Sei sulla pagina 1di 60

Project Title: Online Auction and Barter Systems

INTRODUCTION

Problem Statement:
This web application is designed to give the trading facility to
the registered candidates of the site. The main functionality offered is
barter and auction of items.

By barter we mean offering a commodity of certain value


in exchange of another commodity of approx. same value.

By auction we mean placing a commodity


at a certain minimum price and then other users are
allowed to apply bid on that commodity at a price
more than that minimum price. The person who
apply the highest bid gets the commodity.

After getting a commodity one has to pay for it


by credit card. There is a certain maximum time limit
for the placement for product for auction .

The system can be divided into the folowing modules


modules of the system are as follows:

1. Registration module :
In this module a general user can be registered with the site.
The main information required to be filled are :

2. User function module 1 (put to barter\auction) :

This module covers the following main functionalities-


a. Function to put a commodity for barter
b. Function to put a commodity for auction

3. User function module2 (Apply for barter\auction) :

This module covers the following main functionalities-


a. Function to view the products placed on the site for barter
b. Function to view the products placed on the site for auction
c. Function to offer another product for barter
d. Function to apply bid for auction

4. User function module3 (View/update transactions) :

This module covers the following functionalities-


a. Function to view all the tranctions
b. Function to withdraw a product placed for barter or auction
c. Function to update a product information placed for barter or auction
d. Function to view the list of all the users who have applied for ones products
DATABASE SCHEME(tentative) :

(1) member_info Table :

This table stores the member information

(2) barter_info TABLE :

This table stores the information of the barter transaction

(3) auction_info Table:

This table stores the information of the auction transaction

(4) bid_info Table:


This table stores the information of the bid applied by any user

(5) offer_info TABLE :

This table stores the information of the transaction of


the product offered for barter

(6) item_info TABLE :

This table stores the information of the products


available on the site for business

Auction:

An auction is a sale in which a seller presents his product on a public platform/ forum.
The selling price in an auction is determined by the bids made by interested buyers. The price
they bid is based on their own valuation of, and need for, the product. The product is sold to
the highest bidder. A potential buyer participates by bidding on an item that a seller has listed.
The person who has offered the highest bid at close of auction wins the right to purchase the
item at that price.

Bid:

A bid is the amount of money proffered for an item that has been put on sale in an
auction. The bidder competes with other potential buyers, keeping in mind that the buyer with
the highest bid is obliged to complete the purchase with the seller. In other words, your bid
tells other buyers, "I want to buy this item at this price."

Win:

You win an auction by placing the winning (read highest) bid and obtaining the item on
auction. The person with the highest bid is the winner of the auction. Now that you're familiar
with how an auction generally works.
Online Barter Trade and Auction System :

Problem Statement:
This web application is designed to give the trading facility to
the registered candidates of the site. The main functionality offered is
barter and auction of items.

By barter we mean offering a commodity of certain value


in exchange of another commodity of approx. same value.

By auction we mean placing a commodity


at a certain minimum price and then other users are
allowed to apply bid on that commodity at a price
more than that minimum price. The person who
apply the highest bid gets the commodity.

After getting a commodity one has to pay for it


by credit card. There is a certain maximum time limit
for the placement for product for auction .

The system can be divided into the folowing modules


modules of the system are as follows:

1. Registration module :
In this module a general user can be registered with the site.
The main information required to be filled are :

2. User function module 1 (put to barter\auction) :

This module covers the following main functionalities-


a. Function to put a commodity for barter
b. Function to put a commodity for auction

3. User function module2 (Apply for barter\auction) :

This module covers the following main functionalities-


a. Function to view the products placed on the site for barter
b. Function to view the products placed on the site for auction
c. Function to offer another product for barter
d. Function to apply bid for auction

4. User function module3 (View/update transactions) :

This module covers the following functionalities-


a. Function to view all the tranctions
b. Function to withdraw a product placed for barter or auction
c. Function to update a product information placed for barter or auction
d. Function to view the list of all the users who have applied for ones products

5. Administrator Module :
This module offers the following main functionalities for the administrator-
a. Function to view the list of all the users selectively
b. Function to view all the commodities for which barter/auction facility in available
c. Function to add or delete commodity in the list

DATABASE SCHEME(tentative) :

(1) member_info Table :

This table stores the member information

(2) barter_info TABLE :

This table stores the information of the barter transaction

(3) auction_info Table:

This table stores the information of the auction transaction

(4) bid_info Table:


This table stores the information of the bid applied by any user

(5) offer_info TABLE :

This table stores the information of the transaction of


the product offered for barter

(6) item_info TABLE :

This table stores the information of the products


available on the site for business

ONLINE AUCTIONS
Before an Auction:

The process of an online auction is much the same as a live auction. This means that
users place bids for items, and the goods get sold to the highest bidder. You are notified
through email on the status of your bids, which is when you place a bid, when you've been
outbid and when you've won an item.

To bit for an item, there is a bidding form through which you may place bids on the
item. To bid on an item, enter your bid amount. While entering your bid, you need to consider
the bid increment. The bid increment is the amount by which each bid increases. The seller sets
this amount. The bid amount should be one bid increment or more above the current leading
bid specified on the item page.

Automatic Bids and manual bids need not be exact multiples of the bid increment
amount. Bids will only have to be one increment or more above the current bid to be accepted.

Example:

Bid increment amount - Rs. 20


Lets say the starting price is Re.1
Current highest bid is Rs. 21

Now in order to bid: -You can bid at anywhere above or equal to the current highest bid
amount for your bid to be accepted, i.e. you can bid at anywhere between Rs. 21 to Rs.
41 (or more) for your bid to be accepted. -This means that you can bid at say Rs. 23
and the next current minimum bid will get adjusted to Rs. 43 (since the Bid Increment
level is set to 20).

If you wish to place a higher bid, you may do so. For eg. - You can place a bid of Rs. 45.
This would incorporate the current bid at Rs. 21 and the minimum bid increment of Rs.
20. The remaining Rs. 4 is the additional amount you have bid. Therefore the user who
bids after you would have to bid atleast Rs. 65 (Rs. 45 of your bid and Rs. 20 of the bid
increment)

The amount of the next minimum acceptable bid will be displayed in the "Bid Amount per item"
text box.

To find more information about the product the description of that product has to be
referred. A description of every item is put up on the item page. To know more about the item
and its features, you can make use of the "Ask the seller or Read Q&A" facility provided on
every item page. This way you can acquire more information about the item. If it is convenient
for you and the seller, you can also arrange to personally inspect the item.

Bidding can be carried out automatically by enabling the automatic bidding feature.
Automatic Bid features bids on a particular item for you up to the maximum amount that you
have specified. This amount is the maximum amount that you, the buyer, are willing to pay for
an item. It is kept confidential. To activate the Automatic Bid, just enter your maximum bid
amount in the "Enter Automatic Bid amount" box and click on the "Bid Now" button.
Automatic Bid is an optional facility. If you activate Automatic Bid, you need not be
online to bid for and win an item you desire. The system will bid for you if necessary by the
specified bid increment amount to the limit of your Automatic Bid. Please note that the
Automatic Bid system will only bid for you when you have been outbid or to meet the reserve
price at the end of the auction. You will receive an email notification every time the Automatic
Bid bids for you.

