This action might not be possible to undo. Are you sure you want to continue?
1. 2. ORGANISAION PROFILE INTRODUCTION 2.1 SYNOPSIS 2.2 OVERVIEW OF PROJECT. SYSTEM STUDY 3.1 PROBLEM DEFINITION 3.2 SOFTWARE REQUIREMENTS 3.3 HARDWARE REQUIREMENTS CONCEPTS & TECHNIQUES SYSTEM ANALYSIS
6. DESIGN SPECIFICATION 6.1 TABLES 6.2 CONTEXT DIAGRAM 6.3 DATAFLOW DIAGRAMS 7. 8. 9. 10. 11. INTRODUCTION SYNOPSIS The Project entitled "ONLINE SHOPPING" is a web-based application Software developed in JAVA LANGUAGE using Java as front end on Pentium machine. The main aim of "ONLINE SHOPPING" is to improve the services of Customers and vendors. It maintains the details of customer payments, product receipts, addition of new customers, products and also updating, deletion for the same. It also stores the details of invoices generated by customer and payments made by them with all Payments details like credit card. SYSTEM SPECIFICATION SCREENS RE SULTS AND ADVANTAGES CONCLUSION BIBLIOGRAPHY
The primary features of the project entitled "ONLINE SHOPPING" are high accuracy, design flexibility and easy availability. And also it uses database tables Representing entities and relationships between entities. OVERVIEW OF ONLINE SHOPPING The central concept of the application is to allow the customer to shop virtually using the Internet and allow customers to buy the items and articles of their desire from the store. The information pertaining to the products are stores on an RDBMS at the server side (store). The Server process the customers and the items are shipped to the address submitted by them. The application was designed into two modules first Os for the customers who wish to buy the articles. Second is for the storekeepers who maintains and updates the information pertaining to the articles and those of the customers? The end user of this product is a departmental store where the application is hosted on the web and the administrator maintains the database. The application which is deployed at the customer database, the details of the items are brought forward from the database for the customer view based on the selection through the menu and the database of all the products are updated at the end of each transaction. Data entry into the application can be done through various screens designed for various levels of users. Once the authorized personnel feed the relevant data into the system, several reports could be generated as per the security.
To develop a web-based application to improve the service to the customers and merchant which in turn increases the sales and profit in "ONLINE SHOPPING"
GOALS FOR THE SYSTEM AND THE PROJECT
The system is capable of maintaining details of various customers, vendors, Products and storing all the day to day transactions such as generation of shipment address bills, handling customers and product receipts, updating of stores.
CONSTRAINTS ON THE SYSTEM AND THE
ONLINE SHOPPING is developed in Java 1.2.2 using Java as front end and it could run only on Java 1.2 and onward versions.
HARDWARE AND SOFTWARE REQUIREMENTS
: PENTIUM SERVER with Network Of 586 Dx4 300Mhz. 8.3 GB HDD 64MB RAM.
JDK1.2.2,JAVASERVER 1.1.3, SQL SERVER ODBC.
: WINDOWS NT.
CONCEPTS AND TECHNIQUES
The Java Packages Eight packages comprise the standard Java development environment.
The Java Language Package The Java language package, also known as java.lang, contains classes that are core to the Java language. The classes in this package are grouped as follows: Object The granddaddy of all classes--the class from which all others inherit. Data Type Wrappers A collection of classes used to wrap variables of a primitive data type: Boolean, Character, and Double, Float Integer and Long.
Math The Math class provides a library of math routines and values such as pi. Errors are used for more catastrophic errors--normal programs should not catch errors. Only objects that derive from the throwable class can be thrown. The java. and Error classes. Exception. The String and String Buffer Classes is a thorough lesson on the use of both types of strings. System and Runtime These two classes provide let your programs use system resources. Using System Resources Describes both the System and Runtime classes and their methods. Exceptions are a form of Throwable that "normal" programs may try to catch. which indicates what the problem was and the state of the interpreter when the error occurred. Classes The Class provides a runtime description of a class and the Class Loader class allows you to load classes into your program during runtime. System provides a system-independent programming interface to system resources and Runtime gives you direct system-specific access to the runtime environment. and numerous Subclasses of Exception and Error that represent specific Problems. The java. .lang package also defines the runnable interface. and Throwable When an error occurs in a Java program. Error. There are two main subclasses of Throwable: Exception and Error.lang package contains the Throwable. Thread Death and Thread Group classes supplement the multi-threading capabilities so important to the Java language. Runnable makes it convenient for Java class to be active without sub classing the Thread class. Through an example-oriented approach Threads of Control will teach you about Java threads. Handling Error Using Exceptions shows you how to use exceptions in your Java programs to handle errors. Threads The Thread. the program throws an object.Strings Two classes that implement character data. Exception.
Process Process objects represent the system process that is created when you use Runtime to execute system commands. The Java I/O Package The Java I/O Package (java. which allow objects to notify one another when they change. Custom Networking and Security has several examples using these classes. . The java.util package also contains the Observer interface and Observable class. including a client-server example and an example that uses datagrams. The Java Utility Package This Java package. No other packages are automatically imported.lang Packages defines and implements the generic Process class. Included in this Package is the Audio Clip interface which provides a very high level abstraction of audio. and a datagram packet.util. The Applet Package This package contains the Applet class -. Writing Applets explains the ins and outs of developing your own applets. Vector. java.io are covered fully in Input and Output Streams. The java. a connection to a URL.the class that you must subclass if you're writing an applet. and Hash table) a useful object for tokenizing a string and another for manipulating calendar dates.net package contains classes and interface definitions that implement various networking capabilities. You can use these classes to implement client-server applications and other networking communication applications. The java. a socket connection. contains a collection of utility classes. The Java Networking Package The java. Among them are several generic data structures (Dictionary. Stack.util classes aren't covered separately in this tutorial although some examples use these classes. The Classes in this package include a class that implement a URL. The classes and interfaces defined In java. The compiler automatically imports this package for you.io) provides a set of input and Output streams used to read and write data to files or other Input and output sources.
