your alternate email or phone number.
1. Capability to create user Email Accounts by an Administrator or by End users after
registering themselves
2. Administrator functionality to Delete User Accounts, Change passwords
3. Capability for End users to login into the system using a browser
4. Capability for logged in users to send/receive/forward/reply/delete mails
5. Invalidate user login on inactive for more than 10mts
6. Address book capability
7. Mark mails as junk
8. Apply Label to mail
Page | 16
1.3 PROBLEM IN EXISTING SYSTEM
1. Cannot Upload and Download the latest updates.
2. No use of Web Services and Remitting.
3. Risk of mismanagement of data when the project is under development.
4. Less Security
5. Stress to handle many users at a time.
6. Communication between Patient and administration is a tough job.
7. Overwhelming volumes of mail.
1.4 SOLUTION OF THESE PROBLEMS
The development of the new system contains the following activities, which try to automate
the entire process keeping in view of the database integration approach.
1. User friendliness is provided in the application with various controls.
2. The system makes the overall project management much easier and flexible.
3. Readily upload the latest updates, allows user to download the alerts by clicking the
URL.
4. There is no risk of data mismanagement at any level while the project development is
under process.
5. It provides high level of security with different level of authentication.
6. Usage of light databases.
Page | 17
LITERATURE REVIEW
After analyzing the requirements of the task to be performed, the next step is to analyze the
problem and understand its context. The first activity in the phase is studying the existing
system and other is to understand the requirements and domain of new system. Both the
activities are equally important, but the first activity serves as a basis of giving the functional
specifications and then successful design of the proposed system. Understanding the
properties and requirements of a new system is more difficult and requires creative thinking
and understanding of existing running system is also difficult, improper understanding of
present system can lead diversion from solution. In professional world all the
communications are being done by emails.
Short for electronic mail, the transmission of messages over communications networks. The
messages can be notes entered from the keyboard or electronic files stored on disk. Most
mainframes, minicomputers, and computer networks have an e-mail system. Some electronic-
mail systems are confined to a single computer system or network, but others have gateways
to other computer systems, enabling users to send electronic mail anywhere in the world.
Companies that are fully computerized make extensive use of e-mail because it is fast,
flexible, and reliable.
Most e-mail systems include a rudimentary text editor for composing messages, but many
allow you to edit your messages using any editor you want. You then send the message to the
recipient by specifying the recipient's address. You can also send the same message to several
users at once. This is called broadcasting.
Sent messages are stored in electronic mailboxes until the recipient fetches them. To see if
you have any mail, you may have to check your electronic mailbox periodically, although
many systems alert you when mail is received. After reading your mail, you can store it in a
text file, forward it to other users, or delete it. Copies of memos can be printed out on a
printer if you want a paper copy.
All online services and Internet Service Providers (ISPs) offer e-mail, and most also support
gateways so that you can exchange mail with users of other systems. Usually, it takes only a
few seconds or minutes for mail to arrive at its destination. This is a particularly effective
way to communicate with a group because you can broadcast a message or documentto
everyone in the group at once.
Although different e-mail systems use different formats, there are some emerging standards
that are making it possible for users on all systems to exchange messages. In the PC world, an
important e-mail standard is MAPI. The CCITT standards organization has developed the
X.400 standard, which attempts to provide a universal way of addressing messages. To date,
though, the de facto addressing standard is the one used by the Internet system because
almost all e-mail systems have an Internet gateway. Another common spelling for e-mail is
email.
Page | 18
Now a day’s mailing server is playing a very important role in our social and economic life. It
is one of the secure and fast communicating mediums for a modern era. The mail server is
also a good source to connect with your friends; it helps people to be active in social life.
Social network helps a person both continue their existing relationship and finding new
friends by reaching out the people you never met before. What is mailing server?
1. Mailing server is programmed by which you can send emails to your friends, who are
registered with that server. It allows a user to transfer text and data like picture, video,
mp3, etc. However, it has some limitations for the size of the attachment, but you can
change it for your server and as per business needs.
2. In mailing server, a user can register herself/himself. After registration, they can login
with their existing user id and password. The mailing server allows the user to customize
their profile, change themes as per own interest.
3. Mailing server is also a very secure system. It provides you security as you needed your
profile is protected with a password. You can change the password when you feel
insecure with the old password. There is also the password recovery system in case you
forgot your password you can recover your profile by verifying your alternate email or
phone number.
2.1ANALYSIS MODEL
This document play a vital role in the development of life cycle (SDLC) as it describes the
complete requirement of the system. It means for use by developers and will be the basic
during testing phase. Any changes made to the requirements in the future will have to go
through formal change approval process. SPIRAL MODEL was defined by Barry Boehm in
his 1988 article. “A spiral model of software development and enhancement. This model was
not the first model to discuss iterative development, but it was the first model to explain
why the iteration models. As originally envisioned, the iterations were typically 6 months to 2
years long. Each phase starts with a design goal and ends with a client reviewing the progress
thus far. Analysis and engineering efforts are applied at each phase of the project, with an eye
toward the end goal of the project. The steps for Spiral Model can be generalized as follows:
1. The new system requirements are defined in as much details as possible. This usually
involves interviewing a number of users representing all the external or internal users and
other aspects of the existing system.
2. A preliminary design is created for the new system.
3. A first prototype of the new system is constructed from the preliminary design. This is
usually a scaled down system, and represents an approximation of the characteristics of
the final product.
4. A second prototype is evolved by a fourfold procedure:
I. Evaluating the first prototype in terms of its strengths, weakness and risks.
Page | 19
II. Defining the requirements of the second prototype.
III. Planning and designing the second prototype.
IV. Constructing and testing the second prototype
5. At the customer option, the entire project can be aborted if the risk is deemed too great.
Risk factors might involved development cost overruns, operating-cost miscalculation, or
any factor that could, in the customer’s judgment, result in a less than satisfactory final
product.
6. The existing prototype is evaluated in the same manner as was the previous prototype,
and if necessary, another prototype is developed from it according to the fourfold
procedure outlined above.
Table.2.1 Survey Paper
Installed in Software
Name
Installation
year
Functionality Disadvantage
1. IIT, Kanpur Webmail
Service
1997 Make student
aware about
networking
through email
Not
authenticated
2. TATA institute of
social science
Webmail 2000 Maintain all the
information of
patent and cases
Not secured
3. Institute of
information
science, Frame
Email system 2003 Maintain all the
information of
crimes and cases
Not secure
4. European
University
Institute
365 mail
client
2005 Manage details of
student
Error to
generate a
complete detail
in the college
5. University of
Mexico
Emailing
service
2012 Manage details of
student
Poor
authentication
6. University of
France
Network
Emailing
2013 Manage details
faculty and mailing
it to the head
No
authentication
Page | 20
2.2 A BRIEF HISTORY OF ELECTRONIC SURVEYS
Beginning in the late 1980s and early 1990s, prior to the widespread use of the Web, e-mail
was explored as a survey mode. As with the Web today, e-mail offered the possibility of
nearly instantaneous transmission of surveys at little or no cost. Unlike the Web, however,
early e-mail was essentially static, consisting of a basic ASCII (text-only) message that was
livered via the Internet.4 E-mail surveys tended to resemble the linear structure of a paper
survey and were generally limited in length. Furthermore, because e-mail surveys were
primarily text-based, document formatting was rudimentary at best. The only significant
advantage they offered over only) message that was delivered via the Internet.4 E-mail
surveys tended to resemble the linear structure of a paper survey and were generally limited
in length. Furthermore, because e-mail surveys were primarily text-based, document
formatting was rudimentary at best. The only significant advantage they offered over paper
surveys was a potential decrease in delivery and response time and cost, although some
observers also hypothesized that the novelty of the new medium might actually have
enhanced response rates (Parker, 1992; Zhang, 2000).paper surveys was a potential decrease
in delivery and response time and cost, although some observers also hypothesized that the
novelty of the new medium might actually have enhanced response rates (Parker,1992;
Zhang, 2000).) 1The literature contains far more information about response rates than about
any other topic related to surveying, such as timeliness or data quality. Appendix B contains a
more detailed discussion of response rates in the literature and Appendix C lists the survey
topic, sample size, type of sample, contact/response/follow-up mode, and response rate for
each study referenced in this report. We do not address other electronic survey modes that are
currently in use, such as computerized self-administered questionnaires (CSAQs), which are
surveys distributed via computer diskette. Two other electronic modes, CAPI and CATI, as
we noted earlier, are unrelated to the development of the Internet and therefore we do not
discuss them in this report. 3It is worth noting that the survey literature as late as the early- to
mid-1990s could not anticipate the eventual influence of the Web on the practice of
surveying. The Web started to become widely available in the early- to mid- 1990s and
quickly supplanted e-mail as the Internet survey medium of choice. Whereas early e-mail was
all ASCII-based, the Web offered the possibility of multimedia surveys containing audio and
video, as well as an enhanced user interface and more interactive features. For convenience
samples, the Web also offered a way around the necessity of having to know respondents’ e-
mail addresses.
2.3 RESPONSE RATES OF INTERNET SURVEYS
Response rates for Internet surveys in the literature are summarized graphically in Figure 3.1
by survey mode (more-exact numbers can be found in Appendix B). Overall, Figure 3.1
suggests that surveys using a mail response mode and surveys using both a mail and Web
response mode tend to have higher response rates than those using just an e-mail or Web
response mode. Response rates range from 7 to 44 percent for Web surveys and from 6 to 68
percent for e-mail surveys. Some studies in the literature gave respondents the choice of
responding by either mail or via the Web. Of the seven studies we examined, five reported
that respondents. Since the early days of e-mail, the ability to send attachments and
executable files with e-mail has greatly expanded. Today, e-mail can be used to send a survey
Page | 21
program to a user to run on his or her computer. The user can then return the completed
survey electronically or by mail. These CSAQ surveys can be delivered via a number of
different types of media, including e-mail attachments, downloading from the Web, or via
diskette or CD-ROM. More often chose to respond by mail than through the Web and two
studies found just the reverse. Above all else, the context of the individual study seems to
matter. For example, respondents for the study with the highest percentage of Web
respondents were recruited through advertising in Internet discussion groups (Schleyerand
Forrest, 2000). Several studies in the literature involve conducting experiments to determine
whether e-mail surveys have lower or higher response rates than postal mail surveys. In such
studies, identical questionnaires were sent to different portions (or study arms) of the same
population. The only difference between the study arms was in whether the respondent was
asked to respond via e-mail or by mail. In most studies, the mail response rate was higher by
as much as 21 percent. Only one study resulted in a lower mail response rate. However, that
study was in many respects unusual and fell at a time when the novelty of e-mail may have
influenced the results (Parker, 1992).
Page | 22
PROBLEM IDENTIFICATION
1. Sometimes an email message gets lost in transit, or it can take a lot longer than
expected for delivery, and your users can wonder what happened. The message trace
feature lets you follow messages as they pass through your Exchange Online service.
With message tracing, you can determine whether a targeted email message was
received, rejected, deferred, or delivered by the service. It also shows what events
have occurred to the message before reaching its final status. Getting detailed
information about a specific message lets you efficiently answer your user’s
questions, troubleshoot mail flow issues, validate policy changes, and alleviates the
need to contact technical support for assistance.
2. After you run a message trace, try to diagnose and resolve the problem yourself using
the information that the message trace tool provides. If you are unable to resolve the
problem, post a question to the Office 365 Community, or ask for customer support
by filling a service request. For information about how to open up a service request
for a message delivery issue, see Still can’t figure out what went wrong.
3. Your outgoing mail server is used to send emails from your computer. Depending on
where your email account is hosted, you may or may not be able to use your email
provider’s outgoing mail server. Email addresses based on public email services
such as Hotmail, Google, Yahoo, etc. will use their own outgoing mail servers. If
your email is hosted on your own website, you may want to use your hosting
provider’s mail server. For example, websites hosted on example.com may use
mail.example.com as both their incoming and outgoing mail servers.
4. Some ISP’s (Internet Service Providers) will not allow you to make use of your own
outgoing mail server. In this situation, you’ll need to use your ISP’s outgoing mail
server. Find the name of your ISP and use the chart below to find your outgoing mail
server.
5. If you are intent on using your own site’s mail server, you may want to contact your
ISP. You can also try outgoing mail (SMTP) port number to 26 (default is 25), as
some ISP’s will block port 25 because it is often used for spamming..
6. Misspelling the outgoing server name (for example, typing smtp.gail.com instead of
smtp.gmail.com).
Page | 23
7. Some server require outgoing authentication. There should be a box you can check to
enable this (it will have your email client use your email address and password to
authenticate any emails that you send)..
8. Some setups require an SSL connection. If this is the case, your outgoing port will
most likely change (from 25 or 26 to 465).
In most cases, you will not need SPA (Secure Password Authentication).
9. Be sure that your emails don’t look like typical spam emails: don’t insert only a large
image; check that the character-set is set correctly; don’t insert “IP-address only”
links. Write your communication as you would write a normal email. Make it really
easy to unsubscribe or opt-out. Otherwise, your users will unsubscribe by pressing the
“spam” button, and that will affect your reputation.
10. On the technical side: if you can choose your SMTP server, be sure it is a “clean”
SMTP server. IP addresses of spamming SMTP servers are often blacklisted by other
providers. If you don’t know your SMTP servers in advance, it’s a good practice to
provide configuration options in your application for controlling batch sizes and delay
between batches. Some mail servers don’t accept large sending batches or continuous
activity. A case is discussed as the first one makes reference to the use of data
collected in the On the technical side: if you can choose your SMTP server, be sure it
is a “clean” SMTP server. IP addresses of spamming SMTP servers are often
blacklisted by other providers. If you don’t know your SMTP servers in advance, it’s
a good practice to provide configuration options in your application for controlling
batch sizes and delay between batches. Some mail servers don’t accept large sending
batches or continuous activity. Second one concerns a typical ethnographic study in a
large hospital structure for the identification of most relevant areas of intervention.
Page | 24
METHODOLOGY
4.1 Introduction to PHP
PHP is an “HTML-embedded scripting language” primarily used for dynamic web
application. The first part of this definition means that PHP code can be interspersed with
HTML, making it simple to generate dynamic pieces of Web pages on the fly. As a scripting
language, PHP code requires the presence of the PHP processor. PHP code is normally run in
plain-text scripts that will only run on PHP-enabled computers (conversely programming
languages can create standalone binary executable files, a.k.a. programs).PHP takes most of
its syntax from C, Java, and Perl. It is an open source technology and runs on most operating
system and with most Web servers. PHP was written in the C programming language by
Rasmus Lerdorf in 1994 for use in monitoring his online resume and related personal
information. For this reason, PHP originally stood for “Personal Home Page”. Lerdori
combined PHP with his own Form Interpreter, releasing the combination publicly as PHP/FI
(generally referred to as PHP 2.0) on Z June 8, 1995. In 1998, PHP 3 was released, which
was the first widely used version. PHP 4 was released in May 2000, with a new core, known
as Zend Engine 1.0. PHP 4 featured improves speed and reliability over PHP3. In terms of
features, PHP 4 added references the Boolean Type. COM support on the Windows, output
buffering, many new array functions, expanded object-oriented programming, inclusion of
the PCRE library, and many more. Maintenance release ofPHP 4 are still available, primarily
for security updates. PHP 5 was released in July 2004, with the updated Zend Engine 2.0.
Among the many new features in PHP 5 are :-
1. Improved object-oriented programming
2. embedded SOLite
3. support for new MySQL features (see the image at right)
4. exception handling using a try-catch structure
5. integrated SOAP support (see the image at right)
6. the Filter library (I PHP 5.1)
7. better XML tools
8. Iterations
Originally started in 994 as a replacement for various Perl scripts used to maintain his
Personal Web Page (thus the acronym PHP) by the Danish/Greenland programmer Rasmus
Lerdorf, the project has since grown into an open source community effort. Initial uses of
PHP were limited to basic tasks such as counting how many visitors a web site had received,
the introduction of the PHP/FI (The FI stands for Form Interpreter) added additional
functionality including implementation for the C programming language.
In addition to the inclusion of C support, PHP/FI also introduced native support for the
database communications. These two features have become the bedrock for the future
versions of the PHP and together allowed the relatively swift and easy construction of
dynamic web sites.
Page | 25
In 1995 Lerdorf made the project public in an effort to improve the PHP code base I both
reliability and scope. Tis release would eventually be known as PHP 2. At the time was still
the preeminent language for the performing the tasks that PHP was seeking to perform and
PHP had yet to reach a point where it had the same scope, death, and consistency offered by
Perl.
PHP 3 began in 1997 when a pair of Israeli developers at Technician IIT decided to rewrite
the parser. The two would later form Zend Technologies, a company named after blending
their two names: Zeev (Suraski) and Andi (Gutmans). The company would eventually
produce the Zend Engine, the first public version of which powered PP 4 upon its release in
2000.
The successor to Zend Engine is the Zend Engine 2 which was the basis for PHP 5. PHP 5,
released in 2004, is perhaps the most radical and some consider long overdue revamp to PHP
as it finally brings true Object Oriented Programming (OOP) to developers who have long
since grown used to writing object oriented code.
PHP is a server-side scripting language designed for web development but also used as a
