0% found this document useful (0 votes)
36 views5 pages

04 ch1

Download as pdf or txt
Download as pdf or txt
Download as pdf or txt
You are on page 1/ 5

CHAPTER 1: INTRODUCTION

1.1 Project Summary

The Online Shopping system is a web based application intended for online
retailers. The main objective of this application is to make it interactive and its
ease of use. It would make searching, viewing and selection of a product easier.
The user can then view the complete specification of each product. User can
also view the product reviews and also write their own reviews. The users get
the massage after buy the product and also get the discount massage if users
want to get. Online shopping system is a form of commerce used for business-
to-business (B2B) and business-to-consumer (B2C) transactions.

1.2 Purpose:

Goals:
• This website will be an online software system which uses to buy product
online to sit at home easily.
• This website replaces the old shopping methodology with the latest
technology.
• It designed to be easy to use, featuring a graphical user interface similar to
that found on most web application.
• I just have to establish an application which user friendly.

Objectives:

• It is very useful to customers because it saves their time and money


• This will enable easy management of all information and ensure data
integrity
• Across the entire breadth of the system.
1.3 Scope: (Scope - what it can do and can’t do)

• Due to Internet access and for shopping purpose, consumers uses Internet
more and more for their shopping needs, social activities, and for more of
their work related activity.
• User get the good discount when purchase product online.
• User can aware with latest technology & latest electronics item arrive in
market.
• Users can have multiple shipping and billing information saved.
• Internet connection is must necessary for shopping.
• Maximum product availability.
• User cannot buy product without registration on the website.
• Secure login with encrypted password protection
• Unlimited number of concurrent users.

Page 1 of 5
1.4 Technology and Literature Review

FRONT –END TOOLS: web as App with Asp.Net as Server.

BACK END TOOLS: My SQL,

1. ASP.NET

ASP.NET IS a widely used general-purpose server side scripting language that


is especially suited for Web development and can be embedded into HTML.

Why ASP.NET?

What distinguishes ASP.NET from something like client-side JavaScript is that


the code is executed on the server. If you were to have a script similar to the
above on your server, the

Client would receive the results of running that script, with no way determining
what the underlying code may be. You can even configure your webserver to
process all your HTML files with ASP.NET.

The best things in using ASP.NET are that it is extremely simple for a
newcomer, but offers many advanced features for a professional programmer.

ASP.NET is only focused on server-side scripting, so you can do anything any


other CGI program can do, such as collect form data, generate dynamic page
content, or send and receive cookies.

2. My-SQL-SERVER

• MySQL stands for "My Structured Query Language" and “My SQL-Server”
is one of the well known
• Database management systems in the world.
• The data in “My SQL-Server” is stored in database objects called “tables”.
• A table is a collection of related data entries and it consists of columns and
rows.
• Databases are useful when storing information categorically.
• My SQL-Server run on only Microsoft Platforms including Windows Vista,
Windows XP,
• Windows 7 and other OS which is supported .Net Framework.

3. My SQL-SERVER FEATURES:
Activity Monitor:

My SQL Server 2008 Activity Monitor consolidates this information by


detailing running and recently executed processes, graphically. The display
gives the DBA a high-level view and the ability to drill down on processes and
view wait statistics to help understand and resolve problems.

Page 2 of 5
MySQL Server Audit:

Having the ability to monitor logs, events such as who is accessing objects,
what changes occurred, and what time changes occurred. MySQL Server Audit
provides automation that allows the DBA and others to enable, store, and view
audits on various server and database components.

There are server-level audit action groups, such as:


• FAILED_LOGIN_GROUP which tracks failed logins.
• BACKUP_RESTORE_GROUP which shows when a database was backed
up or restored.
• DATABASE_CHANGE_GROUP which audits when a database is created,
altered, or dropped.

4. Backup Compression:

With MySQL Server 2008 backup compression, the backup file is compressed
as it is written out, thereby requiring less storage, less disk I/O, and less time.
The compression is a achieved by specifying the WITH COMPRESSION
clause in the BACKUP command. Backup compression is a very useful feature
that can help the DBA save space and time.

5. Central Management Servers:

Db As are frequently responsible for managing not one but many MySQL
Server with in their environment. Having the ability to centralize the
management and administration of a number of MySQL Server instances from
a single source can allow the DBA to save significant time and effort.

Central Management Servers allow the DBA to register a group of servers and
apply functionality to the servers, as a group, such as:
Multi-Server query execution:
Import and evaluate policies across servers:
Import and export the registered servers:

6. Data Collector and Management Data Warehouse:

MySQL Server 2008 delivers a fully extensible performance data collection


and warehouse tool also known as the data collector. A centralized data
repository for storing performance data called management data warehouse,
and several pre-scanned reports to present the captured data. Another helpful
feature of the management data warehouse is that it can be installed on any
MySQL Server and then collect data from one or more MySQL Server
instances within the environment.

Page 3 of 5
7. Data Compression:

It is provides a resolution to help address these problems. Using this feature, a


DBA can selectively compress any table, table partition, or index, resulting in a
smaller on-disk footprint, smaller memory working-set size, and reduced I/O.
SQL Server 2008 supports two types of compressions:
Row Compression
Page Compression

Both row and page compression can be applied to a table or index in an online
mode that is without any interruption to the application availability. Data
compression can be implemented via Transact-SQL or the Data Compression
Wizard.

8. Policy-Based Management:

Policy-Based Management (PBM) provides DBAs with a wide variety of


options in managing their environment. Policies can be created and checked for
compliance. The policies can be exported and imported as .xml files for
evaluation and implementation across multiple server instances.

9. Predictable Performance and Concurrency:


MySQL Server 2008 provides a few feature changes that can help provide
more predictable performance. In MySQL Server 2008, there exist some
enhancements to the MySQL Server 2005 plan guides and new options to
control a lock.

MySQL Server 2008 builds on the plan guides mechanism in two ways:
• It expands the support for the USE PLAN query hint to cover all DML
statements
• (INSERT, UPDATE, and DELETE).
• Lock escalation.
A new option has been introduced to control lock escalation at a table level. By
using an ALTER TABLE command.

10. Resource Governor:

MySQL Server 2008 introduces a new feature called Resource Governor,


which helps address this issue by enabling users to differentiate workloads and
allocate resources as they are requested. Resource Governor Limits can easily
be reconfigured in real time with minimal impact on the workloads that are
executing. The allocation of the workload to a resource pool is configurable at
the connection level, and the process is completely transparent to the
application.

Page 4 of 5
11. Transparent Data Encryption (TDE):

SQL Server 2008 offers a solution to this problem by way of transparent data
encryption (TDE). TDE performs real-time I/O encryption and decryption of
the data and log files by using database encryption key (DEK). The DEK is a
symmetric key secured by using a certificate stored in the master database of
the server, or an asymmetric key protected by an Extensible Key Management
(EKM) module.

12. Some features of TDE:


When backup compression is used to compress an encrypted database, the size
of the compressed backup is larger than if the database were not encrypted,
because encrypted data does not compress well. Encrypting the database does
not affect data compression (row or page).

13. Literature Review


I refer the many online shopping sites like flipcart, quicker , snap deal
,………etc & take many contents from there.

Page 5 of 5

You might also like