Resource Usage Information System
Resource Usage Information System
INTRODUCTION
1.1 OVERVIEW OF THE PROJECT
This project entitled as “RESOURCE USAGE INFORMATION SYSTEM”. This
is used to computerize the printer usage information and functions across a single large
organization. This application is developed in a .NET platform. The front end of this project
This application can search any one of the student records as user requirement very
quickly for which manual operation take more time. This application increases the work
performance than previous work efficiency. And it calculates any calculation very quickly
and provides approximately hundred percentage efficient result. The application should
MODULES
Authentication Module
Admin Account
User Account
1
1.2 SYSTEM SPECIFICATION
RAM : 2 GB
Technology : Windows
SOFTWARE DESCRIPTION
FRONT END
2
The Microsoft .NET Framework is a software technology that is available with
solutions to common programming problems and a virtual machine that manages the
execution of programs written specifically for the framework. The .NET Framework is a key
Microsoft offering and is intended to be used by most new applications created for the
Windows platform.
code and managed code.
source-level debugger and a machine-level debugger. Other built-in tools include a forms
schema designer. It accepts plug-ins that enhance the functionality at almost every level—
toolsets like editors and visual designers for domain-specific languages or toolsets for other
Explorer).
and debugger to support (to varying degrees) nearly any programming language, provided a
3
2010). Support for other languages such as M, Python, and Ruby among others is available
The pre-coded solutions that form the framework's Base Class Library cover a large
range of programming needs in a number of areas, including user interface, data access,
network communications. The class library is used by programmers, who combine it with
Programs written for the .NET Framework execute in a software environment that
manages the program's runtime requirements. Also part of the .NET Framework, this runtime
environment is known as the Common Language Runtime (CLR). The CLR provides the
appearance of an application virtual machine so that programmers need not consider the
capabilities of the specific CPU that will execute the program. The CLR also provides other
important services such as security, memory management, and exception handling. The class
The .NET Framework can be hosted by unmanaged components that load the
common language runtime into their processes and initiate the execution of managed code,
thereby creating a software environment that can exploit both managed and unmanaged
features. The .NET Framework not only provides several runtime hosts, but also supports the
4
Internet Explorer is an example of an unmanaged application that hosts the runtime
(in the form of a MIME type extension). Using Internet Explorer to host the runtime to
ASSEMBLIES
functionality. All types in the .NET Framework must exist in assemblies; the common
language runtime does not support types outside of assemblies. Each time you create a
Microsoft Windows Application, Windows Service, Class Library, or other application with
Visual Basic .NET, you're building a single assembly. Each assembly is stored as an .exe
or .dll file.
1. The short name. On Windows this is the name of the Portable Executable (PE) file
2. The culture. This is an RFC 1766 identifier of the locale for the assembly. In general,
library and process assemblies should be culture neutral; the culture should only be
3. The version. This is a dotted number made up of four values — major, minor, build
and revision.
4. A public key token. This is a 64-bit hash of the public key that corresponds to the
private key used to sign[1] the assembly. A signed assembly is said to have a strong
name.
It describes set of data types that can be used in different .Net languages in common. (i.e),
CTS ensures that objects written in different .Net languages can interact with each other.
5
For Communicating between programs written in any .NET complaint language, the types
Value types:
Value types directly contain their data, and instances of value types are either allocated on the
stack or allocated inline in a structure. Value types can be built-in (implemented by the
Reference types:
Reference types store a reference to the value's memory address, and are allocated on the
heap. Reference types can be self-describing types, pointer types, or interface types. The type
types are further split into arrays and class types. The class types are user-defined classes,
The common language runtime's built-in support for language interoperability and
interact with code that is written by using a different programming language. Language
interoperability can help maximize code reuse and improve the efficiency of the development
process.
Because developers use a wide variety of tools and technologies, each of which might
support different features and types, it has historically been difficult to ensure language
6
interoperability. However, language compilers and tools that target the common language
runtime benefit from the runtime's built-in support for language interoperability.
