Project Report - Online Classifieds
Project Report - Online Classifieds
Project Report - Online Classifieds
com
INTRODUCTION
Page
1
ClassifiedsOnline.com
INTRODUCTION
ClassifiedsOnline is being launched because a need for a destination where
the local community could come together and help each other is seen.
Community members within a city can come here to find an apartment to live
in, sell their old car, or music system, promote their small business, find a
life partner, join a salsa class, find people who share their interests, get an
audience for a local event, trade any item that they might want or have to
offer and make new friends while doing all of the above.
PURPOSE
Page
2
ClassifiedsOnline.com
Page
3
ClassifiedsOnline.com
OBJECTIVE
• Provide a user friendly environment so that the ad posters can post their
ads easily and free of cost.
• Banner Advertising
• Button Advertising
Page
4
ClassifiedsOnline.com
Page
5
ClassifiedsOnline.com
PHASES:
The concept is further developed to describe how the business will operate
once the approved system is implemented, and to assess how the system will
impact the administrator and user privacy. To ensure the products and /or
services provide the required capability on-time and within budget, project
resources, activities, schedules, tools, and reviews are defined. Additionally,
security certification and accreditation activities begin with the identification
of system security requirements and the completion of a high level
vulnerability assessment.
Page
6
ClassifiedsOnline.com
The physical characteristics of the system are designed during this phase.
The operating environment is established, major subsystems and their inputs
and outputs are defined, and processes are allocated to resources.
Everything requiring user input or approval must be documented and
reviewed by the user. The physical characteristics of the system are specified
and a detailed design is prepared. Subsystems identified during design are
used to create a detailed structure of the system. Each subsystem is
partitioned into one or more design units or modules. Detailed logic
specifications are prepared for each software module.
The detailed specifications produced during the design phase are translated
into hardware, communications, and executable software. Software shall be
unit tested, integrated, and retested in a systematic manner. Hardware is
assembled and tested.
The disposition activities ensure the orderly termination of the system and
preserve the vital information about the system so that some or all of the
information may be reactivated in the future if necessary. Particular
emphasis is given to proper preservation of the data processed by the
system, so that the data is effectively migrated to another system or
archived in accordance with applicable records management regulations and
policies, for potential future access.
Page
8
ClassifiedsOnline.com
SDLC Objectives
Key Principles
Page
9
ClassifiedsOnline.com
Page
10
ClassifiedsOnline.com
The Project Manager has responsibility for the success of the project
and works through a project team and other supporting organization
structures, such as working groups or user groups, to accomplish the
objectives of the project. Regardless of organizational affiliation, the Project
Manager is accountable and responsible for ensuring that project activities
and decisions consider the needs of all organizations that will be affected by
the system. The Project Manager develops a project charter to define and
clearly identify the lines of authority between and within the agency’s
executive management, program sponsor, (user/customer), and developer
for purposes of management and oversight.
Page
11
ClassifiedsOnline.com
REQUIREMENTS ANALYSYS
Page
13
ClassifiedsOnline.com
1) Administrator
Poster ( post AD’s )
2) General User
Viewer ( view AD’s )
The user gets into the system using user name and a unique
password. Each user has his own accessibility permission to accomplish his
task flawlessly. The administrator also has a ID and password to get access
to the system so that no unauthorized person is able to keep an eye on the
working of the complete system.
Page
14
ClassifiedsOnline.com
Requirement Analysis
At the heart of system analysis is a detailed understanding of all
important facets of business area under investigation. (For this reason, the
process of acquiring this is often termed the detailed investigation) Analyst,
working closely with the employees and managers, must study the business
process to answer these key questions:
Interview
Questionnaires
Record inspection
On-site observation
Page
15
ClassifiedsOnline.com
IDENTIFICATION OF NEED
In the world we are growing for globalization day by day with the
development in IT resources and advancement, by using latest technologies
it is possible to access any information of any type while sitting at home.
Survival on manual system is difficult that is why computerized systems are
more in demand. The modules should be complete database driven and
interactive that should provide the proper information regarding the online
classifieds and yellow pages system.
Page
16
ClassifiedsOnline.com
In order to reduce the time, there is a need for computerized system that
can retrieve data, insert data, update existing data or delete existing data.
These modules are developed wit the aim of reducing time, reducing
manpower, reducing cost so that the records can be easily maintained.
The volume of work and complexity are increasing year by year. This
system reduces complexity and workload.
PRELIMINARY INVESTIGATION
Request clarification
Feasible Study
Request approval
Many requests from employees and users in the organization are not
clearly defined. Therefore, it becomes necessary that project request must
be examined and clarified properly before considering systems
investigation.
The feasibility study is carried out by a small group of people who are
familiar with information system techniques, understand the parts of the
business or organization that will be involved or affected by the project, and
are skilled in the system analysis and design process.
