You are on page 1of 37

ABSTRACT

Online classifieds are used to provide the customers with huge amount of information. This
is a site to login to get the latest updates of the automobiles, matrimony and real estates. An
easy way to buy a product just sitting in front of your computers by registering into our site.

This is to facilitate all people who are busy with their works and have no time to get their
desired goods. We are here to provide you all the best and suitable places for sale. If once you
register into our site, then you are benefitted with our latest updates of the sales!

This is used to advertise the products with images. One can easily login to get any kind of
information. Here the user is also facilitated to directly interact with the consumer. He can get
the desired product with different rates and quality.

The main goal is to provide the customer with various goods just by sitting in
front of a computer .He can get the goods easily without moving from place to place.

Consumers can also have a chance of introducing their products not only in a
single place but throughout the world using online classifieds. This system allows the user to
interact directly just by sitting in front of the computer. Consumers have a chance of
comparing the product and purchase the desired one

This document fully and formally describes the requirements of the proposed said project
system. It sets out the functional and non-functional requirements and includes a description
of the user interface and documentation and training requirements.

1
INTRODUCTION

Online shoppingis a form of electronic commerce where the buyer is directly online to the
seller's computer usually via the internet. There is no intermediary service. The sale and
purchase transaction is completed electronically and interactively in real-time such as
Amazon.com for new books. If an intermediary is present, then the sale and purchase
transaction is called electronic commerce such as online shopping.

Proposed System:

The development of this new system contains the following activities, which try to develop
on-line application by keeping the entire process in the view of database integration
approach.

Secure registration and profile management facilities for Customers.

Browsing through the e-Mall to see the items that are there in each category of
products like Apparel, Kitchen accessories, Bath accessories, Food items etc.

Creating a Shopping cart so that customer can Shoppe n no. of items and checkout
finally with the entire shopping cart

Customers should be able to mail the Shop about the items they would like to see in
the Shop

Secured mechanism for checking out from the Shop( Credit card verification
mechanism )

Updates to customers about the Recent Items in the Shop.

Uploading Most Purchased Items in each category of products in the Shop like
Apparel, Kitchen accessories, Bath accessories, Food items etc.

2
Overview of online shopping

The central concept of the application is to allow the customer to shop virtually using the
Internet and allow customers to buy the items and articles of their desire from the store. The
information pertaining to the products are stores on an RDBMS at the server side (store). The
Server process the customers and the items are shipped to the address submitted by them. The
application was designed into two modules first Os for the customers who wish to buy the
articles.Second is for the storekeepers who maintains and updates the information pertaining
to the articles and those of the customers? The end user of this product is a departmental store
where the application is hosted on the web and the administrator maintains the database. The
application which is deployed at the customer database, the details of the items are brought
forward from the database for the customer view based on the selection through the menu and
the database of all the products are updated at the end of each transaction. Data entry into the
application can be done through various screens designed for various levels of users. Once
the authorized personnel feed the relevant data into the system, several reports could be
generated as per the security.

Number of Modules

The system after careful analysis has been identified to be presented with the
following modules:

1 Customer.

2 Employee.

3 Admin Module.

4 Security and Authentication

3
SOFTWARE REQUIREMENTS
Operating System : Windows XP/7 or Linux
User Interface : HTML, CSS
Client-side Scripting : JavaScript
Programming Language : Java
Web Applications : JDBC, Servlets, JSP
IDE/Workbench : My Eclipse 6.0
Database : MYSQL
Server Deployment : Tomcat 5.x
Frame Work : Struts 1.x

HARDWARE REQUIREMENTS
Processor : Pentium IV
Hard Disk : 40GB
RAM : 512MB or more

4
SYSTEM ANALYSIS&DESIGN
Introduction

Analysis is the focus of system developing and is the stage when system designers have to
work at two levels of definition regarding the study of situational issues and possible
solutions in terms of what to do and how to do.