setting pixel values. buttons.awt. AWT Peer Package The java. color filtering. y Robust Java is intended for writing programs that must be readable in a Variety ways. and java. and text items.The Abstract Window Toolkit Packages Three packages comprise the Abstract Window Toolkit: Java. cropping..awt package provides graphical user interface (GUI) elements that are used to get input from and display information to the user. such as setting the color model. FEATURES OF JAVA y Distributed Java has an extensive library of routines for coping with TCP/IP protocols like HTTP and FTP Java applications can open and access across the Net via URLs with the same ease as when accessing local file system. . The single biggest difference between Java has a pointer model that eliminates the possibility of overwriting memory and corrupting data.peer. AWT Package The java. and grabbing snapshots of the screen. These elements include windows. How simple Java makes onerous tasks will like opening a socket connection.image package contains classes and interfaces for managing image data..peer package contains classes and interfaces that connect platform-independent AWT components to their platform-dependent implementation (such as Motif widgets or Microsoft Windows controls).image. java. later dynamic checking. and eliminating situations that are error prone. AWT Image Package The java.awt. Anyone who has tries to do Internet programming using another language will revel. We have found the networking capabilities of Java to be both strong and easy to use.awt.awt. Creating a User Interface covers all three of the AWT packages. Java puts a lot of emphasis on early checking for possible problems.awt. scrollbars.
Overrunning the runtime stack. Twenty years ago. given the presence of Java runtime system. for example. As for the second point. Java enables the contraction of virus-free.The Java compiler detects many problems that in other languages would only show up at runtime. And the codes have been designed to translate easily into actual machine instructions.The Java compiler does this by generating byte code instructions which have nothing to do with a particular computer architecture. even before that. Rather they ere designed to be both easy to any machine and easily translated into native machine code on the fly. You have the power of pointers if you need it. they are no "implementation dependent" aspects of the . the UCSD Pascal system did the same thing in a commercial product and. Here is a sample of what Java¶s security features are supposed to keep a Java programming from doing: 1. anyone who has spent hours chasing a memory leak cost by a printer bug will be very happy with this feature of Java. Nicholas Worth¶s original implementation of Pascal used the same approach. Since you can never access a bad pointer or make memory allocation errors. The designers of Java did an excellent job developing a byte code instruction set those workers well on today¶s most common computer architectures. Corrupting memory outside its own process space.the compiled code is executable on many processors. performance takes major hit. Java gives you the best of both worlds. And you have always-complete safety. 2.. Portable Unlike C and C++. You need not pointers for everyday constructs like string and arrays. Architecture Neutral The compiler generates an architecture neutral object file format. 3. temper-free systems. By using bytecodes. Reading or writing local files when invoked through a security-conscious class loader like Web browser. Secure Java is intended to be used in networked/distributed environment toward that end.. a lot of emphasis has been placed on security. for like lists.
High Performance While the performance of interpreted bytecodes is usually more than adequate. just-in-time compilers can give you a 10-or even 20-fold speedup for some programs and will almost always be significantly faster than the Java Interpreter. It was designed to adapt to an evolving environment. This speeds up code once. or any size the compiler vendor likes. caching the results. The bytecodes can be translated on fly into machine code for the particular CPU the application is running on. be interpreted in the current version.specifications. catching the results. Multithreaded In a number of ways. as is the behavior of arithmetic on them. The only restriction is that it must have at least as many bytes int and cannot have more bytes than a long int. there is an abstract window class and implementations of it UNIX.. Interpreted The Java interpreters can execute Java byte codes directly on any machine to which the interpreter has been ported. and the calling them again. This speed up the loop tremendously since once has to do the interpretation only once. For example. there are situations higher performance is required. a 32-bit integer. . int can mean a 16-bit integer. the development process can be much more rapid and explanatory. and calling them again. The libraries that are a part of the system define portable interfaces. Windows. In C/C++. if needed. Since linking is a more incremental and lightweight process. finding out run time type information is straightforward. Java is more dynamic language than C or C++. ultimately. an int in Java is always a 32-bit integer. These work by compiling the byte codes Into native code once. In Java. The sizes of the primitive¶s data types are specified. Libraries can freely add new methods and instance variables without any effect on their clients. and the Macintosh.. One problem is that the JDK is fairly slow at compiling your source code to the bytecodes that will. Although still slightly slower than a true native code compiler. Instead there are just-in-time (jit) compilers. Native code compilers for Java are not yet generally available.. For example. if needed.
Applets run only from with in Java-Enabled browsers such as NETSCAPE. but without a classic window frame. Some of the features of this model we have seen like the object oriented. Elimination of fatter phenomenon . secure etc. This ensures that certain standards for object Programming are net. . PARADIGM OF JAVA Java as a programming language evolved keeping in view certain criteria and features. the Java Applet is a complete running program.Java based products could eliminate these by giving the users only those features of a product that the user needs at a time. Applets are essentially program that run from within a browser. The range of programs that can be written as an APPLET are reduced because of security limitations imposed by the target browser. JAVA APPLETS Applets are a common way of writing Java applications. architecture neutral. An Applet is just like a widow application. robust. Supports Networks centric computing.This is an important feature in those situations where code needs to be added to a running program.Applets should be downloadable on to a client machine as and when required. Integrating web based sound and graphics into applications is simplified by using methods in Applet class. The major difference is that instead of a static graphics. Supports Active X also. Supports CORBA& DCOM-Java supports Common Object Request Broken Architecture (CORBA) and Distributed Common Object Model (DCOM). hot Java. A prime example is code that is downloaded from the Internet to run in browser. and INTERNET EXPLOSER. They appear as part of HTML documents in the same way that pictures are presented.Java should be able to support low cost Network computers. The remaining features of a product can remain on the server itself. It was built around a model that had these features. Some additional features are explaining below Dynamic downloading of applets.
