Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
A PROJECT REPORT ON
SUBMITTED BY:
2. Certificate of Originality
3. Brief about the organization R.M Infotech(P) Ltd.
4.Introduction to the Problem
5.Introduction to Project.
6. Purpose.
7. Objective.
8. Contribution of Project
9 Hardware Software Used
. About Java.
. About Oracle.
10. Analysis.
. My Role
. Module Description
. Methology
. Table Description.
. Flow Diagram.
11. Problem Definition
. Exiting system
. Proposed system
. Feasibility Study
. Request Approval
. Optimization
. Validation Checks
. Object of the proposed
12. Bibliography
13. Screens
14. Demo Code.
ACKNOWLEDGEMENT
PROJECT
ON LINE SHOPPING
BY :
KRISHNA KUMAR SINGH
COMPANY PROFILE
batches prospectively with twelve students in each batch per day i.e. seventy students
per day subsequently.
The organization enables trainees to use the potential of technology through
experienced IT professionals. We have a staff strength of six senior developers with
BE & MCA background and having experience in development of minimum two
years.
The Lab-Room is equipped with heavily configured ten P.C. connected through
network and loaded with all latest software like c# (sharp), EJB and Oracle 8i. The
center is also equipped with backup facility in case of electricity failure.
OUR VISION :
We shall define ourselves in the cutting edge technology in the coming era. We shall
create honest working environment with see-through-glass planning.
OUR MISSION :
To create opportunity for growth & self actualization to trainees and provide An
environment of highly conducive works culture.
TECHNICAL STRUCTURE :
For Web Site :
Front End
Middle Tier
RDBMS
Server
HTML.
JSDK 2.0
Oracle8i
JWS 2.0
DHTML
Flash
Photoshop
Java Script
JSP
EJB
Added features :
Tom Cat.
Weblogic5.0
a)
b)
c)
d)
e)
For Application :
Front End
RDBMS
VC++
Visual Basic
Oracle8i
Operating System
Windows NT
Introduction to Project
Title of Project
U.R.L
:
Client
:
Status
Team Size
Duration
:
On Line Shopping.
www.microdataproduct.com
Micro Data Product (P) Ltd.
Banglore, India.
Uploadtion and Maintenance in process
:
Four Team Member.
:
500 600 hrs project.
Site will be promoted through various means(1) Through personal approach by marketing division
(2) Through telemarketing
(3) Through advertisement in various newspaper
Maintenance
Brief Description :
This site is acting as a middle men connecting Seller and Buyer. Both has to register
themselves by paying a minimum amount of Rs. 500/- which will remain valid for
one year. After registration a seller has to register its product. Similarly Buyer can
log on to site and search for a product and can do shopping.
Project Category
This project is a Business to Consumer , E-Commerce web-site.
There is difference between Web-site and a Portal. Example of Portal is like
Yahoo, Rediff and Indiatimes where as examples of Web-site is like bazee,
delhihotels, jobsahead etc. Portal is general in nature and has many objectives
to accomplish where as Web-site is specific in nature and has only one
objective to accomplish hence our project is a website and not a portal.
Second feature of this project is that it is a B2C ECommerce site
which means that on line money transaction is taking place between
consumer and Business house.
This is an On Line Shopping Web Site on which person can log in and
can register himself and can search for products.
Objective of this project is complete automation and globalization of Placement
Process. We have used J2EE as Middle Ware Logic and Oracle as a backend
database.
This is a era of Information Technology where getting information is
the base of each and every thing. Success of any business depends upon
its popularity and goodwill. Today market has been expanded and you
have to be a global player , today client want to access most of the
information from his residence and then do transaction.
World Wide Web i.e. Internet technology is the fastest medium to
access the information today. You can access any kind of information
from this technology. By registering a URL in World Wide Web you
make your self Global i.e. then any person from any part of world can
have access to your information.
To summarize over all we can say that Category of this project is :Web-Site.
E-Com i.e transaction on net.
Business to Consumer.
Virtual Auction site.
Both users can use search engine to search for a product
(i)
(ii)
(iii)
(iv)
(v)
(vi)
(vii)
(ii)
(iii)
The site includes the Chat Messenger which provides the users to
interact with each other online.
(iv)
The site includes the search engine and advance search engine
which gives the user easy way to find the product which he/she can
purchase.
(v)
The site also includes the electronic mail facility for the users who
have registered themselves.
(vi)
The site has the registration fee Rs. 500 which prevents the
unregistered user to bid a product.
(vii)
The site acts as a middle-ware for the seller and the buyer.
(viii)
The site has the facility to inform the seller and buyer about the
final sale.
The project would help in effective and systematic record keeping that is storing and
retrieving of useful data. Project will be able to give the report so that management can
make decisions on the basis of those reports.
Scope of the study: The main Scope of study:
It should contain all the information of Seller who is registering his product.
It should contain all the information of Product like Product id, Category, Sale
Price etc.
It should process and evaluate purchase made by buyers.
It should contain information of Sale Price etc.
It should contain information related to Product expiry or re registration.
It should inform both buyer and Seller when the product is sold.
It should maintain proper financial records.
It should have Administrator for scheduling administrative work of site.
It should contain all the information of company.