• Request Approval:
It is not necessary that all request projects are desirable or feasible. Some
organizations receive so many projects request from employees that only a
Page
17
ClassifiedsOnline.com
few of them can be purchased. However, those projects that are feasible and
desirable should be put into a schedule.
In some cases, development can start immediately, although usually
system staff members are busy on other ongoing projects. When such
situation arises, management decides which projects are more urgent and
schedule them accordingly. After a project request is approved, its cost,
priority, completion time and personal requirements are estimated and used
to determine whether to add it to any existing project list. Later on, when the
other projects have been completed, the proposed application development
can be initiated.
Analysis is a process of studying a problem and to find the best
solution to that problem. System analysis gives us the target for the design
and the implementation. Analysis is one phase, which is important phase for
system development life cycle. System development is a problem solving
techniques. Analysis involves interviewing the client and the user. Three
people and the existing documents about the current mode of operation are
the basic source of information for the analyst.
Analysis is the process of studying a problem to find the best solution to that
problem. System analysis gives us the target for the design and the
implementation. Analysis is one phase of the very important phase of the
system development life cycle. System development is a problem solving
techniques. Analyses involve interviewing the client and the user. These
people and the existing document about the current mode of operation are
the basic source of information for the analyst.
Page
18
ClassifiedsOnline.com
In fact some CASE tools remain “point solution:” That is, a tool is used to
assist in a particular software engineering activity (e.g. analysis modeling)
Page
19
ClassifiedsOnline.com
but does not directly communicate with other tools, is not tied into a project
database, is not part of an integrated CASE environment (l-CASE). Although
this situation is not ideal, a CASE tool can be used quite effectively, even if it
is a point solution.
At the low end of the integration spectrum is the individual (point solution)
tool. When individual tools can provide tools provide facilities for data
exchange, the integration level is improved slightly. Such tools produce
output in a standard format that should be compatible with other tools that
can read the format. In some cases, the builder of complementary CASE
tools work together to form a bridge between the tools (e.g. an analysis and
design tool that is coupled with a code generator). Using this approach, the
team develops, synergy between the tools separately. Single source
integration occurs when a single CASE tools vendor integrates a number of
different tools and sells them as a package.
Feasibility Study
Page
20
ClassifiedsOnline.com
1. Economic Feasibility :
2. Technical Feasibility :
3. Operational Feasibility:
Economical feasibility
Page
21
ClassifiedsOnline.com
sophisticated and don’t needs extra components to load the software. Hence
the organization can implement the new system without any additional
expenditure. Hence, it is economically feasible.
• Software Cost :
Oracle : 15000/-
• Manpower Cost :
Team cost :
25000/-
System Cost :
40,000/-
Total Cost :
100000/-
Technical Feasibility
Page
22
ClassifiedsOnline.com
Tools Used :
1) J2EE Library
2) J2SDK 2.0
3) JDK 1.2
4) WebLogic 8.1
5) Oracle 8i.
Duration of Project:-
Page
23
ClassifiedsOnline.com
Time Duration
Operational Feasibility
• User support.
Page
24
ClassifiedsOnline.com
Page
25
ClassifiedsOnline.com
Page
26
ClassifiedsOnline.com
• Distributed Projects.
Local Area Network projects are those projects where application has
to be incorporated in the Local area network of the client i.e within its
premises only. In case of LAN, server is not remotely located and client
accesses the application through the network. Here the question of platform
independence does not arise and we can use the technologies like: Visual
Basic, Fox pro, D2k or C, C++, etc.
Page
27
ClassifiedsOnline.com
PLATFORM
(Technologies/Tools)
Page
28
ClassifiedsOnline.com
Introduction to Java
History of Java
Java development began at Sun Microsystems in 1991, the same year
the World Wide Web was conceived. Java’s creator, James Gosling did not
design java for the Internet. His Objective was to create a common
development environment for consumer electronic devices which was easily
portable from one device to another. This effort evolved into a language,
code named Oak and later renamed Java that retains much of the syntax and
power of c++, but is simpler and more platform-independent.
Java Features
Some of the important features of Java are as follows:
• Simplicity
• Orientation
• Platform Independence
• Security
• High Performance
• Multi Threading
• Dynamic linking.
• Garbage Collection.
Page
29
ClassifiedsOnline.com
When a browser invokes the JVM to run a Java program, the JVM does
a number of things:
Page
30
ClassifiedsOnline.com
Jdbc-Odbc Driver:
This provides a bridge between the Jdbc APIs and the Odbc APIs. The
bridge translates the standard JDBC calls to corresponding ODBC calls, and
sends them to the ODBC data source via ODBC libraries. This configuration
requires every client that will run the application to have the JDBC-ODBC
bridge API, the ODBC driver and the native language-level APIs. As a result
this kind of driver is most appropriate on a corporate network where client
installations are not a major problem.