DISADVANTAGES OF APPLET: Running your application from a web browser is not necessarily a good thing. Object Componen t Container Panel Applet Window Frame . This enables due to keep in constant touch your users. This id because both frame and applet are executed from the container class. Any Java based graphical application can be easily converted into an applet. Internet and Intranet based software also reduces the problems of LAN accesses to software instead of accessing a disk by way of a networkmounted disk. no local files can be read or written to on the client machines. Applets have reduced network access. WEB pages can also be used as a method of presenting help to your users as well as keeping them informed about the latest changes to your programs. If an applet is loaded from networked machine. Files are accessed through http and FTP.8 k or higher on relatively fast computers. This security restriction is alleviated if the applet is loaded from the users local disk. Only that machine can be communicated with a via a socket connection this prevents the applet from communicating to other machines on web. The most obvious is that you only need one copy of your production class files on an HTML server. This reduces the nightmare of distributing and installing software by the tape or disk. Target users must be running a version of web browser that supports that Java. If the applet was loaded from an http server.ADVANTAGES OF APPLETS: There are several advantages using Applets. Loading the applet from the users local disk storage can alleviate this. but this defeats any of the web-based applet advantages mention earlier. It also helps if uses have an Internet connection of 28. Another large problem is local file access.
It is used to re-claim resources. There are no global functions or global data. Compared to c++.This is called immediately after init () start () is called each time user return to the pea or when the page is deconified. If you understand these differences you will see why Java is such a beneficial programming language.This method is called when the browser shuts down. Unlike start. All primitive . Only class. this need not be implemented. Start (): . If you want the equivalent of global. y All non-primitive types can only be created using new. y Compare to C++ Java runs 20 times slower because of platform independents. The following are some of the differences of Java over C++. There are no structures or enumeration or unions.This method is called when the user moves off the page on which the Applet sits or when it is iconified. Java used similar syntax for if and loops structures. Destroy (): . make static methods and static data within a class. Stop (): . y The Char type uses the international 16-bit. so it can automatically represent most national characters. The notion of a constructor is all very similar to what C++ has. Unicode character set.Used for initial setup such as defining Layout. init is called only once.APPLET LIFE CYCLE: There are four methods that give the framework to build the applet Init () Start () Stop () Destroy () Init (): . If an applet if not doing time consuming activities like performing animation. passing parameters and other initializations. JAVA VS C++: The syntax of Java looks very much like C++. y Every thing must be in a class.
you get back a reference. For example String s = new String ("peers"). If you want to use classes in another library. but these containers are not designed for efficiently like the C++ standard template library(STL) y Java has built-in support for comment document action. relatively fool-proof exception handling . Java is more robust. which is stripped out and reformatted into HTML using an apart program. This is boon for documentation maintenance and use. y Java has no templates or other implementation of parameterized types. and through which you can satisfy your container needs.types can only be created directly. There are wrapper classes for all primitive classes so you can create equivalent heap-based objects with new y Java has no Preprocessors. When you create an object with new.Multithreading . y Java has standard libraries for solving specific tasks. y There are no Java pointers in the sense of C and C++. so the source code file can also contain its own documentation.Compression . via Object handles initialized to null Handles are always checked and exceptions are thrown for failure all array accesses are checked for bounds violations Automatic garbage collection prevents memory leaks Clean.Networking . There are no preprocessor-like macros. without new. you say import and the name of the library.Commerce The availability and standard nature of these libraries allow for more rapid application development.Database Connection (via JDBC) . These tasks include .Distributed Objects (via RMI and CORBA) . There is a set of containers : Vectors. y y y y y y Generally. stacks and Hash table that hold object references. C++ relies on nonstandard third-party libraries.
Since ODBC provides for connection to any type of database that is ODBC compliant. 1. which are industry standard as of now. JDBC Driver types: There are four types of JDBC drivers each having its own functionality. Please note that. Writing these type drivers is easier compare to writing other drivers 2. which is turn employees native calls to connect to the data base. JDBC can connect only Java clients and uses ODBC for the connectivity. The Jdbc calls in to equaling ODBC calls using the native methods. It is called a low-level API since any data manipulation. implemented using native methods to access the database. it is very simple matter. This is useful in case of Java application that can run only on some specific platforms.y bytecodes verification of network applets INTRODUCTION TO JDBC What is JDBC and Why JDBC? JDBC (Java Database Connectivity) is a front-tool for connecting to a server and is similar to ODBC in the respect. However. This approach is a recommended once since using ODBC drivers. would make an application truly portable across the databases. they do not substitute one another. 4.Native Jdbc driver: A JDBC driver. JDBC-ODBC bridge driver: A bridge driver provided with JDBC can convert. Native Protocol ALL Java Drivers: - . They are classified based on how they access data from the database. to connect a number of databases simultaneously. which is partly written in Java and most of each. Programming Interface. storage and retrieval has to be done by the program itself. each having their own suitability aspects. JDBC is essentially a low-level Application. All Java JDBC Net Drivers: A JDBC net drivers which uses a common network protocol to connect to an intermediate server. Some tools that provide a higher level abstraction are expected shortly. This approach is used for applets where the request must go through the intermediate server. 3.
JDB-ODBC Bridge 4. JDBC Driver Manager 2. JDBC Driver 3. This method of data access is suitable in case of Intranets were carry every thing can run as an application instead of an applet. Application JDBC Driver Manager JDBC Native Driver JDBC ODBC Bridge JDBC NET DRIVER Native Protocol Jdbc driver Uses Native uses ODBC special Uses native Calls to net protocols net protocols The data to accessthe to access the base database database Access DATA BASE . Applications. JDBC ARCHITECTURE: JDBC architecture is shown below. Components of JDBC are 1.This type of Jdbc driver is written completely in Java and can access the database by making use of native protocols of the database.