It should contain all the information of the products, which is produced by
the company with their quality.
It should contain all the information of the money transactions.
It should contain the facility of ordering the products through e-mail or
Fax.
It should contain facility of on line shopping either through credit card or through
bank.
ONLINE SHOPPING
User Info
User
User Info
U_registration
Prod
uct
Detai
ls
Product Info
User
Detai
ls
Product Info
Product Tables
Orde
r
Status Info
Order
Order Details
4
Order
Info
Order Details
E-R Diagram
for Shopping
DATA FLOW DIAGRAM
Product Tables
Product Price
User ID/CompanyID
Stock
Product Name
Name
Address
Manufactu
rers Name
Product
Category
Phone No.
Product ID
Shop
ping
User/Company
Product
Stock
Register
Category ID
Tra
nsa
ctio
n
Sale
Status
Order
Price
Quantity
Product ID
Product
Name
Product ID
Clients Name :The company Micro Data Product (P) Ltd. is one of the leading
manufacturers and exporters of Micro Processors , Modem , Sound Card, Fax Machine
etc.. It supplies these items to Middle-East countries, Singapore and other Western
countries.
This site is made to globalize product and to increase both buyers and sellers
hence increasing the business of client. There requirement was to prepare a web site
which can do manual things i.e. computerization of manual job. Some of the clients
requirements are: Clients Requirements :According to the Objectives we can specifically analyze the
clients requirements which are as under :
(a)
(b)
(c)
(d)
(e)
(f)
(g)
(h)
About the System: The whole system is divided into different module:Module 1:
Registration module, which is further sub-divided into two sub- sections: 1) Company Registration
2) User Registration.
Module 2:
Administration section, which is further sub-divided into three sub- sections: 1) Login
2) Forget Password
3) Change Password
Module 3:
Maintaining Company section, which is further sub-divided into three subsections: 1) Product Registration.
2) Product Updation.
3) Company Status.
Module 4:
Maintaining User section, which is further sub-divided into three subsections: 1) Search Engine.
2) Order Registration.
3) Order Updation.
4) User Status.
Site Working :1. Person can register as a Seller or Buyer but if one person wants to be both
Seller and Buyer he has to register him self twice first as a seller and then
as a Buyer with two user id.
2. This is a Paid Site where person has to pay registration amount .
Registration will remain valid for one year.
3. At the time of log in his status will be checked i.e. He is log in as Seller
or Buyer.
Case A
He is Log in as a Seller.
4. If person is Seller he can register his product , or update his product or can
check the status of his product i.e. How many purchases have been made,
what is the total sale price etc.
5. At the time of Product Registration Seller has to specify Market price and
other information of product.
6. If the product is already sold then Seller can not update his product.
7. At the Time of Product Registration Seller has to pay 2% of market price
as a security.
Case B
He is Log in as Buyer.
8. If he is buyer he can search for product of his choice, search engine will
display product information of the product; Buyer can choose the product
of his choice and make a bid.
9. After choosing products his shopping cart will be displayed showing total
number of purchases. He can make updation to his shopping cart.
10. If he makes order his order will be booked and an order id will be
generated.
11. Buyer can update his Order.
12. Buyer can check status of his purchase.
Login---A
Enter UserId
Enter Password
New Company Sign up ---- B
New User Sign up ------ C
Forget Password ------ D
Change Password ---- E
Submit
Comp
Regist.
Form.
Check
UserId
If Exist in D.B.
Bank Form
(cr-card infor)
Back to Comp.
Regis. Form
Message:you
are registered
UserId
Check
UserI
d
If Not Member
Else
If Member
Select
Secret
Ques
Else
ForgetPass-2
Your Secret Ques is .
Enter Secret Ans
Check
Secret
Ans
If Correct Ans.
Message : your
password is..
Check
Old
Passw
Iford
Match
and
New
Passw
ord.,
Chec
k Old
UserI
d and
If
there in D.B.
Passw
ord
from
D.B. : Your
Message
Password has been
changed to
Check
Memb
er
<Register Product>
<Update Product>
If Member
<My Status>
Check
Status
Case-G
User
Case-F
Company
.
Product Registration
Form.
Bank Form
Message : Product
registered.
