You are on page 1of 39

[MYBIDSITE]

[LISHA ARORA]

[5710631]

COMPANY PROFILE
THE COMPANY
MDA IT Hub, a trademark of MDA IT Hub InfoTech Private Limited, is a young and dynamic software
development and training company. The company aims at providing the best solutions in the fields of,
1.

Software & Web Development

2.

Business Automation Solutions

3.

Corporate Training

4.

Individual Training

5.

HR Consultancy

6.

Software Consultancy

7.

Infrastructure
The company offers a state-of-the-art Software / Web solutions for Business Automation to IT / Non IT,
industrial, corporate, institutional and small business clients. The company also provides consultancy
services to develop infrastructure.

THE CORE
About MDA IT Hub| TECHNOLOGIES
Strong Programming skills are the defining USP of MDA IT Hub| TECHNOLOGIES. Typical projects
involve advanced n-tier architecture, which integrate with backend legacy systems and databases. A team
of application architects and graphic designers excel in creating lightweight interface pages, creative flash
demos, intuitive navigation and user-friendly forms and screen layouts. The Quality Control team ensures
that all development is bug-free and adheres to the specifications.
Industry Endorsed Technologies: Our highly trained and experienced Technical team can serve to any kind
of Corporate Training needs, whether it is Technologies (like .Net, Java / J2EE, etc.)

About MDA IT Hub| TRAININGS


MDA IT Hub, through its Education Hub or through its Business Partners Education Hub, provides
Industry Endorsed Curriculum to groom an individual in Technology. A non technical Graduate can
pursue Industry Endorsed Diploma Programs, along with the Graduation. Student pursuing Diploma
Programs, not only becomes Technology Savvy but also have a benefit to get Dual Qualification.

[RPIIT]

Page 6

[MYBIDSITE]

[LISHA ARORA]

[5710631]

TABLE OF CONTENTS
Name of Topic

Page No.

1. Scheduled chart of Traning Activites


2. Introduction Background Contents of the Problem Addressed
2.1Introduction of Project
2.2 System Overview
Problem DEFINITION
EXISTING SYSTEM
PROPOSED SYSTEM

3 Academic and technical importance of learning


4.Detail Study of Language
5.System Architecture
DATA FLOW DIAGRAM
ALGORITHM
FLOWCHART
6. Module Implementation

7.Future Scope And Limitations


FUTURE SCOPE
LIMITATIONS
8.Conclusion and Learning Outcomes
9.Bibliography
10. List of Figures and Tables

Scheduled Chart of Traning Activites

[RPIIT]

Page 6

[MYBIDSITE]

S.No

[LISHA ARORA]

[5710631]

Date

Topic Name

05-07-2013

Introduction of HTML

07-07-2013

Introduction of CSS

10-07-2013

Introduction of DIV

12-07-2013

Basics of JavaScript

14-07-2013

Events of JavaScript

16-07-2013

RMI

18-07-2013

Introduction of Servlet

22-07-2013

Servlet classes and Interfaces

25-07-2013

Cookies

10

26-07-2013

Session

11

29-07-2013

SQL Server 2008

12

05-08-2013

Connectivite of JDBC and OBDC

13

09-08-2013

JSP

14

14-08-2013

Scriplets Tags

15

17-08-2013

User Defines Tags

16

21-08-2013

Filter

17

24-08-2013

Structs

[RPIIT]

Page 6

[MYBIDSITE]

[LISHA ARORA]

[5710631]

Introduction Background Contents of the Problem Addressed


2.1 Introduction of Project
Auction is a bid ,a process of selling,buying and services offered take place.There are several different
types of auctions and certain rules exist for each auction.There are variations for an auction which may
include price limit,maximum price limit and time limitations ect.Depending upon the auction methor bider
can participate remotely or in person.Remote auction includes participating through telephone,mail, and
internet.
The online system is a model where we participate in a bid for products and service.This auction is made
easier by using online software which can regulate processes involved .there are several different auction
methods or types and one of the most popular methods.This system has been designed to be highly
scalable and capable of supporting large numbers of bidders in an active auction.Online Auctioning
System has several other names such as e-Auction,electronic auction etc.The requirement for online
auction or online bidding can be more accurately specified by the client.It should be healthy and will be a
good practice when it is made more transparent as a matter of fact.Online bidding has become more wide
spread in all sorts of industrial usage.It not only includes the product or goods to be sold,it also has service
which can be provided .Due to their low cost this expansion made the system to grow.
Online bidding has become a standard method for procurement process.Bidders can be maintained in a
single database according to the preference,and they can be monitored.Users data can be maintained in a
confidential way for validity and integrity of contractual documentation.Neat reporting reduce
paperwork,postage.

The user level accessibility has been restricted into categories;


1. Home
2. admin
3. User
4. Member
5. Contact Us

[RPIIT]

Page 6

[MYBIDSITE]

[LISHA ARORA]

[5710631]

6. Other information

Login:
Before entry,user enters the User id and password is checked andonly valid user id and password will get
entry into members zone. This is a security feature to avoid entry of unauthorized.

User:
Through this module new user can registered them. After giving their details, they will get a user id and
password. Then to get entry into poster section they need to provide this id and password and only poster
with valid id and password will get entry into posterzone. This is also a security feature to avoid entry of
unauthorized user.

