Call Center
Call Center
Call Center
A PROJECT REPORT ON
Done By
Project Report
CERTIFICATE
Principal
******College
Name******
External
Project Report
ACKNOWLEDGEMENT
At every outset I express my gratitude to almighty lord
for showering his grace and blessings upon me to
complete this project.
Although our name appears on the cover of this book,
many people had contributed in some form or the other
form to this project Development. We could not done this
project without the assistance or support of each of the
following we thank you all.
I wish to place on my record my deep sense of gratitude
to
my
project
guide,
Mr.
******,
*****
Software
Project Report
*******Your Name*********
ABSTRACT
Project Report
This system will track the employees login details. And also maintains the data
the employee attend the call and his behavior with customer and the speech will be
recorded into file. Sometimes customer request for service to the organization. This
data also maintains the system.
Project Report
Preface
Table of Contents
1. INTRODUCTION
1.1
INTRODUCTION TO PROJECT
1.2
ORGANIZATION PROFILE
1.3
1.4
1.5
2. SYSTEM ANALYSIS
2.1
INTRODUCTION
2.2
ANALYSIS MODEL
2.3
2.4
2.5
PROPOSED SYSTEM
2.6
2.7
3. FEASIBILITY REPORT
3.1
TECHNICAL FEASIBILITY
Project Report
OPERATIONAL FEASIBILITY
3.3
ECONOMICAL FEASIBILTY
FUNCTIONAL REQUIREMENTS
4.2
PERFORMANCE REQUIREMENTS
5. SELECTED SOFTWARE
5.1
5.2
ASP.NET
5.3
C#.NET
5.4
SQL SERVER
6. SYSTEM DESIGN
6.1
INTRODUCTION
6.2
6.3
NORMALIZATION
6.4
E-R DIAGRAM
6.5
6.6
DATA DICTIONARY
6.7
UML DIAGRAMS
7. OUTPUT SCREENS
8. SYSTEM TESTING AND IMPLEMENTATION
8.1
INTRODUCTION
8.2
UNIT TESTING
8.4
TEST CASES
9. SYSTEM SECURITY
9.1
INTRODUCTION
9.2
SECURITY IN SOFTWARE
10.
CONCLUSION
11.
FUTURE ENHANCEMENTS
12.
BIBLOGRAPHY
Electronic Commerce
Consulting
IT Outsourcing
We apply technology with innovation and responsibility to achieve two broad
objectives:
Project Report
The existing system is a manual system. Here the employees needs to save
the information in the form of excel sheets or Disk Drives.
Project Report
The manual system gives us very less security for saving data; some data
may be lost due to mismanagement.
The system makes the overall project management much easier and flexible.
This can give the good security for user information because data is not in
client machine.
Project Report
The automated system will provide to the customers for reliable services.
The speed and accuracy of this system will improve more and more.
Project Report
SYSTEM ANALYSIS
2.1 INTRODUCTION
After analyzing the requirements of the task to be performed, the next step
is to analyze the problem and understand its context. The first activity in the phase
is studying the existing system and other is to understand the requirements and
domain of the new system. Both the activities are equally important, but the first
activity serves as a basis of giving the functional specifications and then successful
design of the proposed system. Understanding the properties and requirements of a
new system is more difficult and requires creative thinking and understanding of
existing running system is also difficult, improper understanding of present system
can lead diversion from solution.
SDLC METHDOLOGIES
This document play a vital role in the development of life cycle (SDLC) as it
describes the complete requirement of the system. It means for use by
developers and will be the basic during testing phase. Any changes made to the
requirements in the future will have to go through formal change approval
process.
SPIRAL MODEL was defined by Barry Boehm in his 1988 article, A spiral
Model of Software Development and Enhancement. This model was not the first
model to discuss iterative development, but it was the first model to explain why
the iteration models.
As originally envisioned, the iterations were typically 6 months to 2 years
long. Each phase starts with a design goal and ends with a client reviewing the
progress thus far. Analysis and engineering efforts are applied at each phase of
the project, with an eye toward the end goal of the project.
At the customer option, the entire project can be aborted if the risk is
deemed too great. Risk factors might involved development cost
overruns, operating-cost miscalculation, or any other factor that could, in
the customers judgment, result in a less-than-satisfactory final product.
