Professional Documents
Culture Documents
1. INTRODUCTION
HISTORY OF THE COMPANY: This gives about the history of the company
regarding when it was started.
PRODUCT DETAILS: This gives about the details of the products, which are
produced by the company, and also we facilitate the buying them on the online.
SEARCH ENGINE: This option gives the details of the employee who worked
within the company.
Web Application for a Company 2
APTITUDE TEST: This option gives the online examination facility who want to join
in the company to do job.
ONLINE LEAVE TAKING: This option provides the facility that the employee who
want to leave days, he asked on those leaves through online.
INTRANET MAILING SYSTEM: This option gives the facility that the employees
who worked with in the company can send offline messages to the others.
SITE MAP: This page displays all services provided by the company.
That is this page gives overview of the site.
CHATTING: This page provides the service of chatting facility between the
employees present in the company.
Homepage
present in the project. These are the main screens in the project.
2. REVIEW OF PROJECT:
Web Application for a Company 4
It is a set of computers talking over fiber optics, phone lines, satellite links and
other media.
• It is a place where you can talk to your friends and family around the world.
• It is a place to get cool game demos.
• It is an ocean of resources waiting to be mined.
• It is a place to do research for your thesis or a business presentation.
• It is an unlimited commercial opportunity.
• It is a worldwide support group for any problem or need.
• It is a gold mine of professionals in all fields sharing information about their work.
• It is the collection of hundreds of libraries and archives that will open to your
fingertips.
• It is an ultimate time-waster.
• It is the technology of the future that will help make our lives and those of our
children
• brighter.
other information that can be stored and presented electronically. All these resources
are available to all computers connected to the Internet.
You can communicate with anyone on the Internet by sending e-mail, posting
messages in newsgroups, chatting in various chat areas and even telephoning and
video conferencing over the Net.
Internet started with the ARPAnet and a few resourceful computer scientists who
wanted to share files among people working on
similar projects. ARPA is the acronym for Advanced Research Projects Agency of the
United States Department of Defense. In September 1969, the University of California
at Los angels (UCLA), The Stanford Research Institute(SRI), the University of
California, Santa Barbara(USCB) and the University of Utah were connected using
500kbps leased vice lines, and this network is called ARPAnet. Although the original
aim of this research was military, it was soon used for other purposes. Other
universities and research and commercial organizations soon began to us his
technology to create their own networks, some of these networks then connected to
the ARPAnet.
Another factor in the rapid growth of this technology was the inclusion of the
TCP/IP protocols in the Berkeley version of UNIX. TCP/IP protocols gained wide
usage, and more networks were created with them. These networks began to connect
to each other. There was originally only one, the ARPAnet. Soon there were many
separate networks. Eventually all these individual interconnected TCP/IP networks
were collectively referred to as the Internet, or more simply the Net.
As the number of networks increases every day the Internet connects about 40
million users worldwide.
Web Application for a Company 6
CAPABILITIES OF INTERNET:
Some of the fundamental capabilities of the Internet or the WWW are as follows:
Interaction: Two way or multi channel communication is possible on the net. You can
get immediate and focused feedback from customers and forward online customer
queries to appropriate internal resources.
Electronic Commerce: Support for online ordering, purchase orders, inventory and
delivery tracking.
Integration: You can link online activities with internal, back-end-process for
maximum impact, distribute information and customer interaction across functions, and
promote new business applications.
Given below is a random list of activities that you can do on the Internet.
Web Application for a Company 7
The World Wide Web or simply the web for short is one of the most popular
services provided via the Internet. At its best, it combines the appeal of exploring exotic
destinations with the excitement of playing a video game, listening to a video CD, or
even directing a movie, and you can do it all by means of an intuitive, easy to use,
graphical user interface. Probably the most appealing aspect of the web, however, is
the fact that it isn't just for spectators. Once you have some experience with the Web
authoring tools, you can publish yourself-and offer over the Web anything you want to
make available, from your company's latest research results to your own documentary
on the lives of the rich and famous.
