Professional Documents
Culture Documents
Repetitive information, such as client name and address, account data, and personal assignment
distribution, causes problems. When a consumer uses a certain type of administration, the
invoice is physically calculated, which takes time. Moreover, ill-advised help isn't completed on
regular and after-hours errands. Finance estimates are thus generated improperly, making
difficultly for everyone to accomplish the task.
The successive protests by consumers about not getting opportune administrations is one more
issue regularly experienced by the business that has been settled in the proposed customer
management project. This is a consequence of the representatives' unseemly plans for getting
work done and how the records are kept.
The owner is expected to screen the progression of clients consistently. Acquiring data and
records about the situation with administrations in this present circumstance is basically
troublesome. Each of this makes the proprietor the essential individual responsible for dealing
with the entire working framework, and subsequently, the occupation is not generally
disseminated reasonably among those accountable for running the help community. The ongoing
framework misses the mark on fundamental foundation to oversee HR, including representative
information, participation, accounting, client data, and so on.
A system with a vital application in the proposed arrangement of client record management can
likewise work in an organization with the least amount of programming changes. The proposed
framework plan and the current framework don't altogether contrast with each other.
1.3 Objective
The objectives of this project are:
a. To improve accessibility and comfort for customers records.
b. Creating systems with appropriate architecture and OOP principles.
c. To make system integration more dependable and secure.
d. Making it simple for the business administration to quickly and easily look for the
customer's data.
This graphic above gives an overview of the project's use cases. A user is generalized into two
actors in this case. The administrator can do all CRUD activities in the database, while the
viewer can simply read the data. A user must be logged into the software before doing any
activity. Because CRUD activities are only available to authorized users, a login action is
necessary before performing any activity, as illustrated in the figure. The database provider gives
database access, while the authenticator is the program's authentication module for the login
procedure.
The graphic above depicts the database design for this project. The schema has two entities. The
user object has properties such as id, username, password, and role. The type of user will be
determined by the role, such as administrator or viewer. An administrator can change the records
in the customer table, and yet a viewer only see them. This prevents unauthorized access to and
alteration of the database. The customer entity has properties such as an id, a name, a username,
an email address, a phone number, and an address. For a positive implementation, every attribute
must be filled. The primary key that may uniquely define each record in both entities is the id
property. These two entities have a one-to-many connection. A user can see or change one or
more client information.
4.3.2 Read
It is analogous to a search function that enables to get records and read their values. The
SELECT keyword will simply display all of the records in that table without modifying it in any
way.
Figure 5: Reading data from database
The query, such as the create operation, is written first, then translated to a prepared statement,
then the statement is performed. The result is then retrieved and returned, where it may be used
elsewhere.
4.3.3 Update
An existing table record can be updated. This enables to modify existing database entries. Before
running UPDATE, supply the destination table and the columns that will be updated. In some
circumstances, the rows and their associated values are also required.
Figure 6: Updating existing record in database
The column name is set to fresh data from the form and altered when the id matches during the
update procedure. The prepared statement is created and run. The rows of impacted data are then
examined, and a value larger than zero indicates that the data has been appropriately updated.
4.3.4 Delete
The delete command can be used to remove a record from the table. SQL has a delete function
that enables to deletion of one or more records from the database at once. Hard (permanent
delete) and soft (temporary delete) deletion may be supported by some relational database
systems.
Furthermore, in Java programming, classes that specify data attributes and actions (specified by
methods written in the class) can be utilized to generate objects. Java also has built-in packages,
best practices, and features such as abstraction, encapsulation, inheritance, and polymorphism
that make it easier to code. Java programming is exceptionally vigorous because Java objects do
not necessitate any exterior references.
● It provides a wide range of APIs and highly scalable alternatives that function well in a
number of settings.
● Some of the external libraries required for this project, such as the rs2xml and MYSQL
connector, were easily found on the internet. This demonstrates that java resources are
readily available.
which provides powerful tools for automating a large portion of the development process.
● Java has a big user base. Because the majority of the difficulties that surfaced throughout
the project had already been identified and addressed in the community, any issues that
developed during the project were efficiently managed.