Update Product
Form
Message : Product
Updated
Search Engine
<Update Order>
Product Order Form
<My Status>
Bank Form
Message : Order
Recived
Update Order Form
Message :Order
Updated
Tables Structure:
1. Company Registration Table
Field Name
Comp_id
Comp_name
Comp_pwd
Comp_category
Comp_address
Telp_no
E-Mail
Type
Primary Key
varchar2(25)
varchar2(25)
varchar2(10)
varchar2(10)
varchar2(10)
number(10)
varchar2(10)
Primary Key
Type
varchar2(25)
varchar2(25)
varchar2(25)
varchar2(25)
varchar2(250)
varchar2(25)
varchar2(25)
varchar2(25)
varchar2(25)
varchar2(25)
varchar2(25)
varchar2(25)
varchar2(25)
date
varchar2(25)
varchar2(25)
Primary Key
Type
varchar2(25)
varchar2(10)
4.Automobile
Field Name
Item_id
Product_id
Item_name
User_id
Market_price
First_sec_hand
Location
Description
Vehicle_type
Brand_name
Vechicle_no
Reg_no
Average
Colour
Model
Fuel_type
Type
number(25)
number(10)
varchar2(30)
Foreign Key
varchar2(25)
varchar2(25)
varchar2(15)
varchar2(30)
varchar2(125)
varchar2(20)
varchar2(20)
varchar2(20)
varchar2(20)
varchar2(10)
varchar2(20)
varchar2(20)
varchar2(15)
Primary Key
Foreign Key
5.Arts_antiques
Field Name
Item_id
Product_id
Item_name
User_id
Market_price
First_sec_hand
Location
Year
Description
Type
Primary Key
number(25)
Foreign Key
number(10)
varchar2(30)
Foreign Key varchar2(25)
varchar2(25)
varchar2(15)
varchar2(30)
varchar2(10)
varchar2(125)
6. Books
Field Name
Item_id
User_id
Product_id
Market_price
First_sec_hand
Location
Description
Category
Author
Title
Publisher
Language
Qty
Type
Primary Key
varchar2(25)
Foreign Key
varchar2(25)
Foreign Key
number(10)
varchar2(25)
varchar2(15)
varchar2(30)
varchar2(125)
varchar2(25)
varchar2(25)
varchar2(35)
varchar2(30)
varchar2(20)
varchar2(25)
7. Computer
Field Name
Item_id
Item_name
Product_id
User_id
Market_price
First_sec_hand
Location
Description
Category
Brand_name
config
Qty
Type
Primary Key
number(25)
varchar2(30)
Foreign Key
number(10)
Foreign Key
varchar2(25)
varchar2(25)
varchar2(15)
varchar2(30)
varchar2(125)
varchar2(30)
varchar2(30)
varchar2(50)
varchar2(25)
8. electronics
Field Name
Item_id
Item_name
User_id
Product_id
Market_price
First_sec_hand
Location
Description
Category
Brand_name
Qty
Type
Primary Key
number(25)
varchar(30)
Foreign Key
varchar2(25)
Foreign Key
number(10)
varchar2(25)
varchar2(15)
varchar2(30)
varchar2(125)
varchar2(30)
varchar2(30)
varchar2(25)
9 Furniture
Field name
Item_id
Product_id
Item_name
User_id
Market_price
First_sec_hand
Location
Description
Type
Brand_name
Quantity
Type
Primary Key
varchar(25)
Foreign Key
number(10)
varchar2(30)
Foreign Key
varchar2(25)
varchar2(25)
varchar2(15)
varchar2(30)
varchar2(125)
varchar2(35)
varchar2(35)
varchar2(20)
10 property_tab
Field name
Item_id
Product_id
Market_price
First_sec_hand
User_id
Description
Location
Type
Area
Comm_noncomm
Security
Type
Primary Key
number(25)
Foreign Key
number(10)
varchar2(25)
varchar2(25)
Foreign Key
varchar2(25)
varchar2(25)
varchar2(25)
varchar2(25)
varchar2(25)
varchar2(25)
varchar2(25)
11 garments_ tab
Field name
Item_id
Product_id
Market_price
First_sec_hand
User_id
Description
Location
Type
Cloth_type
Garment_size
Brand_name
Color
Design_nondesign
Quantity
Type
number(25)
number(10)
varchar2(25)
varchar2(25)
Foreign Key
varchar2(25)
varchar2(25)
varchar2(25)
varchar2(25)
varchar2(25)
varchar2(25)
varchar2(25)
varchar2(25)
varchar2(25)
varchar2(25)
Primary Key
Foreign Key
12 buyer
Field name
user_id
Comp_id
Item_id
Product_id
Item_name
Description
Market_price
Type
Primary Key
varchar2(25)
Foreign Key
varchar2(25)
Foreign Key
varchar2(25)
Foreign Key
number(10)
varchar2(25)
varchar2(25)
varchar2(25)
Forms to be Generated:
1. Company Registration Form.
2. User Registration Form.
3. Login Form.
4. Change Password Form.
5. Forget Password Form.
6. Product Registration Form.
7. Product Updation Form.
8. Company Status Form.
9. Product Search Form.
10. Add To Cart Form.
11. Product Order Form.
12. Order Update Form.
13. User Status.
14. arts.html
15. autombl.html
16. books.html
17. category_from.html
18. ch_pwd.html
19. computer.html
20. c_items.html
21. electronics.html
22. forg.html
23. furniture.html
24. garments.html
25. indprod.html
26. property.html
27. search1.html
28. update_prd.html
Servlets to be used:
1. adv_search.java
2. aml_serv.java
3. animal_up.java
4. antiques.java
5. antiques_up.java
6. auto_serv.java
7. auto_up.java
8. bid.java
9. bookfrm.java
10. books_up.java
11. b_status.java
12. celeb_up.java
13. cel_serv.java
14. change.java
15. chg_status.java
16. comp.java
17. compu_up.java
18. elect_up.java
19. elec_serv.java
20. forget.java
21. furniture_up.java
22. fur_serv.java
23. garfrm.java
24. gar_up.java
25. indfrm.java
26. ind_up.java
27. jewels.java
28. jewel_up.java
29. login.java
30. option.java
31. propfrm.java
32. prop_up.java
33. search.java
34. servreg.java
35. update_prod.java
36. v_status.java
Project Category:Category of this project is RDBMS based MVC model 2 , N-tier architecture,
Distributed Environment based project with server side component.
