Professional Documents
Culture Documents
1. Introduction
1.2.1. ................................................................................................ 2
1.2.2. ................................................................................................ 4
1.2.3. ................................................................................................ 8
1.2.4. ................................................................................................ 9
1.2.5. ............................................................................................ 10
3. Requirement Analysis
4. System Designing
5. Coding ................................................................................................ 46
6. Snapshots
9. Bibliography
Introduction
1.1. Project Description
paradigm. More and more business houses are implementing web sites
becoming commonplace.
store where any product (such as books, CDs, computers, mobile phones,
electronic items, and home appliances) can be bought from the comfort of
However, for implementation purposes, this paper will deal with an online
book store.
An online store is a virtual store on the Internet where customers can browse
the catalog and select products of interest. The selected items may be
collected in a shopping cart. At checkout time, the items in the shopping cart
PHP processor module which generates the resulting Web page. It also
PHP is installed on more than 20 million Web sites and 1 million Web
servers.
the GNU General Public License (GPL) due to restrictions on the usage
displaying his rsum and recording his web-page traffic. Lerdorf initially
1995.
Interface(CGI) binaries, extending them to add the ability to work with Web
"Personal Home Page Tools (PHP Tools) version 1.0" publicly on June 8,
1995, to accelerate bug location and improve the code. This release already
had the basic functionality that PHP has today. This included Perl-like
variables, form handling, and the ability to embed HTML. The syntax was
similar to Perl but was more limited and simpler, although less consistent. A
development team began to form and, after months of work and beta testing,
rewrote the parser in 1997 and formed the base of PHP 3, changing the
new rewrite of PHP's core, producing the Zend Engine in 1999. They also
powered by the Zend Engine 1.0, was released. As of August 2008 this
On July 13, 2004, PHP 5 was released, powered by the new Zend Engine II.
under development. Late static binding had been missing from PHP and was
added in version 5.3. A new major version has been under development
alongside PHP 5 for several years. This version was originally planned to be
for full Unicode support. However, Unicode support took developers much
longer to implement than originally thought, and the decision was made in
March 2010 to move the project to a branch, with features still under
quotes, and safe mode. The reason for the removals was that register_globals
and the use of magic quotes had an unpredictable nature. Instead, to escape
removed in future versions and have been deprecated in PHP 5.3 will
5.
As of 2011 PHP does not have native support for Unicode or multibyte
PHP interpreters are available on both 32-bit and 64-bit operating systems,
1 Licensing
Any PHP code in a requested file is executed by the PHP runtime, usually to
create dynamic web page content or dynamic images used on Web sites or
many operating systems and platforms, and can be used with many relational
the PHP Group provides the complete source code for users to build,
PHP acts primarily as a filter, taking input from a file or stream containing
text and/or PHP instructions and outputting another stream of data; most
PHP parser compiles input to produce bytecode for processing by the Zend
languages that provide dynamic content from a Web server to a client, such
The LAMP architecture has become popular in the Web industry as a way of
alongside Linux, Apache and MySQL, although the P may also refer
also available for Windows and Mac OS X, then called WAMP and MAMP,
with the first letter standing for the respective operating system.
As of April 2007, over 20 million Internet domains had Web services hosted
on servers with PHP installed and mod_php was recorded as the most
Publish, SilverStripe, WordPress, Drupal and Moodle. All Web sites created
using these tools are written in PHP, including the user-facing portion
validation which induces many issues. Such a feature is being developed for
PHP, but its inclusion in a release has been rejected several times in the past.
<!DOCTYPE html>
<html>
<head>
<title>PHP Test</title>
</head>
<body>
<?php
in parentheses. */
?>
</body>
</html>
The PHP interpreter only executes PHP code within its delimiters. Anything
outside its delimiters is not processed by PHP (although non-PHP text is still
subject to control structures described within PHP code). The most common
delimiters are <?php to open and ?> to close PHP sections. <script
language="php"> and </script> delimiters are also available, as are the
shortened forms <? or <?= (which is used to echo back a string or variable)
and?> as well as ASP-style short forms <% or <%= and %>. While short
delimiters are used, they make script files less portable as support for them
can be disabled in the PHP configuration, and so they are discouraged. The
purpose of all these delimiters is to separate PHP code from non-PHP code,
including HTML.
instructions'. This means that the resulting mixture of PHP code and other
Variables are prefixed with a dollar symbol, and a type does not need to be
specified in advance. Unlike function and class names, variable names are
case sensitive. Both double-quoted ("") and heredoc strings provide the
PHP has three types of comment syntax: /* */ marks block and inline
languages that follow the C style syntax. if conditions, for and whileloops,
and function returns are similar in syntax to languages such as C, C++, Java
and Perl.
or two forms of scientific notation. PHP has a native Boolean type that is
similar to the native Boolean types in Java and C++. Using the Boolean type
conversion rules, non-zero values are interpreted as true and zero as false, as
in Perland C++. The null data type represents a variable that has no value.