System Study

Definition of the system

A system is an orderly grouping of independent components linked together according to a


plan to achieve a specific objective. Its main characteristics are organization, interaction,
independent, integration and central objective a system does not necessarily mean to a
computer system. It may be a manual system or any other names.

Needs of the system

Social and economic factor: a wave of social and economic changes often follows in the
wake of the new technology. New opportunities may arise to improve on a production
process or to do something that was not previously possible. Changes in the ways individuals
are organized into groups may then be necessary, and the new groups may complete for
economic resources with established units.
Technological factor: people have never before in a time when the scope of scientific inquiry
was so broad, so when the speed of applying the new technology accounts for many changes
in the organization.
High level decisions and operating processes: in response to technological, socio-economical
factors, top level managers may decide to recognize operations and introduce new products.
To deal with these needs, people commonly seek new modified information to support the
decision. When that happens, then they obtain turn to a computer system for help the
information users and data processing specialist then work together to complete a series of
steps in a system study to produce output results to satisfy information needs.

5
System analysis

System Analysis is a process by which we attribute process or goals to a human activity,


determine how well those purpose are being achieved and specify the requirements of the
various tools and techniques that areto be used within the system if the system performances
are to be achieved.

System planning

Planning for information systems has a time horizon and a focus dimension. The time horizon
dimension specifies the time range of the plan, where as the focus dimension relates whether
the primary concern is strategic, managerial, or operational. The system i.e. The Project that
we were assigned was required to complete within 20 weeks. What we had planned is as
follows:

Requirements analysis, Preliminary Investigation & Information Gathering should be covered


within the 1st and 2nd week. Since I was not aware of MYECLIPSE IDE it require 1 week for
me to adjust with that tool. 12 Weeks for the design of the system under development. 1
week for Testing & Implementation. And rest 2 reserve weeks.

Preliminary investigation

The initial investigation has the objective of determining the validity of the users request for
a candidate system and whether a feasibility study should be conducted.

The objectives of the problem posed by the user must be understood within the framework of
the organizations MIS plan. Ihad investigated from the concerned authority about the project

Information gathering

Akey part of feasibility analysis is gathering information about the present system. The
analyst must know what information to gather, where to find it, how to collect it, and what to
make of it. The proper use of tools for gathering information is the key to successful analysis.
The tools are the traditional interview, questionnaires, and on-site observation

6
STRUCTURED ANALYSIS

The traditional tools of data gathering have limitations. An English narrative description is
often vague and difficult for the user to grasp. System flowcharts focus more on physical than
on logical implementation of the candidate system. Because of these drawbacks, structured
tools were introduced for analysis. Structured analysis is a set of techniques and graphical
tools (DFD) that allow the analyst to develop a new kind of system specifications that are
easily understandable to the user.

7
PROBLEM FORMULATION
A problem is well defined very rarely. So the first task is to get more crucial information by
interviewing and meeting concerned people. It clarifies how the problem is felt, how often it
occurs, how it affects the business and which departments are suffering with this. This phase
consists of the following tasks.

This was a preliminary investigation done with a view to have a feel of


the working of the proposed system. This phase has been identified the
end-user directly involved in the system who were the managers,
assistant officer and database administrator, and the development
department. By understanding the working of database, its flow and also
after conducting meetings and interviews with the concerned persons of
the department, a clear idea about the working was obtained. A flexible
approach is adapted towards people who are interviewed. Short hand
written notes are prepared based on the response of the employees.
Detailed investigation is done in order to define the scope of the
problem .The interview is concluded with a quick resume of the ground
covered during the interview .The Questionnaire technique is combined
with interviews to get the best result. Proper care has been taken in the
design of such questionnaires so that the persons answering these
questions do not feel hesitant. An explanatory note that serves to gain
cooperation and avoid misunderstanding by setting out the purpose of the
exercise clearly accomplishes each questionnaire.