To bid on a multiple items is considered to be a special auction where a seller has more
than one quantity of the item he or she wants to sell/bid. The seller selects the starting bid
amount and indicates how many of these items are available for the auction.

An auction is a multiple auction or not can be known by checking the quantity box of the
item. If there is number of quantities displayed is more than 1, then it is a MQA (Multiple
Quantity Auction)

After an Auction:

At the end of every auction, you would receive an email (if your bid is the highest at that point
of time) with your seller's contact details. You would then need to contact your seller to arrange
for the delivery and complete the deal offline.

A bidder can know about the item he/she won in an auction once the auction of an item
you have bid on has ended. You will receive an auto-generated email if your bid was the
highest and the reserve price (if any) had been met. The mail will include item details and the
seller's contact details. The seller too will receive an email providing them with your contact
details. You will need to contact your seller to inspect the goods and arrange delivery and
payment.

Once the auction is ended, both the seller and the buyer are notified through email and
given each other's contact details. They need to contact each other and work out payment as
per the terms of payment mentioned by the seller on the item page.

Transaction:

The transaction between the buyer and the seller can be carried out manually if the
buyer and seller are in a reachable distance. In other case the transaction is carried out over
the net via Ecommerce Secured transaction systems.

Society cannot seem to escape the criminal element in the physical world, and so it is
the same with online auctions.
One of the concepts that the online auctions were started with was the idea that people
could police themselves, but those with the intent to take advantage of others have found the
means to bypass this mild safeguard as well. It was envisioned that with the opportunity to
give ‘feedback’ on each other as buyers and sellers, honesty would remain intact. However
some have found a way to inflate their ratings which makes them appear trustworthy to do
business with.

There are steps to take to reduce the risk of being scammed by a less-than-honest
individual in an online transaction, and the first step is to deal only with reputable
establishments. At least if there is a problem with the transaction, whether as the buyer or the
seller, one stands a better chance of resolving the problem satisfactorily for everyone. So do
your homework as to where it is safe to do business. Establish the top price that you are
willing to give, keeping in mind how much more than the bid price you will have to give to
cover shipping, insurance and tax. If possible, establish the identity of whom you are dealing
with. Have they been operating with this auction service for an acceptable length of time? Do
they have any comments about them, either positive or negative? These things must be
considered in an attempt to protect oneself from the risk of being scammed.

Another safeguard to consider is, “how will one pay for the goods?” There are payment
services available such as PayPal or Billpoint. Many of these services offer some form of
assurance and insurance against fraud. Or one may want to consider an Escrow service to
handle the transaction. Many of the auction sites have an escrow service to offer their clients,
however there is usually an extra fee associated with these services as well.

Whatever the means one chooses to minimize the risk of loss due to fraud, in the end it
still comes down to the individual consumer and the choices they make. Until the goods are
received and all parties satisfied, one should keep record of any and all transactions, whether
they are the buyer or the seller. It may help provide proof of what took place, and help get
ones money or goods back, if one has the misfortune of being the victim of online auction
fraud.

(Mulrean, J., 5 steps to avoiding auction rip-offs, retrieved 12 April 2002 from MSN
Money, http://money.msn.com/articles/smartbuy/dollarwise/9013.asping ground for fraud.)
What is Auction ?

Examples

Ancient cases:

500BC: Herodotus talked about auctions in Babylon


Ancient Rome: commercial trading, selling war booty.-193 A.D.: auction for the entire empire

More recent cases: auctions


•for rare collective items
•in wholesale markets of fish, flowers, etc.
•for public contracts
•in stock market

Very recent cases:auctions

• over Internet (E-bay, ONSALE, etc.).

Benefits of Online Auction

Online auction is probably the most effective negotiation tool available today.

Instead of the buyer conducting the negotiation, sellers bid or ‘negotiate’ among
themselves to arrive at the best price for the buyer

Dynamic Pricing: Multiple bid scenario, allowing bidders to submit


as many bids as they wish.

Transparent: Both auction originators and bidders can view the lowest/highest prices being
offered.
Efficient &Fast: Actual online auction event is achievable within one hour instead of weeks in
the traditional auction.

List of Auction Sites :-

 AuctionAddict.com -mega-site.. large auction site,1000's of categories.


 Amazon Auctions-mega-site.. large auction community,1000's of categories
 BidBay.com -mega-site... wide range of listings, regional auctions.
 BidVille- mega-site... auctions for everything in 1000's of categories.
 Bidz.com-mega-site… live auctions every 5 mines -24 hours a day, 7 days a week,
 CityAuction- local... online auctions based on your major metropolis.
 CNET Auctions-computers. including desktops,notebooks,printers and more.
 CommerceFlow-tool..manage all your auctions in one place; for buyer and sellers.
 eBay-mega-site..wide range of listings,millions of traders.
 edeal-network..large auction marketplace,networked throughout edeal partners.
 half.com-classifieds..buy and sell entertainment products at half or less.
 Liquidation.com-surplus..mass-quantity auctions at wholesale cost.
 Loot.com-classifieds..(UK)large section devoted to vehicles and property.
 QXL.com-mega-site..(UK)1000's categories,items sold by pounds.
 Shopgoodwill.com -charity..wide array of antiques and collectibles from goodwill.
 WantAds.com-classifieds..a simple,but large directory of online classified ads.
 Yahoo!Auctions-mega-site..wide range of items and products.
 ZDnet Auctions-computers..including desktops,notebooks,printers and more.
 Mandi.com -buying service..get quotes for maids,loans,vacations, collectibles, and more.
 priceline.com-buying service..name your own price for airline tickets, hotels, cars, etc.
 Respond.com-buying service.. wide range of services,matches buyers w/sellers..

Difference Between Online Store And Online Auction

Unlike on-line stores, on-line auctions only provide the place where buyers and sellers can
meet. It is a different approach for trading.
-e.g: eBay doesn’t sell the product by itself, but buyers will buy the product from sellers who
post them on the eBay web site.

Unlike on-line stores, on-line auctions offer a place for buyers and sellers to order and receive
products in a timely manner.
In other words On-line auctions are another alternative for buyers and sellers who are seeking
the best deal for products..
Traditional vs. online auction
Types of Online Auction

There are several types of online auction available. But the most commonly used online auction
is
English auction.

English Auction: Each bidder announces openly its bid; when no bidder is willing to raise
anymore, the auction ends. The highest bidder wins the item at the price of its bid. Strategy:
- In private value auctions the dominant strategy is to always bid a small amount more than
the current highest bid and stop when the private value is reached.
- In correlated value auctions the bidder increases the price at a constant rate or at a rate it
thinks appropriate.
Dutch Auction: The auctioneer continuously lowers the price until one of the bidders takes the
item at the current price. Strategy:
- Strategically equivalent to the first-price sealed- bid auction
- Efficient for real time.