The only value in the null data type is NULL. Variables of the "resource"
image, and database resources. Arrays can contain elements of any type that
PHP can handle, including resources, objects, and even other arrays. Order is
preserved in lists of values and in hashes with both keys and values, and the
two can be intermingled. PHP also supports strings, which can be used with
The Standard PHP Library (SPL) attempts to solve standard problems and
Functions
PHP has hundreds of base functions and thousands more via extensions.
These functions are well documented on the PHP site; however, the built-in
echo 'My name is ' . myFunction() . '!'; //outputs the text and the return
variable of the
Functions are not first-class functions and can only be referenced by their
Function calls must use parentheses, with the exception of zero argument
class constructor functions called with the PHP new operator, where
functions because anonymous functions are nameless, but functions can only
in PHP.
PHP gained support for closures. True anonymous functions are supported
function getAdder($x) {
return $x + $y;
};
}
$adder = getAdder(8);
Here, the getAdder() function creates a closure using the parameter $x (the
keyword use imports a variable from the lexical context), which takes an
parameter to other functions, etc. For more details see Lambda functions and
closures RFC.
function lock() {
retry:
goto retry;
fwrite($file, 'Success!');
fclose($file);
return 0;
}
When flock() is called, PHP opens a file and tries to lock it. The target
label retry: defines the point to which execution should return ifflock() is
unsuccessful and goto retry; is called. The goto statement is restricted and
requires that the target label be in the same file and context.
(b) Objects
of PHP, objects were handled like value types. The drawback of this method
was that the whole object was copied when a variable was assigned or
classes and final classes as well as abstract methods and final methods. It
time.[73]
If the developer creates a copy of an object using the reserved word clone,
the Zend engine will check if a __clone() method has been defined or not. If
not, it will call a default __clone() which will copy the object's properties. If
necessary properties in the created object. For convenience, the engine will
supply a function that imports the properties of the source object, so that the
programmer can start with a by-value replica of the source object and only
class Person {
public $firstName;
public $lastName;
parameter
$this->firstName = $firstName;
$this->lastName = $lastName;
}
".";
Doe."
(i)
defined using the keywords public, private, and protected. The default is
to inherited classes (and to the class that defines the item). private limits
visibility only to the class that defines the item. Objects of the same type
have access to each other's private and protected members even though they
are not the same instance. PHP's member visibility features have sometimes
been described as "highly useful." However, they have also sometimes been
executed by the PHP engine. In order to speed up execution time and not
have to compile the PHP source code every time the Web page is accessed,
compiler.
Code optimizers aim to enhance the performance of the compiled code by
reducing its size, merging redundant instructions and making other changes
that can reduce the execution time. With PHP, there are often opportunities
using an opcode cache. Opcode caches work by caching the compiled form
of parsing and compiling the code every time the script runs. An opcode
cache, APC, is planned to be built into an upcoming release of PHP (but not
Opcode caching and code optimization can be combined for best efficiency,
compilers have been developed which decouple the PHP language from the
into CIL byte-code, and HipHop, developed at Facebook and now available
as open source, which transforms the PHP Script into C++, then compiles it,
PHP includes free and open source libraries with the core build. PHP is a
PHP language. These can then be compiled into PHP or loaded dynamically
at runtime. Extensions have been written to add support for the Windows
generation of images and Adobe Flash content, and even speech synthesis.
is the life cycle model on which the process is based. The particular life
cycle model can significantly affect overall life cycle costs associated with a
software product. Life cycle of the software starts from concept exploration
activities that analysts, designers and users carry out to develop and
Preliminary investigation.
Requirement Analysis.
System Designing.
Coding.
System Testing.