The other computer would be the server because it is handling your computer's request. APPLICATION: Application is a Java Program that needs the information to be modified in some database or wants to retrieve the information. Your computer would be the client because it is requesting the files from another computer. Whenever a connection is requested. SERVLETS: Client and Servers To understand the World Wide Web and Server Side programming must understand the division between Web clients and Web servers and how HTTP facilities the interaction between the two. JDBC Driver: . that is ODBC complaint. Putting in simple words. However. With networked computers.Function of the driver manager is to findout available drivers in the system and connects the application to the appropriate database. If the request is handled. the object is sent back to the client .Function of the JDBC Driver is to accept the SQL calls from the application and convert them into native calls to the database. in this process it may take help some other drivers or even servers. clients and servers are very common. suppose you are using a word processing program to edit files on another compute. although this not always the case. which either handles the request an object or transaction from the server software. JDBC-ODBC Bridge: Sunsoft provides a special JDBC Driver called JDBC-ODBC bridge driver. each driver should be registered with the driver Manager. A server typically runs on a different machine than the client. The interaction between the two usually begins on the client side. to help the driver manager identify different types of drivers. However. which depends on the type of Jdbc Driver we are using. which can be used to connect to any existing database.JDBC Driver Manager: . For example. it is possible that the total functionality of the database server could be built into the driver itself. Also. The client software request an object or transaction from the server software. which either handles the request or denies it. a server handles request from various clients.
you wouldn't. Servlets make use of the Java standard extension classes in the packages javax.http (extension of the Servlets framework for Servlets that answer HTTP requests). they provide a means to create server extensions in a server and operating system independent way. HTTP is defaulted at port 80 and in case of Servlets it is defaulted at 8080 that could be changed. The web browser then uses the HTTP response headers to determine how to display the file or data being returned by the web server. It is just a simple example CGI script. allowing you to view documents on the World Wide Web. The process of viewing a document on the web starts when a web browser sends a request to web server in http request headers. however. Internet Explorer. It also gives a quick introduction to HTTP and its implementation in the HttpSetvlet class. On the World Wide Web server are known as webservers. and NCA's Mosaic.software. Web browser¶s request documents from web servers. WHY USE SERVLETS? You may have noticed that the preceding CGI example could just as easily been a simple HTML file. In fact. Typical uses for HTTP Servlets include: . As you learn Servlets. and sends back the file with HTTP response headers. these companies also distribute Web server software (in our case we uses JWS Java Web Browser). for the preceding example. Like most software companies that distribute Web Browsers. you will see that it allows you to extend the functionality of Web documents to produce dynamic and interactive pages. 1. In the case of Servlets we would refer to a URL with a default port at 8080. So why use any server side scripting? Well. Since Servlets are written in the highly portable Java Language and follow a standard framework. and clients are known as Webbrowsers.servlet and javax. such as the name of the file being requested. The Web server receives and views the http request headers for any relevant information. Servlets are not tied to a specific client-server protocol but they are most commonly used with Http and the word "SERVLET" is often used in the meaning of "HTTP Servlets". you don't gain advantage from making it a server side script.servlet.An Invitation to Servlets: This session provides answer to the questions "What is Servlets" shows typical uses for Servlets. If the above said server are Java Enabled Web Severs. What is Servlets? Servlets are modules of Java code that run in a server application to answer client requests. Some of the most common browsers are Netscape Navigator.
Note that in Java the identity of a class is not only defined by the class name but also by the Class Loader by which it was loaded.g.0 of the Servlet API. called by casting the returned object to the required class type.1 Servlets are not alone in a web server. represented by an instance of javax. Methods. A Servlet can get a list of all othg3r Servlets in the Servlet context by calling get Servlet Names on the Servlet Context object. returning the results of a database query to the client. The Servlet Context is available through the Servlet Config object's get Servlet context method. Note that this method can throw a ServletException because it may need to load and initialize the requested ServletException if this was not already done. which comply strictly. Web servers usually load each Servlet with a different class loader. which are loaded by a Servlet class loader. Only a classloader object with all loaded classes can be replaced. A Servlet for a known name (probably obtained through getServletNames) is returned by getServlet. which are not declared in javax. e.servlet. Managing state information on top of the stateless HTTP.Servelet but in a subclass thereof can.servlet.g.servletContext. The Servlet Environment: Inter-Servlet communication The inter Servlet communication method which is described in this section can only be used with Servlet engines which implement version 1. They have access to other Servlets in the same Servlet context (usually a Servlet directory). for an online shopping chart system which manages shopping charts for many concurrent customers and maps every request to the right customer.0 or 2. It will not work with Servlet engines.y y y Processing and/or storing data submitted an HTML form. After obtaining the reference to another Servlet that Servlets methods can be called. A class literal FooServlet (as used in a type cast like "FooServlet foo ((FooServlet) context. cannot be used for inter-Servlet communication. This means that classes.getServlet ("FooServlet")") which is used in class BarServlet is different from the class literal FooServlet as used in FooServlet itself. e. to version 2. A way to overcome 5this problem is using a supercalss or and interface . Providing synergic content. This is necessary to reload Servlets on the fly because single classes cannot be replaced in the running JVM.