Jdbc database calls are translated into vendor-specific API calls. The
database will process the request & send the result back through the API,
which in turn forwards them back to the Jdbc drivers. The Jdbc driver
translates the result to the Jdbc standard & returns them to the Java
Page
31
ClassifiedsOnline.com
application, hence this kind of driver has same problem that was with Jdbc-
Odbc driver and is mostly used in Intranet.
These are true 100% pure java real JDBC drivers. All the mechanism
of the client access is coded completely in java. There are no calls out off or
into the virtual machine and native code and there is no need for some costly
server in the middle. Type 4 drivers are different for different RDBMS and are
available for almost all major RDBMS vendors.
Native Driver:
This kind of driver converts JDBC calls into the network protocol used by
Database directly. This allows a direct call from client machine to the
Database server.
These are true 100% pure java real JDBC drivers. All the
mechanism of the client access is coded completely in java. There are no
Page
32
ClassifiedsOnline.com
calls out off or into the virtual machine and native code and there is no need
for some costly server in the middle. Type 4 drivers are different for different
RDBMS and are available for almost all major RDBMS vendors.
Servlet / JSP are middle-ware technologies which are used in web based
projects because they use:-
ABOUT J2EE
Introduction to J2EE:
Page
33
ClassifiedsOnline.com
messages the server object. It returns results to the clients. The presence of
a middleware layer allows programmers to concentrate on business logic of
application. The middleware handles low-lever services, such as thread
handling, security, and transactions management.
Sun Microsystems introduced the J2EE
application server and the enterprise Java Bean (EJB) specifications as a
venture into the multi-tier component architecture. J2EE functions as a
middle tier server in three tier architectures.
• J2EE Architecture:
Page
34
ClassifiedsOnline.com
The J2EE server provides the EJB and web containers. The J2EE
server enforces authenticating users. The either service provided by the
J2EE server are listed here below.
The EJB container manages the execution of Enterprise Bean for J2EE
server. EJB is a specification for making server side component that enable
and simplifies the task of creating distributed objects. EJB component provide
services such as transaction and security management and can be
customized during deployment.
The web container manages the executing of JSP and servlets for J2EE
applications web components and their container run on the J2EE server.
Servlets of the java program that can be deployed on a java enable web
server to enhances and extend the functionality of the web server for
example you can write a servlets to add a manager service to a website.
Servlet can also be used to add dynamic content to web pages. Java
Server Page (JSP) adds server side programming functionality to java. JSP
consists of regular Html tags representing the static content and code
enclosed within special tags representing the dynamic content. After
compilation, a JSP generates a servlets and therefore incorporates all the
servlets functionalities.
Page
35
ClassifiedsOnline.com
• J2EE Application:
J2EE applications are complex access data from a variety of source and cater
to a variety of client. To manage these applications the business function
conducted in the middle tier. The J2EE platform acts as a middle tier and
provides the necessary environment needed by the application. The J2EE
platform provides” write once, run anywhere”, portability and scalability for
multi-tier application. It also minimizes complexity for building multi-tier
application.
Each of these components is packaged into a file with a specified file format.
A J2EE application client is a Java application that run in a environment that
enable it to access to the J2EE services. A J2EE application client is packaged
into a .jar (Java archive) file. The web components are packaged into a .war
(Web archive) file.
An Enterprise Bean consists of three files: the EJB class, Home and Remote
Interfaces. The Enterprise Beans are bundled into an EJB.jar file. The .jar,
.war and EJB.jar are assembled into a J2EE application, which is an .ear file.
The .ear file is then deployed to the J2EE server.
Page
36
ClassifiedsOnline.com
The race for market share in the database industry has increased with the
advent of client-server platforms. Oracle is one of the most successful
companies that has released a number of development tools including SQL
*PLUS, PL/SQL that enables faster and easier application development and
its management.
Assembled
J2EE
Server
Page
37
ClassifiedsOnline.com
• J2EE Technologies:
EJB:
Enterprise Java Beans (EJB) is “write once, run anywhere” middle tier
component consisting of method that implements the business rule.
Enterprise Bean encapsulates the business logic. There are two types of
Enterprise Bean: Entity Bean and Session Bean.
RMI:
Page
38
ClassifiedsOnline.com
JNDI:
JDBC:
Java Transaction API (JTA) and Java Transaction Service (JTS) are
transaction API. One can use these API to democrat whether the transaction
starts or ends.
JMS:
Java Messaging Service is an API that J2EE platform include to send mail via
Internet.
Page
39
ClassifiedsOnline.com
Servlet:
XML:
Page
40
ClassifiedsOnline.com
When J2EE application client execute its request that you enter
login id and password. If the combination of both username and password
correct the J2EE allow you to access the services.The J2EE server also
enforces security by process known as authentication. Authorization is a
process by which the permissions are assigned by server to invoke the
method of Enterprise Bean.
JAVA BEANS
Page
41
ClassifiedsOnline.com
BOUND PROPERTIES:
BEAN EVENTS:
The property change support class should cater for most of the
needs. However on many occasions beans will still need to communicate
even though no property change activity has occurred.