Member:
Through this, works to provide the feedback related to the information stored in various services etc.

Contact Us:
Through this, a user can contact us to find the relatively information regarding to the services.
Other advantage of this project is:

User-Friendly:
This systemis user-friendly to attract the customers and when they have problems, it should provide help.

Ease of Use:
This feature would make the users more enthusiastic while using the system. There are some tasks, like the
registration of the visitors, which may be boring for the users. With well-designed interfaces and easy-to-use
components, these tedious processes may be converted into a joyful activity.
Reliability:
One of the most important features of the system is reliability. There are two aspects of reliability. First, the
information gathered from the customers (private information) should not be revealed under any
circumstances. Moreover, the database that valuable information is kept should be secure.The other aspect is
that, the system should be online as long as possible.

2.2SYSTEM OVERVIEW
2.2.1PROBLEM DEFINITION
The problem with public auction is that the participation of the general public is very limited. The aim of
the project is to socialize the auction so that people from far & wide and even across the continent can
participate in it. The "BidInBid" site is developed with a vision to wipe out the inherent problems of
"Conventional Auction House". The salient features of the site are as follows:

[RPIIT]

Page 6

[MYBIDSITE]

[LISHA ARORA]

1.

Paperless Auction System

2.

It's accessible to everyone, at any time no matter where they are

3.

Reliable user validation & checking.

4.

Easy online settlement.

[5710631]

"BidInBid" is designed in such a way that it is as user friendly as possible. So any aspiring bidder or seller
can visit the site and engage in bidding with least effort.

2.2.2EXISTING SYSTEM
The existing "OPEN Auction House" is managed manually. Prior to each auction, the day of auction, the
venue and the items on auction are announced through news media. Those who wish to take part in the
auction have to arrive at the venue on that day on time. This conventional method most of the times
prevent aspiring bidders from participating in the bidding process. Another headache of the old system is
to track each bidding process and to make it culminate in financial settlement. So the system has to keep
records of both buyers and sellers until the end of settlement. The process is very cumbersome and time
consuming.

2.2.3 PROPOSED SYSTEM


The slogan of the new site is AAA, 'Anyone, Anytime, Anywhere'. That what it really is? The "BidInBid"
is online auction house so the seller or bidder doesn't need to go anywhere, instead they can take part in
the auction just sitting in the comfort of their living room, be it during the day or night.
The proposed computerized "BidInBid" site has made auction process simple. The only

[RPIIT]

Page 6

[MYBIDSITE]

[LISHA ARORA]

[5710631]

5 pre-condition is that the user must register and authenticate before he/she can take part in the bidding
process. The system uses HTTP forms authentication which creates a session cookie for any signed in
user. Through out the span of the session the cookie remains valid until the user logs out.
An auction house needs to have products to auction, so in the proposed system this is done using product
registration module. The module is open to user who is registered sellers and they need to authenticate
before they register any product. The system controls the closing date by adding 14 days to the submitting
date there by restricting the bidding process to go on indefinitely.
Another important module in the proposed project is the "Bidding module ". Here one can see the details
of any particular product and also the bidding history. The user can bid on that item by entering any
amount greater than or equal to the incremental bid amount. Here also system checks to see whether the
user has his credential verified otherwise he/she will be directed to the login/registration page.
The last but the least module is the "Web Administration" module. The module is only open to the web
administrator due to security reasons. In this module the administrator can add product categories; this is
to avoid rampant creation of categories. The 2nd thing is the option to edit any given product. This will be
necessary when some of the details of the product need to be edited for one reason or other. The 3rd and
last the closed bid manager where the administrator notifies both the seller and buyer the need to complete
the transaction.
There is another module which runs more or less like background process. The function of the module is
to close bid of those products whose closing date is less than the current date. The process is automatic
and hidden from the web users.

Academic and technical importance of learning


This course is specially designed for students who do not have any programming experience or
programming knowledge in using object-oriented techniques.
This course covers the programming and object-oriented techniques of Java. It introduces students to
Object-oriented programming concepts, teaches them the fundamentals of the Java language and syntax,
introduces them to the major class libraries in Java, and prepares them to begin development of business
applications in Java. It is interspersed with step-by-step exercises illustrating the concepts as they are

[RPIIT]

Page 6

[MYBIDSITE]

[LISHA ARORA]

[5710631]

explained. Java applications, using JDK 1.2, are introduced in this course to provide students with a more
thorough understanding of the programming process.
By the end of this course one should have a good basic understanding of how to develop (design, code,
and debug) programs in the Java language.
Electrical engineers are also asked to create or write softwares for the hardwares that they develop using
high level programming languages, and java is one. jave is one of the most commonly used programming
language to implement business applications to day and even with every commercial lines. with the use of
java, it would probably more easier to write in code the algorithms and logic that you would want to
implement in your hardware design for the chips.
You can get tons of Jobs opportunity by learning Java programming language, you can develop core Java
based server side application, J2EE web and enterprise applications, and can even go for Android based
mobile application development. So if you are not coming from C and C++ background, and want to learn
your first programming language.
The platform comes in three versions:

Java SE (Java Platform, Standard Edition) for desktop and server applications

Java EE (Java Platform, Enterprise Edition) for web and enterprise applications

Java ME (Java Platform, Micro Edition) for applications running on resource-constrained devices

Following list of technologies that are required in this project.

