Professional Documents
Culture Documents
[LISHA ARORA]
[5710631]
COMPANY PROFILE
THE COMPANY
MDA IT Hub, a trademark of MDA IT Hub InfoTech Private Limited, is a young and dynamic software
development and training company. The company aims at providing the best solutions in the fields of,
1.
2.
3.
Corporate Training
4.
Individual Training
5.
HR Consultancy
6.
Software Consultancy
7.
Infrastructure
The company offers a state-of-the-art Software / Web solutions for Business Automation to IT / Non IT,
industrial, corporate, institutional and small business clients. The company also provides consultancy
services to develop infrastructure.
THE CORE
About MDA IT Hub| TECHNOLOGIES
Strong Programming skills are the defining USP of MDA IT Hub| TECHNOLOGIES. Typical projects
involve advanced n-tier architecture, which integrate with backend legacy systems and databases. A team
of application architects and graphic designers excel in creating lightweight interface pages, creative flash
demos, intuitive navigation and user-friendly forms and screen layouts. The Quality Control team ensures
that all development is bug-free and adheres to the specifications.
Industry Endorsed Technologies: Our highly trained and experienced Technical team can serve to any kind
of Corporate Training needs, whether it is Technologies (like .Net, Java / J2EE, etc.)
[RPIIT]
Page 6
[MYBIDSITE]
[LISHA ARORA]
[5710631]
TABLE OF CONTENTS
Name of Topic
Page No.
[RPIIT]
Page 6
[MYBIDSITE]
S.No
[LISHA ARORA]
[5710631]
Date
Topic Name
05-07-2013
Introduction of HTML
07-07-2013
Introduction of CSS
10-07-2013
Introduction of DIV
12-07-2013
Basics of JavaScript
14-07-2013
Events of JavaScript
16-07-2013
RMI
18-07-2013
Introduction of Servlet
22-07-2013
25-07-2013
Cookies
10
26-07-2013
Session
11
29-07-2013
12
05-08-2013
13
09-08-2013
JSP
14
14-08-2013
Scriplets Tags
15
17-08-2013
16
21-08-2013
Filter
17
24-08-2013
Structs
[RPIIT]
Page 6
[MYBIDSITE]
[LISHA ARORA]
[5710631]
[RPIIT]
Page 6
[MYBIDSITE]
[LISHA ARORA]
[5710631]
6. Other information
Login:
Before entry,user enters the User id and password is checked andonly valid user id and password will get
entry into members zone. This is a security feature to avoid entry of unauthorized.
User:
Through this module new user can registered them. After giving their details, they will get a user id and
password. Then to get entry into poster section they need to provide this id and password and only poster
with valid id and password will get entry into posterzone. This is also a security feature to avoid entry of
unauthorized user.
Member:
Through this, works to provide the feedback related to the information stored in various services etc.
Contact Us:
Through this, a user can contact us to find the relatively information regarding to the services.
Other advantage of this project is:
User-Friendly:
This systemis user-friendly to attract the customers and when they have problems, it should provide help.
Ease of Use:
This feature would make the users more enthusiastic while using the system. There are some tasks, like the
registration of the visitors, which may be boring for the users. With well-designed interfaces and easy-to-use
components, these tedious processes may be converted into a joyful activity.
Reliability:
One of the most important features of the system is reliability. There are two aspects of reliability. First, the
information gathered from the customers (private information) should not be revealed under any
circumstances. Moreover, the database that valuable information is kept should be secure.The other aspect is
that, the system should be online as long as possible.
2.2SYSTEM OVERVIEW
2.2.1PROBLEM DEFINITION
The problem with public auction is that the participation of the general public is very limited. The aim of
the project is to socialize the auction so that people from far & wide and even across the continent can
participate in it. The "BidInBid" site is developed with a vision to wipe out the inherent problems of
"Conventional Auction House". The salient features of the site are as follows:
[RPIIT]
Page 6
[MYBIDSITE]
[LISHA ARORA]
1.
2.
3.
4.
[5710631]
"BidInBid" is designed in such a way that it is as user friendly as possible. So any aspiring bidder or seller
can visit the site and engage in bidding with least effort.
2.2.2EXISTING SYSTEM
The existing "OPEN Auction House" is managed manually. Prior to each auction, the day of auction, the
venue and the items on auction are announced through news media. Those who wish to take part in the
auction have to arrive at the venue on that day on time. This conventional method most of the times
prevent aspiring bidders from participating in the bidding process. Another headache of the old system is
to track each bidding process and to make it culminate in financial settlement. So the system has to keep
records of both buyers and sellers until the end of settlement. The process is very cumbersome and time
consuming.