as you¶ll see below) by binding the objects to the ServletContext object which is shared by several Servlets.which is loaded by the system loader and thus shared by all Servlets.1 of the Servlet API offers a new way of sharing named objects between all the Servlets in a Servlets in Servlet context (and also other contexts.fooservlet could have an attribute com.foo. The ServletContext class has several methods for accessing the shared objects: Public void setAttributes (string name. Public void remove Attribute (String name) removes the attributes with the specified name if it exists. Object) adds a new object or replaces an old object by the specified name. In a Web Server. . which is written in Java. In addition to the user-defined attributes there may also be predefined attributes. Public Object getAtributes (String name) returns the name object or null if the attribute does not exist. The attribute name should follow the same naming convention as a package name (e. The Servlet Context objects of a Servlet with a known local URL can be retrieved with the method public Servlet Context getContext (String unipath) of the Servlets own Servlet Context.foo. This method returns null if there is no Servlet for the specified path or if this Servlet is not allowed to get the Servlet Context for the specified path due to security restrictions.g. Just like a custom ServletRequest attribute an object which is stored as a ServletContext attribute should also be serializable to allow attributes to be shared by Servlets which are running in different JVMS on different machines in a load balancing server environment. Public environment getAtributes name () returns an Enumeration of the names of all available attributes.fooservlet. these classes are usually located in the class path (as defined by the CLASSPATH environment variable) Sharing Data between Servlets Version 2. a Servlet com. The separation of Servlets into Servlet contexts depends on the Servlet engine. which are specific to the Servlet engine and provide additional information about a Servlet (Context) environment.bar).
servlet and javax. When a group of LAN's are connected together they are called Wan¶s. In 1960s this was explored revolution all aspects of human-information interaction. The internet stemmed from the concept of universal database: data that would not only be accessible to people around the world. It is the worldwide access to people and information. UNDERSTANDING INTERNET A network in which computers are connected using cables or some other direct media are said to be in LAN.http are not included with the compiler or your Servlet engine you have to install them separately by downloading the JSDK (Java Servlet Development Kit) and including the JSDK classes in your CLASSPATH environment variable. This quickly spread to other institutions around the world where today there are an estimated 20 million computers linked together. Importantly these LAN's are connected to form Wan¶s through special computers called Routers. Introduction to world wide web Internet: The Internet is a network. They can also be worked out with Java Web Server.Compiling Servlets Servlets can be compiled with the JDK and other Java compilers. Its consists of thousands of interconnected networks consisting of different types of computers. If the Servlet packages javax. These Wan's are connected via telephone line.servlet. The job of a Router is to provide a link from one network to other where networks can be LAN¶s to form Wan¶s to become even larger Wan's. satellite links etc. but information that would link easily to others pieces of information so that the relevant data can be quickly found by a user. The Internet first began in 1969 when the United States Department of Defense researched ways of communication via decentralized computer networks. except for JSDK providing supporting for the other servers like IIS and other third party vendors. . just like Applets and Applications. Both JSDK and JWS follow the same rules. After that computers in government and universities were voluntarily linked.
g. 3. for easy navigation among resources (E. Hypertext. video clips. INTRODUCTION TO HTML WHAT IS World Wide Web? The World Wide Web is a network of information resources.http). Introduction to URLs Every resource available on the web-TML document.HTML) The ties between the three mechanisms are apparent throughout this specification. The web realize on three mechanism to make the resources readily available to the widest possible audience: 1.: . program.g. Protocols. Has an address that may be an encoded by a Uniform Resource Locator. for access to named resources over the web (E.: .: URLs) 2.g. or "URL" . image. etc.HARDWARE REQUIREMENTS: If Internet being accessed through a telephone line Then we need y y y A computer with minimum requirements A modem A telephone Taking a first issue of computers with minimum requirements may put everyone wondering what could be the requirements? It would be safe enough to use the 486 or higher processors for a computer to be fast enough with at least 16MB to 64MB MEMORY. A Uniform name is scheme for locating resources on the web (E.
.html.org//TR/Pr-html4/cover. given as a path. Other schemes you may see in HTML documents include "mailto " for E-mail and FTP for FTP." means one level up in the hierarchy defined by the path).. URLs play a role in these situations: . Relative URLs are resolved to full URLs using a base URL. and may contain fragment identifiers.com> JoeCool</a>.html". Fragment Identifiers Some URLs refer to a location within a resource.w3. assume we have the base URL http://www.w3. For all comments. This kind of URL ends with "#" followed by an anchor identifier (called the "fragment identifier").html This URL may be read as follows: They¶re a document available via an http protocol.com/support/intro. The name of the resource itself. 3. The name of the machine hosting the resource. Relative URLs A relative URL doesn't contain any naming scheme information..ame.. Consider the URL that designates the current html specification: http://www. residing on the machine www. The naming scheme of the mechanism used to access the resource. Relative URLs may contain relative path components (". please send E-mail to <A href="mailto:Joe@ omeplace. y This one refers to a User's mailbox: This is text.org Accessible Via the path" TR/Pr-html4/cover. 2. Here is another example if a URL. As an example of relative URL resolution.html"> Supplies </a> In HTML. The relative URL in the following markup for a hypertext link: <A href="supplies. Its path generally refers to a resource on the same on the same machine as the current document.URLs typically consist of three pieces: 1.
y y y y y y y y Linking to another document or resource. The publishing language used by the World Web is HTML (from HyperTextMarkupLanguage). Design forms for conducting transaction with remote services.0 (November 1995) was developed under the aegis of the Internet Engineering Task Force (IETF) to codify common practice in late 1994. one needs a universally understood language. Images objects and applets for inclusion in a page. etc. and other applications directly in their documents. What is HTML? To publish information for global distribution. Include spreadsheets. lists. HTML gives authors the means to: Publish online documents with headings. This has motivated joint work on specification for HTML. sound clip. Image maps. A brief History of HTML HTML was originally developed by Tim Berners-Lee while at CERN. Form submission Frames Citing an external reference. Referring to metadata conventions describing a document. Linking to an external style sheet for inclusion in a page. Retrieve online information via hypertext links. HTML 2. and popularized by the Mosaic browser developed at NCSA. HTML+(1993) and [HTML 3. . a kind of publishing mother tongue that all computers may potentially understand. During this time. The Web depends on Web page others and vendors sharing the same conventions for HTML. HTML has been extended in a number of ways. During the course of the 1990s it has blossomed with the explosive growth of the Web. ordering products.Despite never receiving consensus in standard discussions. tables. for use in searching for information. making reservations. etc. photos.0] (1995) proposed much richer versions of HTML. text. these drafts led to the adoption of a range of new features. video clips. at the click of a button.