general-purpose programming language. As of January 2013, PHP was installed on more than
240 million websites (39% of those sampled) and 2.1 million web servers. Originally created
by Rasmus Lerdorf in 1994, the reference implementation of PHP (powered by the Zend
Engine) is now produced by The PHP Group. While PHP originally stood for Personal Home
Page, it now stands for PHP: Hypertext Preprocessor, which is a recursive backronym.
PHP code can be simply mixed with HTML code, or it can be used in combination with
various tinplating engines and web frameworks. PHP code is usually processed by a PHP
interpreter, which is usually implemented as a web server's native module or a Common
Gateway Interface (CGI) executable. After the PHP code is interpreted and executed, the web
server sends resulting output to its client, usually in form of a part of the generated web page;
for example, PHP code can generate a web page's HTML code, an image, or some other data.
PHP has also evolved to include a command-line interface (CLI) capability and can be used
in standalone graphical applications.
The canonical PHP interpreter, powered by the Zend Engine, is free software released under
the PHP License. PHP has been widely ported and can be deployed on most web servers on
almost every operating system and platform, free of charge.
Despite its popularity, no written specification or standard existed for the PHP language until
2014, leaving the canonical PHP interpreter as a de facto standard. Since 2014, there is
ongoing work on creating a formal PHP specification.
4.2 Normalization
A database is a structure that comes in two flavors: a flat database and a relational database.
A relational database is much more oriented to the human mind and is often preferred over
the gabble-de-gook flat databases that are just stored on hard drives like a text file. MySQL is
a relational database. MySQL is a powerful database. It's very good and free of charge.
Page | 26
Database normalization is the process of organizing the attributes and tables of a relational
database to minimize data redundancy. Normalization involves refactoring a table into less
redundant (and smaller) tables but without losing information; defining foreign keys in the
old table referencing the primary keys of the new ones. The objective is to isolate data so that
additions, deletions, and modifications of an attribute can be made in just one table and then
propagated through the rest of the database using the defined foreign keys.
Edgar F. Codd, the inventor of the relational model (RM), introduced the concept of
normalization and what we now know as the First normal form (1NF) in 1970. Codd went on
to define the Second normal form (2NF) and Third normal form (3NF) in 1971, and Codd
and Raymond F. Boyce defined the Boyce-Codd Normal Form (BCNF) in 1974. Informally,
a relational database table is often described as "normalized" if it is in the Third Normal
Form. Most 3NF tables are free of insertion, update, and deletion anomalies.
The relational model separates the logical design from the physical design: DBMS
performance is a matter of physical designer using indexes, view materialization, big buffers,
etc. It is not a matter of changing the logical design.
A typical example of normalization is that an entity's unique ID is stored everywhere in the
system but its name is held in only one table. The name can be updated more easily in one
row of one table. A typical update in such an example would be the RIM company changing
its name to BlackBerry. That update would be done in one place and immediately the correct
"BlackBerry" name would be displayed throughout the system
Advantages:
1. Scalability and Flexibility: The MySQL database server provides the ultimate in
scalability, sporting the capacity to handle deeply embedded applications with a footprint of
only 1MB to running massive data warehouses holding terabytes of information. Platform
flexibility is a stalwart feature of MySQL with all flavors of Linux, UNIX, and Windows
being supported. And, of course, the open source nature of MySQL allows complete
customization for those wanting to add unique requirements to the database server.
2. High Performance: A unique storage-engine architecture allows database professionals to
configure the MySQL database server specifically for particular applications, with the end
result being amazing performance results. Whether the intended application is a high-speed
transactional processing system or a high-volume web site that services a billion queries a
day, MySQL can meet the most demanding performance expectations of any system. With
high-speed load utilities, distinctive memory caches, full text indexes, and other performance-
enhancing mechanisms, MySQL offers all the right ammunition for today's critical business
systems.
3. High Availability: Rock-solid reliability and constant availability are hallmarks of
MySQL, with customers relying on MySQL to guarantee around-the-clock uptime. MySQL
offers a variety of high-availability options from high-speed master/slave replication
Page | 27
configurations, to specialized Cluster servers offering instant failover, to third party vendors
offering unique high-availability solutions for the MySQL database server.
4. Robust Transactional Support: MySQL offers one of the most powerful transactional
database engines on the market. Features include complete ACID (atomic, consistent,
isolated, durable) transaction support, unlimited row-level locking, distributed transaction
capability, and multi-version transaction support where readers never block writers and vice-
versa. Full data integrity is also assured through server-enforced referential integrity,
specialized transaction isolation levels, and instant deadlock detection.
5. Web and Data Warehouse Strengths: MySQL is the de-facto standard for high-traffic web
sites because of its high-performance query engine, tremendously fast data insert capability,
and strong support for specialized web functions like fast full text searches. These same
strengths also apply to data warehousing environments where MySQL scales up into the
terabyte range for either single servers or scale-out architectures. Other features like main
memory tables, B-tree and hash indexes, and compressed archive tables that reduce storage
requirements by up to eighty-percent make MySQL a strong standout for both web and
business intelligence applications.
6. Strong Data Protection: Because guarding the data assets of corporations is the number one
job of database professionals, MySQL offers exceptional security features that ensure
absolute data protection. In terms of database authentication, MySQL provides powerful
mechanisms for ensuring only authorized users have entry to the database server, with the
ability to block users down to the client machine level being possible. SSH and SSL support
are also provided to ensure safe and secure connections. A granular object privilege
framework is present so that users only see the data they should, and powerful data
encryption and decryption functions ensure that sensitive data is protected from unauthorized
viewing. Finally, backup and recovery utilities provided through MySQL and third party
software vendors allow for complete logical and physical backup as well as full and point-in-
time recovery.
7. Comprehensive Application Development: One of the reasons MySQL is the world's most
popular open source database is that it provides comprehensive support for every application
development need. Within the database, support can be found for stored procedures, triggers,
functions, views, cursors, ANSI-standard SQL, and more. For embedded applications, plug-in
libraries are available to embed MySQL database support into nearly any application.
MySQL also provides connectors and drivers (ODBC, JDBC, etc.) that allow all forms of
applications to make use of MySQL as a preferred data management server. It doesn't matter
if it's PHP, Perl, Java, Visual Basic, or .NET. MySQL offers application developers
everything they need to be successful in building database-driven information systems.
8. Open Source Technology: Many corporations are hesitant to fully commit to open source
software because they believe they can't get the type of support or professional service safety
nets they currently rely on with proprietary software to ensure the overall success of their key
applications. The questions of indemnification come up often as well. These worries can be
Page | 28
put to rest with MySQL as complete around-the-clock support as well as indemnification is
available through MySQL Network. MySQL is not a typical open source project as all the
software is owned and supported by MySQL AB, and because of this, a unique cost and
support model are available that provides a unique combination of open source freedom and
trusted software with support.
9. Management Ease: MySQL offers exceptional quick-start capability with the average time
from software download to installation completion being less than fifteen minutes. This rule
holds true whether the platform is Microsoft Windows, Linux, Macintosh, or UNIX. Once
installed, self-management features like automatic space expansion, auto-restart, and dynamic
configuration changes take much of the burden off already overworked database
administrators. MySQL also provides a complete suite of graphical management and
migration tools that allow a DBA to manage, troubleshoot, and control the operation of many
MySQL servers from a single workstation. Many third party software vendor tools are also
available for MySQL that handle tasks ranging from data design and ETL, to complete
database administration, job management, and performance monitoring.
ADVANTAGES OF RDBMS
1. Redundancy can be avoided
2. Inconsistency can be eliminated
3. Data can be Shared
4. Standards can be enforced
5. Security restrictions can be applied
6. Integrity can be maintained
7. Conflicting requirements can be balanced
8. Data independence can be achieved.
DISADVANTAGES OF DBMS:
A significant disadvantage of the DBMS system is cost. In addition to the cost
of purchasing of developing the software, the hardware has to be upgraded to allow for the
extensive programs and the workspace required for their execution and storage. While
centralization reduces duplication, the lack of duplication requires that the database be
adequately backed up so that in case of failure the data can be recovered.
4.3 E-R DIAGRAMS
In software engineering, an entity–relationship model (ER model) is a data model for
describing the data or information aspects of a business domain or its process requirements,
in an abstract way that lends itself to ultimately being implemented in a database such as a
Page | 29
relational database. The main components of ER models are entities (things) and the
relationships that can exist among them.
Entity–relationship modeling was developed by Peter Chen and published in a 1976 paper.
However, variants of the idea existed previously, and have been devised subsequently such
as super type and subtype data entities and commonality relationships.
Introduction: An entity–relationship model is a systematic way of describing and defining
a business process. The process is modeled as components (entities) that are linked with
each other by relationships that express the dependencies and requirements between them,
such as: one building may be divided into zero or more apartments, but one apartment can
only be located in one building. Entities may have various properties (attributes) that
characterize them. Diagrams created to represent these entities, attributes, and relationships
graphically are called entity–relationship diagrams.
An ER model is typically implemented as a database. In the case of a relational database,
which stores data in tables, every row of each table represents one instance of an entity.
Some data fields in these tables point to indexes in other tables; such pointers represent the
relationships.
An ERD is a model that identifies the concepts or entities that exist in a system and the
relationships between those entities. An ERD is often used as a way to visualize a
relational database: each entity represents a database table, and the relationship lines
represent the keys in one table that point to specific records in related tables. ERDs may
also be more abstract, not necessarily capturing every table needed within a database, but
serving to diagram the major concepts and relationships.
This ERD is of the latter type, intended to present an abstract, theoretical view of the major
entities and relationships needed for management of electronic resources. It may assist the
database design process for an e-resource management system, but does not identify every
table that would be necessary for an electronic resource management database.
The ERD presents a visual representation of e-resource management concepts and the
relationships between them. The Data Element Dictionary identifies and defines the
individual data elements that an e-resource management system must contain and manage,
but leaves the relationship between the elements to be inferred by the reader.ER Diagram is
shown in fig. 4.2
Entities
Entities are equivalent to database tables in a relational database, with each row of the
table representing an instance of that entity. An entity is something that exists in itself,
actually or potentially, concretely or abstractly, physically or not. It need not be of material
Page | 30
existence. In particular, abstractions and legal fictions are usually regarded as entities. In
general, there is also no presumption that an entity is animate.
The word may refer, for example, to Bucephalus, the horse of Alexander; to a stone; to a
cardinal number; to a language; or to ghosts or other spirits.
The word estimative is the adjective form of the noun entity. Something that is entitative is
considered in its own right.
In philosophy, ontology is about the recognition of entities. The words ontic and entity are
derived respectively from the ancient Greek and Latin present participles that mean 'being'.
Relationship
Relationships are represented by lines between entities. Relationship lines indicate that
each instance of an entity may have a relationship with instances of the connected entity,
and vice versa. In relational database theory, a relation, as originally defined by E. F.
Codd,[1] is a set of tuples (d1, d2, ..., dn), where each element dj is a member of Dj, a data
domain. Codd's original definition notwithstanding, and contrary to the usual definition in
mathematics, there is no ordering to the elements of the tuples of a relation.[2][3] Instead,
each element is termed an attribute value. An attribute is a name paired with a domain
(nowadays more commonly referred to as type or data type). An attribute value is an
attribute name paired with an element of that attribute's domain, and a tuple is a set of
attribute values in which no two distinct elements have the same name. Thus, in some
accounts, a tuple is described as a function, mapping names to values. A set of attributes in
which no two distinct elements have the same name is called a heading. A set of tuples
having the same heading is called a body. A relation is thus a heading paired with a body,
the heading of the relation being also the heading of each tuple in its body. The number of
attributes constituting a heading is called the degree, which term also applies to tuples and
relations. The term n-tuple refers to a tuple of degree n (n>=0). E. F. Codd used the term
relation in its mathematical sense of a finitary relation, a set of tuples on some set of n sets
S1, S2, .... ,Sn.[4] Thus, an n-ary relation is interpreted, under the Closed World
Assumption, as the extension of some n-adic predicate: all and only those n-tuples whose
values, substituted for corresponding free variables in the predicate, yield propositions that
hold true, appear in the relation. The term relation schema refers to a heading paired with a
set of constraints defined in terms of that heading. A relation can thus be seen as an
instantiation of a relation schema if it has the heading of that schema and it satisfies the
applicable constraints. Sometimes a relation schema is taken to include a name.[5][6] A
relational database definition (database schema, sometimes referred to as a relational
schema) can thus be thought of as a collection of named relation schemas.
In implementations, the domain of each attribute is effectively a data type[9] and a named
relation schema is effectively a relation variable or relvar for short (see Relation Variables
below). In SQL, a database language for relational databases, relations are represented by
tables, where each row of a table represents a single tuple, and where the values of each
attribute form a column.
Page | 31
Fig 4.1 E-R diagram
4.4 Data Flow Process
A data flow diagram is graphical tool used to describe and analyze movement of data
through a system. These are the central tool and the basis from which the other components
are developed. The transformation of data from input to output, through processed, may be
described logically and independently of physical components associated with the system.
These are known as the logical data flow diagrams. The physical data flow diagrams show
the actual implements and movement of data between people, departments and workstations.
A full description of a system actually consists of a set of data flow diagrams. Using two
familiar notations Yourdon, Gane and Sarson notation develops the data flow diagrams. Each
component in a DFD is labeled with a descriptive name. Process is further identified with a
Page | 32
number that will be used for identification purpose. The development of DFD’S is done in
several levels. Each process in lower level diagrams can be broken down into a more
detailed DFD in the next level. The lop-level diagram is often called context diagram. It
consists a single process bit, which plays vital role in studying the current system. The
process in the context level diagram is exploded into other process at the first level DFD.
The idea behind the explosion of a process into more process is that understanding at one
level of detail is exploded into greater detail at the next level. This is done until further
explosion is necessary and an adequate amount of detail is described for analyst to understand
the process.
Larry Constantine first developed the DFD as a way of expressing system requirements in a
graphical from, this lead to the modular design.
A DFD is also known as a “bubble Chart” has the purpose of clarifying system requirements
and identifying major transformations that will become programs in system design. So it is
the starting point of the design to the lowest level of detail. A DFD consists of a series of
bubbles joined by data flows in the system.
It is common practice to draw the context-level data flow diagram first, which shows the
interaction between the system and external agents which act as data sources and data sinks.
This helps to create an accurate drawing in the context diagram. The system's interactions
with the outside world are modelled purely in terms of data flows across the system
boundary. The context diagram shows the entire system as a single process, and gives no
clues as to its internal organization.
This context-level DFD is next "exploded", to produce a Level 1 DFD that shows some of the
detail of the system being modeled. The Level 1 DFD shows how the system is divided into
sub-systems (processes), each of which deals with one or more of the data flows to or from an
external agent, and which together provide all of the functionality of the system as a whole. It
also identifies internal data stores that must be present in order for the system to do its job,
and shows the flow of data between the various parts of the system.
Data flow diagrams are one of the three essential perspectives of the structured-systems
analysis and design method SSADM. The sponsor of a project and the end users will need to
be briefed and consulted throughout all stages of a system's evolution. With a data flow
diagram, users are able to visualize how the system will operate, what the system will
accomplish, and how the system will be implemented. The old system's dataflow diagrams
can be drawn up and compared with the new system's data flow diagrams to draw
comparisons to implement a more efficient system. Data flow diagrams can be used to
provide the end user with a physical idea of where the data they input ultimately has an effect
upon the structure of the whole system from order to dispatch to report. How any system is
developed can be determined through a data flow diagram model.
Page | 33
In the course of developing a set of levelled data flow diagrams the analyst/designers is
forced to address how the system may be decomposed into component sub-systems, and to
identify the transaction data in the data model.
Data flow diagrams can be used in both Analysis and Design phase of the SDLC.
There are different notations to draw data flow diagrams (Yourdon & Coad and Gane &
Sarson), defining different visual representations for processes, data stores, data flow, and
external entities.
4.4.1 DFD SYMBOLS:
In the DFD, there are four symbols
1. A square defines a source(originator) or destination of system data
2. An arrow identifies data flow. Data Flow Diagram is shown in fig. 5.3
3. It is the pipeline through which the information flows
4. A circle or a bubble represents a process that transforms incoming data flow into outgoing
data flows.
5. An open rectangle is a data store, data at rest or a temporary repository of data
Fig:-4.2: Symbols Used In DFD’S
4.3.2 CONSTRUCTING A DFD:
Several rules of thumb are used in drawing DFD’S:
Page | 34
1. Process should be named and numbered for an easy reference. Each name should be