The preceding steps are iterated until the customer is satisfied that the
refined prototype represents the final product desired.
Project Report
Project Report
2.
NUMBER OF MODULES
The system after careful analysis has been identified to be presented with the
following modules:
1. Administrator
2. Call Center Employees
3. Customers
4. Services
5. Employee Rosters
6. Reports
7. Authentication
Administration
Project Report
The
the
can
are
Customers
Customers in the sense of service holders. While using the services the
customers have to face any problem then they automatically call to the call center
and find a solution.
Services
Customer service also known as Client Service is the provision of service to
customer before, during and after purchase. Customer service is a series of
activities designed to enhance to level of customer satisfaction. Here customer
services my provided by a call center person. Customer service is an integral part
of a companys customer value proportions. Servicer in the sense of
Employee Rosters
The maintenance of employee rosters in a call center is a tough job. Every
roster has three shifts. Roster has starting date and ending date and an in charge
will be there for every roster. Call center employee need to follow their roster and
shift. Every roster has holiday also. Admin Can keep track employees rosters and
shifts means employees login date and time, log off date and time etc.,
Project Report
Hardware Requirements:
Software Requirements:
version 3.5
Project Report
Project Report
Admin enter user id or date for track the user login information
New users give his completed personnel, address and phone details for
registration.
Admin gives different kind of user information for search the user data.
User gives his user id, hint question, answer for getting the forgotten
password.
Outputs:
Project Report
Project Report
Feasibility Report
Project Report
Technical Feasibility
Operational Feasibility
Economical Feasibility
Do the proposed equipments have the technical capacity to hold the data
required to use the new system?
Are there technical guarantees of accuracy, reliability, ease of access and data
security?
Earlier no system existed to cater to the needs of Secure Infrastructure
reliability and security. The software and hard requirements for the development of
this project are not many and are already available in-house at NIC or are available
as free as open source. The work for the project is done with the current equipment
and existing software technology. Necessary bandwidth exists for providing a fast
feedback to the users irrespective of the number of users using the system.
Will the system be used and work properly if it is being developed and
implemented?
Will there be any resistance from the user that will undermine the possible
application benefits?
This system is targeted to be in accordance with the above-mentioned
issues. Beforehand, the management issues and user requirements have been
taken into consideration. So there is no question of resistance from the users that
can undermine the possible application benefits.
The well-planned design would ensure the optimal utilization of the computer
resources and would help in the improvement of performance status.
Project Report
Project Report
The software, Site Explorer is designed for management of web sites from a
remote location.
INTRODUCTION
Purpose: The main purpose for preparing this document is to give a general insight
into the analysis and requirements of the existing system or situation and for
determining the operating characteristics of the system.
Scope: This Document plays a vital role in the development life cycle (SDLC) and it
describes the complete requirement of the system. It is meant for use by the
developers and will be the basic during testing phase. Any changes made to the
requirements in the future will have to go through formal change approval process.
DEVELOPERS RESPONSIBILITIES OVERVIEW:
The developer is responsible for:
Developing the system, which meets the SRS and solving all the requirements of
the system?
Demonstrating the system and installing the system at client's location after the
acceptance testing is successful.
Submitting the required user manual describing the system interfaces to work
on it and also the documents of the system.
Conducting any user training that might be needed for using the system.
Project Report
Internal Outputs whose destination is within organization and they are the
OUTPUT DEFINITION
The outputs should be defined in terms of the following points:
Project Report
Output Media:
In the next stage it is to be decided that which medium is the most
appropriate for the output. The main considerations when deciding about the output
media are:
Keeping in view the above description the project is to have outputs mainly coming
under the category of internal outputs. The main outputs desired according to the
requirement specification are:
The outputs were needed to be generated as a hot copy and as well as queries to
be viewed on the screen. Keeping in view these outputs, the format for the output
is taken from the outputs, which are currently being obtained after manual
processing. The standard printer is to be used as output media for hard copies.
INPUT DESIGN
Input design is a part of overall system design. The main objective during
the input design is as given below:
Project Report
INPUT STAGES:
The main input stages can be listed as below:
Data recording
Data transcription
Data conversion
Data verification
Data control
Data transmission
Data validation
Data correction
INPUT TYPES:
It is necessary to determine the various types of inputs. Inputs can be categorized
as follows:
INPUT MEDIA:
At this stage choice has to be made about the input media.