Language Fundamentals
1. The Java Environment:
2. Installing Java.
[RPIIT]

Page 6

[MYBIDSITE]

[LISHA ARORA]

3. Java Program Development


4. Java Source File Structure
5. Compilation
6. Executions.
Networking Programming
1. Networking Basics
2. Client-Server Architecture
3. Socket Overview
4. Networking Classes and Interfaces
5. Developing Networking Applications in Java
DataBase Programming using JDBC
1. Introduction to JDBC
2. JDBC Drivers & Architecture

[RPIIT]

Page 6

[5710631]

[MYBIDSITE]

[LISHA ARORA]

[5710631]

Detail Study of Language


4.1 Hypertext Markup Language
HTML, an initialize of Hypertext Markup Language, is the predominant markup language for web pages. It
provides a means to describe the structure of text-based information in a document by denoting certain text
as headings, paragraphs, lists, and so on and to supplement that text with interactive forms, embedded
images, and other objects.
.HYPERTEXTMARKUPLANGUAGE Hypertext Markup Language (HTML), the languages of the World
Wide Web (WWW), allows users to produces Web pages that include text, graphics and pointer to other Web
pages (Hyperlinks).
HTML can be used to display any type of document on the host computer, which can be geographically at a
different location. It is a versatile language and can be used on any platform or desktop. HTML provides tags
(special codes) to make the document look attractive. HTML tags are not case-sensitive. Using graphics,
fonts, different sizes, color, etc., can enhance the presentation of the document. Anything that is not a tag is
part of the document itself.

4.1.1ATTRIBUTES :The attributes of an element are name-value pairs, separated by "=", and written within the start label of an
element, after the element's name. The value should be enclosed in single or double quotes, although values
consisting of certain characters can be left unquoted in HTML (but not XHTML).Leaving attribute values
unquoted is considered unsafe. Most elements take any of several common attributes: id, class, style and
title. Most also take language-related attributes: language and dir.

4.1.2ADVANTAGES
A HTML document is small and hence easy to send over the net. It is small because it does not include
formatted information.HTML is platform independent.HTML tags are not case-sensitive.

4.2 JavaScript
JavaScript script-based programming language that was developed by Netscape Communication
Corporation. JavaScript was originally called Live Script and renamed as JavaScript to indicate its
relationship with Java. JavaScript supports the development of both client and server components of Webbased applications. On the client side, it can be used to write programs that are executed by a Web browser
within the context of a Web page. On the server side, it can be used to write Web server programs that can
process information submitted by a Web browser and then update the browsers display accordingly.

[RPIIT]

Page 6

[MYBIDSITE]

[LISHA ARORA]

[5710631]

4.2.1JAVASCRIPT VS JAVA
JavaScript and Java are entirely different languages. A few of the most glaring differences are: Java applets
are generally displayed in a box within the web document; JavaScript can affect any part of the Web
document itself. While JavaScript is best suited to simple applications and adding interactive features to Web
pages; Java can be used for incredibly complex applications. There are many other differences but the
important thing to remember is that JavaScript and Java are separate languages. They are both useful for
different things; in fact they can be used together to combine their advantages.

4.2.2 ADVANTAGES: The advantages include:


JavaScript can be used for Sever-side and Client-side scripting.
It is more flexible than VBScript. JavaScript is the default scripting languages at Client-side since all the
browsers supports it.

4.3Java Technology
Initially the language was called as oak but it was renamed as Java in 1995. The primary motivation of
this language was the need for a platform-independent (i.e., architecture neutral) language that could be used
to create software to be embedded in various consumer electronic devices:
Java is a programmers language.
Java is cohesive and consistent.
Except for those constraints imposed by the Internet environment, Java gives the programmer, full
control.

Finally, Java is to Internet programming where C was to system programming.

4.3.1 IMPORTANCE OF JAVA TO THE INTERNET


Java has had a profound effect on the Internet. This is because; Java expands the Universe of objects that can
move about freely in Cyberspace. In a network, two categories of objects are transmitted between the Server
and the Personal computer. They are: Passive information and Dynamic active programs. The Dynamic,
Self-executing programs cause serious problems in the areas of Security and probability

4.3.2 JAVA CAN BEUSED TO CREATETWO TYPES OFPROGRAMS APPLICATION


AND APPLETS: -

[RPIIT]

Page 6

[MYBIDSITE]

[LISHA ARORA]

[5710631]

An application is a program that runs on our Computer under the operating system of that computer. It is
more or less like one creating using C or C++. Javas abilityto create Applets makes it important . An Applet
is an application designed to be transmitted over the Internet and executed by a Java compatible web
browser.

4.3.3FEATURES OF JAVA SECURITY :Every time you that you download a normal program, you are risking a viral infection. Prior to Java, most
users did not download executable programs frequently, and those who did scan them for viruses prior to
execution. Most users still worried about the possibilityof infecting their systems with a virus In addition,
another type of malicious program exists that must be guarded against.