The common language runtime provides the necessary foundation for language
metadata. Because all languages targeting the runtime follow the common type system rules
for defining and using types, the usage of types is consistent across
storing and retrieving information about types. Compilers store type information as metadata,
and the common language runtime uses this information to provide services during execution;
the runtime can manage the execution of multi language applications because all type
information is stored and retrieved in the same way, regardless of the language the code was
written in.
Managed code benefits from the runtime's support for language interoperability in the
following ways:
Types can inherit implementation from other types, pass objects to another type's
methods, and call methods defined on other types, regardless of the language the
Debuggers, profilers, or other tools are required to understand only one environment
—the Microsoft intermediate language (MSIL) and metadata for the common
language runtime—and they can support any programming language that targets the
runtime.
Exception handling is consistent across languages. Your code can throw an exception
in one language and that exception can be caught and understood by an object written
in another language.
7
Interoperability
Because interaction between new and older applications is commonly required, the
The Common Language Runtime (CLR) is the virtual machine component of the
.NET framework. All .NET programs execute under the supervision of the CLR,
guaranteeing certain properties and behaviours in the areas of memory management, security,
The Base Class Library (BCL), part of the Framework Class Library (FCL), is a
library of functionality available to all languages using the .NET Framework. The BCL
provides classes which encapsulate a number of common functions, including file reading
and writing, graphic rendering, database interaction and XML document manipulation.
Simplified Deployment
Installation of computer software must be carefully managed to ensure that it does not
interfere with previously installed software, and that it conforms to security requirements.
The .NET framework includes design features and tools that help address these requirements.
Security
8
The design is meant to address some of the vulnerabilities, such as buffer overflows,
that have been exploited by malicious software. Additionally, .NET provides a common
Portability
That is, a program written to use the framework should run without change on any type of
system for which the framework is implemented.
Memory Management
The .NET Framework CLR frees the developer from the burden of managing memory
(allocating and freeing up when done); instead it does the memory management itself. To this
end, the memory allocated to instantiations of .NET types (objects) is done contiguously from
the managed heap, a pool of memory managed by the CLR. The .NET Garbage Collector
only when a certain amount of memory has been used or there is enough pressure for memory
on the system. Since it is not guaranteed when the conditions to reclaim memory are reached,
Your code does not stay IL for long, however. It is the PE file, containing the IL that
can be distributed and placed with the CLR running on the .NET Framework on any
operating system for which the .NET framework exists, because the IL is platform
independent. When you run the IL, however, it is compiled to native code for that platform.
Therefore, you are still running native code; you are not going back to the days of interpreted
code at all. The compilation to native code occurs via another tool of the .NET Framework:
9
the Just-In-Time (JIT) compiler. With the code compiled, it can run within the Framework
and take advantage of low level features such as memory management and security.
The compiled code is native code for the CPU on which the .NET Framework is
running, meaning that you are indeed running native code instead of interpreted code. A JIT
compiler will be available for each platform on which the .NET Framework runs, so you
should always be getting native code on any platform running the .NET Framework.
Remember, today this is just Windows, but this could change in the future.
branded as Master Data Services, a central management of master data entities and
hierarchies. Also Multi Server Management, a centralized console to manage multiple SQL
Server 2008 instances and services including relational databases, Reporting Services,
SQL Server new features and enhancements include Always On SQL Server Failover
Cluster Instances and Availability Groups which provides a set of options to improve
instances, new and modified Dynamic Management Views and Functions, programmability
enhancements including new spatial features, metadata discovery, sequence objects and the
improvements to On Line and partition level operations and security enhancements including
provisioning during setup, new permissions, improved role management, and default schema
SQL Server stores records relating to each other in a table. Different tables are
created for the various groups of information. Related tables are grouped together to form a
10
database. SQL Server new features and enhancements include Always On SQL Server
Failover Cluster Instances and Availability Groups which provides a set of options to
improve database availability A database management, or DBMS, gives the user access to
their data and helps them transform the data into information. Such database management
systems include dBase, paradox, IMS, SQL Server and SQL Server. These systems allow
users to create, update and extract information from their database. It is called as data
manipulation.