Vickery Auction : Each bidder submits one bid without knowing the other's bids. The highest
bid wins but at the price of the second highest bid. Strategy:

-The bidder dominant strategy is to bid its true value.

Types of Online Auction

For each type of online auction, the reverse and forward auctions can be set
Reverse auction: This is an auction to buy. A buyer originates the auction to buy a particular
product or service with sellers submitting bids, and the bidder with the lowest bid
wins.
Forward auction: This is an auction to sell. Seller originates to sell a particular product or
service with buyers submitting bids, and the buyer with the highest bid wins.

What Is A Reverse Auction?

 Reverse Auctioning (RA) provides a dynamic means for vendors to compete nearly real-
time to provide goods or services.

 Similar to a standard auction…except prices get lower with each bid

 Vendors compete in an iterative manner until auction is complete (i.e., they bid a lower
price than their competitor until a pre-set time)

 Vendor identities masked…only see winning price


Forward Action Vs reserve Auction

Forward Auction :

 Increasing bid auctions on the Internet

 The seller puts up an item for sale and specifies an acceptable minimum price

 The item is then posted on the auction site


 together with the minimum price
 the bidding is kept open for a specified period

 During this period, potential buyers bid for the item


 The latest high bid is displayed.

 The price rises in a forward auction.

Properties Desired In An e-auction

Basic Properties:

• Correctness: If every party acts honestly, the correct winning price and winner(s) care
determined according to the auction rules.

• Confidentiality: No bids are revealed to any parties (including the auctioneer) until the bid
opening phase.

• Fairness: It includes
 No bidder knows anything about other bidders bids before he submits his own bid. This
is actually included in confidentiality.
 After a bidder submits his bid, the bid cannot be modified.
 No bidder can deny his bid after he submits it. This is sometime called non-repudiation
of bids.

 Optional properties:
• Anonymity: The identities of losing bidders must be kept secret.
• Privacy (of losing bids): The losing bids remain confidential until the end of the auction
even to the auctioneer.

Differences between privacy and confidentiality of bids include


 privacy only deals with losing bids;
 privacy is confidentiality of the losing bids even after the bid opening phase.
• Public verifiability: The validity of the result of the auction is publicly verifiable by anyone.
• Robustness: Nobody is assumed to be honest and any malicious behaviors of any party
cannot compromise the system or lead to an incorrect result. Robustness is a
complement to correctness and guarantees that if there is a result, that result must be
correct no matter what system failure or attack may occur.
• Price flexibility: The values of the bids can be as precise as the seller or bidders require.

Who can participate in an online auction?

• Originator and bidders have to be registered user.

Activities Involved

 Buying Products:

 Search many products from various categories


 Place bid , Noticed of status everyday by mail.
 Bid closes.
 Winner Notified.
 Sellers & Buyer contact each other.

 Selling Products:
 Sellers pay fee to advertise their products.
 Notified of status every day by email.
 Bid closes.
 Gets highest bidder contact information via email.
 Seller and buyer contact each other.
Comparison with other online Auctions

Classifieds2000 :
• Division of Excite.com3.
•Offers many categories for sellers to auction their products online.
•Sellers are required to register with Classifieds2000, but buyers are not.
•Does not have many options or alternatives for buyers or sellers.
•Buyers and sellers have to do all trading activities themselves.
•Only provides the place where buyers and sellers can meet.

Onsale.com :
•An on-line auction for computers and computer-related products.
•Offers many product categories for computers and computer-
related products, e.g. Desktop, notebook, Printer, Scanner, CD-
ROM and so on.
•Onsale.com has a stick rule for seller and buyer.
Ask for contact information and valid credit card number.
• Onsale.com also provides on-line secure transaction for it's customers.

Internet Auction

Design of Auction software


1. Object model for auction application: In figure 1 multiple trader and auction are part of
the auction house. Each auction is for one or multiple copies of a single product and a
subset of traders participate in it. The product object describes the product or service
being auctioned. It is separate from the auction object because the same product can be
auctioned in different quantities in different auctions held at different times. For
example, a withdraw bids only when the auction is in not-started state
2. Each message, for example, bid from a buyer or closing of auction by the seller, results
in updates or notifications being sent to all or some of the other participants. Different
participants may get different notifications. For example, when a bid is submitted in an
open-cry auction the bid submitter gets a simple acknowledgment, the bidders whose
bids are lower than the newly submitted bid will be informed that a higher bid has been
submitted, while bidders whose bids are already higher than the newly submitted bid
may get no notification at all. Similarly, when the auction closes, the winners and losers
will get different notifications.

The seller can also select an auction, and in case of Dutch auction use the offer process to
change the asking price. This again results in notifications being sent to people who are
participating in the Dutch auction (participation in a Dutch auction by buyers who have not
bid at all can be recorded by keeping a zero quantity bid in the bid table). Finally the close
(auction) process normally closes the auction automatically based on auction rules, but
supports manual closing by the seller. When an auction is closed, all the bids submitted for
that auction are evaluated and the winners and losers are notified (Dutch auctions, by
definition have winners only).

Notification:
Currently two notification mechanisms are provided in the auction prototype. First one is the
simple e-mail. The second one is through the message box mentioned in the previous
paragraph. E-mail is necessary to communicate with buyers who are not looking at one of
the auction site pages when a message need to be delivered. Message box is more
convenient for those who are on some auction site page when the message is to be
delivered.
Navigation

Figure 3 shows how the bidders navigate the auction web site. Each bubble shows a web
page and arcs from one page to another indicate that a hot link is available from the first
page to the second. The seven pages marked with asterisk can be accessed any time from
the side bar. The auction site URL puts a bidder on the Welcome page from where a
registered user can authenticate himself to the web site and initiate a secure session
(login). An unregistered user will get the opportunity to fill in a registration form which may
be processed online or off-line. After registering, the bidders can browse through or search
the products in the auction house which will possibly result in a product being selected and
its description presented to the bidder. If the product is on auction, the rules of auction can
be viewed, and bids can be submitted for that product.

From the home page the bidder can also see a list of all auctions at the auction site or a
subset of these which are in his personal auction gallery. From either list, the bidder can
select an auction and access the description of the product being auctioned, see the rules of
the auction, or bid on the product. For open-cry auctions he can also see a subset of the
previously submitted high bids for that product. In both these lists, the entry for an auction
also includes the auction type, quantity being auctioned (if the rules permit), best bid or
current asking price for open cry and Dutch auctions respectively, and auction closing time
if determined.
Seller’s options:
From the list of high bids for a product mentioned above, a buyer can increase his existing
bid, submit a new bid, review the auction rules or access the product description. Similarly,
from the home page a buyer can access the list of all his bids and perform the same
functions. Finally from the home page a buyer can access his message box which contains
all the notifications sent by the auctioneer to the buyer.
SYSTEM ANALYSIS

4. SYSTEM ANALYSIS
System Planning is one of the important items to be considered before actually beginning the project.
Planning is performed on the issued like defining Life Cycle Model and an organizational structure project,
configuration management, quality and validation activities.
In the process of the System Planning various phase-dependent tools, techniques and notations are
determined. Preliminary cost estimates for the system development and preliminary development schedules are
established. Preliminary estimates of the computing resources required to operate and maintain the system are
developed, glossary of terms are prepared.