4.3.4 PORTABILITY:For programs to be dynamically downloaded to all the various types of platforms connected to the Internet,
some means of generating portable executable code is needed. the same mechanism that helps ensure
security also helps create portability. Indeed, Javas solution to these two problems is both elegant and
efficient.
4.3.5 THE BYTE CODE:The key that allows the Java to solve the security and portability problems is that the output of Java compiler
is Byte code. Byte code is a highly optimized set of instructions designed to be executed by the Java run-time
system, which is called the Java Virtual Machine (JVM). That is, in its standard form, the JVM is an
interpreter for byte code. Although Java was designed for interpretation, there is technically nothing about
Java that prevents on-the-fly compilation of byte code into native code. Sun has just completed its Just in
Time (JIT) compiler for byte code. When the JIT compiler is a part of JVM, it
compiles byte code into executable code in real time, on a piece-by-piece, demand basis. It is not possible to
compile an entire Java program into executable code all at once, because Java performs various run-time
checks that can be done only at run time. The JIT compiles code, as it is needed, during execution

4.4 JAVAVIRTUALMACHINE(JVM):Beyond the language, there is the Java virtual machine. The Java virtual machine is an important element of
the Java technology. The virtual machine can be embedded within a web browser or an operating system.
Once a piece of Java code is loaded onto a machine, it is verified. As part of the loading process, a class
loader is invoked and does byte code verification makes sure that the code thats has been generated by the
compiler will not corrupt the machine that its loaded on. Byte code verification takes place at the end of the
compilation process to make sure that is all accurate and correct. So byte code verification is integral to the
compiling and executing of Java code .

[RPIIT]

Page 6

[MYBIDSITE]

[LISHA ARORA]

[5710631]

4.4.1JAVA ARCHITECTURE:Java architecture provides a portable, robust, high performing environment for development. Java provides
portability by compiling the byte codes for the Java Virtual Machine, which is then interpreted on each
platform by the run-time environment. Java is a dynamic system, able to load code when needed from a
machine in the same room or across the planet.

4.4.2 COMPILATION OFCODE:When you compile the code, the Java compiler creates machine code (called byte code) for a hypothetical
machine called Java Virtual Machine (JVM). The JVM is supposed to execute the byte code. The JVM is
created for overcoming the issue of portability. The code is written and compiled for one machine and
interpreted on all machines. This machine is called Java Virtual Machine.

4.4.3 SIMPLE:Java was designed to be easy for the Professional programmer to learn and to use effectively. If you are an
experienced C++ programmer, learning Java will be even easier. Because Java inherits the C/C++ syntax and
many of the object oriented features of C++.

4.4.4 OBJECT-ORIENTED:Java was not designed to be source-code compatible with any other language. This allowed the Java team the
freedom to design with a blank slate. One outcome of this was a clean usable, pragmatic approach to objects.
The object model in Java is simple and easy to extend, while simple types, such as integers, are kept as highperformance non-objects
.

4.4.5ROBUST:
The multi-platform environment of the Web places extraordinary demands on a program, because the
program must execute reliably in a variety of systems. The ability to create robust programs was given a high
priority in the design of Java. Java is strictlytyped language; it checks your code at compile time and run
time

4.6 Java and C


1. Java does not include keywords like goto, size of and typedef.
2. Java does not contain data types like struct, union and enum.
3. Java does not define the type modifiers keywords like auto, register, signed.

[RPIIT]

Page 6

[MYBIDSITE]

[LISHA ARORA]

[5710631]

4. Java does not support an explicit pointer type.


5. Java does not have preprocessor.
6. Java does not support variables arguments to functions.
7. Java adds many features required for Object-Oriented Programming.

Java
C
C+
+

4.6.1 Java and C++


1.
2. Java does not support operator overloading.
3. Java does not support multiple inheritances.
4. Java does not support global variables.
5. Java has replaced the destructor function with a finalize () function.
6. Java is a true object-oriented language while C++ is basically C with object-oriented extension.
7. Java does not provide the access to the pointers.

4.7Java Database Connectivity

[RPIIT]

Page 6

[MYBIDSITE]

[LISHA ARORA]

[5710631]

JDBC is a Java API for executing SQL statements. (As a point of interest, JDBC is a trademarked name and
is not an acronym; nevertheless, JDBC is often thought of as standing for Java Database Connectivity. It
consists of a set of classes and interfaces written in the Java programming language. JDBC provides a
standard API for tool/database developers and makes it possible to write database applications using a pure
Java API. Simplyput, JDBC makes it possible to do three things:
1.Establish a connection with a database.
2.Send SQL statements. Process the result..

4.7.1JDBC OVER ODBC:


At this point, Microsoft's ODBC (Open Database Connectivity) API is that probably the most widely used
programming interface for accessing relational databases. It offers the ability to connect to almost all
databases on almost all platforms.
So why not just use ODBC from Java? The answer is that can use ODBC from Java, but this is best done
with the help of JDBC in the form of the JDBC-ODBC Bridge, which we will cover shortly. The question
now becomes "Why do you need JDBC?" There are several answers to this question:
ODBC is not appropriate for direct use from Java because it uses a C interface. Calls from Java to
native C code have a number of drawbacks in the security, implementation, robustness, and
automatic portabilityof applications.

A literal translation of the ODBC C API into a Java API would not be desirable. For example, Java
has no pointers, and ODBC makes copious use of them, including the notoriously error-prone
generic pointer "void *". You can think of JDBC as ODBC translated into an object-oriented
interface that is natural for Java programmers.