richer tables. etc. computers with high or low bandwidth. improved support for right to left and mixed direction text. which deals with the internationalization of HTML. hand held devices.0 HTML 4.2(January 1997). Achieving interoperability lowers costs to content provides since that must develop only one version of a document. correct hyphenation. scripting.0 extends HTML with mechanism for style sheets. This is the world's most inclusive standard dealing with issues of the representation of international characters. HTML now offers greater support for diverse human languages within a document. PCs with graphics displays of varying resolution and color depths. and enhancements to forms. Most people agree that HTML documents should work well across different browsers and platforms. Internalization This version of HTML has been designed with the help of experts in the field of international -libation. there is much greater risk that the Web will evolve into a proprietary world of incompatible formats. If the effort is not made. HTML has been developed with the vision that all manner of devices should be able to use information on the Web. One important step has been the adoption of the ISO? IEC: 10646 Standard (ISO10646) as the document character set for HTML. test direction. devices for speech for output and input. punctuation. higher-quality typography. and so on. This allows for more effective indexing of documents for search engines. and other world language issues. frames. HTML 4. This has been accomplished by incorporating [RFC2070]. so that document may be written in every language and web transported easily around the world. ultimately reducing the Web's commercial potential for all participants. offering improved accessibility for people with disabilities. better text-to-text-speech conversion. .The efforts of the World Wide Web Consortium¶s Html working group to codify common practice in 1996 resulted in HTML 3. cellular telephones. embedding objects.
specialized applications. The mechanism for associating a style sheet with a document is independent of the style sheet language. etc. column groups). authors and had limited control over rendering. Compound Documents HTML now offers a standard mechanism for embedding generic media objects and applications in HTML documents. Tables Authors now have greater control over structure and layout (e.Accessibility As the Web community grows and its members diversify in their abilities and skills. and other objects in a document. Before the advent of style sheets. sound. Providing labels for form fields. Providing labeled hierarchical groupings for form fields. It also allows authors to specify a hierarchy of alternate renderings for user agents that don't support a specific rendering. HTML has been designed to make Web pages more accessible to those with physical limitations.g. The ability of designers to recommend column widths allows user agents to display table data incrementally as it arrives rather than waiting for the entire table before rendering.. The OBJECT element (together with its more specific ancestor elements IMG and APPLET) provides a mechanism for including images. Style Sheets Style Sheets simplify HTML markup and largely relieve HTML of the responsibilities of presentation. Providing the ability to associate a longer text description with an HTML element. video. it is crucial that the underlying technologies be appropriate to their specific needs. HTML 4. HTML 3.0 developments in the area of accessibility include: Encouraging the use of style sheets to achieve layout effect. mathematics. colors. alignment. They give both authors and users control over the presentation of documents-font information.2 included a number of attributes and elements . Making it easier to provide alternate descriptions of images for non-visual browsers.
However. etc maintain the web sites. sore to an entirely different site. font size. made up of links. in this network. navigation tools text. Authors also exploited tables and images as a means for laying out pages. Every browser has its own home page. etc. These documents are usually coded in HyperTextMarkupLanguage (HTML) HOME PAGE: Home page is the first page of web documents. Companies. However. the World Wide Web consortium will eventually phases out many of HTML's presentation elements and attributes. . Home page is the entry point for that particular WWW site. or end point. and text color. The web gets its name. LINK: A link can be anything on a page such as text or graphics. since style sheets often more powerful presentation mechanisms. Also. from the interdependent network of server¶s worldwide. It is also refer to as the "Back-end" and is actually software that runs at a web site and returns web documents upon request by the web browser. is a gateway to another page within the sight. The relatively long time it takes for users to upgrade their browser¶s means that these features will continue to be used for some time. WEB SERVERS: Web sites are housed on a server.offering control over alignment. COMPONENTS OF WWW: WEBPAGE: The part of the Web the user sees the front-end" is known as a Web page. images. WEB SITES: A group of related pages is a site. institutions. The user's computer is a terminal. They are the pages to go on he Web. Government agencies. individuals. home page is the page a browser loads. Web documents are files of information residing at a Web site. Servers run all the time and wait for users to request information. which is a computer design to "serve" the file up to the user in a proper format. in fact. the default homepage for a browser can be changed.
GATEWAY PROGRAMS: Programs that accept and process request from a web server and generate new web pages. These programs usually handle requests to run a certain program or access information from a database. It is a fast. also critical to the WWW proposal was the development of new protocol.with an important extension: Hypertext contains connections with in the text to other documents. object oriented protocol called hypertext transfer Protocol SERVER Servlet Code SERVLET Code Handle Client Requests Client Client Server Server Servlet code . stateless. searched or edited. These programs add a new level of interactivity on the web not possible by simple HTML documents. hypertext links. In this way. PROTOCAL: A protocol is a set of rules for two computers to use when transferring data. especially design for the needs of a distributed hypertext system. can create a complex virtual web of connections.HEPERTEXT: The operation web realizes on hypertext as its means of interacting with users. called hyper links. This new text would themselves have links and a connection to others documents. Continually selecting Hypertext is like taking a free-associative tool of information. While the World Wide Web encompasses previously existing protocols such as GOPHER and FTP. Hypertext is basically the same regular text-it can be stored read.
