DFD
DFD
INTRODUCTION
Problem Statement:
This web application is designed to give the trading facility to
the registered candidates of the site. The main functionality offered is
barter and auction of items.
1. Registration module :
In this module a general user can be registered with the site.
The main information required to be filled are :
Auction:
An auction is a sale in which a seller presents his product on a public platform/ forum.
The selling price in an auction is determined by the bids made by interested buyers. The price
they bid is based on their own valuation of, and need for, the product. The product is sold to
the highest bidder. A potential buyer participates by bidding on an item that a seller has listed.
The person who has offered the highest bid at close of auction wins the right to purchase the
item at that price.
Bid:
A bid is the amount of money proffered for an item that has been put on sale in an
auction. The bidder competes with other potential buyers, keeping in mind that the buyer with
the highest bid is obliged to complete the purchase with the seller. In other words, your bid
tells other buyers, "I want to buy this item at this price."
Win:
You win an auction by placing the winning (read highest) bid and obtaining the item on
auction. The person with the highest bid is the winner of the auction. Now that you're familiar
with how an auction generally works.
Online Barter Trade and Auction System :
Problem Statement:
This web application is designed to give the trading facility to
the registered candidates of the site. The main functionality offered is
barter and auction of items.
1. Registration module :
In this module a general user can be registered with the site.
The main information required to be filled are :
5. Administrator Module :
This module offers the following main functionalities for the administrator-
a. Function to view the list of all the users selectively
b. Function to view all the commodities for which barter/auction facility in available
c. Function to add or delete commodity in the list
DATABASE SCHEME(tentative) :
ONLINE AUCTIONS
Before an Auction:
The process of an online auction is much the same as a live auction. This means that
users place bids for items, and the goods get sold to the highest bidder. You are notified
through email on the status of your bids, which is when you place a bid, when you've been
outbid and when you've won an item.
To bit for an item, there is a bidding form through which you may place bids on the
item. To bid on an item, enter your bid amount. While entering your bid, you need to consider
the bid increment. The bid increment is the amount by which each bid increases. The seller sets
this amount. The bid amount should be one bid increment or more above the current leading
bid specified on the item page.
Automatic Bids and manual bids need not be exact multiples of the bid increment
amount. Bids will only have to be one increment or more above the current bid to be accepted.
Example:
Now in order to bid: -You can bid at anywhere above or equal to the current highest bid
amount for your bid to be accepted, i.e. you can bid at anywhere between Rs. 21 to Rs.
41 (or more) for your bid to be accepted. -This means that you can bid at say Rs. 23
and the next current minimum bid will get adjusted to Rs. 43 (since the Bid Increment
level is set to 20).
If you wish to place a higher bid, you may do so. For eg. - You can place a bid of Rs. 45.
This would incorporate the current bid at Rs. 21 and the minimum bid increment of Rs.
20. The remaining Rs. 4 is the additional amount you have bid. Therefore the user who
bids after you would have to bid atleast Rs. 65 (Rs. 45 of your bid and Rs. 20 of the bid
increment)
The amount of the next minimum acceptable bid will be displayed in the "Bid Amount per item"
text box.
To find more information about the product the description of that product has to be
referred. A description of every item is put up on the item page. To know more about the item
and its features, you can make use of the "Ask the seller or Read Q&A" facility provided on
every item page. This way you can acquire more information about the item. If it is convenient
for you and the seller, you can also arrange to personally inspect the item.
Bidding can be carried out automatically by enabling the automatic bidding feature.
Automatic Bid features bids on a particular item for you up to the maximum amount that you
have specified. This amount is the maximum amount that you, the buyer, are willing to pay for
an item. It is kept confidential. To activate the Automatic Bid, just enter your maximum bid
amount in the "Enter Automatic Bid amount" box and click on the "Bid Now" button.
Automatic Bid is an optional facility. If you activate Automatic Bid, you need not be
online to bid for and win an item you desire. The system will bid for you if necessary by the
specified bid increment amount to the limit of your Automatic Bid. Please note that the
Automatic Bid system will only bid for you when you have been outbid or to meet the reserve
price at the end of the auction. You will receive an email notification every time the Automatic
Bid bids for you.
To bid on a multiple items is considered to be a special auction where a seller has more
than one quantity of the item he or she wants to sell/bid. The seller selects the starting bid
amount and indicates how many of these items are available for the auction.
An auction is a multiple auction or not can be known by checking the quantity box of the
item. If there is number of quantities displayed is more than 1, then it is a MQA (Multiple
Quantity Auction)
After an Auction:
At the end of every auction, you would receive an email (if your bid is the highest at that point
of time) with your seller's contact details. You would then need to contact your seller to arrange
for the delivery and complete the deal offline.