To conclude
Type of input
Flexibility of format
Speed
Accuracy
Verification methods
Rejection rates
Project Report
Ease of correction
Security
Easy to use
Portability
Keeping in view the above description of the input types and input media, it
can be said that most of the inputs are of the form of internal and interactive. As
Input data is to be the directly keyed in by the user, the keyboard can be
considered to be the most suitable input device.
ERROR AVOIDANCE
At this stage care is to be taken to ensure that input data remains accurate
form the stage at which it is recorded up to the stage in which the data is accepted
by the system. This can be achieved only by means of careful control each time the
data is handled.
ERROR DETECTION
Even though every effort is make to avoid the occurrence of errors, still a
small proportion of errors is always likely to occur, these types of errors can be
discovered by using validations to check the input data.
DATA VALIDATION
Procedures are designed to detect errors in data at a lower level of detail.
Data validations have been included in the system in almost every area where there
is a possibility for the user to commit errors.
data. Whenever an invalid data is keyed in, the system immediately prompts the
user and the user has to again key in the data and the system will accept the data
only if the data is correct. Validations have been included where necessary.
Project Report
user/computer dialogue.
Project Report
menu with more options. In this way every option leads the users to data entry
form where the user can key in the data.
ERROR MESSAGE DESIGN:
The design of error messages is an important part of the user interface
design. As user is bound to commit some errors or other while designing a system
the system should be designed to be helpful by providing the user with information
regarding the error he/she has committed.
This application must be able to produce output at different modules for
different inputs.
requirements have to be known during the initial stages so that the system can be
designed according to those requirements. It is very difficult to change the system
once it has been designed and on the other hand designing a system, which does
not cater to the requirements of the user, is of no use.
The requirement specification for any system can be broadly stated as given
below:
Project Report
SELECTED SOFTWARE
Project Report
Project Report
Project Report
Architecture
Project Report
Project Report
Metadata
All CLI is self-describing through .NET metadata. The CLR checks the
metadata to ensure that the correct method is called. Metadata is usually generated
by language compilers but developers can create their own metadata through
custom attributes. Metadata contains information about the assembly, and is also
used to implement the reflective programming capabilities of .NET Framework.
Security
.NET has its own security mechanism with two general features: Code Access
Security (CAS), and validation and verification. Code Access Security is based on
evidence that is associated with a specific assembly. Typically the evidence is the
source of the assembly (whether it is installed on the local machine or has been
downloaded from the intranet or Internet). Code Access Security uses evidence to
determine the permissions granted to the code. Other code can demand that calling
code is granted a specified permission. The demand causes the CLR to perform a
call stack walk: every assembly of each method in the call stack is checked for the
required permission; if any assembly is not granted the permission a security
exception is thrown.
When an assembly is loaded the CLR performs various tests. Two such tests
are validation and verification. During validation the CLR checks that the assembly
contains valid metadata and CIL, and whether the internal tables are correct.
Verification is not so exact. The verification mechanism checks to see if the code
does anything that is 'unsafe'. The algorithm used is quite conservative; hence
occasionally code that is 'safe' does not pass. Unsafe code will only be executed if
the assembly has the 'skip verification' permission, which generally means code
that is installed on the local machine.
Project Report
Project Report
Project Report
3.0.4506.30
3.5.21022.8
2006-11-06
2007-11-09
5.2 ASP.NET
Project Report
Project Report
Project Report
LANGUAGE SUPPORT
The Microsoft .NET Platform currently offers built-in support for three
languages: C#, Visual Basic, and Java Script.
WHAT IS ASP.NET WEB FORMS?
The ASP.NET Web Forms page framework is a scalable common language
runtime programming model that can be used on the server to dynamically
generate Web pages.
Intended as a logical evolution of ASP (ASP.NET provides syntax compatibility
with existing pages), the ASP.NET Web Forms framework has been specifically
designed to address a number of key deficiencies in the previous model. In
particular, it provides:
The ability to create and use reusable UI controls that can encapsulate common
functionality and thus reduce the amount of code that a page developer has to
write.
The ability for developers to cleanly structure their page logic in an orderly
fashion (not "spaghetti code").
The ability for development tools to provide strong WYSIWYG design support for
pages (existing ASP code is opaque to tools).