Project can be categorized in two ways :1. Local area network projects.
2. Distributed Projects.
Local Area Network projects are those projects where application has to be
incorporated in the Local area network of the client i.e within its premises
only. In LAN case server is not remotely located and client access this
application through this network. Here the question of platform
independence does not arise and we use technologies like : Visual Basic ,
Fox pro , D2k or C,C++.
Distributed projects are those projects where application is remotely
situated. In these kinds of projects application is remotely situated on to the
remote server from where client machine access this application. WAN and
an Internet is a kind of distributed application where client machine
connects to the remote server and application is downloaded on to client
machine. Here the question of platform independence arises and we use
technologies like Java Servlets , Java Server Pages , EJB , RMI etc.
Project Models :
There are three kind of Project models :1. Single tier architecture.
2. Two tier architecture.
3. N- tier architecture.
Data base is the most important thing in this universe as data base gives
identity to a thing without data base existence of a thing is impossible.
While working on a project first step is to design a database.
What is data base ?
Data Base is a collection of tables and table is a collection of records in a
tabular form i.e. in row and columns.
Data Base can be divided into two parts :1. RDBMS.
2. DBMS.
We will be using RDBMS (Relational Database Management System) in
our project i.e. oracle 8i Enterprise edition.
Why we are using Oracle (RDBMS)?
Some of the merits of using Oracle (RDBMS) is as under :
Centralization of database.
Client Server Technology.
Security.
Normalization of Data Base.
Relationship.
Transaction Processor.
It gives some internet related features.
Simplicity
Orientation
Platform Independence
Security
High Performance
Multi Threading
Dynamic linking.
Garbage Collection.
One of the most important feature of Java is Platform Independence which makes it
famous and suitable language for World Wide Web.
Why java is Platform Independent ?
Java is Platform Independent because of Java Virtual Machine (JVM).
Connectivity using JDBC :There are four kind of drivers available in Jdbc :1.
2.
3.
4.
JdbcOdbcDriver : This provides Jdbc access via Odbc drivers. Note that
Odbc binary code , and in many case database client code, must be loaded
an each client machine that uses this driver. As a result this kind of driver is
most appropriate on a corporate network where client installations are not a
major problem.
Partly Java Driver : This Driver translates Jdbc calls into a Net Protocol
which is then translated to a RDBMS protocolby a server.In this kind of
driver part of the binary code should be on client machine and part should
be on server, hence this kind of driver has same problem that was with
JdbcOdbc driver and it is mostly used in Intranet.
Oracle supports the largest database potential hundreds of Giga Bytes in size. To make
efficient use of expensive devices , it allows full control of space usage.
Oracle maintains the processing features with a high degree of overall system
performance. Database user doesnt suffer from slow processing performance.
High Availability
At some sets Oracle works 24 Hours per day with no downtime or limit database
throughput. Normal system operation such as database backup & partial completion
system failure dont interrupt database use.
Controlled Availability
Oracle can selectively control the availability of data at the database level & sub
Database level. e.g. an administrator can disallow use of a specific application .Data can
be reloaded without affecting other application.
Oracle adheres to industry accepted standards for the data access language operating
system, user interface & network communication protocols . It is open system that
protocols a customer invention.
Manageable Security
To protect against unauthorized database aspects & users .Oracle provides failsafe
security features to limit & monitor the data area. The system make it easy to manage
even the most completed designs for data assets.
Oracle enforces data integrity Business rules that dictates the standards for applicable
data. As result the cost of coding & managing checks in many database applications are
eliminated.
For community environment that are connected via networks. Oracle combines the data
physically located on the different computers in one logical database that can be accessed
by all the network users. Distributed systems have same degree of user transparency &
data consistency as non-distributed systems. Yet receives the advantages of local database
management.
Portability
Oracle software is compatible to work under different operating system & same on all
system. Application developed on Oracle can be used on virtually any system with little
or no more modification.
Compatibility
Oracle software is compatible with industry standards, including most industry standards
operating systems. Application developed on Oracle can be used on virtually any system
with little or no modification.
Connectivity
Oracle software allows different types of computers & operating system to share
information networks.
Improved Scalability
The maximum size of an Oracle database has been increased to support hundreds of
terabytes depending on the operating system on which it resides.
Improved Security
Oracle 8.0 server now includes password management so that a password has a limited
lifetime & must meet certain complexity such as minimum length. An account can be
locked after a specified no of failed login attempts.
A table of index can divided into smaller pieces called patrons, based on the value of one
or more columns. A table patron can be individually managed so that operation in one
partition do not affect the availability of data on the other partitions. Also Insert
,Update ,Delete operation against a partitioned table can be processed partially.
In other words, the Oracle 8 server can assign a portion of the work to execute a single
DML statement to multiple processes , which may then be allocated to multiple processes
by the server operating system. As a result ,the parallel DML operation is completed
more quickly.