Page
42
ClassifiedsOnline.com
much if it has to reset every time it is retrieved. Java beans use the
serializable interface to address these issues.
JDBC
Page
43
ClassifiedsOnline.com
Web
Client Machine
server
Browser
with
JSP JDBC
HTML
Engine Driver
DB Server Machine
RDBMS
Server
Here the browser using the web application is not required to support
java at all. The JSP has full control over how many JDBC connections are
made to the server. The client never makes direct JDBC connection to the
server. This solution can work readily through a firewall, only standard HTTP
is used between the web server and the client.
Page
44
ClassifiedsOnline.com
There is still one minor problem with this scenario. Project personal
accessing the JSP page containing the embedded JDBC code can easily and
inadvertently modify the database access code and this may result in an
erroneous application or even corrupted database. There are 2 solutions for
this:
1. Create java beans or java classes that encapsulate all the JDBC
operations. This is significantly better solution. But instantiation,
initialization and parameterization of the java class or the beans can
still represent a significant amount of embedded java code with in the
JSP.
2. Create a tag extension set to ‘pushdown’ all the database access logic.
The data access logic programmers write the set of custom tags. The
JSP application logic designers will then use the set of custom tag to
create their application.
Page
45
ClassifiedsOnline.com
JSP Engine
JSP’s
Custom tag
Custom Java
extension
beans/classes
Page
46
ClassifiedsOnline.com
BACK-END
ORACLE 8i
• Centralization of database.
• Client Server Technology.
• Security.
• Normalization of Data Base.
• Relationship.
• Transaction Processor.
• It gives some internet related features.
Wether you are working on LAN projects or Distributed projects, there are
two sides of it:-
• Front End
• Back End
Front End remains on client side. Front end is made for end user who uses
our application. Basically in front end, our input-output forms reside which
takes the input from the client and gives output back to client.
Page
47
ClassifiedsOnline.com
What is a database?
• RDBMS
• DBMS
Page
48
ClassifiedsOnline.com
• High Availability
• Controlled Availbility
Page
49
ClassifiedsOnline.com
• Manageable Security
• Portability
Page
50
ClassifiedsOnline.com
• Compatibility
• Connectivity
• Improved Scalability
• Improved Security
In other words, the Oracle 8 server can assign a portion of the work to
execute a single DML statement to multiple processes, which may then be
allocated to multiple processes by the server operating system. As a result,
the parallel DML operations are completed more quickly.
Some existing data types have been enhanced & new data types have
been introduced.
Page
52
ClassifiedsOnline.com
Database Models
There are three kinds of database models:-
Page
53
ClassifiedsOnline.com
client i.e. weather the client can access the database or not. Hence there is
security in it as well as middle-ware allows multiple clients access.
What is Middle-Ware?
Page
54
ClassifiedsOnline.com
SOFTWARE
REQUIREMENT
SPECIFICATION
Page
55
ClassifiedsOnline.com
Some of the difficulty is due to the scope of this phase. The software
project is initiated by the client’s needs. In the beginning these needs are in
the minds of various people in the client organization. The requirement
analyst has to identify the requirements by talking to these people and
understanding their needs. In situations where the software is to automate a
currently manual process, most of the needs can be understood by observing
the current practice.
The SRS is a means of translating the ideas in the minds of the clients
(the input), into formal document (the output of the requirements phase).
Thus, the output of the phase is a set of formally specified requirements,
which hopefully are complete and consistent, while the input has none of
these properties.
Page
56
ClassifiedsOnline.com
Page
57
ClassifiedsOnline.com
Details that is not shown on the different levels of the data flow
diagram such as volumes, timing, frequency, etc. is shown on supplementary
diagrams or in the data dictionary. For example, data store contents may be
shown in the data dictionary.
Page
58
ClassifiedsOnline.com
• Process
A process transforms data values. The lowest level processes are pure
functions without side effects. An entire data flow graphics high level
process.
Graphical representation:
Graphical Representation:
• Data flows
Graphical Representation:
• Actors
An actor is active object that drives the data flow graph by producing
or consuming values.
Page
59
ClassifiedsOnline.com
• Data store
A data store is a passive object with in a data flow diagram that stores
data for later access.
Graphical Representation:
• External Entity
Graphical Representation:
• OutPut Symbol
Graphical Representation:
Page
60
ClassifiedsOnline.com
ADMINISTRATOR
Search View
Contact Contacts
s
Viewer
Contacts
View Send
Search Responses
Ads Response
Ads
View
Respons
Ads Post
es
Ads
Category
Edit Login Poster
Ads Process
New Poster
Maintain
Category View Registered Users
Registere
d Users
Send
Administrator Notificatio
n
Show
Banner
Ads
Maintain
Advertisers’
Details
Advertiser’s
Details
Page
62
ClassifiedsOnline.com
Entity Relationship
diagrams
Page
63
ClassifiedsOnline.com
E - R DIAGRAM
Data Flow Diagramming is a means of representing a system at any
level of detail with a graphic network of symbols showing data flows, data
stores, data processes, and data sources/destination.