Observation technique is also used for fact finding. The work described
at the time of interview is observed personally ads it reduces the chances
of misunderstanding and omissions. Some important things observed are
like the flow of information through the system and important data
transactions, the data being maintained and the frequency of their
updating.

By the end of this phase, idea as to how the information enters the
system, how it is stored, how it is processed, how information changes

8
affects the working of the system and finally the output format required
by the end-user was collected. All the information generated from this
phase acted as an input to the next phase.

FUNCTION

1. Enable customer to buy online.

2. Enable customer to easily browse through the products.

3. Enable customer to search products.

4. allowing customers to post queries and discuss products and sell through us.

5. allow the businessman to manage the shop inventory.

6. allow the businessman to view graphs depicting previous sales etc.

7. allow the businessman to change the look and feel of the site with ease.

8. allow the shopkeeper to view different configuration options and update


them.

9
PERFORMANCE REQUIREMENTS

We don't have an exact idea for the performance requirements at this stage.
Maybe at this stage we must say.

1. a powerful server: A large number of the html les are dynamically


generated .This puts a lot of load on the server. It is imperative that server must
be powerful enough.

2. A good hard disk (fast and big) are essential for a shop

3. The shop must be well connected to the net by a good connection so that a
large number of customers can use the shop together.

ANALYSIS :

In day to day life, we will need to buy lots of goods or products from a shop. It may be
food items, electronic items, house hold items etc etc. Now a days, it is really hard to get
some time to go out and get them by ourselves due to busy life style or lots of works. In
order to solve this, B2C E-Commerce websites have been started. Using these websites,
we can buy goods or products online just by visiting the website and ordering the item
online by making payments online.

This existing system of buying goods has several disadvantages. It requires lots of time to
travel to the particular shop to buy the goods. Since everyone is leading busy life now a
days, time means a lot to everyone. Also there are expenses for travelling from house to
shop. More over the shop from where we would like to buy some thing may not be open
24*7*365. Hence we have to adjust our time with the shopkeepers time or vendors time.

In order to overcome these, we have e-commerce solution, i.e one place where we can get all
required goods/products online. The proposed system helps in building a website to buy, sell
products or goods online using internet connection. Purchasing of goods online, user can

10
choose different products based on categories , online payments , delivery services and hence
covering the disadvantages of the

11
Chapter 1.0 HTML
INTRODUCTION

Webpages are written in HTML - a simple scripting language.

HTML is short for HyperText Markup Language.

Hypertext is simply a piece of text that works as a link.

Markup Language is a way of writing layout information within documents.

Basically an HTML document is a plain text file that contains text and nothing else.

When a browser opens an HTML file, the browser will look for HTML codes in the text and
use them to change the layout, insert images, or create links to other pages.

Since HTML documents are just text files they can be written in even the simplest text editor.

A more popular choice is to use a special HTML editor - maybe even one that puts focus on
the visual result rather than the codes - a so-called WYSIWYG editor

Some of the most popular HTML editors, such as FrontPage or Dreamweaver will let you
create pages more or less as you write documents in Word or whatever text editor you're
using.

However, there are some very good reasons to create your own pages - or parts of them - by
hand...

12
Chapter 2.0 CSS

What is CSS?

Cascading Style Sheets, fondly referred to as CSS, is a simple design language intended to
simplify the process of making web pages presentable.

CSS handles the look and feel part of a web page. Using CSS, you can control the color of
the text, the style of fonts, the spacing between paragraphs, how columns are sized and laid
out, what background images or colors are used, as well as a variety of other effects.

CSS is easy to learn and understand but it provides powerful control over the presentation of
an HTML document. Most commonly, CSS is combined with the markup languages HTML
or XHTML.

Advantages of CSS:

CSS saves time - You can write CSS once and then reuse same sheet in multiple
HTML pages. You can define a style for each HTML element and apply it to as many
Web pages as you want.

Pages load faster - If you are using CSS, you do not need to write HTML tag
attributes every time. Just write one CSS rule of a tag and apply to all the occurrences
of that tag. So less code means faster download times.