Data entry into the application can be done through various screens designed for various levels of users. If the customer wants to buy the product he wants to enter into the shopping chart. after that customer gives the credit card number. Once the authorized personnel feed relevant data into the system. The central concept of the application is to allow the Customer to shop virtually using the Internet and allow customers to buy the items and articles of their desire form the store.SYSTEM SPECIFICATION The application ONLINE SHOPPING was designed into two modules 1. BUSSINESS PROCESS MODEL The end-user of this product is a departmental store where the application is hosted on the web and the administrator maintains the database. Initially marchant enter with login. the details of the items are brought forward from the database for the customers view based on the selection through the menu and the database of all the products are updated at the end of each transaction. The information pertaining to the products are stored on an RDBMS at the server side (store). The Server processes the customer's request and the items are shipped to the address submitted by them. which is maintained in database. After filling order form merchant shipped the product to address specified by the Customer. and customer details. For the customers who wish to buy the articles? 2. The application which is deployed at the departmental stores will automate the customer details that are appended to the customers database. Bill is send by merchant the address specified by the customer. For the storekeeper who maintains and updates the information pertaining to the articles and those of the customers. Here marchant can be stored the customer shipped address. . and also maintain the product details in the database. He selects the desired product. after that he enter in to the order form he fills the order form. Every time he has access the insertion Updating and deletion when and where ever he wants. several reports could be generated as per the security.
color. sizes & fonts it would be subjected to a specific environment> Secondly as the number of users grow day by day one should think of minimizing the amount of information to be passed from one system to the other. A data dictionary explicitly represents the relationships among data objects and the constrains on the elements of the data structure. testing and maintenance activities. These are explained in the following section. having the addresses of those locations. It will contain the basic information about the link but no specifications about how to display the highlight the link. etc. SYSTEM DESIGN Design of software involves conceiving. The purpose of a browser becomes to act as a presentation engine. Hence HTML would contain plan ext. DATA DESIGN: The primary activity during data design is to select logical representations of data objects identified during requirement analysis and software analysis. which can be added to the content of a document as an aid processing. . The purpose of HTML is to specify how the text should be processed. It left to the browser how information should be displayed. architectural design and user interface design in the design process. Within Hyper text there will be an indication of the start and end of the paragraph.. planning out and specifying the externally observable characteristics of the software product. If HTML would be a language having instructions about the colors. If hypertext one must send information for displaying the text and these instructions are embedded in the text itself. A data dictionary should be established and used to define both data and program design. We have data design. to interpret HTML & display the contents in appropriate manner. fonts. The goal of design process is to provide a blue print for implementation.HTML is a formal set of specifications used to define information. file would occupy less space than any other graphics file but. The importance of HTML lies with Internet because one doesn¶t know about the end user since there are different user types on the NET. there will be no explicit instructions about the size.
The costs incurred of not creating the system are set to be great. Operational Feasibility: In this project. Implementation: Implementation is the stage where the theoretical design is turned into a working system. All these make Java an appropriate language for this project. Economical Feasibility 3. the management will know the details of each project where he may be presented and the data will be maintained as decentralized and if any inquires for that particular contract can be known as per their requirements and necessaries. The purpose of feasibility is not to solve the problem but to determine if the problem is worth solving. With this software. 1. 3. Operational Feasibility. availability and compatibility. The project was developed in Java which Graphical User Interface. .FESIBILITY STUDY: Feasibility study is conducted once the problem is clearly understood. because precious time can be wanted by manually. It provides the high level of reliability. The objective is to determine quickly at a minimum expense how to solve a problem. the machine and manpower utilization are expected to go up by 80-90% approximately. 2. Technical Feasibility: The project entitles "Project Monitoring System" is technically feasibility because of the below mentioned feature. The system has been tested for feasibility in the following points. The most crucial stage in achieving a new successful system and in giving confidence on the new system for the users that it will work efficiently and effectively. Technical Feasibility 2. 1. Feasibility study is a high level capsule version of the entire system analysis and design process. Thus the existing software Java is a powerful language. Economical Feasibility: The computerized system will help in automate the selection leading the profits and details of the organization.
This is due to poor interfacing. The individual modules are clipped under this major module and tested again and verified the results. programs are written and tested. will also show perfect results when run as a whole. . validity and also determine any missing operations and to verify whether the objectives have been met. design of methods to achieve the change over and an evaluation of change over methods a part from planning. For this. The implementation phase comprises of several activities. TESTING: The testing phase is an important part of software development. So errors are rectified easily in particular module and program clarity is increased. the software whose modules when run individually and showing perfect results. Unit testing is the important and major part of the project. Two major tasks of preparing the implementation are education and training of the users and testing of the system.The system can be implemented only after thorough testing is done and if it is found to work according to the specification. Software testing is carried out in three steps: The first includes unit testing. The user then changes over to his new fully tested system and the old system is discontinued. adverse effect on any other or on the global data structures. investigation of the current system and its constraints on implementation. the more involved will be the systems analysis and design effort required just for implementation. It is the process of finding errors and missing operations and also a complete verification to determine whether the objectives are met and the user requirements are satisfied. It need not be the case. where in each module is tested to provide its correctness. So unit testing is conducted to individual modules. In this project entire system is divided into several modules and is developed individually. The second step includes Integration testing. The system may require some software to be developed. which may results in data being lost across an interface. causing serious problems. The required hardware and software acquisition is carried out. The more complex the system being implemented. It involves careful planning. A module can have inadvertent. Errors are noted down and corrected immediately.