Information Gathering:

Information relevant to the “Computer Resource Management System” of Laila Infotech is collected
from the Laila Infotech Limited and the finance department of the company. The information regarding
company activities is gathered from the company’s website www.lailainfotech.com.

Feasibility Study:

An initial investigation culminates in a proposal that determines whether an alternative system is


feasible than the present candidate system. To do feasible study we have to do the Economic, Technical,
Behavioral feasible studies.
1.Economic Feasibility: -
It is the most frequently used method for evaluating the effectiveness of a system. It is also called as
cost/benefit analysis.
In this project “Computer Resource Management System”, for the development of the candidate
system the cost that have to spend is the computer resources like the required software and hardware that
supports the software in an effective and efficient manner and the money to be paid to the developers. As the
company itself is a development center all the resources are in the company itself and no extra cost is spent for
Computer Resource Management System.
Hence our candidate system production is economically feasible.

2.Technical Feasibility: -
Technical feasibility centers around the existing computer system (software/hardware) configuration
and good software facilities in such a way that any new candidate system can be implemented without a large
alteration of the lab nut with slight modification of the existing system.
Hence our candidate system production is technically feasible.

3.Behavioural Feasibility: -
People are inherently resistant to change. Our candidate system is developed in such a way that it is
very user friendly, easy to learn how to work with and there is also not much resistant to this package from the
staff side also. As the company is basically a development center it will be very easy for the employees of the
company to learn about the developed candidate system.
Hence our candidate system production is behaviorally feasible.

4.1. SYSTEM DESCRIPTION

4.1.1 About Computer Resource Management System


Computer Resource Management System (CRMS) is a total management and informative system, which provides the
up-to date information of all the computer resources in the company.

4.1.2 Functional Requirements Specification

4.1.2.1 Hierarchy of Users


The hierarchy of the system is maintained by the privileges to access the system. There are four types of users.

Master Administrator: Has all the privileges of creating and deleting all type users, locations, shelves, for moving the
components from one location to another and also for changing the designation of a particular user. The administrator
can also search on shelves, component models, users and computers.
Hardware Administrator: Will be having the privilege of moving the components between various modules (shelves,
Bin, Recycle-Bin, locations and computers). He can create and delete computers.

Purchase Manger: Is the responsible person to buy the parts from the external vendors and keep them in the shelf. He
periodically views and updates the shelf, Bin and Recycle-Bin.

Normal User: Has only the privileges of viewing and searching the site for the information about the resources or the
other users. He also has the privilege to change his password.

4.1.2.2 High Level Functional Requirements

 Provides the Interface for users, purchase manager and administrators to login.
 For master administrator, provision of creating and deleting the users, shelves, locations, moving the
shelves from one location to another, editing the components and changing the designation of users is
provided.
 For hardware administrator provision for viewing and editing the components, moving the components
between various modules, creation and deletion of computers is provided.
 For Purchase Manager provision for viewing and updating the shelf, Bin and recycle-Bin
 For the normal users, provision for searching on usernames, location and components.
4.2.3.7 COMPUTER RESOURCE MANAGEMENT SYSTEM ARCHITECTURE

4.2.3.7.1 Physical Architecture Model

4.2.3.7.2 Layered Architecture


Database Layer Contains the data and database-related objects like stored
procedures, triggers, packages, etc.
Application Layer Contains the objects addressing the business logic; Most of
the middle-level Java objects will be here in application
layer.
Web Interface Layer It will be on the web server; It contains the web pages (JSPs)
of the application which will interact with the front-end
browsers
Client Layer Contains the web browser which interacts with web server
DEVELOPMENT METHODOLOGY

We have used a phased development process in our project. In a phased development process,
there are various phases with each phase ending with defined output. The main reason for
having a phased process that it breaks the problem of developing software into successfully
performing set of phases each handling a different concern of software development. The cost
of development is lower than what whole pattern tackled together. Phased process allows
proper checking of quality and progress at some defined point during a development.

It consist of :
2.1 Requirement Analysis

The requirement Analysis is done in in order to understand the problem the software system is
to solve basically two parties are involved in the software development – client and the
developer. The developer usually does not understand the client problem domain and client
often does not understand the issues involved in software development. This causes a
communication gap between the two parties which has two be bridged during requirement
analysis. There are two main activities involved in requirement analysis :

a) Problem Analysis

In it analyst has to understand the problem and its contented by interacting with clients end
users as well as studying the existing procedures.

b) Requirements Specification

Ones the problem is analyzed and essentials understood, the requirement must be specified in
the requirement specification document.

Requisition in generally in form of written document, combining natural languages description


and graphically model. It is called system specification and serves as the foundation for
hardware engineering, software engineering, database engineering and human engineering. It
describes the function and performance of computer base system and the constraints that will
govern its development. This specification bounds each allocated system elements. The system
specification also describes the information(data and control) that is input to and output from
the system.

Recognize and defined a problem of opportunity uses system thinking.


A problem is defined as a basic condition that is causing undesirable results.
An opportunity is basic condition that present the potential for desirable result.
Symptoms are merely signals of an underlying causes or problem.
It should properly document the following:
 Present system and its problems
 Objectives of project
 Limitation of the project
 Resources available for the project

Function requirement specify the following:


 User interface requirements
 Processing requirement
 Storage requirement
 Control requirement

2.2 FEASIBILY STUDY

Feasibility is the major of how beneficial or practical the development of a computerizes system
will be to an organization.
There aspects are considered to evaluate the feasibility.

Technical Feasibility

It is measure of the practically of a specific technical solution and the availability of technical
resources and expertise

 The proposed system used java as front end and MS Access as backend tool.
 Access is a popular tool used to design and develop database objects such as table
views, indexes.
 The above tool s are readily available easy to work with and widely used for developing
commercial application.

Operational Feasibility

There are two aspect functionality and acceptance with is the organization. The proposed
system will reduce the manual work and speed of the pay calculation.

Functionality

Functionality include issues such as determining whether the system can provide right
information at the right place and on time.
It fully support managements requirement of desired report and queries.
Acceptance

Acceptance implies how well received this system would be from both users and management
perspective.
The proposed system will be gladly accepted by the end user as it automates their routine work
and is user friendly.