A bidder can know about the item he/she won in an auction once the auction of an item
you have bid on has ended. You will receive an auto-generated email if your bid was the
highest and the reserve price (if any) had been met. The mail will include item details and the
seller's contact details. The seller too will receive an email providing them with your contact
details. You will need to contact your seller to inspect the goods and arrange delivery and
payment.
Once the auction is ended, both the seller and the buyer are notified through email and
given each other's contact details. They need to contact each other and work out payment as
per the terms of payment mentioned by the seller on the item page.
Transaction:
The transaction between the buyer and the seller can be carried out manually if the
buyer and seller are in a reachable distance. In other case the transaction is carried out over
the net via Ecommerce Secured transaction systems.
Society cannot seem to escape the criminal element in the physical world, and so it is
the same with online auctions.
One of the concepts that the online auctions were started with was the idea that people
could police themselves, but those with the intent to take advantage of others have found the
means to bypass this mild safeguard as well. It was envisioned that with the opportunity to
give ‘feedback’ on each other as buyers and sellers, honesty would remain intact. However
some have found a way to inflate their ratings which makes them appear trustworthy to do
business with.
There are steps to take to reduce the risk of being scammed by a less-than-honest
individual in an online transaction, and the first step is to deal only with reputable
establishments. At least if there is a problem with the transaction, whether as the buyer or the
seller, one stands a better chance of resolving the problem satisfactorily for everyone. So do
your homework as to where it is safe to do business. Establish the top price that you are
willing to give, keeping in mind how much more than the bid price you will have to give to
cover shipping, insurance and tax. If possible, establish the identity of whom you are dealing
with. Have they been operating with this auction service for an acceptable length of time? Do
they have any comments about them, either positive or negative? These things must be
considered in an attempt to protect oneself from the risk of being scammed.
Another safeguard to consider is, “how will one pay for the goods?” There are payment
services available such as PayPal or Billpoint. Many of these services offer some form of
assurance and insurance against fraud. Or one may want to consider an Escrow service to
handle the transaction. Many of the auction sites have an escrow service to offer their clients,
however there is usually an extra fee associated with these services as well.
Whatever the means one chooses to minimize the risk of loss due to fraud, in the end it
still comes down to the individual consumer and the choices they make. Until the goods are
received and all parties satisfied, one should keep record of any and all transactions, whether
they are the buyer or the seller. It may help provide proof of what took place, and help get
ones money or goods back, if one has the misfortune of being the victim of online auction
fraud.
(Mulrean, J., 5 steps to avoiding auction rip-offs, retrieved 12 April 2002 from MSN
Money, http://money.msn.com/articles/smartbuy/dollarwise/9013.asping ground for fraud.)
What is Auction ?
Examples
Ancient cases:
Online auction is probably the most effective negotiation tool available today.
Instead of the buyer conducting the negotiation, sellers bid or ‘negotiate’ among
themselves to arrive at the best price for the buyer
Transparent: Both auction originators and bidders can view the lowest/highest prices being
offered.
Efficient &Fast: Actual online auction event is achievable within one hour instead of weeks in
the traditional auction.
Unlike on-line stores, on-line auctions only provide the place where buyers and sellers can
meet. It is a different approach for trading.
-e.g: eBay doesn’t sell the product by itself, but buyers will buy the product from sellers who
post them on the eBay web site.
Unlike on-line stores, on-line auctions offer a place for buyers and sellers to order and receive
products in a timely manner.
In other words On-line auctions are another alternative for buyers and sellers who are seeking
the best deal for products..
Traditional vs. online auction
Types of Online Auction
There are several types of online auction available. But the most commonly used online auction
is
English auction.
English Auction: Each bidder announces openly its bid; when no bidder is willing to raise
anymore, the auction ends. The highest bidder wins the item at the price of its bid. Strategy:
- In private value auctions the dominant strategy is to always bid a small amount more than
the current highest bid and stop when the private value is reached.
- In correlated value auctions the bidder increases the price at a constant rate or at a rate it
thinks appropriate.
Dutch Auction: The auctioneer continuously lowers the price until one of the bidders takes the
item at the current price. Strategy:
- Strategically equivalent to the first-price sealed- bid auction
- Efficient for real time.
Vickery Auction : Each bidder submits one bid without knowing the other's bids. The highest
bid wins but at the price of the second highest bid. Strategy:
For each type of online auction, the reverse and forward auctions can be set
Reverse auction: This is an auction to buy. A buyer originates the auction to buy a particular
product or service with sellers submitting bids, and the bidder with the lowest bid
wins.
Forward auction: This is an auction to sell. Seller originates to sell a particular product or
service with buyers submitting bids, and the buyer with the highest bid wins.
Reverse Auctioning (RA) provides a dynamic means for vendors to compete nearly real-
time to provide goods or services.