Preliminary Investigation : -
An important outcome of the preliminary investigation is the
study, there are three major distinct and interrelated areas were taken
1. Technical Feasibility :
produce outputs faster, can input large amount of data in limited time
2. Operational Feasibility : -
The ultimate users i.e. the people who are supposed to use the system are
trained for a period of one month so as to get familiar with the new
system and its operation. They are taught about the new skills and the
new technology and how the technology will be useful to them in their
of the hardware and software and the cost to training of personnel of the
company to operate the system and the installation cost is less than the
cost of maintaining the registers. This may not be a big sum in the long
run of the school business. Also the time taken for the entire process of
equal to one working month of the school. As a result, there has been no
Requirements analysis :-
collecting data. During analysis, data are collected on the available files,
decision points and transaction handled by the present system. Once the
of what is to be done.
System Designing:
Coding: -
System Testing:-
the software does not fail. In other words we can say that it will run
according to its specifications and in the way users expect. Special test
and put new equipments into use, train users, install the new application
working system during its working life and to tune the system to any
Requirement Analysis
3.1 Overview:
Analysis is a Fact Finding Technique where studies like Users need, System
Problem Analysis
Requirement Analysis
Validation
Validated
SRS
This is the most important step in a software project where we get a general
idea about the needs of the customers or end users by having man to man
conversation with them and about the various conditions and restrictions that
The purpose of this phase is to identify, analyze and document the exact
extremely important that the developers of the system study the existing
Identification of need
Information Gathering
defined, thoroughly investigated, and properly carried out through the choice
the user needs rather then what he/she wants. Until the problem has been
identified, defined, and evaluated the analyst shouldn't think about solutions
2. Information Gathering:
must know what information to get, where to find it, how to collect it, and
how to make use of it. The proper use of tools for gathering information is
3. Feasibility Study:
unlimited resources and infinite time, all projects are feasible. Unfortunately,
such results and time are not possible in real life situations. Hence it is both
necessary and prudent to evaluate the feasibility of the project at the earliest
3.3.1 Introduction:
A.
Purpose:
without describing how the software will do it. The basic goal of the
B.
Scope:
This document is the only one that describes the requirements of the system.
It is meant for use by the developer and will be the basis for validating the
final delivered system. Any changes made to the requirements in the future
responsible for asking for clarifications, where necessary, and will not make
C.
Developers responsibility:
The developer is responsible for:
(c) Conducting any user training that might be needed for using the system.
(d) Maintaining the system for a period of one year after installation.
3.3.2 Product description:
This section provides an overview of the software. This section describes the
goal and objective of the software. This section also briefly describes the
general requirements of the software. This section is very important for the
verification of the software after the completion whether the objective and
A.
related services on the Internet. This software also helps to automate the
process of ordering the books in home using internet . The goals of Online
purchases books .
services.
anywhere Shopping.
B.
General requirements:
books.
details.
attract visitors.
A.
User Profiles:
Use-cases:
Administrator level:
This level of users will be able to insert new Books, new Category and Price
User Level:
This level of users will be able to Search the books, Order the books etc.
A. Hardware Requirement:
II. Client
Memory 256 MB
B. Software Requirement:
Technologies : PHP
Client Side Scripting Language : HTML.
System Designing
4.1 OVERVIEW:
goes through a logical and physical stage of the progress. Logical design
plans, and prepares the logical design walkthrough. The physical design
makes out the details of the physical system, plans the system
In addition, the database system provides for the safety of information stored
The design of the human machine interface in one of the most important
aspects of system design. A good interface design should take into account
It includes consideration of the kinds of the users who will use the
well as their physical characteristics. The users who posses high degree of
skill often prefer more powerful functions which usually means greater
Task Characteristics:
The nature of the users tasks differ and therefore the needs for specific-kinds
of service from the system. For example unstructured tasks usually requires
opposed to structured tasks, which are more predictable and repetitive. The
sequence and frequency with which certain tasks are performed will also
Functional Characteristics:
It refers to the various functions required to perform the tasks and the ease
with which these functions can be learnt made use of by the users while
perform the functions, also need to be taken into account. These include
facilities like training, on line help, documentation, expert system etc. the
other aspect of functional characteristics of a system its performance criteria
INPUT DESIGN:
The most common cause of errors in data processing is inaccurate input data.
Errors entered by data entry operators can be controlled by the input design.
based formats. The goal of input design to make data entry easy logical and
Computers are the most important source of information to the user. Inputs
are fed into computers to acquire the required outputs. The computers can
various values. The major form of output is a hardcopy (reports) from the
A. Tables description:
Table 1:
Table Definition:
Foreign Key :
Columns Definition:
me 2
Table Description:
O table column.