ODBC is hard to learn. It mixes simple and advanced features together, and it has complex options
even for simple queries. JDBC, on the other hand, was designed to keep simple things simple while
allowing more advanced capabilities where required.

A Java API like JDBC is needed in order to enable a "pure Java" solution. When ODBC is used, the
ODBC driver manager and drivers must be manually installed on every client machine. When the
JDBC driver is written completely in Java, however, JDBC code is automatically installable,
portable, and secure on all Java platforms from network computers to mainframes.

4.7.2 TWO-TIERANDTHREE-TIER MODELS:-

[RPIIT]

Page 6

[MYBIDSITE]

[LISHA ARORA]

[5710631]

The JDBC API supports both two-tier and three-tier models for database access. In the two-tier model, a Java
applet or application talks directly to the database. This requires a JDBC driver that can communicate with
the particular database management system being accessed. A user's SQL statements are delivered to the
database, and the results of those statements are sent back to the user. The database may be located on
another machine to which the user is connected via a network. This is referred to as a client/server
configuration, with the user's machine as the client, and the machine housing the database as the server. The
network can be an Intranet, which, for example, connects employees within a corporation, or it can be the
Internet.

4.7.3 JDBC DRIVER TYPES:The JDBC drivers that we are aware of at this time fit into one of four categories:
1.JDBC-ODBC bridge plus ODBC driver.
2. Native-API partly-Java driver.
3. JDBC-Net pure Java driver.
4. Native-protocol pure Java driver.
2.2.4.4JDBC-ODBCBRIDGE
If possible, use a Pure Java JDBC driver instead of the Bridge and an ODBC driver. This completely
eliminates the client configuration required by ODBC. It also eliminates the potential that the Java VM could
be corrupted by an error in the native code brought in by the Bridge (that is, the Bridge native library, the
ODBC driver manager library, the ODBC driver library, and the database client library).

4.7.4JDBC Connectivity :The JDBC provides database-independent connectivitybetween the J2EE platform and a wide range of
tabular data sources. JDBC technology allows an Application Component Provider to:
1. Perform connection and authentication to a database server.
2.

Manager transactions.

3. Move SQL statements to a database engine for preprocessing and execution.


4.

Execute stored procedures.

5.

Inspect and modify the results from Select statements.

4.8 DATABASE:A database management system (DBMS) is computer software designed for the purpose of managing
databases, a large set of structured data, and run operations on the data requested by numerous users. Typical

[RPIIT]

Page 6

[MYBIDSITE]

[LISHA ARORA]

[5710631]

examples of DBMSs include Oracle, DB2, Microsoft Access, Microsoft SQL Server, Firebird, PostgreSQL,
MySQL, SQLite, FileMaker and Sybase Adaptive Server Enterprise. DBMSs are typically used by Database
administrators in the creation of Database systems. Typical examples of DBMS use include accounting,
human resources and customer support systems.

4.8.1 DESCRIPTION A DBMS:Is a complex set of software programs that controls the organization, storage, management and retrieval of
data in a database. A DBMS includes:

A modeling language to define the schema of each database hosted in the DBMS, according to the
DBMS data model.

The four most common types of organizations are the hierarchical, network, relational and object
models. Inverted lists and other methods are also used. A given database management system may
provide one or more of the four models. The optimal structure depends on the natural organization of the
application's data, and on the application's requirements (which include transaction rate (speed),
reliability, maintainability, scalability, and cost).

4.9 SQL SERVER 2008


Microsoft SQL Server is a relational model database server produced by Microsoft. Its primary query
languages are T-SQL and ANSI SQL Server 2008 released in October 2008, is the successor to SQL
Server 2000. It included native support for managing XML data, in addition to relational data. For this
purpose, it defined an xml data type that could be used either as a data type in database columns or as
literals in queries.Data storage:

[RPIIT]

Page 6

[MYBIDSITE]

[LISHA ARORA]

[5710631]

The main unit of data storage is a database, which is a collection of tables with typed columns. SQL
Server supports different data types, including primary types such as Integer, Float, Decimal, Char
(including character strings), Varchar (variable length character strings), binary (for unstructured blobs of
data), Text (for textual data) among others. It also allows user-defined composite types (UDTs) to be
defined and used. SQL Server also makes server statistics available as virtual tables and views (called
Dynamic Management Views or DMVs). A database can also contain other objects including views, stored
procedures, indexes and constraints,

4.9.1Transaction log Concurrency and locking:-SQL Server allows multiple clients to use the same
database concurrently. As such, it needs to control concurrent access to shared data, to ensure data
integrity - when multiple clients update the same data, or clients attempt to read data that is in the process
of being changed by another client.

4.9.2 SQL Server Management Studio:SQL Server Management Studio is a GUI tool included with SQL Server 2008 and later for configuring,
managing, and administering all components within Microsoft SQL Server. The tool includes both script
editors and graphical tools that work with objects and features of the server .SQL Server Management
Studio replaces Enterprise Manager as the primary management interface for Microsoft SQL Server since
SQL Server 2008. A version of SQL Server Management Studio is also available for SQL Server Express
Edition, for which it is known as SQL Server Management Studio Express (SSMSE).
A central feature of SQL Server Management Studio is the Object Explorer, which allows the user to
browse, select, and act upon any of the objects within the server.It can be used to visually observe and
analyze query plans and optimize the database performance, among others.SQL Server Management
Studio can also be used to create a new database, alter any existing database schema by adding or
modifying tables and indexes, or analyze performance.