Vendors compete in an iterative manner until auction is complete (i.e., they bid a lower
price than their competitor until a pre-set time)
Forward Auction :
The seller puts up an item for sale and specifies an acceptable minimum price
Basic Properties:
• Correctness: If every party acts honestly, the correct winning price and winner(s) care
determined according to the auction rules.
• Confidentiality: No bids are revealed to any parties (including the auctioneer) until the bid
opening phase.
• Fairness: It includes
No bidder knows anything about other bidders bids before he submits his own bid. This
is actually included in confidentiality.
After a bidder submits his bid, the bid cannot be modified.
No bidder can deny his bid after he submits it. This is sometime called non-repudiation
of bids.
Optional properties:
• Anonymity: The identities of losing bidders must be kept secret.
• Privacy (of losing bids): The losing bids remain confidential until the end of the auction
even to the auctioneer.
Activities Involved
Buying Products:
Selling Products:
Sellers pay fee to advertise their products.
Notified of status every day by email.
Bid closes.
Gets highest bidder contact information via email.
Seller and buyer contact each other.
Comparison with other online Auctions
Classifieds2000 :
• Division of Excite.com3.
•Offers many categories for sellers to auction their products online.
•Sellers are required to register with Classifieds2000, but buyers are not.
•Does not have many options or alternatives for buyers or sellers.
•Buyers and sellers have to do all trading activities themselves.
•Only provides the place where buyers and sellers can meet.
Onsale.com :
•An on-line auction for computers and computer-related products.
•Offers many product categories for computers and computer-
related products, e.g. Desktop, notebook, Printer, Scanner, CD-
ROM and so on.
•Onsale.com has a stick rule for seller and buyer.
Ask for contact information and valid credit card number.
• Onsale.com also provides on-line secure transaction for it's customers.
Internet Auction
The seller can also select an auction, and in case of Dutch auction use the offer process to
change the asking price. This again results in notifications being sent to people who are
participating in the Dutch auction (participation in a Dutch auction by buyers who have not
bid at all can be recorded by keeping a zero quantity bid in the bid table). Finally the close
(auction) process normally closes the auction automatically based on auction rules, but
supports manual closing by the seller. When an auction is closed, all the bids submitted for
that auction are evaluated and the winners and losers are notified (Dutch auctions, by
definition have winners only).
Notification:
Currently two notification mechanisms are provided in the auction prototype. First one is the
simple e-mail. The second one is through the message box mentioned in the previous
paragraph. E-mail is necessary to communicate with buyers who are not looking at one of
the auction site pages when a message need to be delivered. Message box is more
convenient for those who are on some auction site page when the message is to be
delivered.
Navigation
Figure 3 shows how the bidders navigate the auction web site. Each bubble shows a web
page and arcs from one page to another indicate that a hot link is available from the first
page to the second. The seven pages marked with asterisk can be accessed any time from
the side bar. The auction site URL puts a bidder on the Welcome page from where a
registered user can authenticate himself to the web site and initiate a secure session
(login). An unregistered user will get the opportunity to fill in a registration form which may
be processed online or off-line. After registering, the bidders can browse through or search
the products in the auction house which will possibly result in a product being selected and
its description presented to the bidder. If the product is on auction, the rules of auction can
be viewed, and bids can be submitted for that product.
From the home page the bidder can also see a list of all auctions at the auction site or a
subset of these which are in his personal auction gallery. From either list, the bidder can
select an auction and access the description of the product being auctioned, see the rules of
the auction, or bid on the product. For open-cry auctions he can also see a subset of the
previously submitted high bids for that product. In both these lists, the entry for an auction
also includes the auction type, quantity being auctioned (if the rules permit), best bid or
current asking price for open cry and Dutch auctions respectively, and auction closing time
if determined.
Seller’s options:
From the list of high bids for a product mentioned above, a buyer can increase his existing
bid, submit a new bid, review the auction rules or access the product description. Similarly,
from the home page a buyer can access the list of all his bids and perform the same
functions. Finally from the home page a buyer can access his message box which contains
all the notifications sent by the auctioneer to the buyer.
SYSTEM ANALYSIS
4. SYSTEM ANALYSIS
System Planning is one of the important items to be considered before actually beginning the project.
Planning is performed on the issued like defining Life Cycle Model and an organizational structure project,
configuration management, quality and validation activities.
In the process of the System Planning various phase-dependent tools, techniques and notations are
determined. Preliminary cost estimates for the system development and preliminary development schedules are
established. Preliminary estimates of the computing resources required to operate and maintain the system are
developed, glossary of terms are prepared.
Information Gathering:
Information relevant to the “Computer Resource Management System” of Laila Infotech is collected
from the Laila Infotech Limited and the finance department of the company. The information regarding
company activities is gathered from the company’s website www.lailainfotech.com.