Details that is not shown on the different levels of the data flow
diagram such as volumes, timing, frequency, etc. is shown on supplementary
diagrams or in the data dictionary. For example, data store contents may be
shown in the data dictionary.
Page
64
ClassifiedsOnline.com
Title
Category
id
Category
description
Page
65
ClassifiedsOnline.com
Data Dictionary
Page
66
ClassifiedsOnline.com
Page
68
ClassifiedsOnline.com
Page
69
ClassifiedsOnline.com
1. Search Ads:
Through this module Viewer can view ads, can also
send response to particular poster.
2. Yellow Pages:
Through this module works as yellow pages.
Provide contact details about various companies,
institutes, banks etc.
3. Login :
In this module Poster enter the User id and
password is checked and only valid user id and
password will get entry into member’s zone. This
Page
70
ClassifiedsOnline.com
4. Registration Process:
5. Poster :
Through this module a poster can post a new ad,
update ad details. He can update including user
name and password and search and shortlist the
Viewers, check the status of advertisement’s
response. He can reply to the viewers In short this
module deals with the whole advertisement
process.
6. Administrator:
7. Log Out:
To provide functionality to logout your id and
return to home page.
8. Write Mail:
You can write any mail and also attach any
document or image and send to your destinations.
9. Mail Inbox:
You can check your mail also and attach the
important files with your mail box.
Page
71
ClassifiedsOnline.com
10. Help:
Provide the functionality to get help about the
online reminder.
Process Logic
Page
72
ClassifiedsOnline.com
Layered Architecture
Page
73
ClassifiedsOnline.com
Page
74
ClassifiedsOnline.com
• Login Process:
• Post AD Process:
Page
75
ClassifiedsOnline.com
Page
76
ClassifiedsOnline.com
Page
77
ClassifiedsOnline.com
DATABASE DESIGN
DATABASE DESIGN
Page
78
ClassifiedsOnline.com
DATA STRUCTURES:
This part of the Design consists the overall database schema or we
can say that tables which consists various types of records. Table of aa
database consists attributes, entities, tuples for storing and manipulating
records
Some of the tables are as follows:
Page
79
ClassifiedsOnline.com
Page
81
ClassifiedsOnline.com
Coding
Page
82
ClassifiedsOnline.com
Page
83
ClassifiedsOnline.com
SYSTEM TESTING
Here the System testing involved is the most widely used testing
process consisting of five stages as shown in the figure. In general, the
sequence of testing activities is component testing, integration testing, and
then user testing. However, as defects are discovered at any one stage, they
require program modifications to correct them and this may require other
stages in the testing process to be repeated.
Unit testing
Module
testing
Sub-system
testing
System
testing
Acceptance
testing
Page
84
ClassifiedsOnline.com
Testing is vital to the success of the system. System testing makes a logical
assumption that if the parts of the system are correct, the goal will be
successfully achieved. In adequate testing or non-testing leads to errors that
may not appear until months or even years later (Remember the New York
three day power failure due to a misplaced ‘Break’ statement).
A small error can conceivably explode into a much larger problem. Effective
testing early in the process translates directly into long term cost savings
from a reduced number of errors.
Another reason for system testing is it’s utility as a user oriented vehicle
before implementation. The best program is worthless if it does not meet the
user requirements. Unfortunately, the user’s demands are often
compromised by efforts to facilitate program or design efficiency in terms of
processing time or design efficiency.
Thus in this phase we went to test the code we wrote. We needed to know if
the code compiled with the design or not? Whether the code gave the desired
outputs on given inputs? Whether it was ready to be installed on the user’s
computer or some more modifications were needed?
Page
85
ClassifiedsOnline.com
application.
PSYCHOLOGY OF TESTING
TESTING OBJECTIVES:
Page
87
ClassifiedsOnline.com
LEVELS OF TESTING
Client Needs
Acceptance Testing
Requirements
System Testing
Design
Integration Testing
Code
Unit Testing
Page
88
ClassifiedsOnline.com
Unit testing
Integration Testing
SYSTEM TESTING
Page
89
ClassifiedsOnline.com
Here the entire software system is tested. The reference document for
this process is the requirements document, and the goal is to see if software
meets its requirements.
Here entire ‘HRRP’ has been tested against requirements of project
and it is checked whether all requirements of project have been satisfied or
not.
ACCEPTANCE TESTING
This is a unit testing method, where a unit will be taken at a time and
tested thoroughly at a statement level to find the maximum possible errors.
I tested step wise every piece of code, taking care that every
statement in the code is executed at least once. The white box testing is also
called Glass Box Testing.