By pooling database connection, the Oracle 8 server is able t9o service a much larger
number of concurrent users up to 3000, depending on the server operating system &
server hardware resources.
Some existing data types have been enhanced & new data types have been introduced.
A new feature of the select statement allows a sub query to be used in place of a table
in a from clause.
Tools/Environment used :
Tools and Environment used in this project are as under: Software requirements
Hardware Requirements
A feasibility study is conducted to select the best system that meets performance
requirement. This entails an identification description, an evaluation of candidate system
and the selection of best system for he job. The system required performance is defined
by a statement of constraints, the identification of specific system objective and a
description of outputs.
The key consideration in feasibility analysis are :
1. Economic Feasibility :
2. Technical Feasibility :
Hardware :
(a) Server
(b) Server space
(c) Ram
Windows NT
20 MB
128 MB
Software :
(a) Backend
Oracle 8I
(b) Middleware
EJB
(c) Front-end SERVLET
(d) Operating System Windows NT
Theory
If said to analyze cost of any physical product, example a simple pen, I can pin point to a
good extent the cap's cost, the ink cost etc., and come out with a rough estimation. Even
the customer is equally convinced as he can see those physical products. Software
industry also has practices of evaluating cost, the following are 2 major ones:
1. Lines of code.
2. Function points (FP).
I personally do not believe in lines of code. In this software world of reusability, 1000
lines of code can become 200 lines, thus leading to complete misjudgment. Just
wondering during design phase how can you know the total lines of code. For some
reason, I feel Lines of Code favor the software company more than its clients. Just
imagine i want to make simple window based customer GUI in C language and the same
in Visual basic. The Lines of code will differ a lot and hence the costing. In short lines of
code are programming language dependent." Lines of code would have been fair if there
was one programming language in the world". Just my 2 cents Programmers output is not
Quantity (Lines of code) but the logic what he has written. If you want to evaluate a
house cost do we ever measure the bricks and nails. Well i stop here talking about LOC or
else the whole tutorial will look like i am against LOC.
But with FP, I see the quote coming out fair for both customer as well as the software
company and is language independent to a very good extent Note not completely
independent). I was very convinced with FP in one of my clients' place where the client
handed us a huge book of use case and said to come out with estimation. We where a
team of 4 people. We divided in team of 2 and said let's come out with some quote and
then tally our results. After 2 days continuously counting every element, we saw both
teams coming to the same value of "Function Points", that means consistency even after
different people sitting on it.
Software Cost
J2EE
Ms-Office
Oracle
Manpower Cost
25000/:
15000/:
20000/-
Team cost
System Cost
Total Cost
:
: 20,000/-
15000/-
95000/-
Tools Used
:
1) J2EE API 2.1
2) Weblogic Server 6.0
3) Data Report
4) JDK 1.3
15days,
45days,
60 days,
15days,
135 days.
Methodology: The following approach is used to design this system, which is called classic life
cycle or waterfall model. This linear sequential model suggests a systematic,
sequential approach to software development that begins at the system level and progress
through analysis, design, coding, testing and maintenance. The linear sequential model
encompasses the following activities:1.
2.
3.
4.
5.
6.
System
Analysis
Design
Code
Testing
Maintenance
Analysis :-
MY ROLE :My role in this project was to do Analyzing, designing and coding. I was
involved in development of :1.
module of this project. The project is Divided into different modules as above
discussed: Module Description and Design :Program Structure :
Title of this project is On line Shopping Web Site , Objective of this project is to do
on line sale and purchase of the registered products. Basically this site is acting as a
middlemen connecting two different people i.e. Seller and Buyer. Seller is the person
who wants to sell off his product where as Buyer is a person who is making bid on a
product. Both Seller and Buyer has to register them selves by paying an annual
subscription amount. Seller has to register his product also by paying the 2% security
of market price. Buyer will be using search engine to search for the registered
products and then after that can make purchase on the selected product of his choice
We have used Java Language and Oracle as a backend Data Base.
My role in this project was to do Analyzing , designing and coding. I was
involved in every sphere of this project. The project is Divided into different
modules some of the forms are as under :
Login Verification.
Change Password
Forget Password
Company Registration
User Registration
User Bank
Network Chat
Mail Server.
Some of the modules is divided into different Sub Modules. Now I am explaining
each module in detail.
Login verification :- In this module we are checking the authenticity of the
person who is using this application . Person who is using this application should
enter correct userid and password to authenticate him self.
Hence first form that opens up is a verification form, we are taking input from the
user of this software i.e. user id and password then we are checking this input
from our database if it is correct then we are opening First form i.e. Introduction
form.
Change Password :- By this module user can change his password from old
password to new password. He has to enter some information like User Id , old
Password, new Password and reconfirm password.
Then we have to first verify that new password and reconfirm password matches,
If it does not matches then we have to send user back to change password form
else if it matches then we have to check weather he is a member or not.
This is done through verifying User Id and Old password if they matches with our
data base then it means he is a member other wise not. If he is not a member then
again we are redirecting him back to Change password form with a error message
else if he is a member we will change his Old Password to New Password and
confirm him the New Password.