Feasibility Study:
2.Technical Feasibility: -
Technical feasibility centers around the existing computer system (software/hardware) configuration
and good software facilities in such a way that any new candidate system can be implemented without a large
alteration of the lab nut with slight modification of the existing system.
Hence our candidate system production is technically feasible.
3.Behavioural Feasibility: -
People are inherently resistant to change. Our candidate system is developed in such a way that it is
very user friendly, easy to learn how to work with and there is also not much resistant to this package from the
staff side also. As the company is basically a development center it will be very easy for the employees of the
company to learn about the developed candidate system.
Hence our candidate system production is behaviorally feasible.
Master Administrator: Has all the privileges of creating and deleting all type users, locations, shelves, for moving the
components from one location to another and also for changing the designation of a particular user. The administrator
can also search on shelves, component models, users and computers.
Hardware Administrator: Will be having the privilege of moving the components between various modules (shelves,
Bin, Recycle-Bin, locations and computers). He can create and delete computers.
Purchase Manger: Is the responsible person to buy the parts from the external vendors and keep them in the shelf. He
periodically views and updates the shelf, Bin and Recycle-Bin.
Normal User: Has only the privileges of viewing and searching the site for the information about the resources or the
other users. He also has the privilege to change his password.
Provides the Interface for users, purchase manager and administrators to login.
For master administrator, provision of creating and deleting the users, shelves, locations, moving the
shelves from one location to another, editing the components and changing the designation of users is
provided.
For hardware administrator provision for viewing and editing the components, moving the components
between various modules, creation and deletion of computers is provided.
For Purchase Manager provision for viewing and updating the shelf, Bin and recycle-Bin
For the normal users, provision for searching on usernames, location and components.
4.2.3.7 COMPUTER RESOURCE MANAGEMENT SYSTEM ARCHITECTURE
We have used a phased development process in our project. In a phased development process,
there are various phases with each phase ending with defined output. The main reason for
having a phased process that it breaks the problem of developing software into successfully
performing set of phases each handling a different concern of software development. The cost
of development is lower than what whole pattern tackled together. Phased process allows
proper checking of quality and progress at some defined point during a development.
It consist of :
2.1 Requirement Analysis
The requirement Analysis is done in in order to understand the problem the software system is
to solve basically two parties are involved in the software development – client and the
developer. The developer usually does not understand the client problem domain and client
often does not understand the issues involved in software development. This causes a
communication gap between the two parties which has two be bridged during requirement
analysis. There are two main activities involved in requirement analysis :
a) Problem Analysis
In it analyst has to understand the problem and its contented by interacting with clients end
users as well as studying the existing procedures.
b) Requirements Specification
Ones the problem is analyzed and essentials understood, the requirement must be specified in
the requirement specification document.
Feasibility is the major of how beneficial or practical the development of a computerizes system
will be to an organization.
There aspects are considered to evaluate the feasibility.
Technical Feasibility
It is measure of the practically of a specific technical solution and the availability of technical
resources and expertise
The proposed system used java as front end and MS Access as backend tool.
Access is a popular tool used to design and develop database objects such as table
views, indexes.
The above tool s are readily available easy to work with and widely used for developing
commercial application.
Operational Feasibility
There are two aspect functionality and acceptance with is the organization. The proposed
system will reduce the manual work and speed of the pay calculation.
Functionality
Functionality include issues such as determining whether the system can provide right
information at the right place and on time.
It fully support managements requirement of desired report and queries.
Acceptance
Acceptance implies how well received this system would be from both users and management
perspective.
The proposed system will be gladly accepted by the end user as it automates their routine work
and is user friendly.
Economic feasibility
It looks at the financial aspects of the project. It determines whether the management has
enough resources and budget to invest in the proposed system and the estimated time for the
recovery of cost incurred. It also determines whether it is worthwhile to invest the money in the
proposed project. Economic feasibility is determines by the means of cost benefit analysis.
The purpose of the phase is to plan a solution of the problem specified by the requirement
document. This is first step in moving from the problem domain to solution domain. Designing
activity is divided into two parts.
a) SYSTEM DESIGN
It aims to identify the modules that should be in the system, the specification of these modules
and how they interact with each other to produce the desired result.
b) DETAILED DESIGN
The internal goal of each of the modules specified in the system design is decided
2.4 CODING
The goal of the coding phases to translate the design of the system into code in a given
programming language. For a given design, the aim is this phase is to implement the design in
best possible manner. The coding phase effects both testing and maintaining profoundly.
2.5 TESTING
Its function is to detect error in software. The starting point of testing is unit testing. In init
testing iach modules is tested separately and than integration testing is performed. In
integration testing in modules are integrated after that system is put together and system
testing is done and at last acceptance testing is done in order to demonstrate to the client.