[RPIIT]
Page 6
[MYBIDSITE]
[LISHA ARORA]
[5710631]
5 pre-condition is that the user must register and authenticate before he/she can take part in the bidding
process. The system uses HTTP forms authentication which creates a session cookie for any signed in
user. Through out the span of the session the cookie remains valid until the user logs out.
An auction house needs to have products to auction, so in the proposed system this is done using product
registration module. The module is open to user who is registered sellers and they need to authenticate
before they register any product. The system controls the closing date by adding 14 days to the submitting
date there by restricting the bidding process to go on indefinitely.
Another important module in the proposed project is the "Bidding module ". Here one can see the details
of any particular product and also the bidding history. The user can bid on that item by entering any
amount greater than or equal to the incremental bid amount. Here also system checks to see whether the
user has his credential verified otherwise he/she will be directed to the login/registration page.
The last but the least module is the "Web Administration" module. The module is only open to the web
administrator due to security reasons. In this module the administrator can add product categories; this is
to avoid rampant creation of categories. The 2nd thing is the option to edit any given product. This will be
necessary when some of the details of the product need to be edited for one reason or other. The 3rd and
last the closed bid manager where the administrator notifies both the seller and buyer the need to complete
the transaction.
There is another module which runs more or less like background process. The function of the module is
to close bid of those products whose closing date is less than the current date. The process is automatic
and hidden from the web users.
[RPIIT]
Page 6
[MYBIDSITE]
[LISHA ARORA]
[5710631]
explained. Java applications, using JDK 1.2, are introduced in this course to provide students with a more
thorough understanding of the programming process.
By the end of this course one should have a good basic understanding of how to develop (design, code,
and debug) programs in the Java language.
Electrical engineers are also asked to create or write softwares for the hardwares that they develop using
high level programming languages, and java is one. jave is one of the most commonly used programming
language to implement business applications to day and even with every commercial lines. with the use of
java, it would probably more easier to write in code the algorithms and logic that you would want to
implement in your hardware design for the chips.
You can get tons of Jobs opportunity by learning Java programming language, you can develop core Java
based server side application, J2EE web and enterprise applications, and can even go for Android based
mobile application development. So if you are not coming from C and C++ background, and want to learn
your first programming language.
The platform comes in three versions:
Java SE (Java Platform, Standard Edition) for desktop and server applications
Java EE (Java Platform, Enterprise Edition) for web and enterprise applications
Java ME (Java Platform, Micro Edition) for applications running on resource-constrained devices
Language Fundamentals
1. The Java Environment:
2. Installing Java.
[RPIIT]
Page 6
[MYBIDSITE]
[LISHA ARORA]
[RPIIT]
Page 6
[5710631]
[MYBIDSITE]
[LISHA ARORA]
[5710631]
4.1.1ATTRIBUTES :The attributes of an element are name-value pairs, separated by "=", and written within the start label of an
element, after the element's name. The value should be enclosed in single or double quotes, although values
consisting of certain characters can be left unquoted in HTML (but not XHTML).Leaving attribute values
unquoted is considered unsafe. Most elements take any of several common attributes: id, class, style and
title. Most also take language-related attributes: language and dir.
4.1.2ADVANTAGES
A HTML document is small and hence easy to send over the net. It is small because it does not include
formatted information.HTML is platform independent.HTML tags are not case-sensitive.
4.2 JavaScript
JavaScript script-based programming language that was developed by Netscape Communication
Corporation. JavaScript was originally called Live Script and renamed as JavaScript to indicate its
relationship with Java. JavaScript supports the development of both client and server components of Webbased applications. On the client side, it can be used to write programs that are executed by a Web browser
within the context of a Web page. On the server side, it can be used to write Web server programs that can
process information submitted by a Web browser and then update the browsers display accordingly.
[RPIIT]
Page 6
[MYBIDSITE]
[LISHA ARORA]
[5710631]
4.2.1JAVASCRIPT VS JAVA
JavaScript and Java are entirely different languages. A few of the most glaring differences are: Java applets
are generally displayed in a box within the web document; JavaScript can affect any part of the Web
document itself. While JavaScript is best suited to simple applications and adding interactive features to Web
pages; Java can be used for incredibly complex applications. There are many other differences but the
important thing to remember is that JavaScript and Java are separate languages. They are both useful for
different things; in fact they can be used together to combine their advantages.