Easy maintenance - To make a global change, simply change the style, and all
elements in all the web pages will be updated automatically.

Superior styles to HTML - CSS has a much wider array of attributes than HTML so
you can give far better look to your HTML page in comparison of HTML attributes.

Multiple Device Compatibility - Style sheets allow content to be optimized for more
than one type of device. By using the same HTML document, different versions of a
website can be presented for handheld devices such as PDAs and cell phones or for
printing.

13
Global web standards - Now HTML attributes are being deprecated and it is being
recommended to use CSS. So its a good idea to start using CSS in all the HTML
pages to make them compatible to future browsers.

CSS Versions:

Cascading Style Sheets, level 1 (CSS1) was came out of W3C as a recommendation in
December 1996. This version describes the CSS language as well as a simple visual
formatting model for all the HTML tags.

CSS2 was became a W3C recommendation in May 1998 and builds on CSS1. This version
adds support for media-specific style sheets e.g. printers and aural devices, downloadable
fonts, element positioning and tables.

About this Tutorial:

This tutorial covers both versions CSS1 and CSS2 and teaches you CSS starting from basic
concepts to advanced concepts. So now start from next chapter and finish it till end to
become master in CSS.

14
Chapter 3.0 JAVA SCRIPT
INTRODUCTION

JavaScript is not a programming language in strict sense. Instead, it is a scripting language


because it uses the browser to do the dirty work. If you command an image to be replaced by
another one, JavaScript tells the browser to go do it. Because the browser actually does the
work, you only need to pull some strings by writing some relatively easy lines of code. Thats
what makes JavaScript an easy language to start with.

But dont be fooled by some beginners luck: JavaScript can be pretty difficult, too. First of
all, despite its simple appearance it is a full fledged programming language: it is possible to
write quite complex programs in JavaScript. This is rarely necessary when dealing with web
pages, but it is possible. This means that there are some complex programming structures that
youll only understand after protracted studies.

Secondly, and more importantly, there are the browser differences. Though modern web
browsers all support JavaScript, there is no sacred law that says they should support exactly
the same JavaScript. A large part of this site is devoted to exploring and explaining these
browser differences and finding ways to cope with them.

So basic JavaScript is easy to learn, but when you start writing advanced scripts browser
differences (and occasionally syntactic problems) will creep up.

15
Security
Clientside JavaScript has expressly been developed for use in a web browser in conjunction
with HTML pages. This has certain consequences for security.

First of all, please note carefully what happens when a user visits a JavaScriptenhanced web
site:
The user asks for a certain HTML page without knowing whether it contains JavaScript. The
HTML page is delivered to the browser, including the scripts. The scripts usually run
automatically when the page loads or when the user takes a certain action. In general the user
cant do anything to stop the scripts (well, he could turn off JavaScript, but few end users
know how to do this, or that it can be done, or that JavaScript exists).

So basically an innocent end user downloads a random program and allows it to be executed on his
machine. Therefore there should be strict rules as to what this program can and cannot do.

16
Chapter 4.0 MYSQL

What is Database?

A database is a separate application that stores a collection of data. Each database has one or
more distinct APIs for creating, accessing, managing, searching and replicating the data it
holds.

Other kinds of data stores can be used, such as files on the file system or large hash tables in
memory but data fetching and writing would not be so fast and easy with those types of
systems.

So nowadays, we use relational database management systems (RDBMS) to store and


manage huge volume of data. This is called relational database because all the data is stored
into different tables and relations are established using primary keys or other keys known as
foreign keys.

A Relational DataBase Management System (RDBMS) is a software that:

Enables you to implement a database with tables, columns and indexes.

Guarantees the Referential Integrity between rows of various tables.

Updates the indexes automatically.

Interprets an SQL query and combines information from various tables.

RDBMS Terminology:

Before we proceed to explain MySQL database system, let's revise few definitions related to
database.