The testing process starts with test plan. This test plan identities all the activities related to
testing that must be performed and specifies guidelines for testing. Then comes test case
specifications document, it contains list of all the different test cases together with the expected
output. Finally the test report is prepared.
2.6 INPLEMENTATION
the goal of implementation phase is to install the working system as the user site and it is the
responsibility of the developer is provide proper user training.
Implementation simply means converting a new system design into operation. In system
implementation, user training is crucial for minimizing resistance to change and giving the new
system to prove its worth. Training aids that communicate information about the new system
and help screens provide the user with a good start on the new system.
2.7 MAINTENANCE
Maintenance is the enigma of system development. Analyst and programmers spend for more
time maintaining program than writing them. Maintenance accounts for 50 to 80 percent of
total system development.
Maintenance activities begin where conversion leaves off.
Maintenances is handled by the same planning and control used in formal system project.
Documentation is as much a part of maintenance as that of system development. Program
changes are then tested and submitted to the user for approval. Once approved a project
completion notice send to the user, signaling the termination of the project.
4. SYSTEM CONFIGURATION
5. SYSTEM DESIGN
A model is an abstraction of something for the purpose of understating it. Before building it. A
model omits the m\nonessential details, so it is easier to manipulate than original entity. The
use of this property is known as ABSTRACTION. Engineers’ artists and craftsmen have build
model for thousands of years to try out designs before executing them. To build complex
system, the developer must abstract different views of the system, build model using precise
notation, verify that the model specify the requirement, of the system, and gradually add detail
to transform the model into an implementation.
Advantage of modeling:
Designer build different type of model for various purpose before construction them, for
example architecture model to show customers, airplane scale models for wind-tunnel-test,
blueprint of machine parts.
Testing a physical entity before using it.
Communication with customers.
Visualization.
Reduction of complexity.
Abstraction
It is useful to model a system from three related but different viewpoints, each capturing
important aspect of the system. The object modeling technique combines these three view of
modeling systems. Each model contains references to entities in other model. For example
operation are attached to object in the object model but more fully expanded in the functional
model.
Each of the three model evolves during development cycle. During analysis a model of the
application domain is constructed without regard for eventual implementation during design,
solution domain constructs are added to the model. During implementation both application-
domain and solution domain are coded. The word “model” has two dimension- a view of a
system (object model, dynamic model or functional model) and stage of development (analysis,
design or implementation).
the object model describes the structure of objects in a system- their identity, their
relationships to other objects , their attributes and their operations. It provides the essential
framework into which the dynamic and functional model can be placed.
The object model is represented graphically with object diagrams containing object classes.
Classes are arranged into hierarchies sharing common structure and behaviors and are
associated with other classes.
Objects
Object is a concept, abstraction, or thing with crisp boundaries and meaning for the problem at
hand. Ass objects have identity and are distinguishable.
Classes
Classes defined a group of objects with similar properties or attributes common relationships to
other objects and common semantics.
Object diagrams
It provide a formal graphic notation for modeling object, classes and their relationships to one
another.
Attributes
It is a data value held by an object in a class.
Operations and methods
An operation is a function or transformation that may be applied to or by object s in a class. A
method is the implementation of an operation in a class.
Links and associations
A Links is a physical or conceptual connection between object instances, whereas association
describes a group of links with common structure and common semantics.
Aggregation
It is strong form of association in which and aggregate object is made of components.
Multiple inheritance
It permits a class to have more than one super class and to inherit features from all parents.
ADVANTAGES
It organizes a system around real world objects or conceptual objects that exists in the
user’s view of the word.
Changes in function are readily accommodated in object oriented design by adding or
changing operations, leaving the basics object structure unchanged.
It can be easily extended by adding objects and relationships near the boundary.
It is easier to understand.
It integrates database with programming code.
Decomposition of object can be easily done here.
FUNCTIONAL MODEL
The functional model describe those aspect of a system concerned with transformation of
values-function, Mappings, constrains and functional dependencies. it captures what a system
does, without regard for how and when it is done.
The functional model is represented with data flow diagrams, which shows the dependencies
between values and the computation of out put values from input values and function. This
mode specifies the meaning of operations in the object model and the action in the dynamic
model.
Send items
Main page
Actors
An Actors is active object that drives the data flow graph by producing or donsuming values.
Data store
A data store is a passive object with in a data flow diagram that stores data for later access.
It specifies the result of a computation with out specifying how or when they are
computed.
It also includes constraints among values in an object model.
It is the main model for the non computation programs, like compilers.
It is simple to understand the functionality from this model.
It specifies only what happens in the system.
Why is the topic chosen: -
In today’s competitive environment, where everybody wants
to be on the top, Information plays very crucial role.