Page
90
ClassifiedsOnline.com
White-box test focuses on the program control structure. Test cases are
derived to ensure that all statement in the program control structure. Test cases
are derived to ensure that all statement in the program control structure. Test
cases are derived to ensure that all statement in the program has been executed
at least once during testing and that all logical conditions have been exercised.
Basis path testing, a white box technique, makes use of program graphs (or
graph matrices) to derive the set of linearly independent test that will ensure
coverage. Condition and data flow testing further exercising degrees of
complexity.
Page
91
ClassifiedsOnline.com
A strategy for software testing may also be viewed in the context of the
spiral. Unit testing begins at the vortex of the spiral and, concentrates on
each unit, component of the software as implemented in source code. Testing
progresses moving outward along the spiral to integration testing, where the
focus is on designed the construction of the software architecture. Taking
another turn outward on spiral, we encounter validation testing, where
requirements established as part of software requirements analysis are
validated against the software that has been constructed. Finally, we arrive
at system testing, where the software and other system elements are tested
as a whole. To test computer software, we spiral out along stream lines that
broaden the scope of testing with each turn.
Page
92
ClassifiedsOnline.com
System Testing
Validation Testing
Integration Testing
Validation testing
Code
Design
System Engineering
System Security
Page
93
ClassifiedsOnline.com
Evaluatio
Software n
Configuration
Test Results
Error
Error
Rate Data
Expected Results
Testing
Debug
Reliability
Model
Test Configuration
Predicated Reliability
Correction
Page
94
ClassifiedsOnline.com
Screen shots
Page
95
ClassifiedsOnline.com
MAIN PAGE
Page
96
ClassifiedsOnline.com
Page
97
ClassifiedsOnline.com
Page
98
ClassifiedsOnline.com
Page
99
ClassifiedsOnline.com
Project Scheduling
Page
100
ClassifiedsOnline.com
PROJECT SCHEDULING
Once we have the estimates of the effort and time requirement for the
different phases, a schedule for the project can be prepared. This
schedule will be used later to monitor the progress of the project.
Page
101
ClassifiedsOnline.com
GANTT CHART
SRS Completion
Requirements
Finalization
System Design
Detail Design
Coding
Unit Testing
Test Plan
Testing
Time Duration of
the Activity
Page
102
ClassifiedsOnline.com
Milestones
SYSTEM SECURITY
Page
103
ClassifiedsOnline.com
SYSTEM SECURITY
Introduction
One might think that there is a little reason to be concerned about security in
an intranet. After all, by definition an intranet is internal to ones’
organization; outsider can not access it. There are strong arguments for the
position that an intranet should be completely open to its users, with little or
no security. One might not have considered ones’ intranet on any other light.
On the other hand, implementing some simple, built-in security measures in
ones’ intranet can allow one to provide resources one might not have
considered possible in such context. For example, one can give access to
some Web Pages to some people without them available to oner entire
customer base, with several kinds of authentication.
There are basically two types of security associated with this system:
1. Physical security:-
Damage due to natural causes like earth tremor, flooding, water logging,
fire hazards, atmospheric or environmental conditions etc..For
overcoming these difficulties the replica of the data are automatically
stored at various networks and for environmental conditions Air
conditioning environment is created.
Page
104
ClassifiedsOnline.com
2. Data security:-
i) Identification:-
Unique Ids for the different users have been provided.
ii) Authentication:-
System checks the password under the particular user identification.
The computer permits the various resource to the authorized person.
iii) Authorisation:-
The access control mechanism to prevent unauthorized logging to the
system.
Many people view computer and network security in a negative light, thinking
of it only in terms of restricting access to services. One major view of
network security is “that which is not expressly permitted is denied.”
Although this is a good way of thinking about how to connect other
organization to the internet, one can, and possibly should, view intranet
security from a more positive angle. Property set up, intranet security can be
an enabler, enriching ones’ intranet with services and resources one would
Page
105
ClassifiedsOnline.com
This does not mean that one should throw caution to the wind and
make everything available to ones’ users on ones’ intranet. There are many
things to consider when placing sensitive business data out on ones’ intranet.
It may fall into the wrong hands, or worse, be used against ones’ business.
For example, some of ones’ users might have information they would li9ke to
make available, provided access to it can be limited to a specified group-for
example, confidential management or financial information. Without the
ability to ensure that only those who have the right to see such information
will have access, the custodians of data will not be willing to put it on ones’
intranet. Providing security increases ones’ organization’s ability to use the
important collaborative aspects of an intranet.
Before going into a great deal of detail about how one can use security to
enhance ones’ intranet, take a high- level look at what security features are
available to ones. These break down into three main categories.