4.3Java Technology
Initially the language was called as oak but it was renamed as Java in 1995. The primary motivation of
this language was the need for a platform-independent (i.e., architecture neutral) language that could be used
to create software to be embedded in various consumer electronic devices:
Java is a programmers language.
Java is cohesive and consistent.
Except for those constraints imposed by the Internet environment, Java gives the programmer, full
control.
[RPIIT]
Page 6
[MYBIDSITE]
[LISHA ARORA]
[5710631]
An application is a program that runs on our Computer under the operating system of that computer. It is
more or less like one creating using C or C++. Javas abilityto create Applets makes it important . An Applet
is an application designed to be transmitted over the Internet and executed by a Java compatible web
browser.
4.3.3FEATURES OF JAVA SECURITY :Every time you that you download a normal program, you are risking a viral infection. Prior to Java, most
users did not download executable programs frequently, and those who did scan them for viruses prior to
execution. Most users still worried about the possibilityof infecting their systems with a virus In addition,
another type of malicious program exists that must be guarded against.
4.3.4 PORTABILITY:For programs to be dynamically downloaded to all the various types of platforms connected to the Internet,
some means of generating portable executable code is needed. the same mechanism that helps ensure
security also helps create portability. Indeed, Javas solution to these two problems is both elegant and
efficient.
4.3.5 THE BYTE CODE:The key that allows the Java to solve the security and portability problems is that the output of Java compiler
is Byte code. Byte code is a highly optimized set of instructions designed to be executed by the Java run-time
system, which is called the Java Virtual Machine (JVM). That is, in its standard form, the JVM is an
interpreter for byte code. Although Java was designed for interpretation, there is technically nothing about
Java that prevents on-the-fly compilation of byte code into native code. Sun has just completed its Just in
Time (JIT) compiler for byte code. When the JIT compiler is a part of JVM, it
compiles byte code into executable code in real time, on a piece-by-piece, demand basis. It is not possible to
compile an entire Java program into executable code all at once, because Java performs various run-time
checks that can be done only at run time. The JIT compiles code, as it is needed, during execution
4.4 JAVAVIRTUALMACHINE(JVM):Beyond the language, there is the Java virtual machine. The Java virtual machine is an important element of
the Java technology. The virtual machine can be embedded within a web browser or an operating system.
Once a piece of Java code is loaded onto a machine, it is verified. As part of the loading process, a class
loader is invoked and does byte code verification makes sure that the code thats has been generated by the
compiler will not corrupt the machine that its loaded on. Byte code verification takes place at the end of the
compilation process to make sure that is all accurate and correct. So byte code verification is integral to the
compiling and executing of Java code .
[RPIIT]
Page 6
[MYBIDSITE]
[LISHA ARORA]
[5710631]
4.4.1JAVA ARCHITECTURE:Java architecture provides a portable, robust, high performing environment for development. Java provides
portability by compiling the byte codes for the Java Virtual Machine, which is then interpreted on each
platform by the run-time environment. Java is a dynamic system, able to load code when needed from a
machine in the same room or across the planet.
4.4.2 COMPILATION OFCODE:When you compile the code, the Java compiler creates machine code (called byte code) for a hypothetical
machine called Java Virtual Machine (JVM). The JVM is supposed to execute the byte code. The JVM is
created for overcoming the issue of portability. The code is written and compiled for one machine and
interpreted on all machines. This machine is called Java Virtual Machine.
4.4.3 SIMPLE:Java was designed to be easy for the Professional programmer to learn and to use effectively. If you are an
experienced C++ programmer, learning Java will be even easier. Because Java inherits the C/C++ syntax and
many of the object oriented features of C++.
4.4.4 OBJECT-ORIENTED:Java was not designed to be source-code compatible with any other language. This allowed the Java team the
freedom to design with a blank slate. One outcome of this was a clean usable, pragmatic approach to objects.
The object model in Java is simple and easy to extend, while simple types, such as integers, are kept as highperformance non-objects
.