As fast as information is accessed and processed, it can give good results.
Computerized system help to fulfill these goals . Computerization of the official works
will help in doing lot of manual work quickly . It will help in easy storage and access of
all information , in short period of time.
Project Category:-
2. Distributed Projects.
Local Area Network projects are those projects where application has to be
incorporated in the Local area network of the client i.e within its premises
only. In LAN case server is not remotely located and client access this
application through this network. Here the question of platform
independence does not arise and we use technologies like : Visual Basic ,
Fox pro , D2k or C,C++.
Weather you are working on LAN projects or Distributed projects there are
two sides of it :-
1. Front End.
2. Back End.
Front End remains on client side. Front end is made for end user who uses
our application. Basically in front end our input-output forms reside which
takes the input from the client and gives output back to client.
Data base is the most important thing in this universe as data base gives
identity to a thing without data base existence of a thing is impossible.
While working on a project first step is to design a database.
1. RDBMS.
2. DBMS.
Centralization of database.
Client Server Technology.
Security.
Normalization of Data Base.
Relationship.
Transaction Processor.
It gives some internet related features.
Oracle 8.0 contains all the features of previous version. It also supports some new
features & enhancement to some existing features. Oracle servers provides deficient &
effective solution for the major features.
Oracle supports the largest database potential hundreds of Giga Bytes in size. To make
efficient use of expensive devices , it allows full control of space usage.
Oracle maintains the processing features with a high degree of overall system
performance. Database user doesn’t suffer from slow processing performance.
High Availability
At some sets Oracle works 24 Hours per day with no downtime or limit database
throughput. Normal system operation such as database backup & partial completion
system failure don’t interrupt database use.
Controlled Availability
Oracle can selectively control the availability of data at the database level & sub
Database level. e.g. an administrator can disallow use of a specific application .Data can
be reloaded without affecting other application.
Oracle adheres to industry accepted standards for the data access language operating
system, user interface & network communication protocols . It is open system that
protocols a customer invention.
Manageable Security
To protect against unauthorized database aspects & users .Oracle provides failsafe
security features to limit & monitor the data area. The system make it easy to manage
even the most completed designs for data assets.
Oracle enforces data integrity “Business rules” that dictates the standards for applicable
data. As result the cost of coding & managing checks in many database applications are
eliminated.
For community environment that are connected via networks. Oracle combines the data
physically located on the different computers in one logical database that can be accessed
by all the network users. Distributed systems have same degree of user transparency &
data consistency as non-distributed systems. Yet receives the advantages of local database
management.
Portability
Oracle software is compatible to work under different operating system & same on all
system. Application developed on Oracle can be used on virtually any system with little
or no more modification.
Compatibility
Oracle software is compatible with industry standards, including most industry standards
operating systems. Application developed on Oracle can be used on virtually any system
with little or no modification.
Connectivity
Oracle software allows different types of computers & operating system to share
information networks.
Improved Scalability
The maximum size of an Oracle database has been increased to support hundreds of
terabytes depending on the operating system on which it resides.
Improved Security
Oracle 8.0 server now includes password management so that a password has a limited
lifetime & must meet certain complexity such as minimum length. An account can be
locked after a specified no of failed login attempts.
A table of index can divided into smaller pieces called patrons, based on the value of one
or more columns. A table patron can be individually managed so that operation in one
partition do not affect the availability of data on the other partitions. Also Insert
,Update ,Delete operation against a partitioned table can be processed partially.
In other words, the Oracle 8 server can assign a portion of the work to execute a single
DML statement to multiple processes , which may then be allocated to multiple processes
by the server operating system. As a result ,the parallel DML operation is completed
more quickly.
By pooling database connection, the Oracle 8 server is able t9o service a much larger
number of concurrent users up to 3000, depending on the server operating system &
server hardware resources.
Some existing data types have been enhanced & new data types have been introduced.
A new feature of the select statement allows a sub query to be used in place of a table
in a from clause.
Now when we are discussing Data Base there is one more thing attached to it
i.e. Data Base Models.
DataBase Models :
What is Middle-Ware ?
Introduction to Java
Java is a high level, third-generation programming language, like C, Fortran, Perl and
many others. It is a platform for distributed computing – a development and run-time
environment that cointains built-in support for the World Wide Web.
History of Java
Java development began at Sun Microsystem in 1991, the same year the World Wide Web
was conceived. Java’s creator , James Gosling did not design java for the Internet. His
Objective was to create a common development environment for consumer electronic
devices which was easily portable from one device to another. This effort evolved into a
language , code named Oak and later renamed Java that retains much of the syntax and
power of c++ , but is simpler and more platform independent.
Java Features
Simplicity
Orientation
Platform Independence
Security
High Performance
Multi Threading
Dynamic linking.