representative of the process.
2. The direction of flow is from top to bottom and from left to right. Data traditionally
flow from source to the destination although they may flow back to the source. One way
to indicate this is to draw long flow line back to a source. An alternative way is to repeat
the source symbol as a destination. Since it is used more than once in the DFD it is
marked with a short diagonal.
3. When a process is exploded into lower level details, they are numbered.
4. The names of data stores and destinations are written in capital letters. Process and
dataflow names have the first letter of each work capitalized. A DFD typically shows the
minimum contents of data store. Each data store should contain all the data elements
that flow in and out. Questionnaires should contain all the data elements that flow in and
out. Missing interfaces redundancies and like is then accounted for often through
interviews.
4.5 HARDWARE SPECIFICATIONS
The selection of hardware is very important in the existence and proper working of any
software. In the selection of hardware, the size and the capacity requirements are also
important.
The job portal can be efficiently run on Pentium system with at least 128mb ram and hard
disk drive having 20 GB floppy disk drive of 1.44MB.
4.5.1 HARDWARE REQUIREMENT:-
1.RAM capacity ------- 128 MB
2.Hard disk -------- 20GB
3.Floppy disk ------1.44MB
4.CD-ROM Drive ----32HZ
5.KEYBOARD------ 108 Standard
4.6 SOFTWARE SPECIFICATIONS
Some of the most difficult tasks is that, the selection of the software, once system
requirement is known is determining whether a particular software package fits the
requirements. After initial selection further security is needed to determine the desirability of
Page | 35
particular software compared with other candidates. This section first summarizes the
application requirement question and then suggests more detailed comparisons.
4.6.1 SOFTWARE REQIREMENT:-
1. Operating System: - Windows 2000 & above
2. Application Server: - Apache Server
3. Database: - MySQL .
4. Browser Specification:- Internet Explorer, Chrome, Opera.
4.7 ANALYSIS MODEL:-
1. The model that is basically being followed is the INCREMENTAL MODEL, which
combines elements of the linear sequential model with the iterative philosophy of
prototyping.
2. First of all the feasibility study is done. Once that part is over the requirement analysis and
project planning begins.
3. If system exists one and modification and addition of new module is needed, analysis of
present system can be used as basic model.
4. The design starts after the requirement analysis is complete and the coding begins after the
design is complete.
5. Once the programming is completed, the testing is done. In this model the sequence of
activities performed in a software development project are: -
i) Requirement Analysis
ii) Project Planning
iii) System design
iv) Detail design
v) Coding
vi) Unit testing
vii) System integration & testing
6. End of the phase and the output of one phase is the input of other phase.
7. The output of each phase is to be consistent with the overall requirement of the system.
8. Some of the qualities of spiral model are also incorporated like after the people concerned
with the project review completion of each of the phase the work done.
SPIRAL MODEL was being chosen because all requirements were known beforehand and
the objective of our software development is the computerization/automation of an already
Page | 36
existing manual working system and further enhancement on the project need to be done after
basic model. Perform four basic activities in every cycle
1. This invariant identifies the four basic activities that should occur in each cycle of the
spiral model:
Consider the win conditions of all success-critical stakeholders. Identify and evaluate
alternative approaches for satisfying the win conditions. Identify and resolve risks that stem
from the selected approach(es).Obtain approval from all success-critical stakeholders, plus
commitment to pursue the next cycle.Project cycles that omit or shortchange any of these
activities risk wasting effort by pursuing options that are unacceptable to key stakeholders, or
are too risky. Some "hazardous spiral look-alike" processes violate this invariant by
excluding key stakeholders from certain sequential phases or cycles. For example, system
maintainers and administrators might not be invited to participate in definition and
development of the system. As a result, the system is at risk of failing to satisfy their win
conditions.
2. Risk determines level of effort
For any project activity (e.g., requirements analysis, design, prototyping, testing), the project
team must decide how much effort is enough. In authentic spiral process cycles, these
decisions are made by minimizing overall risk. For example, investing additional time testing
a software product often reduces the risk due to the marketplace rejecting a shoddy product.
However, additional testing time might increase the risk due to a competitor's early market
entry. From a spiral model perspective, testing should be performed until the total risk is
minimized, and no further. "Hazardous spiral look-alikes" that violate this invariant include
evolutionary processes that ignore risk due to scalability issues, and incremental processes
that invest heavily in a technical architecture that must be redesigned or replaced to
accommodate future increments of the product.
3. Risk determines degree of detail
For any project artifact (e.g., requirements specification, design document, test plan), the
project team must decide how much detail is enough. In authentic spiral process cycles, these
decisions are made by minimizing overall risk.
Considering requirements specification as an example, the project should precisely specify
those features where risk is reduced through precise specification (e.g., interfaces between
hardware and software, interfaces between prime and sub-contractors). Conversely, the
project should not precisely specify those features where precise specification increases risk
(e.g., graphical screen layouts, behavior of off-the-shelf components).
4. Use anchor point milestones
Boehm's original description of the spiral model did not include any process milestones. In
later refinements, he introduces three anchor point milestones that serve as progress
indicators and points of commitment. These anchor point milestones can be characterized by
Page | 37
key questions. Life Cycle Objectives. Is there a sufficient definition of a technical and
management approach to satisfying everyone's win conditions? If the stakeholders agree that
the answer is "Yes", then the project has cleared this LCO milestone. Otherwise, the project
can be abandoned, or the stakeholders can commit to another cycle to try to get to "Yes." Life
Cycle Architecture. Is there a sufficient definition of the preferred approach to satisfying
everyone's win conditions, and are all significant risks eliminated or mitigated? If the
stakeholders agree that the answer is "Yes", then the project has cleared this LCA milestone.
Otherwise, the project can be abandoned, or the stakeholders can commit to another cycle to
try to get to "Yes." Initial Operational Capability. Is there sufficient preparation of the
software, site, users, operators, and maintainers to satisfy everyone's win conditions by
launching the system? If the stakeholders agree that the answer is "Yes", then the project has
cleared the IOC milestone and is launched. Otherwise, the project can be abandoned, or the
stakeholders can commit to another cycle to try to get to "Yes.""Hazardous spiral look-
alikes" that violate this invariant include evolutionary and incremental processes that commit
significant resources to implementing a solution with a poorly defined
architecture.[clarification needed]
The three anchor point milestones fit easily into the Rational Unified Process (RUP), with
LCO marking the boundary between RUP's Inception and Elaboration phases, LCA marking
the boundary between Elaboration and Construction phases, and IOC marking the boundary
between Construction and Transition phases.
5. Focus on the system and its life cycle
This invariant highlights the importance of the overall system and the long-term concerns
spanning its entire life cycle. It excludes "hazardous spiral look-alikes" that focus too much
on initial development of software code. These processes can result from following published
approaches to object-oriented or structured software analysis and design, while neglecting
other aspects of the project's process needs.
Page | 38
Fig 4.3: Spiral Model
Phases Involved in SPIRAL MODEL
1. Communicated Requirements (Analysis Phase)
It consists of planning and requirement definition activities. The end products of planning
are:
a) System Definition:-It is expressed in English. Ti incorporates charts, figures, graphs,
tables, etc. The notations used here are highly dependent on problem area.
b) Project Plan:-It contains the life-cycle model to be used at the beginning of development
schedule, beginning cost estimates and resource estimates, tools and techniques to be used
and standard practice to be followed.
There are two types of designing techniques followed in designing phase:-
i) Architectural Designing
Identifies various software components like functions data streams, data source.
Decouples and decomposes software components into modules and conceptual data
Specifies the inter connections between various software components.
ii) Detailed Debugging
Page | 39
It is concerned with detail designing and implementation procedures to process the algorithm,
structure and interconnection between the modules and data structures. The various activities
that this phase includes are:
a) Adaption of the existing codes.
b) Modification of existing codes.
c) Design of data representation.
d) Packaging of software products.
2. Implementation Phase
It involves the translation of the designing specifications into source code. It involves activity
such as debugging, documentation and unit testing of source code.
In this stage, various programming can be followed like built in and user defined data types,
source type checking, flexible rules, concurrency construction.
3. Maintenance Phase
In this phase the activities include:
a) Corrective maintenance:-Correcting errors that were not discovered during the
product development phase.
b) Perfective Maintenance:-Improving the implementation of the system and enhancing
the functionality of the system according to customer’s requirements.
Page | 40
PROJECT ANALYSIS
5.1 FRONT END
5.1.1 PHP
PHP is a server-side scripting language designed for web development but also used as a
general-purpose programming language. PHP stands for “hypertext pre-processor”
scripting language linked with apache server can be installed as an apache module.PHP
was created by “RASMUS LERDORF” in 1995.PHP originally stood for “personal
home page”. PHP is scripting language that was originally designed for web
development to produce dynamic web pages. PHP acts as an intermediate between the
server and the database. There is a request respond cycle between and the server. PHP is
a server side scripting language that is embedded in HTML. It is used to manage
dynamic content, databases, session tracking, even build entire e-commerce sites. It is
integrated with a number of popular databases, including MySQL, Oracle, Sybase,
Informix, and Microsoft SQL Server.
1. PHP stands for “hypertext preprocessor” scripting language linked with apache server
can be installed as an apache module.
2. PHP was created by “RASMUS LERDORF” in 1995.PHP originally stood for
“personal home page”.
3. PHP is scripting language that was originally designed for web development to
produce dynamic web pages.
PHP acts as an intermediate between the server and the database. There is a request
respond cycle between and the server.
5.5.2 HTML
HTML stands for “Hypertext Markup Language”. HTML is a set of markup language
tags. The tags describe document content. The html documents contain html tags and
plain text. Html is coded in the form of tags which are enclosed in angular bracket <>.
“Body” is the tag element. By using This tag we can start the body of the html page. In
html there are opening and closing tags. the closing tag is always slightly different from
the opening tag in that it has a forward slash after the first angled bracket :</html >.
A Web browser can read HTML files and compose them into visible or audible Web
pages. The browser does not display the HTML tags and scripts, but uses them to
interpret the content of the page. HTML describes the structure of
a Website semantically along with cues for presentation, making it a markup language,
rather than a programming language. Hypertext Markup Language, commonly referred to
as HTML, is the standard markup language used to create web pages.[1] It is written in
the form of HTML elements consisting of tags enclosed in angle brackets (like <html>).
HTML tags most commonly come in pairs like <h1> and </h1>, although some represent
Page | 41
empty elements and so are unpaired, for example <img>. The first tag in such a pair is the
start tag, and the second is the end tag (they are also called opening tags and closing tags.
Web browsers can read HTML files and render them into visible or audible web pages.
Browsers do not display the HTML tags and scripts, but use them to interpret the content
of the page. HTML describes the structure of a website semantically along with cues for
presentation, making it a markup language, rather than a programming language.
HTML elements form the building blocks of all websites. HTML allows images and
objects to be embedded and can be used to create interactive forms. It provides a means to
create structured documents by denoting structural semantics for text such as headings,
paragraphs, lists, links, quotes and other items. It can embed scripts written in languages
such as JavaScript which affect the behavior of HTML web pages.
Web browsers can also refer to Cascading Style Sheets (CSS) to define the look and
layout of text and other material. The World Wide Web Consortium (W3C), maintainer
of both the HTML and the CSS standards, has encouraged the use of CSS over explicit
presentational HTML since 1999
i. <html>Tag
<html>tagtellsthebrowserthatitisanHTMLelement.ItrepresentstherootofHTMLdocument.
ii. HeadingTags
Any document starts with a heading. You can use different sizes for your headings.
HTML also has six levels of headings, which use the elements <h1>, <h2>, <h3>, <h4>,
<h5>, and <h6>. While displaying any heading, browser adds one line before and one line
after that heading.
iii. ParagraphTag
The <p> tag offers a way to structure your text into different paragraphs. Each
paragraph of text should go in between an opening and a closing.
iv. LineBreakTag
Whenever you use the <br /> element, anything following it starts from the next line.
This tag is an example of an empty element, where you do not need opening and closing
tags, as there is nothing to go in between them.
Page | 42
The < br /> tag has a space between the characters br and the forward slash. If you omit this
space, older browsers will have trouble rendering the line break, while you miss the forward
slash it is not valid in XHTML.
5.1.3 CSS
A CSS stands for “Cascading Style Sheet”. A CSS file allows you to separate your web
sites(x) html from its style. As always you use your (x) html file to arrange the content, but
all of the presentation (font, color, background...) are accomplished within a CSS.CSS works
by allowing you to associate rules with the elements that appear in a web page. These rules
govern how the content of those elements should be rendered.CSS rule, which is made up of
two parts: the selector, which indicates which element or elements that appear in a web
page. This applies to more than one element, you can have a comma- separated list of
several elements).The decoration, which sets out how the elements referred to in the
selector, should be styled. The padding property allows you to specify how much space
should appear between the content of an element and its border.
The value of this property is most often specified in pixels, although it can use any of the
units of length we met earlier, a percentage, or the word inherit. The padding of an element
will not inherit by default, so if the <body> element inside it. If the value inherit is applied to
any elements, only then will they have the same padding and their parent element.
If a percentage is used, the percentage is of the containing box, and if the value of 10 percent
is specified, there would be 5 percent of each side of the box as padding. You can specify
different amounts of padding inside each side of a box using the following properties:
1.padding – bottom
2.padding – top
3.padding- left
4.padding-right
5.1.4 JAVASCRIPT
JavaScript is the world most popular programming language. JavaScript is a scripting
language. JavaScript is a programming code that can be inserted in to html pages. JavaScript
inserted to html page, can be executed by all modern web browsers. Along with refusing
other people scripts and folders, you can also write code that you can reuse yourself.
For example, you might build several sites that use a similar from that allows people to
contact the site owners. On each contact from there might be several fields that are required,
and you might decide to write a script to ensure that people fill in the required fields. Rather
than writing a new script that you can use on my contact from you write.
1. Beginnings at Netscape
JavaScript was originally developed by Brendan Eich, while he was working for Netscape
Communications Corporation. Indeed, while competing with Microsoft for user adoption of
Page | 43
web technologies and platforms, Netscape considered their client-server offering a distributed
OS with a portable version of Sun Microsystems' Java providing an environment in which
applets could be run.[citation needed] Because Java was a competitor of C++ and aimed at
professional programmers, Netscape also wanted a lightweight interpreted language that
would complement Java by appealing to nonprofessional programmers, like Microsoft's
Visual Basic (see JavaScript and Java).Although it was developed under the name Mocha, the
language was officially called Live Script when it first shipped in beta releases of Netscape
Navigator 2.0 in September 1995, but it was renamed JavaScript when it was deployed in the
Netscape browser version 2.0B3.
The change of name from Live Script to JavaScript roughly coincided with Netscape adding
support for Java technology in its Netscape Navigator web browser. The final choice of name
caused confusion, giving the impression that the language was a spin-off of the Java
programming language, and the choice has been characterized as a marketing ploy by
Netscape to give JavaScript the cachet of what was then the hot new web programming
language
There is a common misconception that the JavaScript language was influenced by an earlier
web page scripting language developed by Nombas named C--, not to be confused with the
later C-- created in 1997. Brendan Eich, however, had never heard of C-- before he created
LiveScript.[17] Nombas did pitch their embedded web page scripting to Netscape, though
web page scripting was not a new concept, as shown by ViolaWWW. Nombas later switched
to offering JavaScript instead of C-- in their ScriptEase product and was part of the TC39
group that standardized ECMAScript.
2. Server-side JavaScript
Netscape introduced an implementation of the language for server-side scripting with
Netscape Enterprise Server in December, 1994, soon after releasing JavaScript for
browsers.[21][22] Since the mid-2000s, there has been a resurgence of server-side JavaScript
implementations, such as Node.js.
3. Adoption by Microsoft
Microsoft Windows script technologies including VBScript and JScript were released in
1996. JScript, a port of Netscape's JavaScript, was released on July 16, 1996 and was part of
Internet Explorer 3, as well as being available server-side in Internet Information Server. IE3
also included Microsoft's first support for Cascading Style Sheets and various extensions to
HTML, but in each case the implementation was noticeably different to that found in
Netscape Navigator at the time. These differences made it difficult for designers and
programmers to make a single website work well in both browsers leading to the use of 'best
viewed in Netscape' and 'best viewed in Internet Explorer' logos that characterised these early
years of the browser wars. JavaScript began to acquire a reputation for being one of the
Final year project report on Internet And Interanet Emailing server
Final year project report on Internet And Interanet Emailing server
Final year project report on Internet And Interanet Emailing server
Final year project report on Internet And Interanet Emailing server
Final year project report on Internet And Interanet Emailing server
Final year project report on Internet And Interanet Emailing server
Final year project report on Internet And Interanet Emailing server
Final year project report on Internet And Interanet Emailing server
Final year project report on Internet And Interanet Emailing server
Final year project report on Internet And Interanet Emailing server
Final year project report on Internet And Interanet Emailing server
Final year project report on Internet And Interanet Emailing server
Final year project report on Internet And Interanet Emailing server
Final year project report on Internet And Interanet Emailing server
Final year project report on Internet And Interanet Emailing server
Final year project report on Internet And Interanet Emailing server