A little history: What exactly is the Web? The web is the collection of all the
browsers, servers, files, and browser-accessible services available through the
Internet. A computer scientist named Tim Berners-Lee created it in 1989; its original
purpose was to facilitate communication between research scientists. Berners-Lee,
working at the Counsel European pour la Recherché Nucleaire (CERN), the European
Laboratory for Practical physics, located in Geneva, Switzerland, designed the Web in
such a way that documents located on one computer on the internet could provide
links to documents located on other computers in the Internet.
To many, the most familiar element of the web is the browser. A browser is the
user's window to the web, providing the capability to view Web documents and access
web-based services and applications
THE GOOD:
• It is easy to create pages and publish information
• It is relatively inexpensive to start and maintain a page
• Navigating from page to page is simple.
• There is a browser for almost every type of computer and operating system.
THE BAD:
• Because of immature technology, some browser and server software have bugs.
• Graphics take a long, long time to transfer over the internet, particularly when there
is a lot of traffic.
• Addresses change regularly, so you never really know what is out there.
• Largely untested software and unknown network capacity requirements so the
impact on individual web servers and the Internet as a whole is unknown.
• Weak or non-existent server security means any one can visit your site.
• Weak or non-existent browser security permits some web servers to track and build
mailing lists from user ids of everyone who visits.
THE UGLY:
• Not all the browsers display HTML the same way, so what looks good with one
browser may not with another.
• Not all browsers support all types of graphic files, so some graphics may not
display.
• Graphics require a large amount of network capacity, so some users cannot view
any graphics.
Web Application for a Company 10
Hyper Text Markup Language (HTML) is a method where ordinary text can be
converted into hypertext. it is a set of special codes included to control the layout and
appearance of the text. It is a set of special codes included to control the layout and
appearance of the text. Technically, HTML is not a programming language. It combines
instructions within data to tell a display program called browser, how to render the data
that the document contains.
HTML is the character-based method for describing and expressing the content.
The content is pictures, text, sound, and video clips.
It delivers the contents of multiple platforms.
Tim Berners Lee developed HTML in early 1990 at CERN (Counsil European de
la Recherche Nucleaire), the European Poetical Physics Laboratory in Geneva,
Switzerland. HTML is a public domain and not owned by anybody. The W3C (World
Wide Web Consortium) www.w3.org is the body, which controls the HTML standards.
The HTML working group comprises of industry leaders, content providers and other
leading experts who provide input on Web accessibility and internationalization.
Tim Berners Lee originally developed HTML, and was popularized by the
Mosaic Browser. During, 1990's it has blossomed with the explosive growth of the web.
During this time, HTML has been extended in a number of ways. HTML 2.0
specification was developed under the protection of the Internet Engineering Task
Force (IETF) to codify common practice in late
Web Application for a Company 11
1994. HTML 3.0 proposed much richer version of HTML. Despite never receiving
consensus in standards discussions, these drafts led to the adoption of a new range of
new features. The efforts of the World Wide Web Consortium's HTML working group to
codify common practice in 1996 resulted in HTML 3.2. HTML 4.0 extends HTML with
mechanisms for style sheets, scripting frames, embedding objects improved support
for right to left and mixed direction text, richer tables and enhancements to forms,
offering improved accessibility for people with disabilities.
HTML has generally two parts an on-code and an off-code, which contains the
text to be defined. Few tags do not require an off code.
Syntax: <tagname>....</tagname>
The most important thing to keep in mind about HTML is that its purpose is not
to specify the exact formatting or layout of a web page, but rather to define and specify
the specific elements that make up a page such as the body of the text, heading,
paragraphs, line breaks, text elements and so on. You can use HTML to define the
composition of a web page not the appearance.
Web Application for a Company 12
Tag or Tag Element: refers to the HTML codes that define an element in an HTML file,
such as headings, paragraphs, images and lists. There are two kinds of tags---the
container tag and empty tag.