Garbage Collection.
One of the most important feature of Java is Platform Independence which makes it
famous and suitable language for World Wide Web.
The client application or operating system must have a java byte-code interpreter to
execute byte-code instructions. The interpreter is a part of a lager program called the
JVM. The JVM interprets the byte code into native code and is available on platforms
that supports java.
When the user runs a Java program, it is upto the JVM to load , possibly verify, and then
execute it. The JVM can perform this function from within a browser or any other
container program or directly on top of the operating system.
When a browser invokes the JVM to run a Java program, the JVM does a number of
things :
1. It validates the requested byte-codes, verifying that they pass various formatting
and security checks.
2. It allocates memory for the in coming java class files and guarantees that the
security of JVM is not violated. This is known as the class loader.
3. it interprets the byte code instructions found in the class files to execute the
program.
Connectivity using JDBC :-
JdbcOdbcDriver : This provides Jdbc access via Odbc drivers. Note that
Odbc binary code , and in many case database client code, must be loaded an
each client machine that uses this driver. As a result this kind of driver is
most appropriate on a corporate network where client installations are not a
major problem.
Partly Java Driver : This Driver translates Jdbc calls into a Net Protocol
which is then translated to a RDBMS protocolby a server.In this kind of
driver part of the binary code should be on client machine and part should be
on server, hence this kind of driver has same problem that was with
JdbcOdbc driver and it is mostly used in Intranet.
Native Driver : This kind of driver converts JDBC calls into the network
protocol used by Dbms directly. This allows a direct call from client machine
to the DBMS server and is a practical solution for Intranet access.
Note :- We are using 3rd Type of driver i.e. Thin Driver in our project.
.
JSP are Front-end technologies which are used in web based projects because
they use :-
1. HTTP Protocol to handle Request and Response.
2. They are invoked through Browser.
3. They give out put in HTML format.
4. They need Browser Support.
We have designed web based forms using JSP and call JavaBeans in which
we have defined business logic.
Tools/Environment used :
Software requirements
LOGIN PROCESS
INVALID,UID,
LAUNCHING
PWD THE PRODUCT
FOR BIDDING
SELLER ID,UID,
PWD AUCTION
VALID DATA
LOGIN
PROCESS
BUYER ID,UID, BIDDING
PWD PROCESS
PAYMENT PROCESS
VALID PAYMENT
USER
BANK
CHECKING FOR PAYMENT ORGAN.
INVALID PAYMENT
PAYMENT INFOR.
SUBMITTED PAYMENT
U’R PAYMENT IS NOY SUFFICIENT
PAYMENT TRANSFER PROCESS
PERMITION
CONFERMATION
ORGN.BANK
FOLLOWING TO BID
ORGAN.
REGISTRATION
REQUEST REQUEST
USER OPENING SERVER AQUARING ORAN.
SITE DOMAIN ON
SITE DATA
CONFERMATION ID
GENERATING ON SEARCH ID
REGISTRATION PROCESS
DETAILS
SELLER
INSERTED
ORGAN.
INSERTED SUBMITTED DETAILS
BUYER
ORGAN.
SELLER BUYER
SID,UID,PWD SID,UID,PWD
LOGIN PROCESS
REGISTRY OR RETRY
ENTERING
SETTING SERVICE
PRODUCTCHARGES
DETAILS PAYMENT
GENERATING
CHECKING
STATEMENT
VALIDITY
E-MAIL
PROCESS CHOOSING TYPE AND PRODECT TO BID
ORAN.
BUYER SELLER
NOT VALID TRY AGAIN
PRICE OF PRODUCT
SELLER DETAILS BUYER DETAILS
BUYER
SELLER AUCTION
BUYER
DATA
AID
DESC.
BANK
PRODUCT
PRICE
AID
TIME OUT
CURRENT HIGHEST BID,AID,
VARIFING PAYMENT BUYERID, SELLERID
BANK
NEW BID
UPDATING DATABASE
AUCTION
BUYER DATA
CURR.
BUYERAUCT ACCEPTED BID
PAYMENT PROCESS
GENERATIN AUCTION ID & SENDING MAIL SETTING NEW BID BIDDING BY BUYER
NOT BID
AID PLACE TIME
SELLER
E R DIAGRAM
name name
LAUNCHED
name
name BAYER
name name
AUCTION MAIN
GOES
name TO
BIDDING ON
ORGN. ACCOUNT
AUCTION ARCHITECTURE
Database Layer Contains the data and database-related objects like stored
procedures, triggers, packages, etc.
Application Layer Contains the objects addressing the business logic; Most of
the middle-level Java objects will be here in application
layer.