More Related Content

What's hot

Mail server report
Mail server reportMail server report
Mail server report
Navjot Navi
 
Simple Mail Transfer Protocol
Simple Mail Transfer ProtocolSimple Mail Transfer Protocol
Simple Mail Transfer ProtocolVinod Gurram
 
Internet mail server
Internet mail server Internet mail server
Internet mail server
Akasha Kumar Das
 
Chat server nitish nagar
Chat server nitish nagarChat server nitish nagar
Chat server nitish nagar
Nitish Nagar
 
SMTP Simple Mail Transfer Protocol
SMTP Simple Mail Transfer ProtocolSMTP Simple Mail Transfer Protocol
SMTP Simple Mail Transfer Protocol
SIDDARAMAIAHMC
 
Mail server_Synopsis
Mail server_SynopsisMail server_Synopsis
Mail server_Synopsis
Manmeet Sinha
 
Electronic mail protocols and operations
 Electronic mail protocols and operations Electronic mail protocols and operations
Electronic mail protocols and operations
VivekRajawat9
 
Web (HTTP) request to response life cycle
Web (HTTP) request to response life cycleWeb (HTTP) request to response life cycle
Web (HTTP) request to response life cycle
Gopakumar Kunduveetil
 
Simple Mail Transfer Protocol
Simple Mail Transfer ProtocolSimple Mail Transfer Protocol
Simple Mail Transfer Protocol
Maitree Patel
 
Hypertext transfer protocol and hypertext transfer protocol secure(HTTP and H...
Hypertext transfer protocol and hypertext transfer protocol secure(HTTP and H...Hypertext transfer protocol and hypertext transfer protocol secure(HTTP and H...
Hypertext transfer protocol and hypertext transfer protocol secure(HTTP and H...rahul kundu
 
Email server system1.ppt
Email server system1.pptEmail server system1.ppt
Email server system1.ppt
Pooja Ladda
 
SMTP - SIMPLE MAIL TRANSFER PROTOCOL
SMTP - SIMPLE MAIL TRANSFER PROTOCOLSMTP - SIMPLE MAIL TRANSFER PROTOCOL
SMTP - SIMPLE MAIL TRANSFER PROTOCOL
Vidhu Arora
 
HyperText Transfer Protocol (HTTP)
HyperText Transfer Protocol (HTTP)HyperText Transfer Protocol (HTTP)
HyperText Transfer Protocol (HTTP)
Gurjot Singh
 
Email Ppt
Email PptEmail Ppt
Email PptDyern
 
Online Quiz System Project Report
Online Quiz System Project Report Online Quiz System Project Report
Online Quiz System Project Report
Kishan Maurya
 
Electronic mail
Electronic mailElectronic mail
Electronic mail
Ahmad Zahid
 

What's hot (20)

Mail server report
Mail server reportMail server report
Mail server report
 
Simple Mail Transfer Protocol
Simple Mail Transfer ProtocolSimple Mail Transfer Protocol
Simple Mail Transfer Protocol
 
Smtp, pop3, imapv 4
Smtp, pop3, imapv 4Smtp, pop3, imapv 4
Smtp, pop3, imapv 4
 
Internet mail server
Internet mail server Internet mail server
Internet mail server
 
How e mail works
How e mail worksHow e mail works
How e mail works
 
Chat server nitish nagar
Chat server nitish nagarChat server nitish nagar
Chat server nitish nagar
 
SMTP Simple Mail Transfer Protocol
SMTP Simple Mail Transfer ProtocolSMTP Simple Mail Transfer Protocol
SMTP Simple Mail Transfer Protocol
 
Basic Email
Basic EmailBasic Email
Basic Email
 
Mail server_Synopsis
Mail server_SynopsisMail server_Synopsis
Mail server_Synopsis
 
Electronic mail protocols and operations
 Electronic mail protocols and operations Electronic mail protocols and operations
Electronic mail protocols and operations
 
Web (HTTP) request to response life cycle
Web (HTTP) request to response life cycleWeb (HTTP) request to response life cycle
Web (HTTP) request to response life cycle
 
Simple Mail Transfer Protocol
Simple Mail Transfer ProtocolSimple Mail Transfer Protocol
Simple Mail Transfer Protocol
 
Hypertext transfer protocol and hypertext transfer protocol secure(HTTP and H...
Hypertext transfer protocol and hypertext transfer protocol secure(HTTP and H...Hypertext transfer protocol and hypertext transfer protocol secure(HTTP and H...
Hypertext transfer protocol and hypertext transfer protocol secure(HTTP and H...
 
Email server system1.ppt
Email server system1.pptEmail server system1.ppt
Email server system1.ppt
 
SMTP - SIMPLE MAIL TRANSFER PROTOCOL
SMTP - SIMPLE MAIL TRANSFER PROTOCOLSMTP - SIMPLE MAIL TRANSFER PROTOCOL
SMTP - SIMPLE MAIL TRANSFER PROTOCOL
 
E Mail
E MailE Mail
E Mail
 
HyperText Transfer Protocol (HTTP)
HyperText Transfer Protocol (HTTP)HyperText Transfer Protocol (HTTP)
HyperText Transfer Protocol (HTTP)
 
Email Ppt
Email PptEmail Ppt
Email Ppt
 
Online Quiz System Project Report
Online Quiz System Project Report Online Quiz System Project Report
Online Quiz System Project Report
 
Electronic mail
Electronic mailElectronic mail
Electronic mail
 

Viewers also liked

Cloud Computing Security (Final Year Project) by Pavlos Stefanis
Cloud Computing Security (Final Year Project) by Pavlos StefanisCloud Computing Security (Final Year Project) by Pavlos Stefanis
Cloud Computing Security (Final Year Project) by Pavlos StefanisPavlos Stefanis
 
Pedestrian Safety and Urban Infrastructure
Pedestrian Safety and Urban InfrastructurePedestrian Safety and Urban Infrastructure
Pedestrian Safety and Urban Infrastructure
WRI Ross Center for Sustainable Cities
 
Object Oriented Programming Lab Manual
Object Oriented Programming Lab Manual Object Oriented Programming Lab Manual
Object Oriented Programming Lab Manual
Abdul Hannan
 
Ppt 1
Ppt 1Ppt 1
automatic-street-light-controller
automatic-street-light-controllerautomatic-street-light-controller
automatic-street-light-controllerAmit Singh
 
Ppt on automatic street light control using ir sensors
Ppt on automatic street light control using ir sensorsPpt on automatic street light control using ir sensors
Ppt on automatic street light control using ir sensors
Vikram Emmidi
 
automatic street light
automatic street lightautomatic street light
automatic street lightAnish Anand
 
Cloud computing security from single to multiple
Cloud computing security from single to multipleCloud computing security from single to multiple
Cloud computing security from single to multiple
Kiran Kumar
 
Data security in cloud computing
Data security in cloud computingData security in cloud computing
Data security in cloud computingPrince Chandu
 
Online movie ticket booking
Online movie ticket bookingOnline movie ticket booking
Online movie ticket bookingmrinnovater007
 

Viewers also liked (13)

Zigbee based proposal
Zigbee based proposalZigbee based proposal
Zigbee based proposal
 
Final review presentation
Final review presentationFinal review presentation
Final review presentation
 
Cloud Computing Security (Final Year Project) by Pavlos Stefanis
Cloud Computing Security (Final Year Project) by Pavlos StefanisCloud Computing Security (Final Year Project) by Pavlos Stefanis
Cloud Computing Security (Final Year Project) by Pavlos Stefanis
 
Pedestrian Safety and Urban Infrastructure
Pedestrian Safety and Urban InfrastructurePedestrian Safety and Urban Infrastructure
Pedestrian Safety and Urban Infrastructure
 
Object Oriented Programming Lab Manual
Object Oriented Programming Lab Manual Object Oriented Programming Lab Manual
Object Oriented Programming Lab Manual
 
Projects
ProjectsProjects
Projects
 
Ppt 1
Ppt 1Ppt 1
Ppt 1
 
automatic-street-light-controller
automatic-street-light-controllerautomatic-street-light-controller
automatic-street-light-controller
 
Ppt on automatic street light control using ir sensors
Ppt on automatic street light control using ir sensorsPpt on automatic street light control using ir sensors
Ppt on automatic street light control using ir sensors
 
automatic street light
automatic street lightautomatic street light
automatic street light
 
Cloud computing security from single to multiple
Cloud computing security from single to multipleCloud computing security from single to multiple
Cloud computing security from single to multiple
 
Data security in cloud computing
Data security in cloud computingData security in cloud computing
Data security in cloud computing
 
Online movie ticket booking
Online movie ticket bookingOnline movie ticket booking
Online movie ticket booking
 

Similar to Final year project report on Internet And Interanet Emailing server

Online Assignment
Online AssignmentOnline Assignment
Online Assignment
subhamanu1990
 
E -MAIL AND INTERNET
E -MAIL AND INTERNETE -MAIL AND INTERNET
E -MAIL AND INTERNET
Prof Ansari
 
Electronic mail
Electronic mailElectronic mail
Electronic mail
Abid Fakhre Alam
 
presentation on email.pptx
presentation on email.pptxpresentation on email.pptx
presentation on email.pptx
YouTubeCONTRA
 
E-MAIL
E-MAILE-MAIL
E-MAIL
rajeev bhatt
 
CS6551 COMPUTER NETWORKS
CS6551 COMPUTER NETWORKSCS6551 COMPUTER NETWORKS
CS6551 COMPUTER NETWORKS
Kathirvel Ayyaswamy
 
Internet Tutorial 02
Internet  Tutorial 02Internet  Tutorial 02
Internet Tutorial 02
dpd
 
Email
EmailEmail
Email
EmailEmail
Tutorial 2 - Basic Communication on the Internet: Email
Tutorial 2 - Basic Communication on the Internet: EmailTutorial 2 - Basic Communication on the Internet: Email
Tutorial 2 - Basic Communication on the Internet: Emaildpd
 
Running header EMAIL FORENSICSEMAIL FORENSICSEmail Forens.docx
Running header EMAIL FORENSICSEMAIL FORENSICSEmail Forens.docxRunning header EMAIL FORENSICSEMAIL FORENSICSEmail Forens.docx
Running header EMAIL FORENSICSEMAIL FORENSICSEmail Forens.docx
jeffsrosalyn
 
Electronic mail
Electronic mailElectronic mail
Electronic mail
Bhojak Rajendra(rahul)
 
email clients and webmail (presentation)
email clients and webmail   (presentation)email clients and webmail   (presentation)
email clients and webmail (presentation)kay2
 
Through-Mail Feature: An Enhancement to Contemporary Email Services
Through-Mail Feature: An Enhancement to Contemporary Email ServicesThrough-Mail Feature: An Enhancement to Contemporary Email Services
Through-Mail Feature: An Enhancement to Contemporary Email Services
IRJESJOURNAL
 
Powerpoint Preentation
Powerpoint PreentationPowerpoint Preentation
Powerpoint Preentation
subhamanu1990
 

Similar to Final year project report on Internet And Interanet Emailing server (20)

Online Assignment
Online AssignmentOnline Assignment
Online Assignment
 
E -MAIL AND INTERNET
E -MAIL AND INTERNETE -MAIL AND INTERNET
E -MAIL AND INTERNET
 
Electronic mail
Electronic mailElectronic mail
Electronic mail
 
presentation on email.pptx
presentation on email.pptxpresentation on email.pptx
presentation on email.pptx
 
E-MAIL
E-MAILE-MAIL
E-MAIL
 
Email
EmailEmail
Email
 
How email works
How email worksHow email works
How email works
 
CS6551 COMPUTER NETWORKS
CS6551 COMPUTER NETWORKSCS6551 COMPUTER NETWORKS
CS6551 COMPUTER NETWORKS
 
Internet Tutorial 02
Internet  Tutorial 02Internet  Tutorial 02
Internet Tutorial 02
 
Email
EmailEmail
Email
 
Email
EmailEmail
Email
 
Email
EmailEmail
Email
 
Tutorial 2 - Basic Communication on the Internet: Email
Tutorial 2 - Basic Communication on the Internet: EmailTutorial 2 - Basic Communication on the Internet: Email
Tutorial 2 - Basic Communication on the Internet: Email
 
Running header EMAIL FORENSICSEMAIL FORENSICSEmail Forens.docx
Running header EMAIL FORENSICSEMAIL FORENSICSEmail Forens.docxRunning header EMAIL FORENSICSEMAIL FORENSICSEmail Forens.docx
Running header EMAIL FORENSICSEMAIL FORENSICSEmail Forens.docx
 
Electronic mail
Electronic mailElectronic mail
Electronic mail
 
Sherbimet e mail serverit
Sherbimet e mail serveritSherbimet e mail serverit
Sherbimet e mail serverit
 
email clients and webmail (presentation)
email clients and webmail   (presentation)email clients and webmail   (presentation)
email clients and webmail (presentation)
 
Internet
InternetInternet
Internet
 
Through-Mail Feature: An Enhancement to Contemporary Email Services
Through-Mail Feature: An Enhancement to Contemporary Email ServicesThrough-Mail Feature: An Enhancement to Contemporary Email Services
Through-Mail Feature: An Enhancement to Contemporary Email Services
 
Powerpoint Preentation
Powerpoint PreentationPowerpoint Preentation
Powerpoint Preentation
 

Recently uploaded

Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)
rosedainty
 
Introduction to Quality Improvement Essentials
Introduction to Quality Improvement EssentialsIntroduction to Quality Improvement Essentials
Introduction to Quality Improvement Essentials
Excellence Foundation for South Sudan
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
joachimlavalley1
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
RaedMohamed3
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
How to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERPHow to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERP
Celine George
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
beazzy04
 
Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
Anna Sz.
 
How to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsHow to Break the cycle of negative Thoughts
How to Break the cycle of negative Thoughts
Col Mukteshwar Prasad
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
The Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve ThomasonThe Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve Thomason
Steve Thomason
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
MIRIAMSALINAS13
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 

Recently uploaded (20)

Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)
 
Introduction to Quality Improvement Essentials
Introduction to Quality Improvement EssentialsIntroduction to Quality Improvement Essentials
Introduction to Quality Improvement Essentials
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
How to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERPHow to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERP
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
 
How to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsHow to Break the cycle of negative Thoughts
How to Break the cycle of negative Thoughts
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
The Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve ThomasonThe Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve Thomason
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 