Economic feasibility

It looks at the financial aspects of the project. It determines whether the management has
enough resources and budget to invest in the proposed system and the estimated time for the
recovery of cost incurred. It also determines whether it is worthwhile to invest the money in the
proposed project. Economic feasibility is determines by the means of cost benefit analysis.

2.3 SOFTWARE DISIGN

The purpose of the phase is to plan a solution of the problem specified by the requirement
document. This is first step in moving from the problem domain to solution domain. Designing
activity is divided into two parts.
a) SYSTEM DESIGN
It aims to identify the modules that should be in the system, the specification of these modules
and how they interact with each other to produce the desired result.

b) DETAILED DESIGN
The internal goal of each of the modules specified in the system design is decided

2.4 CODING

The goal of the coding phases to translate the design of the system into code in a given
programming language. For a given design, the aim is this phase is to implement the design in
best possible manner. The coding phase effects both testing and maintaining profoundly.

2.5 TESTING

Its function is to detect error in software. The starting point of testing is unit testing. In init
testing iach modules is tested separately and than integration testing is performed. In
integration testing in modules are integrated after that system is put together and system
testing is done and at last acceptance testing is done in order to demonstrate to the client.

The testing process starts with test plan. This test plan identities all the activities related to
testing that must be performed and specifies guidelines for testing. Then comes test case
specifications document, it contains list of all the different test cases together with the expected
output. Finally the test report is prepared.

2.6 INPLEMENTATION

the goal of implementation phase is to install the working system as the user site and it is the
responsibility of the developer is provide proper user training.
Implementation simply means converting a new system design into operation. In system
implementation, user training is crucial for minimizing resistance to change and giving the new
system to prove its worth. Training aids that communicate information about the new system
and help screens provide the user with a good start on the new system.

2.7 MAINTENANCE

Maintenance is the enigma of system development. Analyst and programmers spend for more
time maintaining program than writing them. Maintenance accounts for 50 to 80 percent of
total system development.
Maintenance activities begin where conversion leaves off.
Maintenances is handled by the same planning and control used in formal system project.
Documentation is as much a part of maintenance as that of system development. Program
changes are then tested and submitted to the user for approval. Once approved a project
completion notice send to the user, signaling the termination of the project.

4. SYSTEM CONFIGURATION

4.1 Hardware requirement

Main Processor Pentium II


Hard-disk Capaity 8 G.B
RAM 32 MB
Clock Speed 166Hz
Floppy Drive : 1.44MB
Keyboard 104 Key
Monitor V.G.A
4.2 Software specification

Operating System Window XP


Backend tool Oracle 8i
Front-end tool Sun Java 1.2 Run Time

5. SYSTEM DESIGN

Modeling As A Design Technique

A model is an abstraction of something for the purpose of understating it. Before building it. A
model omits the m\nonessential details, so it is easier to manipulate than original entity. The
use of this property is known as ABSTRACTION. Engineers’ artists and craftsmen have build
model for thousands of years to try out designs before executing them. To build complex
system, the developer must abstract different views of the system, build model using precise
notation, verify that the model specify the requirement, of the system, and gradually add detail
to transform the model into an implementation.

Advantage of modeling:

Designer build different type of model for various purpose before construction them, for
example architecture model to show customers, airplane scale models for wind-tunnel-test,
blueprint of machine parts.
 Testing a physical entity before using it.
 Communication with customers.
 Visualization.
 Reduction of complexity.

Abstraction

It is the selective examination of certain aspects of a problem. The goal of abstraction is to


isolate those aspects that are important for some purpose and suppress those aspects that are
unimportant. Abstraction must always be for some purpose, because the purpose only
determines what is important and what is unimportant, a model that contains extraneous detail
unnecessarily limits your choice of design decisions and diverts attention from real issues.

The object modeling technique

It is useful to model a system from three related but different viewpoints, each capturing
important aspect of the system. The object modeling technique combines these three view of
modeling systems. Each model contains references to entities in other model. For example
operation are attached to object in the object model but more fully expanded in the functional
model.

Each of the three model evolves during development cycle. During analysis a model of the
application domain is constructed without regard for eventual implementation during design,
solution domain constructs are added to the model. During implementation both application-
domain and solution domain are coded. The word “model” has two dimension- a view of a
system (object model, dynamic model or functional model) and stage of development (analysis,
design or implementation).

5.1 Object model

the object model describes the structure of objects in a system- their identity, their
relationships to other objects , their attributes and their operations. It provides the essential
framework into which the dynamic and functional model can be placed.

The object model is represented graphically with object diagrams containing object classes.
Classes are arranged into hierarchies sharing common structure and behaviors and are
associated with other classes.

Terms used in object model

 Objects
Object is a concept, abstraction, or thing with crisp boundaries and meaning for the problem at
hand. Ass objects have identity and are distinguishable.
 Classes
Classes defined a group of objects with similar properties or attributes common relationships to
other objects and common semantics.
 Object diagrams
It provide a formal graphic notation for modeling object, classes and their relationships to one
another.
 Attributes
It is a data value held by an object in a class.
 Operations and methods
An operation is a function or transformation that may be applied to or by object s in a class. A
method is the implementation of an operation in a class.
 Links and associations
A Links is a physical or conceptual connection between object instances, whereas association
describes a group of links with common structure and common semantics.
 Aggregation
It is strong form of association in which and aggregate object is made of components.
 Multiple inheritance
It permits a class to have more than one super class and to inherit features from all parents.

ADVANTAGES
 It organizes a system around real world objects or conceptual objects that exists in the
user’s view of the word.
 Changes in function are readily accommodated in object oriented design by adding or
changing operations, leaving the basics object structure unchanged.
 It can be easily extended by adding objects and relationships near the boundary.
 It is easier to understand.
 It integrates database with programming code.
 Decomposition of object can be easily done here.

FUNCTIONAL MODEL

The functional model describe those aspect of a system concerned with transformation of
values-function, Mappings, constrains and functional dependencies. it captures what a system
does, without regard for how and when it is done.
The functional model is represented with data flow diagrams, which shows the dependencies
between values and the computation of out put values from input values and function. This
mode specifies the meaning of operations in the object model and the action in the dynamic
model.

Send items
Main page

Terms used in DFD


 Processes
A process transforms data values. The lowest level processes are pure functions without
side effects. An entire data flow graphics high level process.
 Data flows
A data flows connects the output of an object or process to input of another object or process.
It represents the intermediate data value with in a computation. It is represented by an arrow
and labeled with a description of data, usually its name or type.

 Actors
An Actors is active object that drives the data flow graph by producing or donsuming values.

 Data store
A data store is a passive object with in a data flow diagram that stores data for later access.

Advantages of functional model

 It specifies the result of a computation with out specifying how or when they are
computed.
 It also includes constraints among values in an object model.
 It is the main model for the non computation programs, like compilers.
 It is simple to understand the functionality from this model.
 It specifies only what happens in the system.
Why is the topic chosen: -
In today’s competitive environment, where everybody wants
to be on the top, Information plays very crucial role.
As fast as information is accessed and processed, it can give good results.
Computerized system help to fulfill these goals . Computerization of the official works
will help in doing lot of manual work quickly . It will help in easy storage and access of
all information , in short period of time.