Page
106
ClassifiedsOnline.com
There is a wide range of very flexible security features one can implement on
ones’ Web server. Here’s a summary:
It’s ones’ responsibility to determine the level of security one need on ones’
intranet, and, of course, to implement it. Putting most of the security
measures mentioned into place is not difficult. Ones’ primary concern will be
explaining to customers how intranet security works, not so much as a
limiting factor but as an opportunity for increased use and collaboration using
Page
107
ClassifiedsOnline.com
Page
108
ClassifiedsOnline.com
Is ones’ intranet is accessible from the internet? If so, all of the security
problems of the Internet are now ones’ intranet’s problems, too. One can,
however, connect safely to the Internet and still protect ones’ intranet. One
can even use the Internet as a means of letting remotes sites in ones’
company access ones’ intranet.
e) Firewalls
It’s a fact of Internet life there are people out there who want to break into
other people’s networks via the Internet. Reasons vary from innocent
curiosity to malicious cracking to business and international espionage. At
the same time, the value of Internet to organizations and businesses is as
great that vendors are rushing to fill the need for Internet security with
Internet firewalls. An Internet firewall is a device that sits between ones’
internal network and outside Internet. Its purpose is to limit access into and
out of ones’ network based on ones’ organization’s access policy.
Page
109
ClassifiedsOnline.com
Summary
Page
110
ClassifiedsOnline.com
QUALITY ASSURANCE
Page
111
ClassifiedsOnline.com
QUALITY ASSURANCE
INTRODUCTION
Page
112
ClassifiedsOnline.com
IMPLEMENTATION
Page
113
ClassifiedsOnline.com
IMPLEMENTATION
Introduction
Page
114
ClassifiedsOnline.com
For the project we need to install and configure Weblogic server 8.1 ,
database server, and the deployment directory for the project.
Aspects of Implementation
• Training Personnel
• Conversion Procedures
TRAINING
CONVERSION:
• Parallel Run
• Immediate cut-off
Page
115
ClassifiedsOnline.com
Parallel Run
In this approach, the old system and the new system are used
simultaneously for some period of time so that the performance of the new
system can be monitored and compared with that of the old system. Also
in case of failure of the new system, the user can fall back on the old
system. The risk of this approach is that the user may never want to shift
to new system.
Implementation Tools
The project was implemented using Java server pages,HTML,Java beans.The
implementation work was carried out in Windows XP/2000 server platform.
1) J2EE
2) Weblogic 8.1
Page
116
ClassifiedsOnline.com
3) Oracle 8i
Coding
• Main emphasis while coding was on style so that the end result was
an optimized code.
Coding Style
The structured programming method was used in all the modules the
project.It incorporated the following features
• The code has been written so that the definition and implementation
of each function is contained in one file.
Page
117
ClassifiedsOnline.com
Naming Convention:-
Indentation
Judicious use of indentation can make the task of reading and understanding
a program much simpler.Indentation is an essential part of a goog
program.If code id intended without thought itv will seriously affect the
readability of the program.
• Blank line is also left between each function definition to make the
code look neat.
Page
118
ClassifiedsOnline.com
• Indentation for each source file stating he purpose of the file is also
done.
MAINTENANCE
Page
119
ClassifiedsOnline.com
MAINTENANCE
• Corrective
• Adaptive
• Perfective.
Page
120
ClassifiedsOnline.com
Page
121
ClassifiedsOnline.com
EVALUATION
Page
122
ClassifiedsOnline.com
EVALUATION
The evaluation phase ranks vendor proposals and determines the one best
suited, Evaluation of the system is performed to identify its strengths and
weaknesses. The actual evaluation can occur along any of the following
dimensions:
Page
123
ClassifiedsOnline.com
Page
124
ClassifiedsOnline.com
CONCLUSIONS
In this instance it may be true that on eBay, they have something for
everybody, whatever their tastes may be.
The site is made in all possible way to meet the user requirements
using latest version of available software and hardware.But as user
requirements and operating environment keep changing further extensions
can be made on this.In future some more schemas can be added in the “HR
Recruitment Process” hence these schemas are to be included in the
software developed.
Page
125
ClassifiedsOnline.com
Limitations
• T
hough this system is developed as a multi user system
but it is not a real time system.
• T
he interaction with the database, every time they are
loaded thus the system tends to be a bit slow.
Page
126
ClassifiedsOnline.com
FUTURE SCOPE
DEPENDENCIES
Page
127
ClassifiedsOnline.com
LIMITATIONS
Page
128
ClassifiedsOnline.com
BIBILIOGRAPHY
BOOKS
REFERENCES
• http://www.sun.com
• http://www.coreservlets.com
• http://www.serverside.com
• http://www.w3schools.com
• http://www.google.com
• http://www.webopedia.com
• http://www.ddj.com
Page
129
ClassifiedsOnline.com
APPENDIX-A
D((
[ database ]
Page
130
ClassifiedsOnline.com
APPENDIX-A
Data base is the most important thing in this universe as data base gives
identity to a thing without data base existence of a thing is impossible while
working on a project first step is to design a database.
1. RDBMS.
2. DBMS.
Page
131
ClassifiedsOnline.com
• Centralization of database.
• Client Server Technology.
• Security.
• Normalization of Data Base.