Final year project report on Internet And Interanet Emailing server

  • 1. Page | 1 INTRODUCTION 1.1. PROJECT DESCRIPTION This project is about developing a web based mail client connecting to windows server running a Mail Server. Today’s world is all depend upon email system. It also becomes a significant need of the businesses. That’s where, professionals must know mailing system and aware with that, how it works, how can to create a self-hosted mailing system and other technical aspects To give learners a wide knowledge about it, here, we make available Free Php projects for students along with source code. Students can download this free source from the website easily. Source code will help you to understand and modify the software in an effortless manner. This project has the following main functionality. Electronic mail, most commonly referred to as email or e-mail since c 1993, is a method of exchanging digital messages from an author to one or more recipients. Modern email operates across the Internet or other computer networks. Some early email systems required the author and the recipient to both be online at the same time, in common with instant messaging. Today's email systems are based on a store-and-forward model. Email servers accept, forward, deliver, and store messages. Neither the users nor their computers are required to be online simultaneously; they need connect only briefly, typically to a mail server, for as long as it takes to send or receive messages. Historically, the term electronic mail was used generically for any electronic document transmission. For example, several writers in the early 1970s used the term to describe fax document transmission. As a result, it is difficult to find the first citation for the use of the term with the more specific meaning it has today. An Internet email message consists of three components, the message envelope, the message header, and the message body. The message header contains control information, including, minimally, an originator's email address and one or more recipient addresses. Usually descriptive information is also added, such as a subject header field and a message submission date/time stamp. Originally a text-only (ASCII) communications medium, Internet email was extended to carry, e.g. text in other character sets, multi-media content attachments, a process standardized in RFC 2045 through 2049. Collectively, these RFCs have come to be called Multipurpose Internet Mail Extensions (MIME). Subsequent RFCs have proposed standards for internationalized email addresses using UTF-8. Electronic mail predates the inception of the Internet and was in fact a crucial tool in creating it,[5] but the history of modern, global Internet email services reaches back to the early ARPANET. Standards for encoding email messages were proposed as early as 1973 (RFC 561). Conversion from ARPANET to the Internet in the early 1980s produced the core of the current services. An email message sent in the early 1970s looks quite similar to a basic text message sent on the Internet today.
  • 2. Page | 2 Email is an information and communications technology. It uses technology to communicate a digital message over the Internet. Users use email differently, based on how they think about it. There are many software platforms available to send and receive. Popular email platforms include Gmail, Hotmail, Yahoo! Mail, Outlook, and many others. Network-based email was initially exchanged on the ARPANET in extensions to the File Transfer Protocol (FTP), but is now carried by the Simple Mail Transfer Protocol (SMTP), first published as Internet standard 10 (RFC 821) in 1982. In the process of transporting email messages between systems, SMTP communicates delivery parameters using a message envelope separate from the message (header and body) itself. 1. Receiving/Sending/Organizing mails. 2. Sending mail using send mail. 3. Performing Admin functions like managing new user, resetting passwords etc. 4. Compose an email. 5. Send an email 6. Receive an email 7. Saving an email in the form of draft 8. Showing the detail of the received mail 9. Saving the email ids in contact list 10. Secured by password 11. Recovery of the password 1.1.1 What is E-mail? 1. What is Email? Electronic mail (email) is the term given to an electronic message, usually a form of simple text message,that a user types at a computer system and is transmitted over some form of computer network to another user, who can read it. Email once consisted of a number of proprietary email systems. Originally these email systems could only send and receive email in an office where every person was equipped with the same software. With the expansion of the Internet, some manufacturers of these proprietary email systems introduced the capability of connecting to the Internet for the transfer of messages outside of the local network. This can take the form of a software interface that converts the local messages into a recognized standard form suitable for transfer over the Internet. These systems are more common in establishments that have used email for longer than most, and are renowned for minor problems with access to global Internet email, (e.g. problems with sending or receiving attachments) however such problems are slowly disappearing. There is a page containing a brief history of email if you are interested. Since the Internet has grown in popularity, proprietary systems have become less popular, with more businesses moving over to Internet standards for local network mail services. This has the advantages of usually being less expensive, simpler, no longer being tied to a particular vendor and allows the IT Manager to have a wider choice of email client applications, or different hardware platforms.
  • 3. Page | 3 2. What are the benefits of Email? Email has become one of the driving forces behind connecting businesses to the Internet. It offers fast, economical transfer of messages anywhere in the world. As local telephone calls are free in most parts of the US, messages destined to long-distance destinations become effectively free to send. Outside of the US, local calls tend to be chargeable, therefore the email system can reduce the telephone bill considerably. The substantial cost-cutting associated with these facts have encouraged many businesses to invest in an implementation of email services. Email has considerable benefits over traditional paper based memo's and postal systems: Messages can be sent at any time across the world as easily as across the office, to a group of people or a single recipient, without the sender leaving their desk. Messages can be logged, ensuring some form of record is held, and messages are stored when the recipient is away from their desk. The recipient can collect their mail when they want, from wherever they are. Mobile users can collect their mail whilst out visiting customers, or at other locations. The person you are sending the message to gets it directly, without passing through any third party. Environmentally friendly! Unless requested, email messages require no paper or resources other than storage space on a computer disk drive. 3. What is an email client? An email client is an application that is used to read, write and send email. In simple terms it is the user interface to the email system. The client usually consists of a combination of a simple text editor, address book, filing cabinet and communications module. The text editor allows for the creation of the message itself, and usually includes simple spell checking and formatting facilities. The ability to allow files or documents to be attached to the message is also available. For example a diagram or schematic could be attached to an email message, offering the recipient the chance to see a project's progress, and comment on it with a reply. The address book allows the users to store commonly used email addresses in an easy to get at format, reducing the chance of addressing errors. The filing cabinet allows for the storage of email messages, both sent and received, and usually gives some form of search function, allowing the easy retrieval of a desired message. The final, but most important, section of the email client is the element that deals with the actual communication of email messages to and from an email server. How this actually occurs will be described later in this. 4. What is a mail server? A mail server is an application that receives email from email clients or other mail servers. It is the workhorse of the email system.
  • 4. Page | 4 A mail server usually consists of a storage area, a set of user definable rules, a list of users and a series of communication modules. The storage area is where mail is stored for local users, and where messages that are in transit to another destination are temporarily stored. It usually takes the form of a simple database of information. The user defined rules determine how the mail server should react when determining the destination of a specific message, or possibly react to the sender of the message. For example: specific email addresses can be barred, or certain users can be restricted to only sending messages within the company. The list of users is a database of user accounts that the mail server recognizes and will deal with locally. The communications modules are the components that actually handle the transfer of messages to and from other mail servers and email clients. Depending upon the requirements of the mail server there may be a number of different modules installed for use. What these modules do and how they communicate will be dealt with later in this. A person, sometimes called a Postmaster, maintains the mail server and the list of user accounts that it supports. Most mail servers are designed to operate without any manual intervention during normal operation. They wait for a message to be sent to them and process it accordingly, or collect messages from other mail servers at predetermined intervals. Email Basics - Overview of Email Services The following examples will start with a fictional computer network, and will lead through the basics of how email functions, and it's relevance to the Internet. An example email system to illustrate the basics could be as follows: a. Simple office email system Fig-1.1 Email is required within a company, but not out to the rest of the world. A very simple email system could be installed and maintained, giving interoffice communications: Simple office email system In the above example, the three workstations are connected to a computer network within a company office. If one user wishes to send email to another user, then the message is simply
  • 5. Page | 5 typed and sent to the mail server, addressed to the recipient using their email name, which would simply be the first name of a user, such as "Tom". For example: if Fred wants to send a message to Tom, he types his message on his email client, addressing it to Tom. His email client then sends the message to the mail server, where it is stored for Tom. When Tom next checks to see if there is any mail for him, his email client will collect his messages and allow him to read them. Because this email system works only within the office, each recipient can be referred to using only their email name. This system could easily be expanded to allow for remote users if some form of dial in support is added to the network using a modem (A modem is a device that sends computer signals down a telephone line, effectively making a telephone system a part of a computer network). This would increase the flexibility of the system enormously. b. Remote user with access to office email Fig-1.2 Remote user with access to office email When John wants to send email to Paul, he types his message within his email client, then, when he wants it to, his email client dials into his company computer network using a modem and telephone line, sends his message to Paul, then collects any waiting messages for him. Once the messages have been collected, the modem disconnects from the phone line, and John can read any messages that were collected. Because John's computer connected using the telephone lines, he can collect his mail from anywhere he can plug his modem into a telephone socket. If the company also had another remote user who also connected through the telephone network, then messages could also be transferred to them as easily as to one of the workstations in the office. The advantages and flexibility of an email system starts to become clearer when compared against traditional memo and telephone systems.The next step is to allow email messages to be able to be sent to another office or company. c. Simple email between two offices
  • 6. Page | 6 Fig-1.3 Simple email between two offices This diagram shows a simple email system to give internal email between two offices, which are connected via a telephone line. Mail is sent internally within an office using the same methods as discussed earlier, but as there are two separate sites, this adds an additional complication in addressing the recipient. As can be seen in the above diagram, there are two Toms available to send email to. How can you specify the correct Tom to send your message to? There are two ways: Change Tom's email name to be something else. This usually is implemented by using the users second name or initial, such as "S" of the second name "Smith", so the second Tom's email name would be "Tom.S" (there is no actual standard way of implementing email names, other than trying to keep them short and easy to remember). Refer to users at a separate office or site with an additional piece of information which defines their location, such as "local office." So to send mail to Tom at the Local Office, you would address his messages to "Tom@local.office". Notice the "@" symbol which is read as "at" and that there are no spaces allowed within an email name or address. The second method is the preferred option as it allows for future expansion of the system, especially if there is the potential for a number of local offices. These could be referred to as "Local.Office.A" "Local.Office.B" or possibly by location, such as "New.York.Office" and so forth. These addresses are known as "Domains" and simply give the location of the user who the message is destined for within the company. (Note that these are not "Internet Domains", but internal company ones).Note that the telephone line would only be used intermittently, when mail was destined for the other office, and could also be used for remote users as well. Using a combination of the discussed options so far, it can be seen that a comprehensive company email system can be assembled without too many problems.The
  • 7. Page | 7 options discussed so far only allow for internal email with a company or organization. The next example is to allow for email access to the global Internet. d. A single user dialling into an Internet Service Provider (ISP) Fig-1.4 A single user dialling into an Internet Service Provider (ISP) When a single user dials into the Internet via an Internet Service Provider (ISP) they are effectively dialling into the ISP's network in the same way as in the earlier example Remote user with access to office email. The only major difference is that the ISP's computer network is itself connected to the Internet, and may have a large number of modems to support their users. The home users email is stored at the ISP's mail server in exactly the same way as within the simple company email system introduced above. The home user can connect to the ISP's network, send their messages and collect their waiting email, then disconnect. The only complexity added is for the actual addressing of the Home user, and the recipients of the messages that the home user wants to send. Due to the Internet actually consisting of a large number of smaller networks, much like the ones shown in Simple email between two offices, an email address needs to be specific in defining the recipients Domain. Can you imagine how many "Toms" exist on the Internet! This brings us back to the subject of "Domains". Each network connected to the Internet has a Domain name associated with it, to ensure email --and other traffic-- gets directed to the right recipient. In the above diagram the ISP would have their own domain name, which points any email destined for a user in their domain to their mail server. So, for example, if the ISP is called "Provider" and the domain that they own on the Internet could be called "provider.com" (We'll go into more details on the domain name later in this FAQ) then all email to the home user is directed to "home.user@provider.com" which will
  • 8. Page | 8 result in the mail being stored on the ISP's mail server, ready to collect by the home user email client. A single office user could also use the same system to collect and send mail using an ISP, but this would not have any direct relationship, or link, to the internal email systems that have already been discussed. e. Multiple user dialling in to an ISP Fig-1.5 A number of users on a network dialling in to an ISP In this example Fred and Paul have two email addresses: One for internal mail within a company, and one for Internet email. This can sometimes occur if most of the email that a user reads or sends is internal within a company network, yet the user wants access to global Internet email. Each user would have an email account on both the company mail server and the ISP's mail server. An Internet email user can contact Fred and Paul using email directly. However if an Internet user wanted to send a message to Tom, then they could not without having to send it to either Fred or Paul and asking them to forward the message. This arrangement allows for company email within the confines of the office network, but gives Internet email facilities to users who need them, in this case Fred and Paul. If Tom wanted to send email to an Internet address, rather than within the confines of the company, then he would have to ask either Fred or Paul to send it on his behalf. Note that there may not actually be individual modems for all users, but some form of modem sharing may occur. If there were more than two Internet email users, then connecting the office network mail server --rather than individual machines--to the Internet would probably be more efficient and flexible. Tom would then have been able to send his email message to another company himself, rather than asking another user to do it for him.
  • 9. Page | 9 f. A company network connected to an ISP Fig-1.6 A company network connected to an ISP In this example the company network is connected to the ISP's network by modem. This adds the additional complication that the email addresses within the company network must be of a form that other users on the Internet can use. As the company network is connected to the Internet through an ISP, then the company could use the "Internet Domain" of the ISP for addressing their own email -- which means that each user could be addressed in the form "user@company.provider.com" (note that this is one possible method of addressing: each service provider may have their own way of addressing individual companies) or they could register their own Internet Domain. This would mean that a user is addressed as "user@company.com" where "company.com" is the Internet domain registered. When Fred, Paul or Tom want to send email to a recipient on the Internet, they send the message in the same way as sending it internally within the office, but also must specify the "Domain" of the person they are trying to contact within the email address. For example, if Tom wants to send a message to "Fred" who is an email user within another company in the US, then he would address the mail message to "Fred@thecompany.com" where "thecompany.com" is the domain for the company where Fred is based. (Domains will be discussed more fully later in this FAQ). With this arrangement the company mail server sends and collects email on behalf of the office network users. The users themselves never actually connect to the Internet. This allows the local Company Network and telephone connection to be used efficiently with the most flexibility.
  • 10. Page | 10 Used in conjunction with dial-in remote users to the company network, as discussed earlier, this system would allow for remote users to have access to global Internet email when dialling in to the Company Network. g. A Company Network connected to the Internet Fig-1.7 A Company Network connected to the Internet This gives all the flexibility of internal email within the company, but also allows Internet access for remote users to the company mail server for collecting and sending messages. The Internet connection would have to be full time in order to implement this arrangement. Note that the actual physical "Internet Connection" could be one of a number of different connection methods, depending upon the potential traffic requirements to and from the Internet. Also some form of Firewall protection would be a sensible option. (A Firewall allows specified traffic through it, preventing unauthorised access both into the company network, and out onto the Internet). Remote users could access the company network either via a direct dialled connection, or via the Internet. Also local dial-in users could access the Internet through the Internet Connection, effectively turning the Company into a private ISP! h. More on Domain Names Domains were introduced earlier, with the examples "Local.Office.A" ,"Local.Office.B" or "New.York.Office." which would allow the easy addressing of users within a department.
  • 11. Page | 11 Taking the "New York Office" as an example, it is fine for use internally within a company, but does not give enough information to be used on the Internet. As can be seen, these domain names are suitable for internal use within a company, but as there are potentially a large number of company with a New York Office, this cannot be used on its own. This description is simply not sufficient for Internet Email, which has to give an unique address for every user. The way to expand on this would be to add the company name to the domain: So the example "New York Office" could become "ny.office.company.com" which would be fine for addressing Internet email, as it would give a legal usable address, for example: Tom, based at the Company New York Office, would be addressed to on the Internet as "tom@ny.office.company.com." This gives full information on how to address a message to Tom, with no chance of it going to the wrong person. If you are wondering what the "com" part of the domain name is for, it simply specifies the type of domain, or the location of the network that the domain is referring to. This section of the domain name is referred to as the "top level" of the domain. "Com" specifies "commercial organisation" and tends to refer to an American company, although other non-US companies also have "com" top levels to their domain. Some examples of these are: apple.com, microsoft.com or pepsi.com A few other possible variations of "Top Level" domains are: GOV Government ORG Non-Profit Organisation EDU Educational Establishment Please note that recently a number of new top level domains have been made available, but are not get in general use. A few of the new domains are: firm, store, web, arts, rec, info, nom. Other endings available give the country of the network, in two letter format. A few examples are: UK United Kingdom JP Japan GM Gambia AQ Antarctica Note that top level domains, normally outside the of the US, are sometimes combined and that "co." (referring to "Company" ) is usually also added before the country, for example:
  • 12. Page | 12 open.gov government office in the United Kingdom. nissan.co.jp The Nissan Car company in Japan. 6. What is an Email address? An example email address looks like this: Example email address diagram This address is made up of two parts: Email account -This is a particular users email account name that, in this case, the vicomsoft.com mail server can deal with. Domain name - This is a name that a company has registered so that they can use it on the Internet. Other examples are: apple.com, or microsoft.com. If a person or company has not registered their own domain name then they may be using their Internet Service Provider's (ISP) domain name, for example: netcom.com, or aol.com. This is usually a less expensive option than registering your own domain name, but does mean that you have to use your ISP's domain name all the time. In the above example "vicomsoft.com" is the domain name that has been registered so that Vicomsoft can use it on the Internet. For further information on registering domain names please see the reference URLs at the end of section 2. 7. How does email get from one email client to another email client? Email client diagram Fig-1.8 Fred wants to send an email message to joe@acompany.com. The email client on Fred's machine sends the message to the email server as shown in fig 1.8 The mail server checks to see if it has an account with the user name "Joe." If this account exists then the message is stored, ready for Joe to collect. If there is not an account for Joe, the message is returned, with an explanation that Joe does not have an account, so the message could not be delivered.
  • 13. Page | 13 Joe checks his email at a later time. Joe's email client asks the email server if there is any mail for Joe. As there is mail waiting for Joe--from Fred-- the email client downloads the waiting message from the mail server. Joe can then read the email message and reply to Fred, if he wants, using his email client. If Fred had sent mail to "tom@acompany.com", instead of "Joe@acompany.com" and Tom did not have an email account created on the mail server, Fred would receive a message back telling him that Tom did not have an email account, so his message could not be delivered. 8. How does email get from one email client to another when they are at different locations? Email clients at different locations Fig-1.9 Fred wants to send an email message across the world to "paul@bcompany.com" He creates his email message with his email client, which sends the message to the acompany.com mail server. The mail server compares the domain name of the destination email address (i.e. bcompany.com) with the domain name it has been told to look after (i.e. acompany.com). These domain names are different, therefore the acompany.com mail server will send the message to the mail server that looks after email for the bcompany.com domain. (How it finds the bcompany.com mail server will be dealt with in Part two of this FAQ) Paul checks his email at a later time. His email client asks his email server if there is any mail for Paul.
  • 14. Page | 14 As there is mail waiting for Paul --from Fred-- the email client downloads the waiting message from the mail server. Paul can then read the email message and reply to Fred, if he wants, using his email client. If Fred had sent mail to "tom@bcompany.com", instead of "Paul@bcompany.com" and Tom did not have an email account created on bcompany.com's mail server, Fred would receive a message back telling him that Tom did not have an email account on the bcompany.com mail server, so his message could not be delivered. 9. But what happens when a destination mail server cannot be found by the sending mail server? If the destination mail server cannot be found or is extremely busy, a number of different things can happen: If the sending mail server cannot find any information at all regarding the destination, then the message is returned to sender, stating the reason for failure. This usually means that the message had an incorrectly spelt email address. If the sending mail server can find information regarding the domain it is trying to contact, but cannot actually contact the mail server that maintains the destination domain, it will hold the message for a specified time, before trying again. If it has tried to send the same message a number of times without success, then it will return the message to the sender, warning that it had tried a number of times, but failed. This can happen if the destination mail server is unavailable for some reason, (such as on a part time connection) or has crashed. To assist against this type of problem, it is possible for more than one mail server to look after a domain. If the first mail server cannot be found, then a second machine can be specified to accept mail on it's behalf. If this mail server cannot be found then a third mail server can be specified, and so forth. If no mail server at all can be found to contact, then the sending mail server will wait for a specified time before trying again. Some larger organizations can have 10 or more mail servers looking after their domain, each passing mail to the final destination mail server. This method also makes allowances for when a mail server is extremely busy, as can be the case with large ISP's mail servers which can process many thousands of messages an hour. 1.2. PURPOSE OF THE PROJECT This project is developed to create a Mail Server. A Mail server is an application which used to send and receive mails. This type of application needs to manage mails which send by registered users. A message has to be composed in compose boxes. This message is stored in inbox directory of receiver. This file should be combination of the sender’s user-id and sub. The file transmitted is moved from sender compose to receiver inbox. The recipient can view the message by selecting the appropriate file no. The main objective is that the working in the
  • 15. Page | 15 organization will be well planned and organized. The data will be stored properly in data stores, which will help in retrieval of information as well as its storage. The level of accuracy in the proposed system will be higher. All operation would be done correctly and it ensures that whatever information is coming from the center is accurate. This is also provision for the replying and deleting the message. This utility also enables users, working under different login names to communicate with each other. We can send files through attachments. In this we attach the files to the mail by browsing option. From desktop or any drive we can select files and we will attach them to the mail that we want to send presently and then we send them to the receiver. Get started quickly with a familiar experience that improves participation and helps teams get more done. Use the new visual tiles in Project Web App (PWA), your web app to access Project Server, to quickly begin or flex project portfolio management capabilities. Choose between devices and browsers – Internet Explorer, Firefox, Safari, Chrome, and more – to view, edit, submit, and collaborate on project, portfolio, and everyday work. In professional world all the communications are being done by emails. Now a day’s mailing server is playing a very important role in our social and economical life. It is one of the secure and fast communicating mediums for a modern era. The mail server is also a good source to connect with your friends; it helps people to be active in social life. Social network helps a person both continue their existing relationship and finding new friends by reaching out the people you never met before. What is mailing server? Mailing server is programmed by which you can send emails to your friends, who are registered with that server. It allows a user to transfer text and data like picture, video, mp3, etc. However, it has some limitations for the size of the attachment, but you can change it for your server and as per business needs. In mailing server, a user can register herself/himself. After registration, they can login with their existing user id and password. The mailing server allows the user to customize their profile, change themes as per own interest. Mailing server is also a very secure system. It provides you security as you needed your profile is protected with a password. You can change the password when you feel insecure with the old password. There is also the password recovery system in case you forgot your password you can recover your profile by verifying your alternate email or phone number. 1. Capability to create user Email Accounts by an Administrator or by End users after registering themselves 2. Administrator functionality to Delete User Accounts, Change passwords 3. Capability for End users to login into the system using a browser 4. Capability for logged in users to send/receive/forward/reply/delete mails 5. Invalidate user login on inactive for more than 10mts 6. Address book capability 7. Mark mails as junk 8. Apply Label to mail
  • 16. Page | 16 1.3 PROBLEM IN EXISTING SYSTEM 1. Cannot Upload and Download the latest updates. 2. No use of Web Services and Remitting. 3. Risk of mismanagement of data when the project is under development. 4. Less Security 5. Stress to handle many users at a time. 6. Communication between Patient and administration is a tough job. 7. Overwhelming volumes of mail. 1.4 SOLUTION OF THESE PROBLEMS The development of the new system contains the following activities, which try to automate the entire process keeping in view of the database integration approach. 1. User friendliness is provided in the application with various controls. 2. The system makes the overall project management much easier and flexible. 3. Readily upload the latest updates, allows user to download the alerts by clicking the URL. 4. There is no risk of data mismanagement at any level while the project development is under process. 5. It provides high level of security with different level of authentication. 6. Usage of light databases.
  • 17. Page | 17 LITERATURE REVIEW After analyzing the requirements of the task to be performed, the next step is to analyze the problem and understand its context. The first activity in the phase is studying the existing system and other is to understand the requirements and domain of new system. Both the activities are equally important, but the first activity serves as a basis of giving the functional specifications and then successful design of the proposed system. Understanding the properties and requirements of a new system is more difficult and requires creative thinking and understanding of existing running system is also difficult, improper understanding of present system can lead diversion from solution. In professional world all the communications are being done by emails. Short for electronic mail, the transmission of messages over communications networks. The messages can be notes entered from the keyboard or electronic files stored on disk. Most mainframes, minicomputers, and computer networks have an e-mail system. Some electronic- mail systems are confined to a single computer system or network, but others have gateways to other computer systems, enabling users to send electronic mail anywhere in the world. Companies that are fully computerized make extensive use of e-mail because it is fast, flexible, and reliable. Most e-mail systems include a rudimentary text editor for composing messages, but many allow you to edit your messages using any editor you want. You then send the message to the recipient by specifying the recipient's address. You can also send the same message to several users at once. This is called broadcasting. Sent messages are stored in electronic mailboxes until the recipient fetches them. To see if you have any mail, you may have to check your electronic mailbox periodically, although many systems alert you when mail is received. After reading your mail, you can store it in a text file, forward it to other users, or delete it. Copies of memos can be printed out on a printer if you want a paper copy. All online services and Internet Service Providers (ISPs) offer e-mail, and most also support gateways so that you can exchange mail with users of other systems. Usually, it takes only a few seconds or minutes for mail to arrive at its destination. This is a particularly effective way to communicate with a group because you can broadcast a message or documentto everyone in the group at once. Although different e-mail systems use different formats, there are some emerging standards that are making it possible for users on all systems to exchange messages. In the PC world, an important e-mail standard is MAPI. The CCITT standards organization has developed the X.400 standard, which attempts to provide a universal way of addressing messages. To date, though, the de facto addressing standard is the one used by the Internet system because almost all e-mail systems have an Internet gateway. Another common spelling for e-mail is email.
  • 18. Page | 18 Now a day’s mailing server is playing a very important role in our social and economic life. It is one of the secure and fast communicating mediums for a modern era. The mail server is also a good source to connect with your friends; it helps people to be active in social life. Social network helps a person both continue their existing relationship and finding new friends by reaching out the people you never met before. What is mailing server? 1. Mailing server is programmed by which you can send emails to your friends, who are registered with that server. It allows a user to transfer text and data like picture, video, mp3, etc. However, it has some limitations for the size of the attachment, but you can change it for your server and as per business needs. 2. In mailing server, a user can register herself/himself. After registration, they can login with their existing user id and password. The mailing server allows the user to customize their profile, change themes as per own interest. 3. Mailing server is also a very secure system. It provides you security as you needed your profile is protected with a password. You can change the password when you feel insecure with the old password. There is also the password recovery system in case you forgot your password you can recover your profile by verifying your alternate email or phone number. 2.1ANALYSIS MODEL This document play a vital role in the development of life cycle (SDLC) as it describes the complete requirement of the system. It means for use by developers and will be the basic during testing phase. Any changes made to the requirements in the future will have to go through formal change approval process. SPIRAL MODEL was defined by Barry Boehm in his 1988 article. “A spiral model of software development and enhancement. This model was not the first model to discuss iterative development, but it was the first model to explain why the iteration models. As originally envisioned, the iterations were typically 6 months to 2 years long. Each phase starts with a design goal and ends with a client reviewing the progress thus far. Analysis and engineering efforts are applied at each phase of the project, with an eye toward the end goal of the project. The steps for Spiral Model can be generalized as follows: 1. The new system requirements are defined in as much details as possible. This usually involves interviewing a number of users representing all the external or internal users and other aspects of the existing system. 2. A preliminary design is created for the new system. 3. A first prototype of the new system is constructed from the preliminary design. This is usually a scaled down system, and represents an approximation of the characteristics of the final product. 4. A second prototype is evolved by a fourfold procedure: I. Evaluating the first prototype in terms of its strengths, weakness and risks.
  • 19. Page | 19 II. Defining the requirements of the second prototype. III. Planning and designing the second prototype. IV. Constructing and testing the second prototype 5. At the customer option, the entire project can be aborted if the risk is deemed too great. Risk factors might involved development cost overruns, operating-cost miscalculation, or any factor that could, in the customer’s judgment, result in a less than satisfactory final product. 6. The existing prototype is evaluated in the same manner as was the previous prototype, and if necessary, another prototype is developed from it according to the fourfold procedure outlined above. Table.2.1 Survey Paper Installed in Software Name Installation year Functionality Disadvantage 1. IIT, Kanpur Webmail Service 1997 Make student aware about networking through email Not authenticated 2. TATA institute of social science Webmail 2000 Maintain all the information of patent and cases Not secured 3. Institute of information science, Frame Email system 2003 Maintain all the information of crimes and cases Not secure 4. European University Institute 365 mail client 2005 Manage details of student Error to generate a complete detail in the college 5. University of Mexico Emailing service 2012 Manage details of student Poor authentication 6. University of France Network Emailing 2013 Manage details faculty and mailing it to the head No authentication
  • 20. Page | 20 2.2 A BRIEF HISTORY OF ELECTRONIC SURVEYS Beginning in the late 1980s and early 1990s, prior to the widespread use of the Web, e-mail was explored as a survey mode. As with the Web today, e-mail offered the possibility of nearly instantaneous transmission of surveys at little or no cost. Unlike the Web, however, early e-mail was essentially static, consisting of a basic ASCII (text-only) message that was livered via the Internet.4 E-mail surveys tended to resemble the linear structure of a paper survey and were generally limited in length. Furthermore, because e-mail surveys were primarily text-based, document formatting was rudimentary at best. The only significant advantage they offered over only) message that was delivered via the Internet.4 E-mail surveys tended to resemble the linear structure of a paper survey and were generally limited in length. Furthermore, because e-mail surveys were primarily text-based, document formatting was rudimentary at best. The only significant advantage they offered over paper surveys was a potential decrease in delivery and response time and cost, although some observers also hypothesized that the novelty of the new medium might actually have enhanced response rates (Parker, 1992; Zhang, 2000).paper surveys was a potential decrease in delivery and response time and cost, although some observers also hypothesized that the novelty of the new medium might actually have enhanced response rates (Parker,1992; Zhang, 2000).) 1The literature contains far more information about response rates than about any other topic related to surveying, such as timeliness or data quality. Appendix B contains a more detailed discussion of response rates in the literature and Appendix C lists the survey topic, sample size, type of sample, contact/response/follow-up mode, and response rate for each study referenced in this report. We do not address other electronic survey modes that are currently in use, such as computerized self-administered questionnaires (CSAQs), which are surveys distributed via computer diskette. Two other electronic modes, CAPI and CATI, as we noted earlier, are unrelated to the development of the Internet and therefore we do not discuss them in this report. 3It is worth noting that the survey literature as late as the early- to mid-1990s could not anticipate the eventual influence of the Web on the practice of surveying. The Web started to become widely available in the early- to mid- 1990s and quickly supplanted e-mail as the Internet survey medium of choice. Whereas early e-mail was all ASCII-based, the Web offered the possibility of multimedia surveys containing audio and video, as well as an enhanced user interface and more interactive features. For convenience samples, the Web also offered a way around the necessity of having to know respondents’ e- mail addresses. 2.3 RESPONSE RATES OF INTERNET SURVEYS Response rates for Internet surveys in the literature are summarized graphically in Figure 3.1 by survey mode (more-exact numbers can be found in Appendix B). Overall, Figure 3.1 suggests that surveys using a mail response mode and surveys using both a mail and Web response mode tend to have higher response rates than those using just an e-mail or Web response mode. Response rates range from 7 to 44 percent for Web surveys and from 6 to 68 percent for e-mail surveys. Some studies in the literature gave respondents the choice of responding by either mail or via the Web. Of the seven studies we examined, five reported that respondents. Since the early days of e-mail, the ability to send attachments and executable files with e-mail has greatly expanded. Today, e-mail can be used to send a survey
  • 21. Page | 21 program to a user to run on his or her computer. The user can then return the completed survey electronically or by mail. These CSAQ surveys can be delivered via a number of different types of media, including e-mail attachments, downloading from the Web, or via diskette or CD-ROM. More often chose to respond by mail than through the Web and two studies found just the reverse. Above all else, the context of the individual study seems to matter. For example, respondents for the study with the highest percentage of Web respondents were recruited through advertising in Internet discussion groups (Schleyerand Forrest, 2000). Several studies in the literature involve conducting experiments to determine whether e-mail surveys have lower or higher response rates than postal mail surveys. In such studies, identical questionnaires were sent to different portions (or study arms) of the same population. The only difference between the study arms was in whether the respondent was asked to respond via e-mail or by mail. In most studies, the mail response rate was higher by as much as 21 percent. Only one study resulted in a lower mail response rate. However, that study was in many respects unusual and fell at a time when the novelty of e-mail may have influenced the results (Parker, 1992).
  • 22. Page | 22 PROBLEM IDENTIFICATION 1. Sometimes an email message gets lost in transit, or it can take a lot longer than expected for delivery, and your users can wonder what happened. The message trace feature lets you follow messages as they pass through your Exchange Online service. With message tracing, you can determine whether a targeted email message was received, rejected, deferred, or delivered by the service. It also shows what events have occurred to the message before reaching its final status. Getting detailed information about a specific message lets you efficiently answer your user’s questions, troubleshoot mail flow issues, validate policy changes, and alleviates the need to contact technical support for assistance. 2. After you run a message trace, try to diagnose and resolve the problem yourself using the information that the message trace tool provides. If you are unable to resolve the problem, post a question to the Office 365 Community, or ask for customer support by filling a service request. For information about how to open up a service request for a message delivery issue, see Still can’t figure out what went wrong. 3. Your outgoing mail server is used to send emails from your computer. Depending on where your email account is hosted, you may or may not be able to use your email provider’s outgoing mail server. Email addresses based on public email services such as Hotmail, Google, Yahoo, etc. will use their own outgoing mail servers. If your email is hosted on your own website, you may want to use your hosting provider’s mail server. For example, websites hosted on example.com may use mail.example.com as both their incoming and outgoing mail servers. 4. Some ISP’s (Internet Service Providers) will not allow you to make use of your own outgoing mail server. In this situation, you’ll need to use your ISP’s outgoing mail server. Find the name of your ISP and use the chart below to find your outgoing mail server. 5. If you are intent on using your own site’s mail server, you may want to contact your ISP. You can also try outgoing mail (SMTP) port number to 26 (default is 25), as some ISP’s will block port 25 because it is often used for spamming.. 6. Misspelling the outgoing server name (for example, typing smtp.gail.com instead of smtp.gmail.com).