ASP.NET Web Forms pages are text files with an .aspx file name extension.
They can be deployed throughout an IIS virtual root directory tree. When a browser
client requests .aspx resources, the ASP.NET runtime parses and compiles the
target file into a .NET Framework class. This class can then be used to dynamically
process incoming requests. (Note that the .aspx file is compiled only the first time it
is accessed; the compiled type instance is then reused across multiple requests).
An ASP.NET page can be created simply by taking an existing HTML file and
changing its file name extension to .aspx (no modification of code is required). For
Project Report
Project Report
1. ASP.NET Web Forms provide an easy and powerful way to build dynamic Web UI.
2. ASP.NET Web Forms pages can target any browser client (there are no script
library or cookie requirements).
3. ASP.NET Web Forms pages provide syntax compatibility with existing ASP pages.
4. ASP.NET server controls provide an easy way to encapsulate common
functionality.
5. ASP.NET ships with 45 built-in server controls. Developers can also use controls
built by third parties.
6. ASP.NET server controls can automatically project both uplevel and downlevel
HTML.
7. ASP.NET templates provide an easy way to customize the look and feel of list
server controls.
8. ASP.NET validation controls provide an easy way to do declarative client or
server data validation.
5.3 C#.NET
ADO.NET OVERVIEW
ADO.NET is an evolution of the ADO data access model that directly
addresses user requirements for developing scalable applications. It was designed
specifically for the web with scalability, statelessness, and XML in mind.
ADO.NET uses some ADO objects, such as the Connection and Command objects,
and also introduces new objects. Key new ADO.NET objects include the Dataset,
Data Reader, and Data Adapter.
The important distinction between this evolved stage of ADO.NET and
previous data architectures is that there exists an object -- the DataSet -- that is
separate and distinct from any data stores. Because of that, the DataSet functions
as a standalone entity. You can think of the DataSet as an always disconnected
recordset that knows nothing about the source or destination of the data it
contains. Inside a DataSet, much like in a database, there are tables, columns,
relationships, constraints, views, and so forth.
A DataAdapter is the object that connects to the database to fill the
DataSet. Then, it connects back to the database to update the data there, based
on operations performed while the DataSet held the data. In the past, data
processing has been primarily connection-based. Now, in an effort to make multitiered apps more efficient, data processing is turning to a message-based approach
that revolves around chunks of information. At the center of this approach is the
DataAdapter, which provides a bridge to retrieve and save data between a
Project Report
Connections:
Project Report
Project Report
Project Report
ADO.NET was created with n-Tier, statelessness and XML in the forefront. Two
new objects, the DataSet and DataAdapter, are provided for these scenarios.
3.
ADO.NET can be used to get data from a stream, or to store data in a cache
for updates.
4.
5.
Also, you can use a DataSet to bind to the data, move through the data, and
navigate data relationships
A database management, or DBMS, gives the user access to their data and
helps them transform the data into information. Such database management
systems include dBase, paradox, IMS, SQL Server and SQL Server. These systems
allow users to create, update and extract information from their database.
A database is a structured collection of data.
characteristics of people, things and events. SQL Server stores each data item in
its own fields.
event are bundled together to form a single complete unit of data, called a record
(it can also be referred to as raw or an occurrence). Each record is made up of a
number of fields. No two fields in a record can have the same field name.
During an SQL Server Database design project, the analysis of your business
needs identifies all the fields or attributes of interest.
change over time, you define any additional fields or change the definition of
existing fields.
SQL SERVER TABLES
Project Report
RELATIONAL DATABASE
Sometimes all the information of interest to a business operation can be
stored in one table.
system, or RDBMS. It stores data in two or more tables and enables you to define
relationships between the table and enables you to define relationships between the
tables.
FOREIGN KEY
When a field is one table matches the primary key of another field is referred
to as a foreign key. A foreign key is a field or a group of fields in one table whose
values match those of the primary key of another table.
REFERENTIAL INTEGRITY
Not only does SQL Server allow you to link multiple tables, it also maintains
consistency between them.
Project Report
what data are actually stored is described and entries and relationship among
them.
View level:
DISADVANTAGES OF DBMS
A significant disadvantage of the DBMS system is cost.