• Relationship.
• Transaction Processor.
• It gives some internet related features.
ABOUT ORACLE 8i
Page
132
ClassifiedsOnline.com
Improved Scalability
Improved Security
Improved Performance Via Partition
Enhanced Support for Database Replication
Capability To Handle a Much Larger Number Of
Concurrent Users
New & Improved Data Types
Page
133
ClassifiedsOnline.com
APPENDIX-B
[ java / j2ee ]
APPENDIX-B
Page
134
ClassifiedsOnline.com
Technology Used
Introduction to Java
History of Java
Java development began at Sun Microsystems in 1991, the same year the
World Wide Web was conceived. Java’s creator, James Gosling did not design
java for the Internet. His Objective was to create a common development
environment for consumer electronic devices which was easily portable from
one device to another.
This effort evolved into a language , code named Oak and later
renamed Java that retains much of the syntax and power of c++ , but is
simpler and more platform independent.
Java Features
• Simplicity
• Orientation
• Platform Independence
Page
135
ClassifiedsOnline.com
• Security
• High Performance
• Multi Threading
• Dynamic linking.
• Garbage Collection.
Page
136
ClassifiedsOnline.com
J2EE is one of the best solutions that we have had so far for meeting the
demand of today’s enterprise. J2EE specifies both the infrastructure for
managing our applications, and the service APIs for building our applications.
The applications that we could develop with the above may be programs to
drive web pages, or components to implement complex database
transactions, or even java applets, all distributed across the network.
While J2EE bundles together APIs that have been in existence in one form or
another for quite sometime, perhaps its most significant aspect is the
abstraction of the runtime infrastructure. The J2EE specification doesn’t
specify how a J2EE runtime should or could be built. Instead, J2EE specify
roles and interfaces for applications, and the runtime onto which applications
could be deployed. This results in a clear demarcation between applications
and the runtime infrastructure. This demarcation allow the runtime to
abstract most of the infrastructure services that enterprise developers have
traditionally attempt to build on their own. As a result, J2EE application
Page
137
ClassifiedsOnline.com
developers could just focus on the application logic and related service, while
leveraging the runtime for all infrastructure-related services.
Apart from specifying a set of standard APIs, the J2EE architecture also
provides a uniform means of accessing platform-level services via its runtime
environment. Such service includes distributed transactions, security,
messaging etc.
1. JDBC API
The JDBC API provides developers with a way to connect to relational data
from within java code. Using the JDBC API, developers can create a client
(which can be anything from an applet to an EJB) that can connect to a
database, execute structured query language statements, and processes the
result of those statements. The API provides connectivity and data access
across the range of relational databases. It can do this because it provides a
set of generic database access methods for sql compliant relational
Page
138
ClassifiedsOnline.com
java.sql Package: -
javax.sql Package: -
2. Java Servlets: -
Page
139
ClassifiedsOnline.com
programming. They are programs that run on a Web server, acting as middle
layer between a request coming from a Web browser or other HTTP client
and databases or applications on the HTTP server. Their job is to:
This data is usually entered in a form on a Web page, but could also come
from a Java applet or a custom HTTP client program.
This information includes details about browser capabilities, cookies, the host
name of the requesting client, and so forth.
Page
140
ClassifiedsOnline.com
Java Server Pages (JSP) technology enables you to mix regular, static HTML
with dynamically generated content from servlets. Many Web pages that are
built by CGI programs are primarily static, with the parts that change limited
to a few small locations. For example, the initial page at most on-line stores
is the same for all visitors, except for a small welcome message giving the
visitor’s name if it is known. But most CGI variations, including servlets,
make you generate the entire page via your program, even though most of it
is always the same. JSP lets you create the two parts separately. Listing 1.1
gives an example.
Most of the page consists of regular HTML, which is passed to the visitor
unchanged. Parts that are generated dynamically are marked with special
HTML-like tags and mixed right into the page.
Page
141
ClassifiedsOnline.com
Page
142
ClassifiedsOnline.com
Page
143
ClassifiedsOnline.com
APPENDIX-C
[ html ]
APPENDIX-C
Page
144
ClassifiedsOnline.com
What is HTML?
HTML itself is the set of custumizable “markup” tags that are inserted
into HTML document govern its format, multimedia content, and
hyperlinks. Any HTML viewer can display such documents but they are
normally viewed usinga Web browser.
III. Link into other locations, in the same document, in another web
page, or even on another computer(Server), or
Page
145
ClassifiedsOnline.com
Features of HTML:-
• The markup teg tell the Web browser how to display the page.
Page
146
ClassifiedsOnline.com
APPENDIX-D
[ java script ]
Page
147
ClassifiedsOnline.com
APPENDIX-D
What is JAVASCRIPT?
Features Of JavaScript:-
JavaScript.
Page
148
ClassifiedsOnline.com
Functions Of JavaScript:-
Limitations of JavaScript:-
Page
149