4.4.5ROBUST:
The multi-platform environment of the Web places extraordinary demands on a program, because the
program must execute reliably in a variety of systems. The ability to create robust programs was given a high
priority in the design of Java. Java is strictlytyped language; it checks your code at compile time and run
time
[RPIIT]
Page 6
[MYBIDSITE]
[LISHA ARORA]
[5710631]
Java
C
C+
+
[RPIIT]
Page 6
[MYBIDSITE]
[LISHA ARORA]
[5710631]
JDBC is a Java API for executing SQL statements. (As a point of interest, JDBC is a trademarked name and
is not an acronym; nevertheless, JDBC is often thought of as standing for Java Database Connectivity. It
consists of a set of classes and interfaces written in the Java programming language. JDBC provides a
standard API for tool/database developers and makes it possible to write database applications using a pure
Java API. Simplyput, JDBC makes it possible to do three things:
1.Establish a connection with a database.
2.Send SQL statements. Process the result..
A literal translation of the ODBC C API into a Java API would not be desirable. For example, Java
has no pointers, and ODBC makes copious use of them, including the notoriously error-prone
generic pointer "void *". You can think of JDBC as ODBC translated into an object-oriented
interface that is natural for Java programmers.
ODBC is hard to learn. It mixes simple and advanced features together, and it has complex options
even for simple queries. JDBC, on the other hand, was designed to keep simple things simple while
allowing more advanced capabilities where required.
A Java API like JDBC is needed in order to enable a "pure Java" solution. When ODBC is used, the
ODBC driver manager and drivers must be manually installed on every client machine. When the
JDBC driver is written completely in Java, however, JDBC code is automatically installable,
portable, and secure on all Java platforms from network computers to mainframes.
[RPIIT]
Page 6
[MYBIDSITE]
[LISHA ARORA]
[5710631]
The JDBC API supports both two-tier and three-tier models for database access. In the two-tier model, a Java
applet or application talks directly to the database. This requires a JDBC driver that can communicate with
the particular database management system being accessed. A user's SQL statements are delivered to the
database, and the results of those statements are sent back to the user. The database may be located on
another machine to which the user is connected via a network. This is referred to as a client/server
configuration, with the user's machine as the client, and the machine housing the database as the server. The
network can be an Intranet, which, for example, connects employees within a corporation, or it can be the
Internet.
4.7.3 JDBC DRIVER TYPES:The JDBC drivers that we are aware of at this time fit into one of four categories:
1.JDBC-ODBC bridge plus ODBC driver.
2. Native-API partly-Java driver.
3. JDBC-Net pure Java driver.
4. Native-protocol pure Java driver.
2.2.4.4JDBC-ODBCBRIDGE
If possible, use a Pure Java JDBC driver instead of the Bridge and an ODBC driver. This completely
eliminates the client configuration required by ODBC. It also eliminates the potential that the Java VM could
be corrupted by an error in the native code brought in by the Bridge (that is, the Bridge native library, the
ODBC driver manager library, the ODBC driver library, and the database client library).
4.7.4JDBC Connectivity :The JDBC provides database-independent connectivitybetween the J2EE platform and a wide range of
tabular data sources. JDBC technology allows an Application Component Provider to:
1. Perform connection and authentication to a database server.
2.
Manager transactions.
5.
4.8 DATABASE:A database management system (DBMS) is computer software designed for the purpose of managing
databases, a large set of structured data, and run operations on the data requested by numerous users. Typical
[RPIIT]
Page 6
[MYBIDSITE]
[LISHA ARORA]
[5710631]
examples of DBMSs include Oracle, DB2, Microsoft Access, Microsoft SQL Server, Firebird, PostgreSQL,
MySQL, SQLite, FileMaker and Sybase Adaptive Server Enterprise. DBMSs are typically used by Database
administrators in the creation of Database systems. Typical examples of DBMS use include accounting,
human resources and customer support systems.
4.8.1 DESCRIPTION A DBMS:Is a complex set of software programs that controls the organization, storage, management and retrieval of
data in a database. A DBMS includes:
A modeling language to define the schema of each database hosted in the DBMS, according to the
DBMS data model.
The four most common types of organizations are the hierarchical, network, relational and object
models. Inverted lists and other methods are also used. A given database management system may
provide one or more of the four models. The optimal structure depends on the natural organization of the
application's data, and on the application's requirements (which include transaction rate (speed),
reliability, maintainability, scalability, and cost).