Primary Key
Every table in SQL Server has a field or a combination of fields that uniquely
identifies each record in the table. The Unique identifier is called the Primary Key, or simply
the Key. The primary key provides the means to distinguish one record from all other in a
table. It allows the user and the database system to identify, locate and refer to one particular
Foreign Key
When a field is one table matches the primary key of another field is referred to as a
foreign key. A foreign key is a field or a group of fields in one table whose values match
2. SYSTEM STUDY
11
The resource usage information system concept for manage the entire schedule. It takes
more manual hours that need to spend in record keeping and generating reports. This
application keeps the data in a centralized way which is available to all the users
simultaneously. It is not effective to manage historical data in database. They need tool that
decreases manual hours spending for normal things and hence increases the performance.
12
Proposed system can using this technology we can make fast to handle resource
management about the student. Which try to automate the entire process keeping in view of
the database integration approach. These proposed system is window based application.
13
3.1 FILE DESIGN
File design is the act of taking the marketing information and creating the design of
the product to be manufactured. File design is therefore the process of defining and
design methods are becoming the most widely used methods for computer systems design. It
is widely used for modelling software systems and is increasingly used for high designing
In accurate input data is the most common cause of errors in data processing. Errors
found at the data entry can be controlled by the proper input design. The input was designed
To ensure that the input is acceptable and understandable by the people who
With the above objectives the major activities that were done during the input design is,
14
The outputs were needed to be generated as a hard copy and as well as queries to be
viewed on the screen. Keeping in view these outputs, the format for the output is taken from
the outputs, which are currently being obtained after manual processing. The standard printer
Outputs from computer systems are required primarily to communicate the results of
processing to users. They are also used to provide a permanent copy of the results for later
Internal Outputs whose destination is within organization and they are the
between them. General access methods are then applied to the conceptual schema to get the
The database design refers to the data organization, in the backup storage system.
This design place and important and critical role for the successful performance.
15
3.5.1 DESCRIPTION OF MODULES
1) Authentication Module
Authentication is used to verify the administrator account. If user Id and password are
This module contains the details of each particular student details. This module is to
indicate the student’s details such as id, name, department and year of studying.
This module used to maintain usage information about printer in college libratory, In
4) Reports
Reports are generated by the administrator can generate and view the reports like
16
4.1 SYSTEM TESTING
Software testing is a critical element and represents the ultimate view of specification,
design, and coding. The user tests it developed system and changes are made according their
needs. The testing phase involves it testing of developed system using various kinds of data.
System testing is actually a series of different tests whose primary purpose is to fully
exercise the computer-based system. System testing is the stage of implementation that is
aimed at assuring that the system works accurately and efficiently before live operation
commerce. Testing is the vital to the successor of the system. System testing makes it logical
assumption that if all the parts of the system are correct, the goal will be successfully
achieved. A series of testing is performed for the proposed system before the system is ready
Unit Testing
Unit testing focused the verification effort on the smallest unit of the software design
module. This is known as module testing. The systems are better separately. The testing was
concerned out during the programming stage itself. In this testing step each module was
White-box testing
White box testing focus on the control structure of the program. Test cases are derived to
ensure that all statements in the program have been executed at least once during testing and
All logical decisions have been exercised on their true and false sides
17
Black-box testing
Black box testing is designed to validate functional requirements without regard to the
internal workings of a program. Black box testing mainly focuses on the information domain
of the software, deriving test cases by partitioning input and output in a manner that provides
through test coverage. Incorrect and missing functions, interface errors, errors in data
structures, error in functional logic are the errors falling in this category.