Forget Password: By this module user can get his password if he has forgotten
his password. For this particular purpose user first has to enter his User Id and we
have to verify his ID i.e. weather he is a member or not. If he is not a member
then we have to redirect him back to Forget password form else we have to open
another form indicating his Secret Question. He has to enter correct Secret
Answer to confirm his Password.
If he enters wrong Secret Answer then we have to again redirect him back to
Forget Password form else we have display his Password.
Company Registration Form: This is the first form when client i.e. Company
visit this site for the first time. As already discussed earlier both Company and
User has to register them selves. This is a Company registration form where user
has to fill up information like his Company name , address , Email , Tel , Fax ,
secret question , secret answer etc along with Company user id and password.
We have to test his user id before registering him, as user id, which he is
choosing, should not exist in database. User id is a primary key and should be
unique. We have to make connection with the database and check weather userid
already exist or not. If it exist in data base then we have to open the same
registration again with all the filled up fields like his Company name, address,
email, secret question, secret answer etc. else if userid does not exit in data base
we have to open Company bank form.
Note * - we are not inserting the record into the database we are just redirecting
him to Company bank form.
User Registration Form: This is the first form when client i.e. User visit this site
for the first time. As already discussed earlier both Company and User has to
register them selves. This is a Company registration form where user has to fill up
information like his Company name, address, Email, Tel, Fax, secret question,
secret answer etc along with Company user id and password.
We have to test his user id before registering him as user id which he is choosing
should not exist in data base. User id is a primary key and should be unique. we
have to make connection with the database and check weather userid already exist
or not. If it exist in data base then we have to open the same registration again
with all the filled up fields like his Company name , address, email , secret
question , secret answer etc. else if userid does not exit in data base we have to
open User Inroduction form.
After successfully logging on our server side program will be checking the status
of the person i.e. weather he is logging on as a
a) Company
b) User
Case A :- Let us first assume that he is logging in as a Company.
Company Introduction Form: After successfully logging in the first forms that
the company get is Company Registration Form. This form has three hyper links
i.e.
We are taking user id to ascertain that to whom this product belong to.
Description of the product means that he has to describe his product like if it is a
automobile he has to give item name like Bus, Sccoter , Moter cycle etc then he
has to give color , average, fuel type, condition etc.
After Registering his product he has to pay 2% security of value of registered
price.
Do Shopping
Update Shopping.
My Status.
Do Shopping: By going on to this link User will get the Search Engine specific to
site which will be searching the registered products from the data base.
Search Engine : In this search engine User will be selecting the category of the
product on which he wants to make a bid and he will also be specifically entering
the item name in the search criteria. Take an example he wants to do shopping of
a Car. In that particular case he will be selecting the automobile from the broad
category and then writing car in the search criteria.
By selecting the broad category we will come to know the name of the table in
which he wants to make a search and what he wants to search well get from item
name. The search engine will display following information:
User can then select the particular product of his choice and a Shop Form will
open.
Shop Form: In this module User will be searching for the products and will select
the product along with the quantity purchased and will add items to the cart. We
will be using the session tracking here. After doing add to cart User will get the
total price due. He can update his shopping as well as can also make final order,
which will be placed, and shopping id will be generated.
Update your Shopping: By this module person can update his previous
shopping. It is not necessary that every time User want to make new shopping he
has to go to search engine and search for the product he can just go to Update
Shopping form and can update his bid.
In update form he has to enter his Shopping id and has to select the category of
product, After selecting program will verify that weather he has entered right
shopping id or not if the id is wrong then we will display error message else if id
is right we will open Shop Now Form where he will get the last order entered by
him with the total price. If he is interested he can update his Shop cart i.e. can
make more purchases or can reduce the purchases.
My Status: My Status will display the status of the User. Last link in this module
is My status. This module will show the status of the User i.e.
Network Chat: This is software which can be incorporated with this project.
Objective of making up this software is to enhance my knowledge in the field
of Java as in my project I was using only Java Servlets with Jdbc, I was not
using the every technology in java. The scope of making this software is that
in this particular software I am using technologies like :
Applet.
Servlet.
AWT.
Multi Threading.
Event Handling.
Exception Handling.
Input/Output.
Net Working.
By using all these topics I am increasing the scope of my area .The advantages in
which this software can be used in my Project is that we can incorporate this
software in this site by which different people around the world can communicate
with each other using this software. Basically in this software we are Applet
Servlet Communication.
Mail Account with in Organization. This is also a software by which we are
making mail account of Employees of organization, which they can access.
We have used Java Mail Package with SMPT to make up this software.
3. Functional Description
: Basically the
website has four modules. Some of the forms are described below :
(A) Login Module
: The user enters in this
module through home page if user already registered himself on the site. He module
checks his/her record and then confirms his authenticity.
(B) Change Password Module
: This module is also for
existing user. If user wishes to change his password the module interacts with
him/her and confirms his authenticity. After confirmation, it writes in the registration
table.
(C) Forget Password Module
: This module is also for
existing user. If the user forgets his/her password, the module interacts with database
and flashes secret question, which is entered by the user during registration process
and asks for secret answer. The module matches the response with the database and
if it is ok the show the password.
(D) New User Signup Module
: This module is for new user.
The user enters in this module by clicking on the hyperlink on the home page and
fills the registration form. After filling the registration form he have to fill a bank
form to get him registered.