4.10 SERVLET
The servlet is a Java programming language class used to extend the capabilities of a server. Although
servlets can respond to any types of requests, they are commonly used to extend the applications hosted
by web servers, so they can be thought of as Java Applets that run on servers instead of in web
browsers. These kinds of servlets are the Javacounterpart to other dynamic Web content technologies such
as PHP and ASP.NET.
Servlets are most often used to

Process or store data that was submitted from an HTML form

[RPIIT]

Page 6

[MYBIDSITE]

[LISHA ARORA]

[5710631]

Provide dynamic content such as the results of a database query

Manage state information that does not exist in the stateless HTTP protocol, such as filling the
articles into the shopping cart of the appropriate customer

Technically speaking, a "servlet" is a Java class in Java EE that conforms to the Java Servlet API, a
protocol by which a Java class may respond to requests. Servlets could in principle communicate over
any clientserver protocol, but they are most often used with theHTTP protocol. Thus "servlet" is often
used as shorthand for "HTTP servlet".] Thus, a software developer may use a servlet to adddynamic
content to a web server using the Java platform. The generated content is commonly HTML, but may be
other data such asXML. Servlets can maintain state in session variables across many server transactions by
using HTTP cookies, or URL rewriting.

To deploy and run a servlet, a web container must be used. A web container (also known as a
servlet container) is essentially the component of a web server that interacts with the servlets. The
web container is responsible for managing the lifecycle of servlets, mapping a URL to a particular
servlet and ensuring that the URL requester has the correct access rights.

The Servlet API, contained in the Java package hierarchy javax.servlet, defines the expected
interactions of the web container and a servlet.

A Servlet is an object that receives a request and generates a response based on that request. The
basic Servlet package defines Java objects to represent servlet requests and responses, as well as
objects to reflect the servlet's configuration parameters and execution environment. The
package javax.servlet.http defines HTTP-specific subclasses of the generic servlet elements,
including session management objects that track multiple requests and responses between the web
server and a client. Servlets may be packaged in a WAR file as a web application.

Servlets can be generated automatically from Java Server Pages (JSP) by the JavaServer Pages
compiler. The difference between servlets and JSP is that servlets typically embed HTML inside
Java code, while JSPs embed Java code in HTML. While the direct usage of servlets to generate
HTML (as shown in the example below) has become rare, the higher level MVC web framework
in Java EE (JSF) still explicitly uses the servlet technology for the low level request/response
handling via the FacesServlet. A somewhat older usage is to use servlets in conjunction with JSPs
in a pattern called "Model 2", which is a flavor of the modelviewcontroller pattern.

[RPIIT]

Page 6

[MYBIDSITE]

[LISHA ARORA]

[5710631]

The current version of Servlet is 3.0.

4.10.1 LIFE SYCLE OF SERVLET


Three methods are central to the life cycle of a servlet. These are init(), service(), and destroy(). They are
implemented by every servlet and are invoked at specific times by the server.

During initialization stage of the servlet life cycle, the web container initializes the servlet instance
by calling the init() method, passing an object implementing the javax.servlet.ServletConfig interface.
This configuration object allows the servlet to access name-value initialization parameters from the
web application.

After initialization, the servlet instance can service client requests. Each request is serviced in its
own separate thread. The web container calls the service() method of the servlet for every request.
The service() method determines the kind of request being made and dispatches it to an appropriate
method to handle the request. The developer of the servlet must provide an implementation for these
methods. If a request is made for a method that is not implemented by the servlet, the method of the
parent class is called, typically resulting in an error being returned to the requester.

Finally, the web container calls the destroy() method that takes the servlet out of service.
The destroy() method, likeinit(), is called only once in the lifecycle of a servlet.

4.10.2 ADVANTAGES OFTHE SERVLET:One of the great advantages of the Servlet API is protocol independence. It assumes nothing about: The
protocol being used to transmit on the net.
How it is loaded.
The server environment it will be running in. These qualities are important, because it allows the

Servlet API to be embedded in many different kinds of servers. There are other advantages to the
Servlet API as well. These include:

Its extensible - you can inherit all your functionality from the base classes made available to you.

Its simple, small, and easy to use.

4.10.3 FEATURES OF SERVLETSFeatures of Servlets include: 1. Servlets are persistent. Servlet are loaded only by the web server and can maintain services between
requests.

[RPIIT]

Page 6

[MYBIDSITE]

[LISHA ARORA]

[5710631]

2. Servlets are fast. Since Servlets only need to be loaded once, they offer much better performance over
their CGI counterparts.
3. Servlets are platform independent.
4. Servlets are extensible. Java is a robust, object-oriented programming language, which easily can be
extended to suit your needs.
5. Servlets are secure.
6. Servlets can be used with a variety of clients.