[RPIIT]
Page 6
[MYBIDSITE]
[LISHA ARORA]
[5710631]
The main unit of data storage is a database, which is a collection of tables with typed columns. SQL
Server supports different data types, including primary types such as Integer, Float, Decimal, Char
(including character strings), Varchar (variable length character strings), binary (for unstructured blobs of
data), Text (for textual data) among others. It also allows user-defined composite types (UDTs) to be
defined and used. SQL Server also makes server statistics available as virtual tables and views (called
Dynamic Management Views or DMVs). A database can also contain other objects including views, stored
procedures, indexes and constraints,
4.9.1Transaction log Concurrency and locking:-SQL Server allows multiple clients to use the same
database concurrently. As such, it needs to control concurrent access to shared data, to ensure data
integrity - when multiple clients update the same data, or clients attempt to read data that is in the process
of being changed by another client.
4.9.2 SQL Server Management Studio:SQL Server Management Studio is a GUI tool included with SQL Server 2008 and later for configuring,
managing, and administering all components within Microsoft SQL Server. The tool includes both script
editors and graphical tools that work with objects and features of the server .SQL Server Management
Studio replaces Enterprise Manager as the primary management interface for Microsoft SQL Server since
SQL Server 2008. A version of SQL Server Management Studio is also available for SQL Server Express
Edition, for which it is known as SQL Server Management Studio Express (SSMSE).
A central feature of SQL Server Management Studio is the Object Explorer, which allows the user to
browse, select, and act upon any of the objects within the server.It can be used to visually observe and
analyze query plans and optimize the database performance, among others.SQL Server Management
Studio can also be used to create a new database, alter any existing database schema by adding or
modifying tables and indexes, or analyze performance.
4.10 SERVLET
The servlet is a Java programming language class used to extend the capabilities of a server. Although
servlets can respond to any types of requests, they are commonly used to extend the applications hosted
by web servers, so they can be thought of as Java Applets that run on servers instead of in web
browsers. These kinds of servlets are the Javacounterpart to other dynamic Web content technologies such
as PHP and ASP.NET.
Servlets are most often used to
[RPIIT]
Page 6
[MYBIDSITE]
[LISHA ARORA]
[5710631]
Manage state information that does not exist in the stateless HTTP protocol, such as filling the
articles into the shopping cart of the appropriate customer
Technically speaking, a "servlet" is a Java class in Java EE that conforms to the Java Servlet API, a
protocol by which a Java class may respond to requests. Servlets could in principle communicate over
any clientserver protocol, but they are most often used with theHTTP protocol. Thus "servlet" is often
used as shorthand for "HTTP servlet".] Thus, a software developer may use a servlet to adddynamic
content to a web server using the Java platform. The generated content is commonly HTML, but may be
other data such asXML. Servlets can maintain state in session variables across many server transactions by
using HTTP cookies, or URL rewriting.
To deploy and run a servlet, a web container must be used. A web container (also known as a
servlet container) is essentially the component of a web server that interacts with the servlets. The
web container is responsible for managing the lifecycle of servlets, mapping a URL to a particular
servlet and ensuring that the URL requester has the correct access rights.
The Servlet API, contained in the Java package hierarchy javax.servlet, defines the expected
interactions of the web container and a servlet.
A Servlet is an object that receives a request and generates a response based on that request. The
basic Servlet package defines Java objects to represent servlet requests and responses, as well as
objects to reflect the servlet's configuration parameters and execution environment. The
package javax.servlet.http defines HTTP-specific subclasses of the generic servlet elements,
including session management objects that track multiple requests and responses between the web
server and a client. Servlets may be packaged in a WAR file as a web application.
Servlets can be generated automatically from Java Server Pages (JSP) by the JavaServer Pages
compiler. The difference between servlets and JSP is that servlets typically embed HTML inside
Java code, while JSPs embed Java code in HTML. While the direct usage of servlets to generate
HTML (as shown in the example below) has become rare, the higher level MVC web framework
in Java EE (JSF) still explicitly uses the servlet technology for the low level request/response
handling via the FacesServlet. A somewhat older usage is to use servlets in conjunction with JSPs
in a pattern called "Model 2", which is a flavor of the modelviewcontroller pattern.
[RPIIT]
Page 6
[MYBIDSITE]
[LISHA ARORA]
[5710631]
During initialization stage of the servlet life cycle, the web container initializes the servlet instance
by calling the init() method, passing an object implementing the javax.servlet.ServletConfig interface.
This configuration object allows the servlet to access name-value initialization parameters from the
web application.
After initialization, the servlet instance can service client requests. Each request is serviced in its
own separate thread. The web container calls the service() method of the servlet for every request.