grieve libraries of computer software began to expand. The maintenance phase focuses on change that is associated with error correction. Maintenance and Enhancement AS the number of computer based systems. We may define maintenance by describing four activities that are undertaken after a program is released for use: Corrective Maintenance Adaptive Maintenance Perfective Maintenance or Enhancement Preventive maintenance or reengineering . all of those source statements-had to be corrected when false were detected.The final step involves validation and testing which determines which the software functions as the user expected. and changes due to enhancements brought about by changing customer requirements. Software products purchased from the outside added hundreds of thousands of new statements. Four types of changes are encountered during the maintenance phase. modified as user requirements changed. Corrective maintenance changes the software to correct defects. In house developed projects produced tones of thousand soft program source statements. Here also some modifications were. These activities were collectively called software Maintenance. or adapted to new hardware that was purchased. All of these programs. A dark cloud appeared on the horizon. Software configuration management is a set of tracking and control activities that began when a software project begins and terminates only when the software is taken out of the operation. Correction Adaptation Enhancement Prevention Correction: Even with the best quality assurance activities is lightly that the customer will uncover defects in the software. In the completion of the project it is satisfied fully by the end user. adaptations required as the software's environment evolves. Maintenance is a set of software Engineering activities that occur after software has been delivered to the customer and put into operation.
business rules. and reengineering an application for use. The remaining 80 percent are spent adapting existing systems to changes in their external environment. Software configuration management (SCM) is an umbrella activity that is applied throughout the software process. Report change to others that may have an interest. In essence. Perceptive maintenance extends the software beyond its original function requirements. operating system. ADAPTATION: Over time. SCM activities are developed to Identify change. ENHANCEMENT: As software is used. DESIGN SPECIFICATION TABLES Table Name: PRODUCT . the customer/user will recognize additional functions that will provide benefit. Control chug. preventive maintenance. Ensure that change is being properly implemented. must be conducted to enable the software to serve the needs of its end users. and enhanced..Only about 20 percent of all maintenance work are spent "fixing mistakes". Adaptive maintenance results in modification to the software to accommodate change to its external environment. adapted. external product characteristics) for which the software was developed is likely to change. preventive maintenance makes changes to computer programs so that they can be more easily corrected. PREVENTION: Computer software deteriorates due to change. and because of this. often called software re engineering. CPU. making enhancements requested by users. the original environment (E>G.
----------------------------------------------------Column Name ----------------------------------------------------Product Id Product Name Product Type UnitPrice Quantity Units in stock Int Units on Order ----------------------------------------------------Table Name: CUSTOMER Type Int Varchar Varchar Float Varchar Int ------------------------------------------------Column Name Type -----------------------------------------------Order Number Int Order Date Date CustomerName Varchar BillAddress Varchar ShippingAddress Varchar PhoneNumber Varchar Email-Id Varchar Amount Float Shipped Status Varchar ------------------------------------------ Table Name: PRODTABLE ------------------------------------------------Column Name Type -----------------------------------------------ProdId Int ProductName Varchar Price Float -----------------------------------------------Table Name: CREDITCARD -----------------------------------------------Column Name ------------------------------------------------ Type .
CardType CardNumber Varchar Varchar ------------------------------------------------ DATAFLOW DIAGRAMS CONTEXT DIAGRAM Product details Merchant Delete Enhance Update Product Order Customer Customer Details FIRST LEVEL DATA FLOW DIAGRAM FOR MARCHANT LOGIN TO ENHANCE STORES Merchant Details Merchant Stores Enhance stores .
FIRST LEVEL DATA FLOW DIAGRAM FOR MARCHANT LOGIN TO ENHANCE STORES Merchant Details Merchant Stores Delete Or Update Updated store Details FIRST LEVEL DATAFLOW PROCESSING ON PRODUCTS DIAGRAM FOR CUSTOMER Product details Customer Product name Product type Customer Details Amount Payable .
It meets the information Requirements specified to the great extent. Although the system has been designed keeping the Present and future requirements in mind and made very flexible.SECOND LEVEL DATA FLOW DIAGRAM FOR BILL SHIPMENT Product details Customer Order Products Bill Processing Bill Shipment Shipment Address Address Specified by the Customer INTERPRETATION OF THE RESULT The system has been implemented and tested successfully. Proper consideration has been given for a wide range of new enhancements in . There are limitations of the System.
The system is In future. developed user friendly. yUser friendly screen to enter the data and Enquire the database tables. y Every Transaction is obtained and processed y Avoids errors by avoiding the manual work. The application was designed into two modules first Os for the customers who wish to buy the articles. ADVANTAGES y It simplifies the operation. Second is for the storekeepers who maintains and updates the information pertaining to the articles and those of the . y Provide Hardware and software securities. y User can easily access the system without much experience. The central concept of the application is to allow the customer to shop virtually using the Internet and allow customers to buy the items and articles of their desire from the store. The information pertaining to the products are stores on an RDBMS at the server side (store). The Server process the customers and the items are shipped to the address submitted by them. through out the development of system. if it is required to generate reports other than provided by the system. y It avoids a lot of manual work. y Online help messages available to the operating system. it can be simply Achieved by a separate module to the main menu without affecting the design of the system. CONCLUSION immediately. y Portable and flexible for further extension.The future.
RustyHarod. Data entry into the application can be done through various screens designed for various levels of users. several reports could be generated as per the requirements. Once the authorized personnel feed the relevant data into the system.Fairly. This system offers information relevant to the user accessing the application thus avoiding unnecessary overloading and at the same time maintaining the security. BIBILIOGRAPHY HTML Publishing Bible Netscape Java Script .James A.Alan Simpson. The Complete Reference OfJava -Patricknaughton Java Network programming . The application which is deployed at the customer database.customers? The end user of this product is a departmental store where the application is hosted on the web and the administrator maintains the database. the details of the items are brought forward from the database for the customer view based on the selection through the menu and the database of all the products are updated at the end of each transaction. . Software Engineering Analysis & Design Of Information . . Senn. Peter& John Kent.
This action might not be possible to undo. Are you sure you want to continue?
We've moved you to where you read on your other device.
Get the full title to continue reading from where you left off, or restart the preview.