4. Behavioral Description
: The event
occurs in this site in two ways. One by the submission of the form by the
user and other by the web page. When the user submits a particular form a
Submission of form
Accessing of database
Generation of appropriate response.
Submission of form
Accessing of database
Generation of appropriate response
Submission of form
Updating database
Generating appropriate response
Module: Login
1.
2.
3.
4.
5.
Submission of form
Accessing of database
Generation of appropriate form
Submission of form
Updating database
5. Validation Criteria
: Each HTML page and its hyperlink is examined and the
respective servlet is also examined. The connection between form (Front-end ) and
database (Backend) is examined keeping in the mind hat no garbage value could be
entered. Middleware or processing logic is also examined.
Validations Checks :
Developing project has number of phases, we have to under go each phase in
order to successfully complete the whole project. Different steps which we
have to follow in order for successfully completion of project are :
Analyzing.
divide the whole project into different modules and assign task to the
Project members.
Coding
In this phase we actually practically implement paper work and do the
front end and back end programming part.
Testing
This is the most important phase of the Project where we practically
check our code in different situations i.e. weather it is working in different
conditions or not , weather it is solving the objectives of client. During this
phase only we do rectification job.
The most important technique used in Testing is Trial and Error
System. We will be discussing this in detail later.
Incorporating
Incorporating means loading the application on to the server from
where it will be used by the client machines.
Training
After Incorporating the code on to the client machine we have to
provide training to the employees of the client i.e. how to use this software
and if there is any problem they can do verification part.
Here we will be discussing Testing Part i.e. Validation Checks. As already told
one of the most important technique of Testing is Trial and Error System In
this system we put our code to different conditions to check that weather it is
working properly or not. We also have adopted this technique.
We have done data verification by entering wrong data type in our data base to
test weather it is working properly.
We tried to search records from different tables using Primary Key i.e. particular
ID and checked weather it is fetching correct record or not.
We have tested weather proper records according to proper fields are inserted to
the tables or not.
We have also used scripting to verify our code. Scripting are of two types i.e.
Client Side Scripting and Server Side Scripting.
Client Side Scripting : We have used Java Script for client side scripting. By
client side scripting we do validation part on client side i.e. at front end , before
submitting up of form. Examples of Client side scripting it that there are some
compulsory fields which has to be filled but are not filled up by the client in that
particular case form should not be submitted and an error message should be
displayed , similarly like that take an example there are two fields one numeric
like age and other text like name user has to enter numeric in numeric field
and text in text field but if does not do so an error message should be displayed
stating that he has made wrong entry. This kind of technique where Information is
tested on client side befor going on to server side program is called Client Side
Scripting.
Server Side Scripting : Server side Scripting is done by server side program .
There are certain things which has to be tested on server side like Employee ID ,
Department ID or User Id. For this particular case we have to first make
connection with our data base and then test weather User Id actually exist in our
database or not if userid exist it means he is a member other wise not. Similarly if
we want to check record of employee this will we done by Employee ID i.e.
primary key in a database these type of checks will be performed by Our Server
Side Program.
In last I am stating that I have performed all the validation checks upto my
knowledge and is satisfied that my code is running properly.
SYSTEM TESTING
Here the system testing involved is the most widely used testing process consists of five
stages as shown in the figure. In general, the sequence of testing activities is component
testing, integration testing then user testing. However, as defects are discovered at any
one stage, they required program modifications to correct them and this may required
other stages in the testing process to be repeated.
Unit testing
Module
testing
Sub-system
testing
System
testing
Acceptance
testing
(component testing)
(Integration testing)
(user testing)
SYSTEM SECURITY
There are basically two types of security associated with this system:1. Physical security:Damage due to natural causes like earth tremor, flooding, water logging, fire
hazards, atmospheric or environmental conditions etc..For overcoming these
difficulties the replica of the data are automatically stored at various networks and
for environmental conditions Air conditioning environment is created.
2. Data security:There are basically two problems associated with data security:a). Data not being available to the authorized person at the time of need.
b). Data becoming available to the unauthorized person.
To overcome these difficulties the following access facilities has been provided:i)
ii)
Authentication:System checks the password under the particular user identification. The
computer permits the various resource to the authorized person.
iii)
unit, integration and system level test cases are designed on the basis of
requirements and as per the plan lay down
3. Test Execution
Test cases are executed according to the test procedures prepared for each test
designed, test procedure describes the purpose, special requirements and the steps
to be followed in executing the tests
4. Test Recording.
All executed tests have test log. Whenever discrepancies are observed from the
expected results, test incidents must be raised. Test Log is a record of all relevant
details of execution of tests. Test incident records any event that occurs during
testing that requires investigation
5. Test Completion
Test records are checked against test completion criteria. Every test must be
completed and there must be no defect logged during execution phase that is not
fixed by respective developer and if fixed should not remain untested by testing
resource
Adapted Software Test Life Cycle
Test
Test
Planning
Planning
Test
Test
Design
Design
Test Case
TestDesign
Case
Design
Test Summary
Test Summary
Test
Test
Completion
Completion
Test
Test
Execution
Execution
Unit Testing
Testing logical pieces of work, functions, subroutines or logical units, generally
conducted by developer. Our approach towards Unit testing is
a. Document all test cases, and test procedures, review all test cases
b. Execute implemented test set on compiled unit
c. Modify and revise the code and test as necessary
d. Re-execute the modified tests until test completion criteria re met
Integration Testing.