The service() method determines the kind of request being made and dispatches it to an appropriate
method to handle the request. The developer of the servlet must provide an implementation for these
methods. If a request is made for a method that is not implemented by the servlet, the method of the
parent class is called, typically resulting in an error being returned to the requester.
Finally, the web container calls the destroy() method that takes the servlet out of service.
The destroy() method, likeinit(), is called only once in the lifecycle of a servlet.
4.10.2 ADVANTAGES OFTHE SERVLET:One of the great advantages of the Servlet API is protocol independence. It assumes nothing about: The
protocol being used to transmit on the net.
How it is loaded.
The server environment it will be running in. These qualities are important, because it allows the
Servlet API to be embedded in many different kinds of servers. There are other advantages to the
Servlet API as well. These include:
Its extensible - you can inherit all your functionality from the base classes made available to you.
4.10.3 FEATURES OF SERVLETSFeatures of Servlets include: 1. Servlets are persistent. Servlet are loaded only by the web server and can maintain services between
requests.
[RPIIT]
Page 6
[MYBIDSITE]
[LISHA ARORA]
[5710631]
2. Servlets are fast. Since Servlets only need to be loaded once, they offer much better performance over
their CGI counterparts.
3. Servlets are platform independent.
4. Servlets are extensible. Java is a robust, object-oriented programming language, which easily can be
extended to suit your needs.
5. Servlets are secure.
6. Servlets can be used with a variety of clients.
4.11 JAVASERVERPAGES(JSP)
Java server Pages is a simple, yet powerful technology for creating and maintaining dynamic-content web
pages. Based on the Java programming language, Java Server Pages offers proven portability, open
standards, and a mature re-usable component model The Java Server Pages architecture enables the
separation of content generation from content presentation. This separation not eases maintenance
headaches; it also allows web team members to focus on their areas of expertise. Now, web page designer
can concentrate on layout, and web application designers on programming, with minimal concern about
impacting each others work
Page 6
[MYBIDSITE]
[LISHA ARORA]
[5710631]
The client sends a request to the web server for a JSP file by giving the name of the JSP file within the
form tag of a HTML page.
This request is transferred to the JavaWebServer. At the server side JavaWebServer receives the request
and if it is a request for a jsp file server gives this request to the JSP engine.
JSP engine is program which can under stands the tags of the jsp and then it converts those tags into a
Servlet program and it is stored at the server side. This Servlet is loaded in the memory and then it is
executed and the result is given back to the JavaWebServer and then it is transferred back to the result is
given back to the JavaWebServer and then it is transferred back to the client.
4.12 STRUTS
Applications built using the Struts framework are at their core, web applications. A web application is a
collection of individual components that once bound together, form a complete application that can be
installed and executed by a web container. The components are tied together due to the fact that they reside
in the same web context and in many cases, may refer to one another, directly or indirectly .
4.12.1 ELEMENTS O FA WEB APPLICATION:Obviously, not all web applications are created equal. They will not have the same functional and nonfunctional requirements across organizations, departments, or even the same vertical markets. Therefore, not
[RPIIT]
Page 6
[MYBIDSITE]
[LISHA ARORA]
[5710631]
all web applications will contain the same types of resources. In general however, web applications can
consist of one or more of the following types of components:
1) Servlets.
2)
JSP Pages.
Text Documents.
System Architecture
[RPIIT]
Page 6
[MYBIDSITE]
[LISHA ARORA]
[5710631]
The
transformation of data from input to output, through processed, may be described logically and
independently of physical components associated with the system. These are known as the logical data
flow diagrams. The physical data flow diagrams show the actual implements and movement of data
between people, departments and workstations. A full description of a system actually consists of a set of
data flow diagrams. Using two familiar notations Yourdon, Gane and Sarson notation develops the data
flow diagrams. Each component in a DFD is labeled with a descriptive name. Process is further identified
with a number that will be used for identification purpose. The development of DFDS is done in several
levels. Each process in lower level diagrams can be broken down into a more detailed DFD in the next
level. The lop-level diagram is often called context diagram. It consists a single process bit, which plays
vital role in studying the current system. The process in the context level diagram is exploded into other
process at the first level DFD.
The idea behind the explosion of a process into more process is that understanding at one level of detail is
exploded into greater detail at the next level. This is done until further explosion is necessary and an
adequate amount of detail is described for analyst to understand the process.
Larry Constantine first developed the DFD as a way of expressing system requirements in a graphical
from, this lead to the modular design.