  • 23. Page | 23 7. Some server require outgoing authentication. There should be a box you can check to enable this (it will have your email client use your email address and password to authenticate any emails that you send).. 8. Some setups require an SSL connection. If this is the case, your outgoing port will most likely change (from 25 or 26 to 465). In most cases, you will not need SPA (Secure Password Authentication). 9. Be sure that your emails don’t look like typical spam emails: don’t insert only a large image; check that the character-set is set correctly; don’t insert “IP-address only” links. Write your communication as you would write a normal email. Make it really easy to unsubscribe or opt-out. Otherwise, your users will unsubscribe by pressing the “spam” button, and that will affect your reputation. 10. On the technical side: if you can choose your SMTP server, be sure it is a “clean” SMTP server. IP addresses of spamming SMTP servers are often blacklisted by other providers. If you don’t know your SMTP servers in advance, it’s a good practice to provide configuration options in your application for controlling batch sizes and delay between batches. Some mail servers don’t accept large sending batches or continuous activity. A case is discussed as the first one makes reference to the use of data collected in the On the technical side: if you can choose your SMTP server, be sure it is a “clean” SMTP server. IP addresses of spamming SMTP servers are often blacklisted by other providers. If you don’t know your SMTP servers in advance, it’s a good practice to provide configuration options in your application for controlling batch sizes and delay between batches. Some mail servers don’t accept large sending batches or continuous activity. Second one concerns a typical ethnographic study in a large hospital structure for the identification of most relevant areas of intervention.
  • 24. Page | 24 METHODOLOGY 4.1 Introduction to PHP PHP is an “HTML-embedded scripting language” primarily used for dynamic web application. The first part of this definition means that PHP code can be interspersed with HTML, making it simple to generate dynamic pieces of Web pages on the fly. As a scripting language, PHP code requires the presence of the PHP processor. PHP code is normally run in plain-text scripts that will only run on PHP-enabled computers (conversely programming languages can create standalone binary executable files, a.k.a. programs).PHP takes most of its syntax from C, Java, and Perl. It is an open source technology and runs on most operating system and with most Web servers. PHP was written in the C programming language by Rasmus Lerdorf in 1994 for use in monitoring his online resume and related personal information. For this reason, PHP originally stood for “Personal Home Page”. Lerdori combined PHP with his own Form Interpreter, releasing the combination publicly as PHP/FI (generally referred to as PHP 2.0) on Z June 8, 1995. In 1998, PHP 3 was released, which was the first widely used version. PHP 4 was released in May 2000, with a new core, known as Zend Engine 1.0. PHP 4 featured improves speed and reliability over PHP3. In terms of features, PHP 4 added references the Boolean Type. COM support on the Windows, output buffering, many new array functions, expanded object-oriented programming, inclusion of the PCRE library, and many more. Maintenance release ofPHP 4 are still available, primarily for security updates. PHP 5 was released in July 2004, with the updated Zend Engine 2.0. Among the many new features in PHP 5 are :- 1. Improved object-oriented programming 2. embedded SOLite 3. support for new MySQL features (see the image at right) 4. exception handling using a try-catch structure 5. integrated SOAP support (see the image at right) 6. the Filter library (I PHP 5.1) 7. better XML tools 8. Iterations Originally started in 994 as a replacement for various Perl scripts used to maintain his Personal Web Page (thus the acronym PHP) by the Danish/Greenland programmer Rasmus Lerdorf, the project has since grown into an open source community effort. Initial uses of PHP were limited to basic tasks such as counting how many visitors a web site had received, the introduction of the PHP/FI (The FI stands for Form Interpreter) added additional functionality including implementation for the C programming language. In addition to the inclusion of C support, PHP/FI also introduced native support for the database communications. These two features have become the bedrock for the future versions of the PHP and together allowed the relatively swift and easy construction of dynamic web sites.
  • 25. Page | 25 In 1995 Lerdorf made the project public in an effort to improve the PHP code base I both reliability and scope. Tis release would eventually be known as PHP 2. At the time was still the preeminent language for the performing the tasks that PHP was seeking to perform and PHP had yet to reach a point where it had the same scope, death, and consistency offered by Perl. PHP 3 began in 1997 when a pair of Israeli developers at Technician IIT decided to rewrite the parser. The two would later form Zend Technologies, a company named after blending their two names: Zeev (Suraski) and Andi (Gutmans). The company would eventually produce the Zend Engine, the first public version of which powered PP 4 upon its release in 2000. The successor to Zend Engine is the Zend Engine 2 which was the basis for PHP 5. PHP 5, released in 2004, is perhaps the most radical and some consider long overdue revamp to PHP as it finally brings true Object Oriented Programming (OOP) to developers who have long since grown used to writing object oriented code. PHP is a server-side scripting language designed for web development but also used as a general-purpose programming language. As of January 2013, PHP was installed on more than 240 million websites (39% of those sampled) and 2.1 million web servers. Originally created by Rasmus Lerdorf in 1994, the reference implementation of PHP (powered by the Zend Engine) is now produced by The PHP Group. While PHP originally stood for Personal Home Page, it now stands for PHP: Hypertext Preprocessor, which is a recursive backronym. PHP code can be simply mixed with HTML code, or it can be used in combination with various tinplating engines and web frameworks. PHP code is usually processed by a PHP interpreter, which is usually implemented as a web server's native module or a Common Gateway Interface (CGI) executable. After the PHP code is interpreted and executed, the web server sends resulting output to its client, usually in form of a part of the generated web page; for example, PHP code can generate a web page's HTML code, an image, or some other data. PHP has also evolved to include a command-line interface (CLI) capability and can be used in standalone graphical applications. The canonical PHP interpreter, powered by the Zend Engine, is free software released under the PHP License. PHP has been widely ported and can be deployed on most web servers on almost every operating system and platform, free of charge. Despite its popularity, no written specification or standard existed for the PHP language until 2014, leaving the canonical PHP interpreter as a de facto standard. Since 2014, there is ongoing work on creating a formal PHP specification. 4.2 Normalization A database is a structure that comes in two flavors: a flat database and a relational database. A relational database is much more oriented to the human mind and is often preferred over the gabble-de-gook flat databases that are just stored on hard drives like a text file. MySQL is a relational database. MySQL is a powerful database. It's very good and free of charge.
  • 26. Page | 26 Database normalization is the process of organizing the attributes and tables of a relational database to minimize data redundancy. Normalization involves refactoring a table into less redundant (and smaller) tables but without losing information; defining foreign keys in the old table referencing the primary keys of the new ones. The objective is to isolate data so that additions, deletions, and modifications of an attribute can be made in just one table and then propagated through the rest of the database using the defined foreign keys. Edgar F. Codd, the inventor of the relational model (RM), introduced the concept of normalization and what we now know as the First normal form (1NF) in 1970. Codd went on to define the Second normal form (2NF) and Third normal form (3NF) in 1971, and Codd and Raymond F. Boyce defined the Boyce-Codd Normal Form (BCNF) in 1974. Informally, a relational database table is often described as "normalized" if it is in the Third Normal Form. Most 3NF tables are free of insertion, update, and deletion anomalies. The relational model separates the logical design from the physical design: DBMS performance is a matter of physical designer using indexes, view materialization, big buffers, etc. It is not a matter of changing the logical design. A typical example of normalization is that an entity's unique ID is stored everywhere in the system but its name is held in only one table. The name can be updated more easily in one row of one table. A typical update in such an example would be the RIM company changing its name to BlackBerry. That update would be done in one place and immediately the correct "BlackBerry" name would be displayed throughout the system Advantages: 1. Scalability and Flexibility: The MySQL database server provides the ultimate in scalability, sporting the capacity to handle deeply embedded applications with a footprint of only 1MB to running massive data warehouses holding terabytes of information. Platform flexibility is a stalwart feature of MySQL with all flavors of Linux, UNIX, and Windows being supported. And, of course, the open source nature of MySQL allows complete customization for those wanting to add unique requirements to the database server. 2. High Performance: A unique storage-engine architecture allows database professionals to configure the MySQL database server specifically for particular applications, with the end result being amazing performance results. Whether the intended application is a high-speed transactional processing system or a high-volume web site that services a billion queries a day, MySQL can meet the most demanding performance expectations of any system. With high-speed load utilities, distinctive memory caches, full text indexes, and other performance- enhancing mechanisms, MySQL offers all the right ammunition for today's critical business systems. 3. High Availability: Rock-solid reliability and constant availability are hallmarks of MySQL, with customers relying on MySQL to guarantee around-the-clock uptime. MySQL offers a variety of high-availability options from high-speed master/slave replication
  • 27. Page | 27 configurations, to specialized Cluster servers offering instant failover, to third party vendors offering unique high-availability solutions for the MySQL database server. 4. Robust Transactional Support: MySQL offers one of the most powerful transactional database engines on the market. Features include complete ACID (atomic, consistent, isolated, durable) transaction support, unlimited row-level locking, distributed transaction capability, and multi-version transaction support where readers never block writers and vice- versa. Full data integrity is also assured through server-enforced referential integrity, specialized transaction isolation levels, and instant deadlock detection. 5. Web and Data Warehouse Strengths: MySQL is the de-facto standard for high-traffic web sites because of its high-performance query engine, tremendously fast data insert capability, and strong support for specialized web functions like fast full text searches. These same strengths also apply to data warehousing environments where MySQL scales up into the terabyte range for either single servers or scale-out architectures. Other features like main memory tables, B-tree and hash indexes, and compressed archive tables that reduce storage requirements by up to eighty-percent make MySQL a strong standout for both web and business intelligence applications. 6. Strong Data Protection: Because guarding the data assets of corporations is the number one job of database professionals, MySQL offers exceptional security features that ensure absolute data protection. In terms of database authentication, MySQL provides powerful mechanisms for ensuring only authorized users have entry to the database server, with the ability to block users down to the client machine level being possible. SSH and SSL support are also provided to ensure safe and secure connections. A granular object privilege framework is present so that users only see the data they should, and powerful data encryption and decryption functions ensure that sensitive data is protected from unauthorized viewing. Finally, backup and recovery utilities provided through MySQL and third party software vendors allow for complete logical and physical backup as well as full and point-in- time recovery. 7. Comprehensive Application Development: One of the reasons MySQL is the world's most popular open source database is that it provides comprehensive support for every application development need. Within the database, support can be found for stored procedures, triggers, functions, views, cursors, ANSI-standard SQL, and more. For embedded applications, plug-in libraries are available to embed MySQL database support into nearly any application. MySQL also provides connectors and drivers (ODBC, JDBC, etc.) that allow all forms of applications to make use of MySQL as a preferred data management server. It doesn't matter if it's PHP, Perl, Java, Visual Basic, or .NET. MySQL offers application developers everything they need to be successful in building database-driven information systems. 8. Open Source Technology: Many corporations are hesitant to fully commit to open source software because they believe they can't get the type of support or professional service safety nets they currently rely on with proprietary software to ensure the overall success of their key applications. The questions of indemnification come up often as well. These worries can be
  • 28. Page | 28 put to rest with MySQL as complete around-the-clock support as well as indemnification is available through MySQL Network. MySQL is not a typical open source project as all the software is owned and supported by MySQL AB, and because of this, a unique cost and support model are available that provides a unique combination of open source freedom and trusted software with support. 9. Management Ease: MySQL offers exceptional quick-start capability with the average time from software download to installation completion being less than fifteen minutes. This rule holds true whether the platform is Microsoft Windows, Linux, Macintosh, or UNIX. Once installed, self-management features like automatic space expansion, auto-restart, and dynamic configuration changes take much of the burden off already overworked database administrators. MySQL also provides a complete suite of graphical management and migration tools that allow a DBA to manage, troubleshoot, and control the operation of many MySQL servers from a single workstation. Many third party software vendor tools are also available for MySQL that handle tasks ranging from data design and ETL, to complete database administration, job management, and performance monitoring. ADVANTAGES OF RDBMS 1. Redundancy can be avoided 2. Inconsistency can be eliminated 3. Data can be Shared 4. Standards can be enforced 5. Security restrictions can be applied 6. Integrity can be maintained 7. Conflicting requirements can be balanced 8. Data independence can be achieved. DISADVANTAGES OF DBMS: A significant disadvantage of the DBMS system is cost. In addition to the cost of purchasing of developing the software, the hardware has to be upgraded to allow for the extensive programs and the workspace required for their execution and storage. While centralization reduces duplication, the lack of duplication requires that the database be adequately backed up so that in case of failure the data can be recovered. 4.3 E-R DIAGRAMS In software engineering, an entity–relationship model (ER model) is a data model for describing the data or information aspects of a business domain or its process requirements, in an abstract way that lends itself to ultimately being implemented in a database such as a
  • 29. Page | 29 relational database. The main components of ER models are entities (things) and the relationships that can exist among them. Entity–relationship modeling was developed by Peter Chen and published in a 1976 paper. However, variants of the idea existed previously, and have been devised subsequently such as super type and subtype data entities and commonality relationships. Introduction: An entity–relationship model is a systematic way of describing and defining a business process. The process is modeled as components (entities) that are linked with each other by relationships that express the dependencies and requirements between them, such as: one building may be divided into zero or more apartments, but one apartment can only be located in one building. Entities may have various properties (attributes) that characterize them. Diagrams created to represent these entities, attributes, and relationships graphically are called entity–relationship diagrams. An ER model is typically implemented as a database. In the case of a relational database, which stores data in tables, every row of each table represents one instance of an entity. Some data fields in these tables point to indexes in other tables; such pointers represent the relationships. An ERD is a model that identifies the concepts or entities that exist in a system and the relationships between those entities. An ERD is often used as a way to visualize a relational database: each entity represents a database table, and the relationship lines represent the keys in one table that point to specific records in related tables. ERDs may also be more abstract, not necessarily capturing every table needed within a database, but serving to diagram the major concepts and relationships. This ERD is of the latter type, intended to present an abstract, theoretical view of the major entities and relationships needed for management of electronic resources. It may assist the database design process for an e-resource management system, but does not identify every table that would be necessary for an electronic resource management database. The ERD presents a visual representation of e-resource management concepts and the relationships between them. The Data Element Dictionary identifies and defines the individual data elements that an e-resource management system must contain and manage, but leaves the relationship between the elements to be inferred by the reader.ER Diagram is shown in fig. 4.2 Entities Entities are equivalent to database tables in a relational database, with each row of the table representing an instance of that entity. An entity is something that exists in itself, actually or potentially, concretely or abstractly, physically or not. It need not be of material
  • 30. Page | 30 existence. In particular, abstractions and legal fictions are usually regarded as entities. In general, there is also no presumption that an entity is animate. The word may refer, for example, to Bucephalus, the horse of Alexander; to a stone; to a cardinal number; to a language; or to ghosts or other spirits. The word estimative is the adjective form of the noun entity. Something that is entitative is considered in its own right. In philosophy, ontology is about the recognition of entities. The words ontic and entity are derived respectively from the ancient Greek and Latin present participles that mean 'being'. Relationship Relationships are represented by lines between entities. Relationship lines indicate that each instance of an entity may have a relationship with instances of the connected entity, and vice versa. In relational database theory, a relation, as originally defined by E. F. Codd,[1] is a set of tuples (d1, d2, ..., dn), where each element dj is a member of Dj, a data domain. Codd's original definition notwithstanding, and contrary to the usual definition in mathematics, there is no ordering to the elements of the tuples of a relation.[2][3] Instead, each element is termed an attribute value. An attribute is a name paired with a domain (nowadays more commonly referred to as type or data type). An attribute value is an attribute name paired with an element of that attribute's domain, and a tuple is a set of attribute values in which no two distinct elements have the same name. Thus, in some accounts, a tuple is described as a function, mapping names to values. A set of attributes in which no two distinct elements have the same name is called a heading. A set of tuples having the same heading is called a body. A relation is thus a heading paired with a body, the heading of the relation being also the heading of each tuple in its body. The number of attributes constituting a heading is called the degree, which term also applies to tuples and relations. The term n-tuple refers to a tuple of degree n (n>=0). E. F. Codd used the term relation in its mathematical sense of a finitary relation, a set of tuples on some set of n sets S1, S2, .... ,Sn.[4] Thus, an n-ary relation is interpreted, under the Closed World Assumption, as the extension of some n-adic predicate: all and only those n-tuples whose values, substituted for corresponding free variables in the predicate, yield propositions that hold true, appear in the relation. The term relation schema refers to a heading paired with a set of constraints defined in terms of that heading. A relation can thus be seen as an instantiation of a relation schema if it has the heading of that schema and it satisfies the applicable constraints. Sometimes a relation schema is taken to include a name.[5][6] A relational database definition (database schema, sometimes referred to as a relational schema) can thus be thought of as a collection of named relation schemas. In implementations, the domain of each attribute is effectively a data type[9] and a named relation schema is effectively a relation variable or relvar for short (see Relation Variables below). In SQL, a database language for relational databases, relations are represented by tables, where each row of a table represents a single tuple, and where the values of each attribute form a column.
  • 31. Page | 31 Fig 4.1 E-R diagram 4.4 Data Flow Process A data flow diagram is graphical tool used to describe and analyze movement of data through a system. These are the central tool and the basis from which the other components are developed. The transformation of data from input to output, through processed, may be described logically and independently of physical components associated with the system. These are known as the logical data flow diagrams. The physical data flow diagrams show the actual implements and movement of data between people, departments and workstations. A full description of a system actually consists of a set of data flow diagrams. Using two familiar notations Yourdon, Gane and Sarson notation develops the data flow diagrams. Each component in a DFD is labeled with a descriptive name. Process is further identified with a