2 NAME Name of the Category.
Table 2:
Table Definition:
Purpose : Stores details about books such as book title, author etc.
Primary Key : BookID
Foreign Key :
CATEGORY_DETAILS.CATEGORYIDBOOK_DETAILS.C
ATEGORY
Columns Definition:
TYPE E ? VALUE
1 BookId Number 5 No
2 CategoryI Number 5 No
d
3 Title VARCHA 50 No
R2
4 Author VARCHA 30 No
R2
5 Publisher VARCHA 30 No
R2
6 Edition VARCHA 5 No
R2
7 Price Number 7,2 No
8 Quantity Number 3 No
9 Descripti Varchar2 100 Yes
on
Table description:
.
1 BookId A system generated number auto posted to this table
column.
2 CategoryID Reference to Category_Details
3 Title Title of the Book.
4 Author Author Name of the book.
5 Publisher Store the Book Publisher.
6 Edition Store the edition of the Book.
7 Price Contain the Price Information.
8 Quantity Contain the quantity available in store.
9 Description Details of the book information
Table 3:
Table Definition:
user.
Primary Key :
ORDER_DETAILS.ORDERID
Columns Definition:
Table Description:
table column.
2 BOOKID Reference to Book_Details table.
3 QUANTIT Store the order quantity.
Y
Table 4:
Table Definition:
Purpose :This table will holds the details about the book that have been
Primary Key :
Foreign Key :
Columns Definitions:
TYPE E ? VALUE
1 BookId Number 5 No
2 CategoryI Number 5 No
d
3 Title VARCHA 50 No
R2
4 Author VARCHA 30 No
R2
5 Publisher VARCHA 30 No
R2
6 Edition VARCHA 5 No
R2
7 Price Number 7,2 No
8 Quantity Number 3 No
9 Descripti Varchar2 100 Yes
on
Table description:
.
1 BookId Store the book id of book details table.
2 CategoryID Store the category id of book details table.
3 Title Title of the Book.
4 Author Author Name of the book.
5 Publisher Store the Book Publisher.
6 Edition Store the edition of the Book.
7 Price Contain the Price Information.
8 Quantity Contain the quantity available in store.
9 Description Details of the book information
Table 5:
Table Definition:
Table Name : USER_Profile
Foreign Key :
Columns Definition:
NO. E E S? VALUE
1 USERNAME VARCHA 30 No
R2
2 PASSWORD VARCHA 15 No
R2
3 FIRSTNAME VARCHA 10 No
R2
4 MIDDLENAM VARCHA 10 Yes
E R2
5 LASTNAME VARCHA 10 No
R2
6 ADDRESS1 VARCHA 40 No
R2
7 ADDRESS2 VARCHA 40 Yes
R2
8 CITY VARCHA 40 No
R2
9 STATE VARCHA 20 No
R2
10 PINCODE VARCHA 10 No
R2
11 EMAIL VARCHA 25 No
R2
12 PHONE VARCHA 12 No
R2
Table Description:
S. NAME DESCRIPTION
NO.
1 USERNAME Store the user name
2 PASSWORD Store information of user password
3 FIRSTNAME Store the first name of the user
4 MIDDLENA Store the middle name of the user.
ME
5 LASTNAME Store the information of the user last name.
6 ADDRESS1 Store the information of the user address.
7 ADDRESS2 Optional
8 CITY User city
9 STATE User state
10 PINCODE State pin code
11 EMAIL User email address
12 PHONE User phone number
Table 6:
Table Definition:
Primary Key :
Foreign Key :
USER_PROFILE.USERNAMEUSER_AUTH.USERNAME
Columns definition:
NO. E E ? VALUE
1 USERNAME VARCHAR 30 No
2
2 PASSWORD VARCHAR 15 No
Table description:
S. NAME DESCRIPTION
NO.
1 USERNAME Store the user name of the end users.
2 PASSWORD Stores the password of the user.
4.2. Process Model
A Process Model tells us about how the data is processed and how the data
flows
from one table to another to gather the required information. This model
consists of the
system and exposes the system's structure. The objective of the Functional
main function
of a system and continuing with the interim levels down to the level of
elementary
functions. The diagram is the starting point for more detailed process
diagrams, such as
Diagram for
this project.