In addition to the
Project Report
Project Report
Project Report
transaction remains as shared memory so that other transactions may access that
data without reading it again from disk. Since fast commits write all data necessary
to the recovery to the log file, modified blocks are written back to the database
independently of the transaction commit, when written from memory to disk.
SYSTEM DESIGN
Project Report
6.1. INTRODUCTION
Software design sits at the technical kernel of the software engineering
process and is applied regardless of the development paradigm and area of
application. Design is the first step in the development phase for any engineered
product or system. The designers goal is to produce a model or representation of
an entity that will later be built. Beginning, once system requirement have been
specified and analyzed, system design is the first of the three technical activities
-design, code and test that is required to build and verify software.
The importance can be stated with a single word Quality. Design is the
place where quality is fostered in software development. Design provides us with
representations of software that can assess for quality. Design is the only way that
we can accurately translate a customers view into a finished software product or
system. Software design serves as a foundation for all the software engineering
steps that follow. Without a strong design we risk building an unstable system
one that will be difficult to test, one whose quality cannot be assessed until the last
stage.
During design, progressive refinement of data structure, program structure,
and procedural details are developed reviewed and documented. System design can
be viewed from either technical or project management perspective. From the
technical point of view, design is comprised of four activities architectural design,
data structure design, interface design and procedural design.
Project Report
6.3 NORMALIZATION
It is a process of converting a relation to a standard form. The process is
used to handle the problems that can arise due to data redundancy i.e. repetition of
data in the database, maintain data integrity as well as handling problems that can
arise due to insertion, updating, deletion anomalies.
Decomposing is the process of splitting relations into multiple relations to
eliminate anomalies and maintain anomalies and maintain data integrity. To do this
we use normal forms or rules for structuring relation.
Insertion anomaly: Inability to add data to the database due to absence of other
data.
Deletion anomaly: Unintended loss of data due to deletion of other data.
Update anomaly: Data inconsistency resulting from data redundancy and partial
update
Normal Forms:
anomalies.
Project Report
D
6.4 E-R Diagrams
The entity Relationship Diagram (ERD) depicts the relationship between the data
objects. The ERD is the notation that is used to conduct the date modeling
activity the attributes of each data object noted is the ERD can be described
resign a data object descriptions.
The set of primary components that are identified by the ERD are
Data object
Relationships
Project Report
Attributes
The primary purpose of the ERD is to represent data objects and their relationships.
E-R Diagram:
Project Report
A full
description of a system actually consists of a set of data flow diagrams. Using two
familiar notations Yourdon, Gane and Sarson notation develops the data flow
diagrams. Each component in a DFD is labeled with a descriptive name. Process is
further identified with a number that will be used for identification purpose.
development of DFDS is done in several levels.
The
diagrams can be broken down into a more detailed DFD in the next level. The loplevel diagram is often called context diagram. It consists a single process bit, which
plays vital role in studying the current system.
Project Report
Data flow
Data Store
CONSTRUCTING A DFD:
Several rules of thumb are used in drawing DFDS:
Project Report
Each name
Data
traditionally flow from source to the destination although they may flow back to
the source. One way to indicate this is to draw long flow line back to a source.
An alternative way is to repeat the source symbol as a destination. Since it is
used more than once in the DFD it is marked with a short diagonal.
3. When a process is exploded into lower level details, they are numbered.
4. The names of data stores and destinations are written in capital letters. Process
and dataflow names have the first letter of each work capitalized.
A DFD typically shows the minimum contents of data store. Each data store
should contain all the data elements that flow in and out.
Questionnaires should contain all the data elements that flow in and out.
Missing interfaces redundancies and like is then accounted for often through
interviews.
SAILENT FEATURES OF DFDS
1. The DFD shows flow of data, not of control loops and decision are controlled
considerations do not appear on a DFD.
2. The DFD does not indicate the time factor involved in any process whether the
dataflow take place daily, weekly, monthly or yearly.
3. The sequence of events is not brought out on the DFD.
TYPES OF DATA FLOW DIAGRAMS
1. Current Physical
2. Current Logical
3. New Logical
4. New Physical
CURRENT PHYSICAL:
Project Report
Project Report
It may flow in
both directions between a process and a data store to show a read before an
update.