What contribution would the Project make: -

This is a era of Information Technology where getting


information is the base of each and every thing. Success of any
business depends upon its popularity and goodwill. Today market has
been expanded and you have to be a global player , today client wants
to access most of the information from his residence and then do
transaction.

The project would help in effective and systematic record


keeping that is storing and retrieving of useful data. Project will be able to give the report
so that management can make decisions on the basis of those reports.

Project Category:-

Category of this project is RDBMS based N-tier architecture Distributed


Environment based project with server side component.

Project can be categorized in two ways :-

1. Local area network projects.

2. Distributed Projects.

Local Area Network projects are those projects where application has to be
incorporated in the Local area network of the client i.e within its premises
only. In LAN case server is not remotely located and client access this
application through this network. Here the question of platform
independence does not arise and we use technologies like : Visual Basic ,
Fox pro , D2k or C,C++.

Distributed projects are those projects where application is remotely situated.


In these kind of projects application is remotely situated on to the remote
server from where client machine access this application. WAN and Internet
is a kind of distributed application where client machine connects to the
remote server and application is downloaded on to client machine. Here the
question of platform independence arises and we use technologies like Java
Servlets , Java Server Pages , EJB , RMI etc.

Weather you are working on LAN projects or Distributed projects there are
two sides of it :-

1. Front End.

2. Back End.

Front End remains on client side. Front end is made for end user who uses
our application. Basically in front end our input-output forms reside which
takes the input from the client and gives output back to client.

Backend remains on server side and has two components i.e.

1. Server side program


2. Data Base.

Data base is the most important thing in this universe as data base gives
identity to a thing without data base existence of a thing is impossible.
While working on a project first step is to design a database.

What is data base ?

Data Base is a collection of tables and table is a collection of records in a


tabular form i.e. in row and columns.

Data Base can be divided into two parts :-

1. RDBMS.
2. DBMS.

We will be using RDBMS (Relational Database Management System) in our


project i.e. oracle 8i Enterprise edition.

Why we are using Oracle (RDBMS)?

Some of the merits of using Oracle (RDBMS) are as under :-

 Centralization of database.
 Client Server Technology.
 Security.
 Normalization of Data Base.
 Relationship.
 Transaction Processor.
 It gives some internet related features.

Hence because of these features we are using Oracle as a back end


technology.

ABOUT ORACLE 8.0

Oracle 8.0 contains all the features of previous version. It also supports some new
features & enhancement to some existing features. Oracle servers provides deficient &
effective solution for the major features.

 Large Database & Space Management Control

Oracle supports the largest database potential hundreds of Giga Bytes in size. To make
efficient use of expensive devices , it allows full control of space usage.

 Many Concurrent Database Performances

It supports large no of concurrent users executing a variety of database Applications


operation on the same data. It minimizes data connection & guarantees data concurrency.
 High Transaction Processing Performance

Oracle maintains the processing features with a high degree of overall system
performance. Database user doesn’t suffer from slow processing performance.

 High Availability

At some sets Oracle works 24 Hours per day with no downtime or limit database
throughput. Normal system operation such as database backup & partial completion
system failure don’t interrupt database use.

 Controlled Availability

Oracle can selectively control the availability of data at the database level & sub
Database level. e.g. an administrator can disallow use of a specific application .Data can
be reloaded without affecting other application.

 Industry Accepted Standards

Oracle adheres to industry accepted standards for the data access language operating
system, user interface & network communication protocols . It is open system that
protocols a customer invention.

 Manageable Security

To protect against unauthorized database aspects & users .Oracle provides failsafe
security features to limit & monitor the data area. The system make it easy to manage
even the most completed designs for data assets.

 Database Enforced Integrity

Oracle enforces data integrity “Business rules” that dictates the standards for applicable
data. As result the cost of coding & managing checks in many database applications are
eliminated.

 Distributed Database System

For community environment that are connected via networks. Oracle combines the data
physically located on the different computers in one logical database that can be accessed
by all the network users. Distributed systems have same degree of user transparency &
data consistency as non-distributed systems. Yet receives the advantages of local database
management.

 Portability

Oracle software is compatible to work under different operating system & same on all
system. Application developed on Oracle can be used on virtually any system with little
or no more modification.

 Compatibility

Oracle software is compatible with industry standards, including most industry standards
operating systems. Application developed on Oracle can be used on virtually any system
with little or no modification.

 Connectivity

Oracle software allows different types of computers & operating system to share
information networks.

NEW FEATURES OF ORACLE 8.0

 Improved Scalability

The maximum size of an Oracle database has been increased to support hundreds of
terabytes depending on the operating system on which it resides.

 Improved Security

Oracle 8.0 server now includes password management so that a password has a limited
lifetime & must meet certain complexity such as minimum length. An account can be
locked after a specified no of failed login attempts.

 Improved Performance Via Partition

A table of index can divided into smaller pieces called patrons, based on the value of one
or more columns. A table patron can be individually managed so that operation in one
partition do not affect the availability of data on the other partitions. Also Insert
,Update ,Delete operation against a partitioned table can be processed partially.
In other words, the Oracle 8 server can assign a portion of the work to execute a single
DML statement to multiple processes , which may then be allocated to multiple processes
by the server operating system. As a result ,the parallel DML operation is completed
more quickly.

 Enhanced Support for Database Replication

The performance & manageability of database replication have been significantly


improved.

 Capability To Handle a Much Larger Number Of Concurrent Users

By pooling database connection, the Oracle 8 server is able t9o service a much larger
number of concurrent users up to 3000, depending on the server operating system &
server hardware resources.

 New & Improved Data Types

Some existing data types have been enhanced & new data types have been introduced.

 Improved Select Statement

A new feature of the select statement allows a sub query to be used in place of a table
in a from clause.

Now when we are discussing Data Base there is one more thing attached to it
i.e. Data Base Models.

DataBase Models :

There are three kind of database models :-


1. Single tier architecture.
2. Two tier architecture.
3. N- tier architecture.

Single tier Architecture :- In this kind of architecture Database and Client


Application remains on One machine i.e there is no client server technology ,
there is no centralization of database and basically it is a stand alone system.

Two tier Architecture :- In this Kind of architecture Database and client


application is on two different machines i.e. Database on one machine and
Application on another machine. In this type of architecture there is client
server technology and centralization of data base is there, but it has two
demerrits :-

1. Security is not there,


2. Multiple Client access is not there.

N- tier Architecture :- In this kind of architecture there is a middle-ware in


between client and database. Middle ware checks the validity of the client
i.e. weather client can access the database or not. Hence there is security in it
as well as middle-ware allows multiple clients access.

What is Middle-Ware ?