Functional Decomposition Diagram
Data Flow Diagrams show the flow of data from external entities into the
system,
and from one process to another within the system. There are four symbols
for drawing a
DFD:
1. Rectangles representing external entities, which are sources or
destinations of
data.
process it
data or
physical items.
Data Flow Diagrams for the current system. Each process within the system
is first shown as a Context Level DFD and later as a Detailed DFD. The
Context Level DFD provides a conceptual view of the process and its
surrounding input,output and data stores. The Detailed DFD provides a more
Customer-Authentication-UserProfile DFD
Authenticated User-Purchase Context DFD
Authenticated User-Purchase DFD
5
Coding
User Interface
Admin Interface
End of Output
7.1Testing
costs associated with a software failure are motivating forces for well
Once source code has been generated, software must be tested to uncover as
series of test cases that have a high likelihood of finding errors but how?
error.
A good test case is one that has a high probability of finding an as-yet-
undiscovered error.
test data and examining the outputs of the software and its operational
Unit testing focuses verification effort on the smallest unit of software design-the
as a guide, important control paths are tested to uncover errors within the
boundary of the module. The relative complexity of tests and uncovered errors is
limited by the constrained scope established for unit testing. The unit test is
white-box oriented and the step can be conducted in parallel for multiple
components.
Login Module:
3 password
Is from
able to match Word Id
Login data
Proper fetching
Matching done Success
N Description d ed Resul
1 Client Server Connecti Connection Connection is Succes
server and
response is
send to
client
4 What if Login Server Error msg: Succes
exist existence of
UserlD
5 What if Login User should Error Succes
3 Addition of or/Stock/Ed
Book Addition Addition is not Success
Title/Publisher/E Stock/Edition
7.1.4 Integration Testing
structure while at the same time conducting tests to uncover errors associated
with interfacing. The objective is to take unit tested components and build a
Incremental integration is the antithesis of the big bang approach. The program is
constructed and tested in small increments, where errors are easier to isolate and
correct, interfaces are more likely to be tested completely, and a systematic test
o
1 Is new User Login ID User should be User named Success
n information should
be stored in
Database
2 Is Database Connectio Connection No error Success
ID & word
Password
4 Does status of Logout Status should No change Success
to 'Logout status
status?
Add Record Module, Delete Record Module, Update Record Module,
N Behavio
o r
1 Is new BookNam Records Record is added Success
displayed on
correct.
7.1.5 System Testing
different purpose, all work to verify that system elements have been properly
Functional Requirements
N n
o
1 Can New User Personal User should User is Success
Ids
2 Can User Loginld + User should User is login Success
Login Id &
password is
valid
3 Can User Add BookName User should Added records Success
on etc
4. Can User BookName User should Deleted records Success
on etc records
5 Can User BookName User should Updated records Success
on etc records
6. Can User BookName User should Result of search Success
on etc. records
7. Can User Click the User should Information will Success
information Read
available on information
the site.
8 Can User Click On User should Logout Success
Logout
7.1.6 OPTIMIZATION POINTS
The software will work efficiently and speedily when the following
All editing features and navigation from one field to another, one web
appropriate fields.
There are some limitations for the current system to which solutions can be
1. The system is not configured for multi- users at this time. The
web server so that everybody who is connected to the Internet can use
it.
8.1. Conclusion
The Internet has become a major resource in modern business, thus
electronic shopping has gained significance not only from the entrepreneurs
but also from the customers point of view. For the entrepreneur, electronic
online stores are impulsive and usually make a decision to stay on a site
within the first few seconds. Website design is like a shop interior. If the
shop looks poor or like hundreds of other shops the customer is most likely
to skip to the
other site. Hence we have designed the project to provide the user with easy
In this project, the user is provided with an e-commerce web site that can be
used
the
using JSP we need a Programming language such as Java and JSP so on. was
the language used to build this application. For the client browser to connect
caching that eliminates the need to contact the database server frequently
and maintain an JSP application. Oracle was used as back-end database since
it is one of the most popular commercial databases, and it provides fast data
view the contents of their cart and to be able to remove or add items to their
comfortable.
and
the technologies used to implement it. The design of the project which
includes Data
Model and Process Model illustrates how the database is built with different
tables, how
the data is accessed and processed from the tables. The building of the
connects to the database to access the data and how the data and web pages
91 References
9.1.1 Books & Authors
Edition, TMG.
APress.
www.google.com
www.wrox.com
www.oracle.com
END