  • 32. Page | 32 number that will be used for identification purpose. The development of DFD’S is done in several levels. Each process in lower level diagrams can be broken down into a more detailed DFD in the next level. The lop-level diagram is often called context diagram. It consists a single process bit, which plays vital role in studying the current system. The process in the context level diagram is exploded into other process at the first level DFD. The idea behind the explosion of a process into more process is that understanding at one level of detail is exploded into greater detail at the next level. This is done until further explosion is necessary and an adequate amount of detail is described for analyst to understand the process. Larry Constantine first developed the DFD as a way of expressing system requirements in a graphical from, this lead to the modular design. A DFD is also known as a “bubble Chart” has the purpose of clarifying system requirements and identifying major transformations that will become programs in system design. So it is the starting point of the design to the lowest level of detail. A DFD consists of a series of bubbles joined by data flows in the system. It is common practice to draw the context-level data flow diagram first, which shows the interaction between the system and external agents which act as data sources and data sinks. This helps to create an accurate drawing in the context diagram. The system's interactions with the outside world are modelled purely in terms of data flows across the system boundary. The context diagram shows the entire system as a single process, and gives no clues as to its internal organization. This context-level DFD is next "exploded", to produce a Level 1 DFD that shows some of the detail of the system being modeled. The Level 1 DFD shows how the system is divided into sub-systems (processes), each of which deals with one or more of the data flows to or from an external agent, and which together provide all of the functionality of the system as a whole. It also identifies internal data stores that must be present in order for the system to do its job, and shows the flow of data between the various parts of the system. Data flow diagrams are one of the three essential perspectives of the structured-systems analysis and design method SSADM. The sponsor of a project and the end users will need to be briefed and consulted throughout all stages of a system's evolution. With a data flow diagram, users are able to visualize how the system will operate, what the system will accomplish, and how the system will be implemented. The old system's dataflow diagrams can be drawn up and compared with the new system's data flow diagrams to draw comparisons to implement a more efficient system. Data flow diagrams can be used to provide the end user with a physical idea of where the data they input ultimately has an effect upon the structure of the whole system from order to dispatch to report. How any system is developed can be determined through a data flow diagram model.
  • 33. Page | 33 In the course of developing a set of levelled data flow diagrams the analyst/designers is forced to address how the system may be decomposed into component sub-systems, and to identify the transaction data in the data model. Data flow diagrams can be used in both Analysis and Design phase of the SDLC. There are different notations to draw data flow diagrams (Yourdon & Coad and Gane & Sarson), defining different visual representations for processes, data stores, data flow, and external entities. 4.4.1 DFD SYMBOLS: In the DFD, there are four symbols 1. A square defines a source(originator) or destination of system data 2. An arrow identifies data flow. Data Flow Diagram is shown in fig. 5.3 3. It is the pipeline through which the information flows 4. A circle or a bubble represents a process that transforms incoming data flow into outgoing data flows. 5. An open rectangle is a data store, data at rest or a temporary repository of data Fig:-4.2: Symbols Used In DFD’S 4.3.2 CONSTRUCTING A DFD: Several rules of thumb are used in drawing DFD’S:
  • 34. Page | 34 1. Process should be named and numbered for an easy reference. Each name should be representative of the process. 2. The direction of flow is from top to bottom and from left to right. Data traditionally flow from source to the destination although they may flow back to the source. One way to indicate this is to draw long flow line back to a source. An alternative way is to repeat the source symbol as a destination. Since it is used more than once in the DFD it is marked with a short diagonal. 3. When a process is exploded into lower level details, they are numbered. 4. The names of data stores and destinations are written in capital letters. Process and dataflow names have the first letter of each work capitalized. A DFD typically shows the minimum contents of data store. Each data store should contain all the data elements that flow in and out. Questionnaires should contain all the data elements that flow in and out. Missing interfaces redundancies and like is then accounted for often through interviews. 4.5 HARDWARE SPECIFICATIONS The selection of hardware is very important in the existence and proper working of any software. In the selection of hardware, the size and the capacity requirements are also important. The job portal can be efficiently run on Pentium system with at least 128mb ram and hard disk drive having 20 GB floppy disk drive of 1.44MB. 4.5.1 HARDWARE REQUIREMENT:- 1.RAM capacity ------- 128 MB 2.Hard disk -------- 20GB 3.Floppy disk ------1.44MB 4.CD-ROM Drive ----32HZ 5.KEYBOARD------ 108 Standard 4.6 SOFTWARE SPECIFICATIONS Some of the most difficult tasks is that, the selection of the software, once system requirement is known is determining whether a particular software package fits the requirements. After initial selection further security is needed to determine the desirability of
  • 35. Page | 35 particular software compared with other candidates. This section first summarizes the application requirement question and then suggests more detailed comparisons. 4.6.1 SOFTWARE REQIREMENT:- 1. Operating System: - Windows 2000 & above 2. Application Server: - Apache Server 3. Database: - MySQL . 4. Browser Specification:- Internet Explorer, Chrome, Opera. 4.7 ANALYSIS MODEL:- 1. The model that is basically being followed is the INCREMENTAL MODEL, which combines elements of the linear sequential model with the iterative philosophy of prototyping. 2. First of all the feasibility study is done. Once that part is over the requirement analysis and project planning begins. 3. If system exists one and modification and addition of new module is needed, analysis of present system can be used as basic model. 4. The design starts after the requirement analysis is complete and the coding begins after the design is complete. 5. Once the programming is completed, the testing is done. In this model the sequence of activities performed in a software development project are: - i) Requirement Analysis ii) Project Planning iii) System design iv) Detail design v) Coding vi) Unit testing vii) System integration & testing 6. End of the phase and the output of one phase is the input of other phase. 7. The output of each phase is to be consistent with the overall requirement of the system. 8. Some of the qualities of spiral model are also incorporated like after the people concerned with the project review completion of each of the phase the work done. SPIRAL MODEL was being chosen because all requirements were known beforehand and the objective of our software development is the computerization/automation of an already
  • 36. Page | 36 existing manual working system and further enhancement on the project need to be done after basic model. Perform four basic activities in every cycle 1. This invariant identifies the four basic activities that should occur in each cycle of the spiral model: Consider the win conditions of all success-critical stakeholders. Identify and evaluate alternative approaches for satisfying the win conditions. Identify and resolve risks that stem from the selected approach(es).Obtain approval from all success-critical stakeholders, plus commitment to pursue the next cycle.Project cycles that omit or shortchange any of these activities risk wasting effort by pursuing options that are unacceptable to key stakeholders, or are too risky. Some "hazardous spiral look-alike" processes violate this invariant by excluding key stakeholders from certain sequential phases or cycles. For example, system maintainers and administrators might not be invited to participate in definition and development of the system. As a result, the system is at risk of failing to satisfy their win conditions. 2. Risk determines level of effort For any project activity (e.g., requirements analysis, design, prototyping, testing), the project team must decide how much effort is enough. In authentic spiral process cycles, these decisions are made by minimizing overall risk. For example, investing additional time testing a software product often reduces the risk due to the marketplace rejecting a shoddy product. However, additional testing time might increase the risk due to a competitor's early market entry. From a spiral model perspective, testing should be performed until the total risk is minimized, and no further. "Hazardous spiral look-alikes" that violate this invariant include evolutionary processes that ignore risk due to scalability issues, and incremental processes that invest heavily in a technical architecture that must be redesigned or replaced to accommodate future increments of the product. 3. Risk determines degree of detail For any project artifact (e.g., requirements specification, design document, test plan), the project team must decide how much detail is enough. In authentic spiral process cycles, these decisions are made by minimizing overall risk. Considering requirements specification as an example, the project should precisely specify those features where risk is reduced through precise specification (e.g., interfaces between hardware and software, interfaces between prime and sub-contractors). Conversely, the project should not precisely specify those features where precise specification increases risk (e.g., graphical screen layouts, behavior of off-the-shelf components). 4. Use anchor point milestones Boehm's original description of the spiral model did not include any process milestones. In later refinements, he introduces three anchor point milestones that serve as progress indicators and points of commitment. These anchor point milestones can be characterized by
  • 37. Page | 37 key questions. Life Cycle Objectives. Is there a sufficient definition of a technical and management approach to satisfying everyone's win conditions? If the stakeholders agree that the answer is "Yes", then the project has cleared this LCO milestone. Otherwise, the project can be abandoned, or the stakeholders can commit to another cycle to try to get to "Yes." Life Cycle Architecture. Is there a sufficient definition of the preferred approach to satisfying everyone's win conditions, and are all significant risks eliminated or mitigated? If the stakeholders agree that the answer is "Yes", then the project has cleared this LCA milestone. Otherwise, the project can be abandoned, or the stakeholders can commit to another cycle to try to get to "Yes." Initial Operational Capability. Is there sufficient preparation of the software, site, users, operators, and maintainers to satisfy everyone's win conditions by launching the system? If the stakeholders agree that the answer is "Yes", then the project has cleared the IOC milestone and is launched. Otherwise, the project can be abandoned, or the stakeholders can commit to another cycle to try to get to "Yes.""Hazardous spiral look- alikes" that violate this invariant include evolutionary and incremental processes that commit significant resources to implementing a solution with a poorly defined architecture.[clarification needed] The three anchor point milestones fit easily into the Rational Unified Process (RUP), with LCO marking the boundary between RUP's Inception and Elaboration phases, LCA marking the boundary between Elaboration and Construction phases, and IOC marking the boundary between Construction and Transition phases. 5. Focus on the system and its life cycle This invariant highlights the importance of the overall system and the long-term concerns spanning its entire life cycle. It excludes "hazardous spiral look-alikes" that focus too much on initial development of software code. These processes can result from following published approaches to object-oriented or structured software analysis and design, while neglecting other aspects of the project's process needs.
  • 38. Page | 38 Fig 4.3: Spiral Model Phases Involved in SPIRAL MODEL 1. Communicated Requirements (Analysis Phase) It consists of planning and requirement definition activities. The end products of planning are: a) System Definition:-It is expressed in English. Ti incorporates charts, figures, graphs, tables, etc. The notations used here are highly dependent on problem area. b) Project Plan:-It contains the life-cycle model to be used at the beginning of development schedule, beginning cost estimates and resource estimates, tools and techniques to be used and standard practice to be followed. There are two types of designing techniques followed in designing phase:- i) Architectural Designing Identifies various software components like functions data streams, data source. Decouples and decomposes software components into modules and conceptual data Specifies the inter connections between various software components. ii) Detailed Debugging
  • 39. Page | 39 It is concerned with detail designing and implementation procedures to process the algorithm, structure and interconnection between the modules and data structures. The various activities that this phase includes are: a) Adaption of the existing codes. b) Modification of existing codes. c) Design of data representation. d) Packaging of software products. 2. Implementation Phase It involves the translation of the designing specifications into source code. It involves activity such as debugging, documentation and unit testing of source code. In this stage, various programming can be followed like built in and user defined data types, source type checking, flexible rules, concurrency construction. 3. Maintenance Phase In this phase the activities include: a) Corrective maintenance:-Correcting errors that were not discovered during the product development phase. b) Perfective Maintenance:-Improving the implementation of the system and enhancing the functionality of the system according to customer’s requirements.
  • 40. Page | 40 PROJECT ANALYSIS 5.1 FRONT END 5.1.1 PHP PHP is a server-side scripting language designed for web development but also used as a general-purpose programming language. PHP stands for “hypertext pre-processor” scripting language linked with apache server can be installed as an apache module.PHP was created by “RASMUS LERDORF” in 1995.PHP originally stood for “personal home page”. PHP is scripting language that was originally designed for web development to produce dynamic web pages. PHP acts as an intermediate between the server and the database. There is a request respond cycle between and the server. PHP is a server side scripting language that is embedded in HTML. It is used to manage dynamic content, databases, session tracking, even build entire e-commerce sites. It is integrated with a number of popular databases, including MySQL, Oracle, Sybase, Informix, and Microsoft SQL Server. 1. PHP stands for “hypertext preprocessor” scripting language linked with apache server can be installed as an apache module. 2. PHP was created by “RASMUS LERDORF” in 1995.PHP originally stood for “personal home page”. 3. PHP is scripting language that was originally designed for web development to produce dynamic web pages. PHP acts as an intermediate between the server and the database. There is a request respond cycle between and the server. 5.5.2 HTML HTML stands for “Hypertext Markup Language”. HTML is a set of markup language tags. The tags describe document content. The html documents contain html tags and plain text. Html is coded in the form of tags which are enclosed in angular bracket <>. “Body” is the tag element. By using This tag we can start the body of the html page. In html there are opening and closing tags. the closing tag is always slightly different from the opening tag in that it has a forward slash after the first angled bracket :</html >. A Web browser can read HTML files and compose them into visible or audible Web pages. The browser does not display the HTML tags and scripts, but uses them to interpret the content of the page. HTML describes the structure of a Website semantically along with cues for presentation, making it a markup language, rather than a programming language. Hypertext Markup Language, commonly referred to as HTML, is the standard markup language used to create web pages.[1] It is written in the form of HTML elements consisting of tags enclosed in angle brackets (like <html>). HTML tags most commonly come in pairs like <h1> and </h1>, although some represent
  • 41. Page | 41 empty elements and so are unpaired, for example <img>. The first tag in such a pair is the start tag, and the second is the end tag (they are also called opening tags and closing tags. Web browsers can read HTML files and render them into visible or audible web pages. Browsers do not display the HTML tags and scripts, but use them to interpret the content of the page. HTML describes the structure of a website semantically along with cues for presentation, making it a markup language, rather than a programming language. HTML elements form the building blocks of all websites. HTML allows images and objects to be embedded and can be used to create interactive forms. It provides a means to create structured documents by denoting structural semantics for text such as headings, paragraphs, lists, links, quotes and other items. It can embed scripts written in languages such as JavaScript which affect the behavior of HTML web pages. Web browsers can also refer to Cascading Style Sheets (CSS) to define the look and layout of text and other material. The World Wide Web Consortium (W3C), maintainer of both the HTML and the CSS standards, has encouraged the use of CSS over explicit presentational HTML since 1999 i. <html>Tag <html>tagtellsthebrowserthatitisanHTMLelement.ItrepresentstherootofHTMLdocument. ii. HeadingTags Any document starts with a heading. You can use different sizes for your headings. HTML also has six levels of headings, which use the elements <h1>, <h2>, <h3>, <h4>, <h5>, and <h6>. While displaying any heading, browser adds one line before and one line after that heading. iii. ParagraphTag The <p> tag offers a way to structure your text into different paragraphs. Each paragraph of text should go in between an opening and a closing. iv. LineBreakTag Whenever you use the <br /> element, anything following it starts from the next line. This tag is an example of an empty element, where you do not need opening and closing tags, as there is nothing to go in between them.
  • 42. Page | 42 The < br /> tag has a space between the characters br and the forward slash. If you omit this space, older browsers will have trouble rendering the line break, while you miss the forward slash it is not valid in XHTML. 5.1.3 CSS A CSS stands for “Cascading Style Sheet”. A CSS file allows you to separate your web sites(x) html from its style. As always you use your (x) html file to arrange the content, but all of the presentation (font, color, background...) are accomplished within a CSS.CSS works by allowing you to associate rules with the elements that appear in a web page. These rules govern how the content of those elements should be rendered.CSS rule, which is made up of two parts: the selector, which indicates which element or elements that appear in a web page. This applies to more than one element, you can have a comma- separated list of several elements).The decoration, which sets out how the elements referred to in the selector, should be styled. The padding property allows you to specify how much space should appear between the content of an element and its border. The value of this property is most often specified in pixels, although it can use any of the units of length we met earlier, a percentage, or the word inherit. The padding of an element will not inherit by default, so if the <body> element inside it. If the value inherit is applied to any elements, only then will they have the same padding and their parent element. If a percentage is used, the percentage is of the containing box, and if the value of 10 percent is specified, there would be 5 percent of each side of the box as padding. You can specify different amounts of padding inside each side of a box using the following properties: 1.padding – bottom 2.padding – top 3.padding- left 4.padding-right 5.1.4 JAVASCRIPT JavaScript is the world most popular programming language. JavaScript is a scripting language. JavaScript is a programming code that can be inserted in to html pages. JavaScript inserted to html page, can be executed by all modern web browsers. Along with refusing other people scripts and folders, you can also write code that you can reuse yourself. For example, you might build several sites that use a similar from that allows people to contact the site owners. On each contact from there might be several fields that are required, and you might decide to write a script to ensure that people fill in the required fields. Rather than writing a new script that you can use on my contact from you write. 1. Beginnings at Netscape JavaScript was originally developed by Brendan Eich, while he was working for Netscape Communications Corporation. Indeed, while competing with Microsoft for user adoption of
  • 43. Page | 43 web technologies and platforms, Netscape considered their client-server offering a distributed OS with a portable version of Sun Microsystems' Java providing an environment in which applets could be run.[citation needed] Because Java was a competitor of C++ and aimed at professional programmers, Netscape also wanted a lightweight interpreted language that would complement Java by appealing to nonprofessional programmers, like Microsoft's Visual Basic (see JavaScript and Java).Although it was developed under the name Mocha, the language was officially called Live Script when it first shipped in beta releases of Netscape Navigator 2.0 in September 1995, but it was renamed JavaScript when it was deployed in the Netscape browser version 2.0B3. The change of name from Live Script to JavaScript roughly coincided with Netscape adding support for Java technology in its Netscape Navigator web browser. The final choice of name caused confusion, giving the impression that the language was a spin-off of the Java programming language, and the choice has been characterized as a marketing ploy by Netscape to give JavaScript the cachet of what was then the hot new web programming language There is a common misconception that the JavaScript language was influenced by an earlier web page scripting language developed by Nombas named C--, not to be confused with the later C-- created in 1997. Brendan Eich, however, had never heard of C-- before he created LiveScript.[17] Nombas did pitch their embedded web page scripting to Netscape, though web page scripting was not a new concept, as shown by ViolaWWW. Nombas later switched to offering JavaScript instead of C-- in their ScriptEase product and was part of the TC39 group that standardized ECMAScript. 2. Server-side JavaScript Netscape introduced an implementation of the language for server-side scripting with Netscape Enterprise Server in December, 1994, soon after releasing JavaScript for browsers.[21][22] Since the mid-2000s, there has been a resurgence of server-side JavaScript implementations, such as Node.js. 3. Adoption by Microsoft Microsoft Windows script technologies including VBScript and JScript were released in 1996. JScript, a port of Netscape's JavaScript, was released on July 16, 1996 and was part of Internet Explorer 3, as well as being available server-side in Internet Information Server. IE3 also included Microsoft's first support for Cascading Style Sheets and various extensions to HTML, but in each case the implementation was noticeably different to that found in Netscape Navigator at the time. These differences made it difficult for designers and programmers to make a single website work well in both browsers leading to the use of 'best viewed in Netscape' and 'best viewed in Internet Explorer' logos that characterised these early years of the browser wars. JavaScript began to acquire a reputation for being one of the