Middle-Ware is a concept , Middle Ware provides centralization of business


logic i.e. instead of putting logic on each and every client machine we put
logic on a centralized server hence middle ware is nothing but a server side
program where all your business logic and business methods reside. It
remains on server side and it has all the logical building. Middle ware
provides :-

1. Multiple Client access.


2. centralized business logic in case of distributed application.

Because we are working on Distributed Application Based Project we need


platform independent Language :-

Introduction to Java

Java is a high level, third-generation programming language, like C, Fortran, Perl and
many others. It is a platform for distributed computing – a development and run-time
environment that cointains built-in support for the World Wide Web.

History of Java

Java development began at Sun Microsystem in 1991, the same year the World Wide Web
was conceived. Java’s creator , James Gosling did not design java for the Internet. His
Objective was to create a common development environment for consumer electronic
devices which was easily portable from one device to another. This effort evolved into a
language , code named Oak and later renamed Java that retains much of the syntax and
power of c++ , but is simpler and more platform independent.
Java Features

Some of the important features of Java are as follows:

 Simplicity
 Orientation
 Platform Independence
 Security
 High Performance
 Multi Threading
 Dynamic linking.
 Garbage Collection.

One of the most important feature of Java is Platform Independence which makes it
famous and suitable language for World Wide Web.

Why java is Platform Independent ?

Java is Platform Independent because of Java Virtual Machine (JVM).

Java Virtual Machine (JVM)

The client application or operating system must have a java byte-code interpreter to
execute byte-code instructions. The interpreter is a part of a lager program called the
JVM. The JVM interprets the byte code into native code and is available on platforms
that supports java.

When the user runs a Java program, it is upto the JVM to load , possibly verify, and then
execute it. The JVM can perform this function from within a browser or any other
container program or directly on top of the operating system.

When a browser invokes the JVM to run a Java program, the JVM does a number of
things :

1. It validates the requested byte-codes, verifying that they pass various formatting
and security checks.
2. It allocates memory for the in coming java class files and guarantees that the
security of JVM is not violated. This is known as the class loader.
3. it interprets the byte code instructions found in the class files to execute the
program.
Connectivity using JDBC :-

There are four kind of drivers available in Jdbc :-

1. JdbcOdbc Bridge Driver.


2. Partly Java Driver.
3. Pure Java Driver.
4. Native Driver.

JdbcOdbcDriver : This provides Jdbc access via Odbc drivers. Note that
Odbc binary code , and in many case database client code, must be loaded an
each client machine that uses this driver. As a result this kind of driver is
most appropriate on a corporate network where client installations are not a
major problem.

Partly Java Driver : This Driver translates Jdbc calls into a Net Protocol
which is then translated to a RDBMS protocolby a server.In this kind of
driver part of the binary code should be on client machine and part should be
on server, hence this kind of driver has same problem that was with
JdbcOdbc driver and it is mostly used in Intranet.

Pure Java Driver : This is a platform independent driver as this kind of


driver remains on server. This kind of driver is provided by third party
vendor. This net server middle ware is able to connect its pure java clients to
many different databases.

Native Driver : This kind of driver converts JDBC calls into the network
protocol used by Dbms directly. This allows a direct call from client machine
to the DBMS server and is a practical solution for Intranet access.

Note :- We are using 3rd Type of driver i.e. Thin Driver in our project.

Client Side Interface :-

In client side interface we are using :-

a) JSP – In Internet Based Application.

.
JSP are Front-end technologies which are used in web based projects because
they use :-
1. HTTP Protocol to handle Request and Response.
2. They are invoked through Browser.
3. They give out put in HTML format.
4. They need Browser Support.

We have designed web based forms using JSP and call JavaBeans in which
we have defined business logic.

JavaBeans :- JavaBeans is a server side component in which we define


business logic which is reuseable.

Features of JavaBeans are:-

1. Wider Scope i.e. it can be used in web based projects.


2. Reusability.
3. Economical and efficient.
4. Transaction and Persistency.
5. Security.
6. Multi threading.

Tools/Environment used :

Tools and Environment used in this project are as under: -

Software requirements

 Windows NT operating system.


 Front End : JSP.
 Middle Ware : JavaBeans.
 Back End : Oracle 8i.
 Connectivity : JDBC – Thin Driver.
 Application Server : Weblogic Server 8.1
 Web Server : Tomcat 4.1.
DATA FLOW DIAGRAM

LOGIN PROCESS

INVALID,UID,
LAUNCHING
PWD THE PRODUCT
FOR BIDDING

SELLER ID,UID,
PWD AUCTION
VALID DATA
LOGIN
PROCESS
BUYER ID,UID, BIDDING
PWD PROCESS

PAYMENT PROCESS

VALID PAYMENT
USER
BANK
CHECKING FOR PAYMENT ORGAN.
INVALID PAYMENT

PAYMENT INFOR.

USER ENTERING CARD NO,PIN NO

SUBMITTED PAYMENT
U’R PAYMENT IS NOY SUFFICIENT
PAYMENT TRANSFER PROCESS
PERMITION

CONFERMATION

ORGN.BANK
FOLLOWING TO BID
ORGAN.

REGISTRATION
REQUEST REQUEST
USER OPENING SERVER AQUARING ORAN.
SITE DOMAIN ON
SITE DATA

CONFERMATION ID

SHOWING FRONT PAGE OF SITE CANCEL COMMOND


CLOSING THE SITE
USER DETAILS

GENERATING ON SEARCH ID

REGISTRATION PROCESS
DETAILS

SELLER

INSERTED

ORGAN.
INSERTED SUBMITTED DETAILS

BUYER
ORGAN.

SELLER BUYER
SID,UID,PWD SID,UID,PWD

LOGIN PROCESS

REGISTRY OR RETRY

ENTERING
SETTING SERVICE
PRODUCTCHARGES
DETAILS PAYMENT
GENERATING
CHECKING
STATEMENT
VALIDITY
E-MAIL
PROCESS CHOOSING TYPE AND PRODECT TO BID

ORAN.
BUYER SELLER
NOT VALID TRY AGAIN

SELLER BUYER CURRENT A/C


ORAN.
SID,UID,PWD

SHOWING PRODUCT TO BID

PRICE OF PRODUCT
SELLER DETAILS BUYER DETAILS

BUYER

SELLER AUCTION
BUYER
DATA
AID
DESC.

BANK

AUCTION CHOOSING PROCESS SHOWING DISC. OF CHOSEN PRODUCT


PAYMENT PROCESS

PRODUCT
PRICE
AID
TIME OUT
CURRENT HIGHEST BID,AID,
VARIFING PAYMENT BUYERID, SELLERID

SETTING SERVICE CHARGES

UPDATING & SHOWING CURR. BID ON PRO.