Container tag: These tags, which bracket or contain text or other tag elements, are
called container tags. These actually contain two tags, a start tag and an ending tag,
which enclose the text they affect.
Empty tag: These are standard alone and do not bracket or contain text or any other
tag elements. An empty tag function is a stand-alone element with an HTML
documents and thus does not bracket or contain anything else.
Attribute: Allows you to specify how web browsers should treat a particular tag. An
attribute is included within the actual tag, either within a start tag or an empty tag. End
tag should not contain attributes.
Syntax: Attribute="value"
E.g., align="center"
Starting your page document tags: All HTML files should include at least these tags:
1. The HTML tag
2. The HEAD tag
3. The TITLE tag
Web Application for a Company 13
The HTML tag: This tag defines the top most elements, identifying it as an HTML
document. It is a container tag that has a start tag and an end tag and all other tags
and texts are nested within it.
Syntax: <HTML>
......
</HTML>
The HEAD tag: This tag contains information about your HTML file. It may also
contain other tag that helps you from identify your HTML file to the outside world. The
head tag is nested within the HTML tag.
Syntax: <HTML>
<HEAD>
.......
</HEAD>
</HTML>
Usually, the only tag contained within the head tag is the title tag. Other tags
also can be contained within the head tag but they used less often.
The TITLE tag: This tag is nested within the head tag. It identifies your page to the
rest of the world. The tag output is displayed on your browser's title bar but does not
appear as part of the page.
Syntax: <HTML>
<HEAD>
<TITLE>
Web Application for a Company 14
The BODY tag: This tag is the compliment of the head tag and contains all the tags,
or elements that a browser actually displays as the body of your HTML document. Both
the head tag and the body tag are nested within the HTML tag. Body tag comes after
the head tag; they denote a separate part of the HTML document.
Syntax: <HTML>
<HEAD>
<TITLE>
My first web page
</TITLE>
</HEAD>
<BODY>
........
</BODY>
</HTML>
Web Application for a Company 15
HELPER APPLICATIONS:
Most graphical web browsers provide support for viewing images in common
graphics formats, such as GIF and JPEG. Some can even play audio files. However,
most browsers do not provide much more than that in
terms of multimedia features. Instead of building ever larger, ever more complicated
browsers that are capable of handling the ever growing list of file formats, browser
developers have opted to design their browsers to rely on their programs, referred to
as helper applications, to support the broad range of multimedia and other file formats.
When a browser encounters a file type that it does not know how to handle, it searches
its list of helper applications to see if it has one that is capable of dealing with the file. If
a suitable helper is found, then the browser executes the helper and passes it the
name of the file to be run. If an appropriate helper cannot be found, then the browser
prompts the user to identify which helper to use or to save the file for later display.
JavaScript is the essential glue that combines HTML, java applets, plug-ins, server-
side programs, and other web components into fully integrated web applications. While
java's forte is in web component development, JavaScript excels at component
integration.
Web Application for a Company 16
Java is very powerful and popular language that supports the development of
web-based applications. It provides a number of capabilities that complement those
provide by JavaScript.
What Is Java?
The rapid growth in the popularity of the java language is nothing short of a
phenomenon. In less than a year, java went from a relatively unknown alpha version to
an incredibly successful version 1.0 release. Every major computer hardware and
software vendor has since endorsed Java. Its remarkable success is summed up by
fact that Microsoft, its chief rival, not only supports java with Internet explorer, but also
sells J++, a popular development environment. In this section we'll explore various
aspects of Java.
Java Is Platform-Independent:
Java's phenomenal success is due to the fact that it provides the capability to
develop compiled software that runs, without modification, on a large variety of
operating systems platform-including Microsoft windows, Apple Macintosh, IBM os/2,
Linux, and several varieties of Unix. In addition, and perhaps more importantly,
specially designed java programs known as applets run in the context of java-enabled
web browsers, such as Netscape navigator and Microsoft Internet explorer.