4.11 JAVASERVERPAGES(JSP)
Java server Pages is a simple, yet powerful technology for creating and maintaining dynamic-content web
pages. Based on the Java programming language, Java Server Pages offers proven portability, open
standards, and a mature re-usable component model The Java Server Pages architecture enables the
separation of content generation from content presentation. This separation not eases maintenance
headaches; it also allows web team members to focus on their areas of expertise. Now, web page designer
can concentrate on layout, and web application designers on programming, with minimal concern about
impacting each others work

4.11.1 FEATURES OFJSP


1) Portability: Java Server Pages files can be run on any web server or web-enabled application server
that provides support for them. Dubbed the JSP engine, this support involves recognition, translation,
and management of the Java Server Page lifecycle and its interaction components.
2) Components: It was mentioned earlier that the Java Server Pages architecture can include reusable
Java components. The architecture also allows for the embedding of a scripting language directly into
the Java Server Pages file. The components current supported include Java Beans, and Servlets
3) Processing: A Java Server Pages file is essentially an HTML document with JSP scripting or tags. The
Java Server Pages file has a JSP extension to the server as a Java Server Pages file. Before the page is
served, the Java Server Pages syntax is parsed and processed into a Servlet on the server side. The
Servlet that is generated outputs real content in straight HTML for responding to the client.
4) Access Models: A Java Server Pages file may be accessed in at least two different ways. A clients
request comes directly into a Java Server Page. In this scenario, suppose the page accesses reusable Java
Bean components that perform particular well-defined computations like accessing a database. The
result of the Beans computations, called result sets is stored within the Bean as properties. The page uses
such Beans to generate dynamic content and present it back to the client.

4.11.2 Steps in the execution of a JSP Application:.


[RPIIT]

Page 6

[MYBIDSITE]

[LISHA ARORA]

[5710631]

The client sends a request to the web server for a JSP file by giving the name of the JSP file within the
form tag of a HTML page.
This request is transferred to the JavaWebServer. At the server side JavaWebServer receives the request
and if it is a request for a jsp file server gives this request to the JSP engine.
JSP engine is program which can under stands the tags of the jsp and then it converts those tags into a
Servlet program and it is stored at the server side. This Servlet is loaded in the memory and then it is
executed and the result is given back to the JavaWebServer and then it is transferred back to the result is
given back to the JavaWebServer and then it is transferred back to the client.

4.12 STRUTS
Applications built using the Struts framework are at their core, web applications. A web application is a
collection of individual components that once bound together, form a complete application that can be
installed and executed by a web container. The components are tied together due to the fact that they reside
in the same web context and in many cases, may refer to one another, directly or indirectly .

4.12.1 ELEMENTS O FA WEB APPLICATION:Obviously, not all web applications are created equal. They will not have the same functional and nonfunctional requirements across organizations, departments, or even the same vertical markets. Therefore, not

[RPIIT]

Page 6

[MYBIDSITE]

[LISHA ARORA]

[5710631]

all web applications will contain the same types of resources. In general however, web applications can
consist of one or more of the following types of components:
1) Servlets.
2)

JSP Pages.

3) Standard JavaBeans and UtilityClasses.


4) HTML Documents.
5) Multimedia Files (Images, Audio and Video Files, CAD Drawings, etc.).
6) Client side Applets, Stylesheets, and JavaScript Files
7)

Text Documents.

System Architecture
[RPIIT]

Page 6

[MYBIDSITE]

[LISHA ARORA]

[5710631]

5.1 DATA FLOW DIAGRAMS


A data flow diagram is graphical tool used to describe and analyze movement of data through a system.
These are the central tool and the basis from which the other components are developed.

The

transformation of data from input to output, through processed, may be described logically and
independently of physical components associated with the system. These are known as the logical data
flow diagrams. The physical data flow diagrams show the actual implements and movement of data
between people, departments and workstations. A full description of a system actually consists of a set of
data flow diagrams. Using two familiar notations Yourdon, Gane and Sarson notation develops the data
flow diagrams. Each component in a DFD is labeled with a descriptive name. Process is further identified
with a number that will be used for identification purpose. The development of DFDS is done in several
levels. Each process in lower level diagrams can be broken down into a more detailed DFD in the next
level. The lop-level diagram is often called context diagram. It consists a single process bit, which plays
vital role in studying the current system. The process in the context level diagram is exploded into other
process at the first level DFD.
The idea behind the explosion of a process into more process is that understanding at one level of detail is
exploded into greater detail at the next level. This is done until further explosion is necessary and an
adequate amount of detail is described for analyst to understand the process.
Larry Constantine first developed the DFD as a way of expressing system requirements in a graphical
from, this lead to the modular design.
A DFD is also known as a bubble Chart has the purpose of clarifying system requirements and
identifying major transformations that will become programs in system design. So it is the starting point
of the design to the lowest level of detail. A DFD consists of a series of bubbles joined by data flows in
the system.

5.1.1.CONTEXT LEVEL DFD


[RPIIT]

Page 6

[MYBIDSITE]

[LISHA ARORA]

yes

[5710631]

NEW USER

Registered

no

LOGIN
response

Database

Select service

Admin

Send
Notification

User

Member

Search Product

Signout
Update
Info

Administrator

[RPIIT]

Checking for registered user

Page 6

[MYBIDSITE]

[LISHA ARORA]

[5710631]

5.1.3 Register new User

User
User Information File
User ID
And Password
Reply

User Information

Validate
User ID and
Password
Send
Appropriate
Reply

User
Information
Invalid

Valid

User ID
and
Password

Add
User ID and
Password

[RPIIT]

Page 6

[MYBIDSITE]

[LISHA ARORA]

[5710631]

5.1.4 Proceesing of the Bid

User

Login

Live Auctions

Buy Bids

Closed
Auctions

Silver
Products

Brown

Expired date of
products

Gold
Puchase
Products
Purchase bids
[RPIIT]

Page 6

[MYBIDSITE]

[LISHA ARORA]

[5710631]

Logout

5.2FLOWCHART
5.2.1FLOWCHART FOR USER AND ADMIN:-

Start

Enter username
and password

Is login
successful

No

Yes
User/admin home
page

Stop

[RPIIT]

Page 6

Invalid
username or
password

[MYBIDSITE]

[LISHA ARORA]

[5710631]

Module Implementation
6.1 System Modules
There are 2 main modules available in the application:
1) Admin Module.
2) User Module.