Web Interface Layer It will be on the web server; It contains the web pages (JSPs)
of the application which will interact with the front-end
browsers
Client Layer Contains the web browser which interacts with web server
TESTING
Testing is the process of detecting errors.Testing performs a very critical role for quality assurance
and for ensuring the reliability of software.The results of testing are used later on during
maintainence also
Psychology of Testing
The aim of testing is often to demonstrate that a program works by showing that it has no errors.The basic
purpose of testing phase is to detect the errors that may be present in the program.Hence one should not
start testing with the intent of showing that a program works,but the intent should be to show that a program
doesn’t work.
Testing is the process of executing a program with the intent of finding errors.
. Testing Objectives:
The main objective of testing is to uncover a host of errors, systematically and with minimum effort
A good test case is one that has a high probability of finding error, if it exists.
The software more or less confirms to the quality and reliable standards.
LEVELS OF TESTING
In order to uncover the errors present in different phases we have the concept of levels of testing.The basic
Unit testing focuses verification effort on the smallest unit of software i.e. the module. Using the
detailed design and the process specifications testing is done to uncover errors within the boundary
of the module. All modules must be successful in the unit test before the start of the integration
testing begins.
In this project each service can be thought of a module.There are so many modules like
Login,HWAdmin, MasterAdmin, NormalUser, PManager. Each module has been tested by giving
different sets of inputs.when developing the module as well as finishing the development so that
each module works without any error.The inputs are validated when accepting from the user.
Integration Testing:
After the unit testing we have to perform integration testing.The goal here is to see if modules can be
integrated proprerly,the emphasis being on testing interfaces between modules.This testing activity can be
considered as testing the design and hence the emphasis on testing module interactions.
In this project the main system is formed by integrating all the modules.When integrating all the modules I
have checked whether the integration effects working of any of the services by giving different combinations
of inputs with which the two services run perfectly before Integration.
SYSTEM TESTING
Here the entire software system is tested.The reference document for this process is the
requirements document, and the goal os to see if software meets its requirements.
Here entire ‘CRMS’ has been tested against requirements of project and it is checked whether all
Acceptance Test is performed with realistic data of the client to demonstrate that the software is
working satisfactorily. Testing here is focused on external behavoiur of the system,the internal
In this project ‘Network Management Of Database System’ I have collected some data and tested
Test cases should be selected so that the largest number of attributes of an equivalence class is
exercised at once.The testing phase is an important part of software development. It is the process
of finding errors and missing operations and also a complete verification to determine whether the
This is a unit testing method where a unit will be taken at a time and tested thoroughly at a
I tested step wise every piece of code, taking care that every statement in the code is executed
at least once. The white box testing is also called Glass Box Testing.
I have generated a list of test cases ,sample data.which is used to check all possible
This testing method considers a module as a single unit and checks the unit at interface and
communication with other modules rather getting into details at statement level. Here the module
will be treated as a block box that will take some input and generate output.Output for a given set of
User Authentication
Every user of the Email first needs to register him with a unique Username and
Password .If the user has already register he can login using his UserName and
Password.this ensure that no other person except the Autorised user can
accesss or modify the data containing mails and other personal information.
To ensure that the UserName and Password are not accessed by any other
persons these values are stored in Encryptedform in the Database and hence
can be protected from any mischievous access.
Once the User has Authenticated himself at the begin of the program he can
check and send Emails.
As evidence of the success of this mission, there are millions of items listed each day in
thousands of different categories. There are items for almost any interest that one could
imagine, from sheet music to automobiles to hand tools to real estate. And the variety doesn’t
stop there. Need a computer? One may find it listed in the proper category, in any
configuration from very old and obsolete to the latest greatest machine available. What about
antiques? One can find an antique quilt that is up for highest bid, or maybe an old violin,
whose beautiful tones have enchanted many though its years. Tickets. Maybe a ticket to the
next concert of ones favorite artist or play production. One can even find that special bottle of
wine, some aged, exotic cheese, and the perfect ‘mood’ music for that special occasion.
In this instance it may be true that on eBay, they have something for everybody, whatever
their tastes may be.
Reliability
For a business of this nature, the need to be available is all-important. After all, when
the only means of access is via ‘online’, it is of utmost importance to have and maintain an
accessible web presence.
"By the nature of the business, keeping its site up and running 24/7 is more important
to eBay than it is to, say, Amazon," Morningstar.com analyst David Kathman told the E-
Commerce Times.
References:
http://pages.ebay.com/community/aboutebay/overview/index.html)
http://www.newsfactor.com/perl/story/16387.html
<http://auctions.indiatimes.com/webapp/commerce/command/ExecMacro/TIL/macros/Logon.d
2w/report>
https://www.baazee.com/jsp/UserRegistration.jsp
http://www.fabmart.com/HTML/faq.asp
http://www.baazee.com/static/help/User-agreement.html