All loops are executed at their boundaries and within their operational bounds
All internal data structures have been exercised to assure their validity
Acceptance Testing
completion of functional testing. This is the final stage in the testing process before the
system is accepted for operational use. This testing is should be done with original data and
with the presence of the users. This test confirms the system ready for use.
Integration Testing
Data can be lost across an interface, one module can have an adverse effect on
another, sub function when combined, may not produce the desired major function.
Integration testing is a systematic technique for constructing the program. Structure, which at
the same time conducting tests to uncover errors associated with in the interface. The
objective is to take unit tested module s and to build a program structure. All the modules are
Here correction is difficult because the isolated of causes is complicated by the vast
expanse of the entire program. Thus is the integration-testing step, all the errors uncovered
18
Validation Testing
package, interfacing errors have been uncovered and corrected and a final series of software
upon which validation tests begin. Validation testing can be defined in many was but a simple
definition id that validation succeeds when the software function is a manner that can be
After validation test has been conducted one of the two possible condition exits the
The implementation of a computer based system requires to be tested first so that one
can firm whether it work effectively. It is also tested on the basis of its performable and
effectiveness. The tested should be carried out is a well planned and it is structured manner to
see whether there are only loop holes and there loop holes must be effectively removed.
System Security
The developed system will be executed only by giving the password. The password
facility gives security to the system such that no unauthorized person can enter the system
and edit and also someone else cannot copy the software.
19
Data are a major asset and should be produced in a database environment where
20
5. CONCLUSION AND FUTURE ENHANCEMENT
5.1 CONCLUSION
computerized and quick easier then when done manually. Appropriate messages are
displayed to assist to user whenever necessary. Input screens are simple and easy to
This application has been developed to meet almost all the requirements of the user.
The system is tested with the sample data and found to be executing at its maximum
performance. The software enables the organization to carry out the feedback and preparing
the report effectively after the implementation. When all the suggestions forwarded in the
This project has been developed keeping in mind all the given possible conditions to
After implementation of the system the client may require some changes to be made with the
project. This project was enhanced as the web application. Whenever changes are made it
will not affect the performance or efficiency of the existing system. Several navigations can
The alterations will be saved and it can be used along with the existing system. The
changes requested by the user after implementation of the project can be done easily and
added to the existing system. The student feedback can be accessed by various departments.
The admin can view the feedback details from anywhere if this project is enhanced as the
web application.