6.1.1Admin Module
Admin module does all the tasks that enable the user to bid for an item effortlessly. The following are the
tasks that the admin will take care of:
Admin will create and update the categories. Under Categories we can find different items that are up
for the auction.
Admin will take care of all the information regarding the items under each Category.
Admin will be responsible for all the actions done by the users. Admin can block the users and can
change the privileges of the selected user.
Admin can delete the categories and can delete the items that are up for the auction.

6.1.2 User Module:


User module is the place where users can register themselves so that they can bid for the items available
and can add items for auction. The following are the features available for the user:
1) User can add items to the categories available so that the items can be available for auction.
2) User can view all the items that are up for the auction and can bid for any item available.
3) User can remove the items owned by him from the auction and can fix an end date for the auction.
Online auction is an effort towards making the auction process transparent and easy to users. Users can bid
for the items available and can add the items for the auction

[RPIIT]

Page 6

[MYBIDSITE]

[LISHA ARORA]

6.2 ALGORITHM
6.2.1 ALGORITHM 1: For Login Page
Step 1: Start
Step 2:If new user
Then
Click on Register a new account
Else
Enter Username and Password
And Click on Login
End if
Step 3: Exit

6.2.2 ALGORITHM 2: For Registration Page


Step 1: Start
Step 2: Input personal details of user
Step 3: Click to the Submit Button
Step 4: If Username and Pasword is correct
Then
You are successfully registered
Else

[RPIIT]

Page 6

[5710631]

[MYBIDSITE]

[LISHA ARORA]

[5710631]

Not
End if
Step 5: Exit

Future Scope And Limitations

7.1 FUTURE SCOPE


It is not possible to develop a system that makes all the requirements of the user. User requirements keep
changing as the system is being used. Some of the future enhancements that can be done to this system
are:
1) As the technology emerges, it is possible to upgrade the system and can be adaptable to desired
environment.
2) Because it is based on object-oriented design, any further changes can be easily adaptable.
3) Based on the future security issues, security can be improved using emerging technologies.
4) Sub admin module can be added.
5) An in-built web browser can be added.

7.2 LIMITATIONS
The limitations of the system are:
1) Only the permanent employees can access the system.
2) Users cannot buy the product directly they can only apply Bid.
3) Members cannot Purchase the Product directly.
4) It is only seller system.

[RPIIT]

Page 6

[MYBIDSITE]

[LISHA ARORA]

[5710631]

Conclusion and Learning Outcomes


8.1 CONCLUSION
It has been a great pleasure for me to work on this exciting and challenging project. This project proved
good for me as it provided practical knowledge of not only programming in J2EE and SERVLET web
based application and no some extent Windows Application and SQL Server, but also about all handling
procedure related with BIDINBID. It also provides knowledge about the latest technology used in
developing web enabled application and client server technology that will be great demand in future. This
will provide better opportunities and guidance in future in developing projects independently.

8.2.LEARNING OUTCOME
Learn intermediate to advanced Java features such as inner classes, object serialization, reflection, the use
of JAR files, and native methods.
1) Gain an in-depth understanding of database programming in Java using JDBC
2) Learn Java's security model and how to do security programming in Java
3) Learn how to do distributed programming in Java using RMI

[RPIIT]

Page 6

[MYBIDSITE]

[LISHA ARORA]

BIBLOGRAPHY
[1] www.support.mircosoft.com
[2] www.developer.com
[3] www.java.com
[4] Java the complete reference Herbert Schildt
[5] Beginning Java 2 -Ivor Horton
[6] HTML completes - BPB publications.

[RPIIT]

Page 6

[5710631]

[MYBIDSITE]

[RPIIT]

[LISHA ARORA]

Page 6

[5710631]

[MYBIDSITE]

[RPIIT]

[LISHA ARORA]

Page 6

[5710631]

[MYBIDSITE]

[LISHA ARORA]

LIST OF FIGURE AND TABLES


TABLES:-

1) LOGINDETAILS

2) CATEGORYDETAILS AND PRODUCTDETAILS

[RPIIT]

Page 6

[5710631]

[MYBIDSITE]

[LISHA ARORA]

3) BIDPLANDETAILS

4) MERMBERPLANDETAILS:-

5) BRANDDETAILS:-

6) NEWSDETAILS:-

[RPIIT]

Page 6

[5710631]

[MYBIDSITE]

[RPIIT]

[LISHA ARORA]

Page 6

[5710631]

[MYBIDSITE]

[RPIIT]

[LISHA ARORA]

Page 6

[5710631]

You might also like