BANK
NEW BID
UPDATING DATABASE
AUCTION
BUYER DATA

CURR.
BUYERAUCT ACCEPTED BID

PAYMENT PROCESS

GENERATIN AUCTION ID & SENDING MAIL SETTING NEW BID BIDDING BY BUYER
NOT BID
AID PLACE TIME

SELLER

E R DIAGRAM

name ADDRESS name REGISTRATION NO

EMAIL PHONE NO. REGISTERED


SELLER

USER ID PWD ORGAN.

name name

LAUNCHED
name
name BAYER

name name
AUCTION MAIN
GOES
name TO

BIDDING ON

ORGN. ACCOUNT

SOID AUCTION CURRENT AUCTION


GOES TO
ADDED PROFIT
& PAYMENT

AUCTION ARCHITECTURE

4.2.3.7.1 Physical Architecture Model


4.2.3.7.2 Layered Architecture

Database Layer Contains the data and database-related objects like stored
procedures, triggers, packages, etc.
Application Layer Contains the objects addressing the business logic; Most of
the middle-level Java objects will be here in application
layer.
Web Interface Layer It will be on the web server; It contains the web pages (JSPs)
of the application which will interact with the front-end
browsers
Client Layer Contains the web browser which interacts with web server
TESTING

Testing is the process of detecting errors.Testing performs a very critical role for quality assurance

and for ensuring the reliability of software.The results of testing are used later on during

maintainence also

Psychology of Testing
The aim of testing is often to demonstrate that a program works by showing that it has no errors.The basic

purpose of testing phase is to detect the errors that may be present in the program.Hence one should not

start testing with the intent of showing that a program works,but the intent should be to show that a program

doesn’t work.

Testing is the process of executing a program with the intent of finding errors.

. Testing Objectives:

The main objective of testing is to uncover a host of errors, systematically and with minimum effort

and time. Stating formally, we can say,

 Testing is a process of executing a program with the intent of finding an error.

 A successful test is one that uncovers an as yet undiscovered error.

 A good test case is one that has a high probability of finding error, if it exists.

 The tests are inadequate to detect possibly present errors.

 The software more or less confirms to the quality and reliable standards.

LEVELS OF TESTING

In order to uncover the errors present in different phases we have the concept of levels of testing.The basic

levels of testing are

Client Needs Acceptance Testing

Requirements System Testing

Design Integration Testing

Code Unit Testing


Unit testing:

Unit testing focuses verification effort on the smallest unit of software i.e. the module. Using the

detailed design and the process specifications testing is done to uncover errors within the boundary

of the module. All modules must be successful in the unit test before the start of the integration

testing begins.

In this project each service can be thought of a module.There are so many modules like

Login,HWAdmin, MasterAdmin, NormalUser, PManager. Each module has been tested by giving

different sets of inputs.when developing the module as well as finishing the development so that

each module works without any error.The inputs are validated when accepting from the user.

Integration Testing:

After the unit testing we have to perform integration testing.The goal here is to see if modules can be

integrated proprerly,the emphasis being on testing interfaces between modules.This testing activity can be

considered as testing the design and hence the emphasis on testing module interactions.

In this project the main system is formed by integrating all the modules.When integrating all the modules I

have checked whether the integration effects working of any of the services by giving different combinations

of inputs with which the two services run perfectly before Integration.

SYSTEM TESTING

Here the entire software system is tested.The reference document for this process is the

requirements document, and the goal os to see if software meets its requirements.

Here entire ‘CRMS’ has been tested against requirements of project and it is checked whether all

requirements of project have been satisfied or not.


ACCEPTANCE TESTING

Acceptance Test is performed with realistic data of the client to demonstrate that the software is

working satisfactorily. Testing here is focused on external behavoiur of the system,the internal

logic of program is not emphasized.

In this project ‘Network Management Of Database System’ I have collected some data and tested

whether project is working correctly or not.

Test cases should be selected so that the largest number of attributes of an equivalence class is

exercised at once.The testing phase is an important part of software development. It is the process

of finding errors and missing operations and also a complete verification to determine whether the

objectives are met and the user requirements are satisfied.

White Box Testing

This is a unit testing method where a unit will be taken at a time and tested thoroughly at a

statement level to find the maximum possible errors.

I tested step wise every piece of code, taking care that every statement in the code is executed

at least once. The white box testing is also called Glass Box Testing.

I have generated a list of test cases ,sample data.which is used to check all possible

combinations of execution paths through the code at every module level.

Black Box Testing

This testing method considers a module as a single unit and checks the unit at interface and

communication with other modules rather getting into details at statement level. Here the module

will be treated as a block box that will take some input and generate output.Output for a given set of

input combinations are forwarded to other modules.


SYSTEM SECURITY

User Authentication

Every user of the Email first needs to register him with a unique Username and
Password .If the user has already register he can login using his UserName and
Password.this ensure that no other person except the Autorised user can
accesss or modify the data containing mails and other personal information.
To ensure that the UserName and Password are not accessed by any other
persons these values are stored in Encryptedform in the Database and hence
can be protected from any mischievous access.

Once the User has Authenticated himself at the begin of the program he can
check and send Emails.

To stop BruteForce attack if UserName and Password combination goes wrong


three times successively then the program stop responding for a while to add a
extra security.
Conclusion

As evidence of the success of this mission, there are millions of items listed each day in
thousands of different categories. There are items for almost any interest that one could
imagine, from sheet music to automobiles to hand tools to real estate. And the variety doesn’t
stop there. Need a computer? One may find it listed in the proper category, in any
configuration from very old and obsolete to the latest greatest machine available. What about
antiques? One can find an antique quilt that is up for highest bid, or maybe an old violin,
whose beautiful tones have enchanted many though its years. Tickets. Maybe a ticket to the
next concert of ones favorite artist or play production. One can even find that special bottle of
wine, some aged, exotic cheese, and the perfect ‘mood’ music for that special occasion.
In this instance it may be true that on eBay, they have something for everybody, whatever
their tastes may be.

Reliability

For a business of this nature, the need to be available is all-important. After all, when
the only means of access is via ‘online’, it is of utmost importance to have and maintain an
accessible web presence.

"By the nature of the business, keeping its site up and running 24/7 is more important
to eBay than it is to, say, Amazon," Morningstar.com analyst David Kathman told the E-
Commerce Times.

References:

eBay, Sellers Guide, retrieved 11 April 2002 from:


http://pages.ebay.com/help/sellerguide/after-whatnow.html
eBay, Company Overview, retrieved 11 April 2002 from:

http://pages.ebay.com/community/aboutebay/overview/index.html)

(Mulrean, J., 5 steps to avoiding auction rip-offs,


retrieved 12 April 2002 from MSN Money,
http://money.msn.com/articles/smartbuy/dollarwise/9013.asping ground for fraud.)

http://www.newsfactor.com/perl/story/16387.html

<http://auctions.indiatimes.com/webapp/commerce/command/ExecMacro/TIL/macros/Logon.d
2w/report>

https://www.baazee.com/jsp/UserRegistration.jsp

http://www.fabmart.com/HTML/faq.asp
http://www.baazee.com/static/help/User-agreement.html

Potrebbero piacerti anche