Database: A database is a collection of tables, with related data.

17
Table: A table is a matrix with data. A table in a database looks like a simple
spreadsheet.

Column: One column (data element) contains data of one and the same kind, for
example the column postcode.

Row: A row (= tuple, entry or record) is a group of related data, for example the data
of one subscription.

Redundancy: Storing data twice, redundantly to make the system faster.

Primary Key: A primary key is unique. A key value can not occur twice in one table.
With a key, you can find at most one row.

Foreign Key: A foreign key is the linking pin between two tables.

Compound Key: A compound key (composite key) is a key that consists of multiple
columns, because one column is not sufficiently unique.

Index: An index in a database resembles an index at the back of a book.

Referential Integrity: Referential Integrity makes sure that a foreign key value
always points to an existing row

MySQL Database:

MySQL is a fast, easy-to-use RDBMS being used for many small and big businesses.
MySQL is developed, marketed, and supported by MySQL AB, which is a Swedish
company. MySQL is becoming so popular because of many good reasons:

MySQL is released under an open-source license. So you have nothing to pay to use
it.

MySQL is a very powerful program in its own right. It handles a large subset of the
functionality of the most expensive and powerful database packages.

MySQL uses a standard form of the well-known SQL data language.

18
MySQL works on many operating systems and with many languages including PHP,
PERL, C, C++, JAVA, etc.

MySQL works very quickly and works well even with large data sets.

MySQL is very friendly to PHP, the most appreciated language for web development.

MySQL supports large databases, up to 50 million rows or more in a table. The


default file size limit for a table is 4GB, but you can increase this (if your operating
system can handle it) to a theoretical limit of 8 million terabytes (TB).

MySQL is customizable. The open-source GPL license allows programmers to


modify the MySQL software to fit their own specific environments.

MYSQL TABLES

CREATE TABLE IF NOT EXISTS `mst_result` (

`login` varchar(20) DEFAULT NULL,

`test_id` int(5) DEFAULT NULL,

`test_date` date DEFAULT NULL,

`score` int(3) DEFAULT NULL

) ENGINE=InnoDB DEFAULT CHARSET=latin1;

--

-- Dumping data for table `mst_result`

--

INSERT INTO `mst_result` (`login`, `test_id`, `test_date`, `score`) VALUES

('raj', 8, '0000-00-00', 3),

19
('raj', 9, '0000-00-00', 3),

('raj', 8, '0000-00-00', 1),

('ashish', 10, '0000-00-00', 3),

('ashish', 9, '0000-00-00', 2),

('ashish', 10, '0000-00-00', 0),

('raj', 8, '0000-00-00', 0),

('ankur', 11, '0000-00-00', 0);

CREATE TABLE IF NOT EXISTS `mst_test` (

`test_id` int(5) NOT NULL AUTO_INCREMENT,

`sub_id` int(5) DEFAULT NULL,

`test_name` varchar(30) DEFAULT NULL,

`total_que` varchar(15) DEFAULT NULL,

PRIMARY KEY (`test_id`)

) ENGINE=InnoDB DEFAULT CHARSET=latin1 AUTO_INCREMENT=12 ;

--

-- Dumping data for table `mst_test`

--

INSERT INTO `mst_test` (`test_id`, `sub_id`, `test_name`, `total_que`) VALUES

(8, 1, 'VB Basic Test', '3'),

(9, 1, 'Essentials of VB', '5'),

20
(10, 1, 'Creating User Services', '5'),

(11, 7, 'function', '5');

CREATE TABLE IF NOT EXISTS `mst_user` (

`user_id` int(5) NOT NULL AUTO_INCREMENT,

`login` varchar(20) DEFAULT NULL,

`pass` varchar(20) DEFAULT NULL,

`username` varchar(30) DEFAULT NULL,

`address` varchar(50) DEFAULT NULL,

`city` varchar(15) DEFAULT NULL,

`phone` int(10) DEFAULT NULL,

`email` varchar(30) DEFAULT NULL,

PRIMARY KEY (`user_id`)