4.5 Screenshots
Network topology labels the physical and logical layout, virtual form, or composition of a
network. Simultaneously, a network can have one physical topology and numerous logical
topologies (AfterAcademy, 2020). There are six major forms of physical topology in a computer
network, which are as follows:
Benefits:
i. Simple connection as each cable must be connected to a primary cable.
ii. Necessitates less wires compared to Mesh and Star topologies.
Drawbacks:
i. Complexity in identifying faults.
ii. The figure of nodes associated through main cable is fixed making no scalability.
Benefits:
i. Easy installation.
ii. Management is streamlined and easy to add or take out an unit.
Drawbacks:
i. The whole network fails when a link falls as the data cannot transmit ahead .
ii. All data transfers in a ring making high data traffic.
5.5 Hybrid Topology
Hybrid topology is the synthesis of two or more topologies, for instance, it is a blend of star and
mesh topology.
Benefits:
i. We can pick the topology based on our needs. For instance, if scalability is a issue, we
can apply star topology than bus technology.
ii. Scalable because we can associate more computer networks with prevailing networks
with varied topologies.
Drawbacks:
i. It is tough to spot flaws.
ii. Installation is complex.
iii. As the architecture is complex, maintenance is expensive.
6 Network Programming Libraries
The creation of programs that run on several devices (computers) that are all linked together via
a network is referred as network programming.
The J2SE APIs' java.net package includes assembly of classesaand interfaces that offer low-level
communication points, permitting to design applications that are focused on deciphering the
problem.
● The server calls the ServerSocket class's accept() function. This procedure pauses for a
● The Socket class's constructor tries to associate the clientlto the supplied server andlport
number. If link is recognized, the client is now in possession of a Socket object that may
communicate with the server.
● The accept() function on the server provides a referencelto alnew socketlon thelserver
After the associates have been created, communication can take place via I/O streams.lEach
socket has anlOutputStream as well as an InputStream. The client'slOutputStream is linked to the
server'slInputStream, and the server's OutputStream is linked to the client's InputStream.
The URL class in JAVA is defined in the java.net package. We may make our own URL objects
by doing the following:
Another method for creating a URL is to separate it into its constituent components:
The URL class also has methods for extracting the various components of a URL object
(protocol, host, file, port, and reference). Here's an example of what you can get access to. It is
important to note thatlthis example merely manipulates alURL object and does not attempt to get
any web pages:
One of the most difficult issues in the creation of this software project was implementing a read
and update function in the system. Because all of the data is contained in the database, changing
the specific data proved extremely difficult.
All of the requirements for the system have been satisfied. The validations and notifications
make the system more efficient for all users to utilize. The system's straightforward design and
forms make it more user-friendly.
8 References
AfterAcademy. (2020, January 19). AfterAcademy. Retrieved from AfterAcademy:
https://afteracademy.com/blog/what-is-network-topology-and-types-of-network-topology
Chaitanya Singh. (2021, June). BeginnersBook. Retrieved from BeginnersBook:
https://beginnersbook.com/2019/03/computer-network-topology-mesh-star-bus-ring-and-
hybrid/#:~:text=There%20are%20five%20types%20of,%2C%20Bus%2C%20Ring
%20and%20Hybrid.
Junaid Rehman. (2019, June). ITRelease: Learn about IT beyond the distance. Retrieved from
ITRelease: Learn about IT beyond the distance: https://www.itrelease.com/2019/06/what-
is-bus-topology-with-example/
Lanthier, M. (2017). Chapter 12 - Network Programming. Canada: Carleton University.
SmartDraw. (2022). Entity Relationship Diagram (ERD). Retrieved from SmartDraw, LLC:
https://www.smartdraw.com/entity-relationship-diagram/
TutorialsPoint. (2022). TutorialsPoint: Java - Networking. Retrieved from TutorialsPoint:
https://www.tutorialspoint.com/java/java_networking.htm
Walker, A. (2022, June 25). Guru99. Retrieved from UML Use Case Diagram: Tutorial with
EXAMPLE: https://www.guru99.com/use-case-diagrams-example.html#:~:text=An
%20example%20of%20a%20use%2Dcase%20diagram,-Following%20use
%20case&text=Each%20actor%20interacts%20with%20a,are%20remaining%20in
%20the%20system.