A DFD is also known as a bubble Chart has the purpose of clarifying system requirements and
identifying major transformations that will become programs in system design. So it is the starting point
of the design to the lowest level of detail. A DFD consists of a series of bubbles joined by data flows in
the system.
Page 6
[MYBIDSITE]
[LISHA ARORA]
yes
[5710631]
NEW USER
Registered
no
LOGIN
response
Database
Select service
Admin
Send
Notification
User
Member
Search Product
Signout
Update
Info
Administrator
[RPIIT]
Page 6
[MYBIDSITE]
[LISHA ARORA]
[5710631]
User
User Information File
User ID
And Password
Reply
User Information
Validate
User ID and
Password
Send
Appropriate
Reply
User
Information
Invalid
Valid
User ID
and
Password
Add
User ID and
Password
[RPIIT]
Page 6
[MYBIDSITE]
[LISHA ARORA]
[5710631]
User
Login
Live Auctions
Buy Bids
Closed
Auctions
Silver
Products
Brown
Expired date of
products
Gold
Puchase
Products
Purchase bids
[RPIIT]
Page 6
[MYBIDSITE]
[LISHA ARORA]
[5710631]
Logout
5.2FLOWCHART
5.2.1FLOWCHART FOR USER AND ADMIN:-
Start
Enter username
and password
Is login
successful
No
Yes
User/admin home
page
Stop
[RPIIT]
Page 6
Invalid
username or
password
[MYBIDSITE]
[LISHA ARORA]
[5710631]
Module Implementation
6.1 System Modules
There are 2 main modules available in the application:
1) Admin Module.
2) User Module.
6.1.1Admin Module
Admin module does all the tasks that enable the user to bid for an item effortlessly. The following are the
tasks that the admin will take care of:
Admin will create and update the categories. Under Categories we can find different items that are up
for the auction.
Admin will take care of all the information regarding the items under each Category.
Admin will be responsible for all the actions done by the users. Admin can block the users and can
change the privileges of the selected user.
Admin can delete the categories and can delete the items that are up for the auction.
[RPIIT]
Page 6
[MYBIDSITE]
[LISHA ARORA]
6.2 ALGORITHM
6.2.1 ALGORITHM 1: For Login Page
Step 1: Start
Step 2:If new user
Then
Click on Register a new account
Else
Enter Username and Password
And Click on Login
End if
Step 3: Exit
[RPIIT]
Page 6
[5710631]
[MYBIDSITE]
[LISHA ARORA]
[5710631]
Not
End if
Step 5: Exit
7.2 LIMITATIONS
The limitations of the system are:
1) Only the permanent employees can access the system.
2) Users cannot buy the product directly they can only apply Bid.
3) Members cannot Purchase the Product directly.
4) It is only seller system.
[RPIIT]
Page 6
[MYBIDSITE]
[LISHA ARORA]
[5710631]
8.2.LEARNING OUTCOME
Learn intermediate to advanced Java features such as inner classes, object serialization, reflection, the use
of JAR files, and native methods.
1) Gain an in-depth understanding of database programming in Java using JDBC
2) Learn Java's security model and how to do security programming in Java
3) Learn how to do distributed programming in Java using RMI
[RPIIT]
Page 6
[MYBIDSITE]
[LISHA ARORA]
BIBLOGRAPHY
[1] www.support.mircosoft.com
[2] www.developer.com
[3] www.java.com
[4] Java the complete reference Herbert Schildt
[5] Beginning Java 2 -Ivor Horton
[6] HTML completes - BPB publications.
[RPIIT]
Page 6
[5710631]
[MYBIDSITE]
[RPIIT]
[LISHA ARORA]
Page 6
[5710631]
[MYBIDSITE]
[RPIIT]
[LISHA ARORA]
Page 6
[5710631]
[MYBIDSITE]
[LISHA ARORA]
1) LOGINDETAILS
[RPIIT]
Page 6
[5710631]
[MYBIDSITE]
[LISHA ARORA]
3) BIDPLANDETAILS
4) MERMBERPLANDETAILS:-
5) BRANDDETAILS:-
6) NEWSDETAILS:-
[RPIIT]
Page 6
[5710631]
[MYBIDSITE]
[RPIIT]
[LISHA ARORA]
Page 6
[5710631]
[MYBIDSITE]
[RPIIT]
[LISHA ARORA]
Page 6
[5710631]