21
6. BIBLIOGRAPHY
TEXT BOOKS
3. Benjamin Nevarez, “Inside the SQL Server Query Optimize”, Red gate books , 2011
4. Damon Allison, Andy Olsen, and James Speer, “Visual Basic .NET Class Design
5. Elias M.Award, “System Analysis and Design”, Galgotia Publications, Second Edition.
WEBSITES
1. www.infinitysql.com
2. www.elsevisedefault.vb.com
3. www. dotnet-tricks.com
4. www. sqlmag.com
5. www.vbtutor.net
22
APPENDIX
A.DATA FLOW DIAGRAM
Level 0
Admin
Id,pwd Login View Resource Usage
Information
Level 1
Access
Entry
Resource
Usage
Generate
Report
23
B. ER DIAGRAM Gender
Address
Student Name
Student RNo
Purpose
Date
Time
Usage Notes
C.TABLE DESIGN
24
1) Table Name: Login Details
25
STRno nvarchar 6 Student registration number
Stname nvarchar 25 Student name
Stpwd nvarchar 20 Student Password
Stgend nvarchar 6 Student gender
Stdob date - Student date of birth
Stcno int 10 Student contact number
Stmail nvarchar 20 Student mail id
Stadd nvarchar 50 Student address
Crsstd nvarchar 20 Course Studying
Stdtype nvarchar 20 Student Type
26
D. SAMPLE SCREENS
27
Fig 1: User Selection Form
28
Fig 2: Admin Invalid Login Form
29
Fig 3: Admin Valid Login Form
30
Fig 4: Admin Menu Form
31
Fig 5: Student Registration Form
32
Fig 6: User Login Form
33
Fig 7: User Selection Form
34
Fig 8: Resource Usage Form
35
Fig 9: Date Wise Resource Usage Form
36
Fig 10: Resource Usage Report
E. SAMPLE CODING
Imports System.Data
Imports System.Data.SqlClient
Public Class StudentRegistration
37
Dim con As New SqlConnection
Dim cmd As New SqlCommand
Dim da As New SqlDataAdapter("select *from Students", con)
Dim ds As New DataSet
Dim dbind As New BindingSource
Dim a As Integer = 0
Dim qry, qry1 As String
Dim i As Integer
Dim reader As SqlDataReader
Dim adp As SqlDataAdapter
Private Sub Button1_Click(ByVal sender As System.Object, ByVal e As
System.EventArgs) Handles Button1.Click
Me.Hide()
End Sub
End Sub
Private Sub LoadDatabase()
con.Close()
con.ConnectionString = "Data Source=.\SQLEXPRESS;Initial
Catalog=Resources;Integrated Security=True"
con.Open()
End Sub
Public Sub Load1()
ClearGridView()
LoadDatabase()
da.Fill(ds, "Students")
dbind.DataSource = ds
dbind.DataMember = ds.Tables(0).ToString()
DataGridView1.DataSource = dbind
End Sub
Private Sub ClearGridView()
For Each row As DataGridViewRow In DataGridView1.Rows
DataGridView1.Rows.Remove(row)
Next
End Sub
Public Sub clear()
txtbuyerid.Clear()
TextBox1.Clear()
TextBox4.Clear()
txtaddress.Clear()
txtcontact.Clear()
txtmail.Clear()
End Sub
38
Private Sub DataGridView1_SelectionChanged(ByVal sender As Object, ByVal e As
System.EventArgs) Handles DataGridView1.SelectionChanged
Try
Dim dgv As DataGridView = TryCast(sender, DataGridView)
If dgv IsNot Nothing AndAlso dgv.SelectedRows.Count > 0 Then
Dim row As DataGridViewRow = dgv.SelectedRows(0)
If row IsNot Nothing Then
txtbuyerid.Text = row.Cells(0).Value.ToString()
TextBox1.Text = row.Cells(1).Value.ToString()
TextBox4.Text = row.Cells(2).Value.ToString()
ComboBox1.Text = row.Cells(3).Value.ToString()
txtcontact.Text = row.Cells(5).Value.ToString()
txtmail.Text = row.Cells(6).Value.ToString()
txtaddress.Text = row.Cells(7).Value.ToString()
ComboBox2.Text = row.Cells(8).Value.ToString()
ComboBox3.Text = row.Cells(9).Value.ToString()
dtdate.Value = row.Cells(4).Value.ToString()
End If
End If
Catch ex As Exception
End Try
End Sub
cmd.ExecuteNonQuery()
MsgBox("Details of Student are Successfully Inserted", vbInformation, "Successfully
Inserted")
clear()
con.Close()
Catch ex As Exception
MsgBox("Details are not Inserted! Please Try Later", vbInformation, "Error In
Inserting Company Details")
39
End Try
ClearGridView()
ClearGridView()
ClearGridView()
ClearGridView()
ClearGridView()
ClearGridView()
ClearGridView()
Load1()
End Sub
40
''End If
Catch ex As Exception
MsgBox("Unable to Update Record! Please Try Later", vbInformation, "Error in
Updating Record")
End Try
End Sub
41
da.SelectCommand.CommandType = CommandType.StoredProcedure
da.SelectCommand.Parameters.AddWithValue("SName", TextBox4.Text)
Dim dt As New DataTable
da.Fill(dt)
DataGridView1.DataSource = dt
con.Close()
End Sub
End Sub
End Class
42