) ENGINE=InnoDB DEFAULT CHARSET=latin1 AUTO_INCREMENT=15 ;

--

-- Dumping data for table `mst_user`

--

INSERT INTO `mst_user` (`user_id`, `login`, `pass`, `username`, `address`, `city`, `phone`,
`email`) VALUES

(1, 'raj', 'raj', 'Rajen', 'limbdi', 'limbdi', 9999, 'raj@yahoo.com'),

(12, 'ashish', 'shah', 'ashish', 'laskdjf', 'S''nagar', 228585, 'ashish@yahoo.com'),

21
(14, 'Dhaval123', 'a', 'a', 'a', 'a', 0, 'dhaval@yahoo.com');

22
Chapter 5.0 PHP

INTRODUCTION

PHP is a powerful language and the interpreter, whether included in a web server as a module
or executed as a separate CGI binary, is able to access files, execute commands and open
network connections on the server. These properties make anything run on a web server
insecure by default. PHP is designed specifically to be a more secure language for
writing CGI programs than Perl or C, and with correct selection of compile-time and runtime
configuration options, and proper coding practices, it can give you exactly the combination of
freedom and security you need.

As there are many different ways of utilizing PHP, there are many configuration options
controlling its behaviour. A large selection of options guarantees you can use PHP for a lot of
purposes, but it also means there are combinations of these options and server configurations
that result in an insecure setup.

The configuration flexibility of PHP is equally rivalled by the code flexibility. PHP can be
used to build complete server applications, with all the power of a shell user, or it can be used
for simple server-side includes with little risk in a tightly controlled environment. How you
build that environment, and how secure it is, is largely up to the PHP developer.

This chapter starts with some general security advice, explains the different configuration
option combinations and the situations they can be safely used, and describes different
considerations in coding for different levels of security.

23
SNAP SHOT

Home Page

24
Baby dress

25
SignUp Page

26
Gallery Page

27
Login Page

28
Kids Page

29
Men Shirt

30
Women Dreess

31
Sandal PageAbout Page

32
DATA FLOW DIAGRAM

33
INT
ERPRETATION OF THE RESULT

The system has been implemented and tested successfully. It meets the
information requirements specified to the great extent. although the system has
been designed keeping the present and future requirements in mind and made
very flexible.

There are limitations of the system. proper consideration has been given for a
wide range of new enhancements.The system is developed user friendly.In future
, if it is required to generate reports other than provided by the system it can be
simply achieved by a separate module to the main menu without affecting the
design of the system.

34
ADVANTAGES

(1)it simplifies the operation.

(2)it avoids a lot of manual work.

(3)every transaction is obtained and processed immediately.

(4)avoids errors by avoiding the manual work.

(5)user friendly screen to enter the data and enquire the database tables.

(6)online help messages available to the operating system.

(7)user can easily access the system without much experience.

(8)provide hardware and software securities.

(9)portable and flexible for further extensions.

CONCLUSION

The central concept of the application is to allow the customer to shop virtually using the
Internet and allow customers to buy the items and articles of their desire from the store. The
information pertaining to the products are stores on an RDBMS at the server side (store).The
Server process the customers and the items are shipped to the address submitted by them.

The application was designed into two modules first Os for the customers who wish to buy
the articles. Second is for the storekeepers who maintains and updates the information
pertaining to the articles and those of the customers.

35
The end user of this product is a departmental store where the application is hosted on the
web and the administrator maintains the database. The application which is deployed at the
customer database, the details of the items are brought forward from the database for the
customer view based on the selection through the menu and the database of all the products
are updated at the end of each transaction.

36
BIBLIOGRAPHY

Websites

http://www.google.com
http://www.microsoft.com
http://www.programmer2programmer.net
http://www.codeproject.com
http://www.msdn.com.

37

You might also like