Project Report
Project Report
Project Report
Project Report
Project Report
3 rd Level DFD
Project Report
Emp Operations
Project Report
Emp Operations
Project Report
Project Report
Project Report
Project Report
Project Report
Project Report
Project Report
Project Report
Project Report
Project Report
Activity Diagrams:
Registration Activity Diagram:
Project Report
Project Report
Project Report
Project Report
OUTPUT SCREENS
Project Report
Project Report
Project Report
Project Report
Project Report
Project Report
Project Report
Project Report
Project Report
Project Report
Project Report
Project Report
Project Report
Project Report
Project Report
Project Report
Project Report
Project Report
Project Report
Project Report
Project Report
Project Report
Project Report
8.1
INTRODUCTION
Project Report
UNIT TESTING
MODULE TESTING
Component Testing
SUB-SYSTEM
TESING
SYSTEM TESTING
Integration Testing
Project Report
ACCEPTANCE TESTING
User Testing
Project Report
All logical decisions have been exercised on their true and false sides
All loops are executed at their boundaries and within their operational bounds
All internal data structures have been exercised to assure their validity.
To follow the concept of white box testing we have tested each form .we have
created independently to verify that Data flow is correct, All conditions are
exercised to check their validity, All loops are executed on their boundaries.
2. BASIC PATH TESTING
Established technique of flow graph with Cyclomatic complexity was used to derive
test cases for all the functions. The main steps in deriving test cases were:
Use the design of the code and draw correspondent flow graph.
Determine the Cyclomatic complexity of resultant flow graph, using formula:
V(G)=E-N+2 or
V(G)=P+1 or
V(G)=Number Of Regions
Where V(G) is Cyclomatic complexity,
E is the number of edges,
N is the number of flow graph nodes,
P is the number of predicate nodes.
Determine the basis of set of linearly independent paths.
3. CONDITIONAL TESTING
In this part of the testing each of the conditions were tested to both true and false
aspects. And all the resulting paths were tested. So that each path that may be
generate on particular condition is traced to uncover any possible errors.
Project Report
Project Report
SYSTEM SECURITY
9.1 INTRODUCTION
The protection of computer based resources that includes hardware,
software, data, procedures and people against unauthorized use or natural
Disaster is known as System Security.
System Security can be divided into four related issues:
Security
Integrity
Privacy
Project Report
VBScript in used to ensure those required fields are filled with suitable data only.
Maximum lengths of the fields of the forms are appropriately defined.
Forms cannot be submitted without filling up the mandatory data so that manual
mistakes of submitting empty fields that are mandatory can be sorted out at the
client side to save the server time and load.
Project Report
Tab-indexes are set according to the need and taking into account the ease of
user while working with the system.
Server side constraint has been imposed to check for the validity of primary key
and foreign key. A primary key value cannot be duplicated. Any attempt to
duplicate the primary value results into a message intimating the user about
those values through the forms using foreign key can be updated only of the
existing foreign key values.
Various Access Control Mechanisms have been built so that one user may not
agitate upon another. Access permissions to various types of users are controlled
according to the organizational structure. Only permitted users can log on to the
system and can have access according to their category. User- name, passwords
and permissions are controlled o the server side.
Project Report
CONCLUSION
It has been a great pleasure for me to work on this exciting and challenging
project. This project proved good for me as it provided practical knowledge of not
only programming in ASP.NET and C#.Net web based application and no some
extent Windows Application and SQL Server, but also about all handling procedure
related with Call Center Executer. It also provides knowledge about the latest
technology used in developing web enabled application and client server technology
Project Report
LIMITATIONS:
Project Report
The size of the database increases day-by-day, increasing the load on the
database back up and data maintenance activity.
Training for simple computer operations is necessary for the users working on
the system.
Project Report
FUTURE IMPROVEMENT
Project Report
A console for the data centre may be made available to allow the personnel
to monitor on the sites which were cleared for hosting during a particular
period.
Project Report
BIBLIOGRAPHY
Project Report
FOR SQL
www.msdn.microsoft.com
FOR ASP.NET
Asp.Net 3.5 Unleashed
www.msdn.microsoft.com/net/quickstart/aspplus/default.c
om
www.asp.net
www.fmexpense.com/quickstart/aspplus/default.com
www.asptoday.com
www.aspfree.com
www.4guysfromrolla.com/index.aspx
Project Report