Our main function of integration testing is to test that interfaces between units are
correct, after few units are integrated verify that specific requirements have been
implemented correctly. Test response time of integrated modules is another aspect
that we take care. Our approach towards Integration Testing is
a. Identifying the integration test sets and their execution
b. Units are combined one at a time and tested till entire software gets
integrated
c. Verifying that data flow between the screens is correctly integrated
d. Verifying that all the integrated modules and units are behaving as per
specifications
Regression Testing.
Testing of all the effected screen or module due to defect fix or change in the
requirement is our aim at regression testing. Tasks that we perform during a
regression test are
a. Testing a defect fix
b. Testing that a defect fix has not caused some other error
c. Both are done by regression testing by running a set of test cases run
previously
System Testing
System testing for us is not a process of testing the functions of the complete
system which has already been achieved by function testing, but it is a process of
attempting to demonstrate how the program does not meet its objectives
a. Test cases derived using black box methodology
b. While functional testing can be taken up in any hardware, the system
testing has to be taken up only with target hardware.
c. In addition to functionality, other aspects such as usability, performance,
recovery etc tested.
Acceptance Testing.
For us Acceptance testing is conducted to determine whether a software system
satisfies its acceptance criteria, this is the reason we conduct acceptance testing on
actual environment and data. The final acceptance decision holds with every
individual client, we verify that the delivered product is adequate and consistent
with executable system and the complete system meets the buyers requirements.
Our acceptance process is
a. Define buyers role
b. Define acceptance criteria
c. Develop acceptance plan
d. Execute acceptance plan
e. Develop acceptance decision
CONCLUSIONS
FINDINGS:After implementing the system in the market its advantages were incomparable to the
present contemporary systems available in the market. The most admirable feature
founded was its simplicity in terms of application to the user but its highly beneficial
outputs cant be ignored. The users will be highly benefited after using the system.
LIMITATIONS:Since, every system has some limitations so our proposed system is also not untouchable
in this regard. Although it includes every kind of features but it cant be used in a huge
organization where number of networks are very large, because the data base used in this
system is an average one. Also it doesnt have different kind of access feature for
different users.
SCOPE FOR FUTURE WORK :Since this system has been generated by using Object Oriented programming, there are
every chances of reusability of the codes in other environment even in different
platforms. Also its present features can be enhanced by some simple modification in the
codes so as to reuse it in the changing scenario.
Scope of future application:
We can implement easily this application. Reusability is possible as and when we
require in this application. We can update it next version. We can add new
features as and when we require. There is flexibility in all the modules.
SOFTWARE SCOPE
Extensibility: This software is extended in ways that its original developers may not
expect. The following principles enhance extensibility like Hide data structure, Avoid
traversing multiple links or methods, Avoid case statements on object type and
distinguish public and private operations.
Robustness: Its method is robust if it does not fail even if it receives improper
parameters. There are some facilities like Protect against errors, Optimize after the
program runs, validating arguments and Avoid predefined limits.
Cost-effectiveness: Its cost is under the budget and make within given time period. It
is desirable to aim for a system with a minimum cost subject to the condition that it
must satisfy all the requirements.
Scope of this document is to put down the requirements, clearly identifying the
information needed by the user, the source of the information and outputs expected from
the system.
PERT (Performance Evaluation and Review Technique)
Like Gantt chart PERT also makes use of tasks. It shows achievement.
These achievements are however not task achievement. They are
terminal achievement called events. Arrow are used to represent tasks
and the circle represent the beginning or completion of the task. The
PERT chart uses these paths and events to show the interrelationship of
project activation.
Activity
Task
1.
Design Forms
Design home page
Design Change Password Page
Design Forget Password Page
Design New User Signup page
2.
3.
4.
5.
Prepare Documentation
ONLINE SHOPPING
Description:
Description:
This is the welcome page for the project. One can register product, Update product
and can view Product Status.
Description:
This page is used to register a new Company. He needs to enter his complete details with secret
question and secret answer. When company will fill up the form with appropriate values inside
the fields he will be registered and the home page will be displayed.
Description:
This page is used to change the password of the registered Company. If the password
is changed successfully home page will be displayed.
Description:
This web page is used to retrieve the password of the company if he somehow forgot
the password.
Description:
Description :
Description:
This web page is used when the user forget his password . So he needs to enter the
user ID here.
Description :
This web page is used to select the category of the product like automobile, books,
computers etc.
Description :
This is the product registration form. User needs to enter the details of the product
and the product ID is generated and is displayed.
Description:
CONCLUSION
Our Web site works successfully and companies person really appreciate this Web site.
This Web site is fully documented so that future modification can be made very easily, if
some requirements get change in future.
Moreover it leads to the first Industrial and professional experience in the software.
REFERENCES:-
BOOKS1.
2.
3.
4.
5.
WEBSITES:1.
GOGGLE.COM.
2.
WEBOPEDIA.COM.
3.
DDJ.COM