The java virtual machine is the key to java's platform-independence. The Java
Virtual Machine (JVM) provides a machine-independent and operating system-
independent platform for the execution of java code. The JVM is a program that
executes java programs that are compiled into the JVM byte code. This byte code is
Web Application for a Company 17
the native machine language of the JVM and does not vary between JVM
implementations.
Java Is Object-Oriented:
Java Is Familiar:
Although java is based on c++, it is simpler and easier to use. This is because
the designers of java eliminated many of the complex and dangerous
features of C++ by doing so, java's fathers also increased its overall reliability, making
it an attractive language for mission-critical applications.
Web Application for a Company 18
Another attractive feature of java is the extensive API that comes standard with
the JDK. The API provides portable libraries for the development of window and
network-based programs. The same API is used to develop console-based programs;
windowed programs; network clients and servers; applets; and fully distributed web-
based applications. It also supports the development of multithreaded programs.
The capability to develop applets for use in web applications is one of the most
attractive features provided by java. Applets are programs that execute in the context
of a browser window; thus they allow executable content to be embedded in a web
page. This enables web pages to be more dynamic and interactive and greatly
increases the number and types of web applications that can be supported.
Java Is Secure:
The power and flexibility provided by applets requires ironclad security on the
part of the java runtime system. This high level of security is required to prevent
malicious applets from disclosing or damaging the information stored on the user's
computer. Java provides several levels of security protection:
At the compiler level, the java compiler performs extensive checks that prevent
errors and ensure that the compiled code does not contain any inconsistencies that
could allow objects to be accessed in ways other than explicitly allowed.
At the runtime level, the java runtime system prevents applets from performing
actions that could result in damage to or disclosure of information stored on your
computer.
Java Is Free:
Finally, if none of the above features are compelling enough to go with java, sun
gives the JDK away for free-it is publicly available at Navasota's web site.
Although Java and JavaScript have similar names, there are a number of similar
names that are a number of significant differences between the two languages. These
differences do not make one language superior to the other-the features of both
languages are well suited to their respective programming niches. For example,
JavaScript is designed to supplement the capabilities of HTML with scripts that are
capable of responding to web page events. As such, it has complete access to all
aspects of the browser window. Java is designed to
implement executable content that can be embedded in web pages. For this purpose, it
is endowed with much more powerful programming capabilities. However, these
capabilities are confined to a limited area of the browser window.
Java and JavaScript complement each other well. Java is the industrial following
subsections identify the differences between these two languages and shows how
Web Application for a Company 20
these differences enable each language to achieve its respective web programming
goals.
JavaScript, on the other hand, is intended to create script that can be embedded
in HTML documents. These scripts control the way the documents are laid out and
define functions to handle user events. JavaScript can be viewed as an extension to
HTML that provides additional capabilities for browser and document control. From this
perspective, it is important that JavaScript that included in HTML as source code so the
browser can inspect the code. This is the reason why it is an interpreted language
instead of a compiled language, like java.
This introduction is excerpted from JDBC TM Database Access from java TM: A
tutorial and annotated reference, currently in progress at Java soft. This book, both a
tutorial and the definitive reference manual for JDBC, will be published in the spring of
1997 by Addison Wesley Publishing Company as part of the Java series.
What Is JDBC?
JDBC tm is a Java TM API for executing SQL statements. (As a point of interest,
JDBC is a trademarked name and is not an acronym; nevertheless, JDBC is often
thought of as standing for "Java Database Connectivity".) It consists of a set of classes
and interfaces written in the Java Programming language. JDBC provides a standard
API for tool/database developers and makes it possible to write database applications
using a pure java API.
Java, being robust, secures, easy to use, easy to understand, and automatically
downloadable on a network, is an excellent language basis for
database applications. What is needed is a way for Java applications to talk to a variety
to talk to a variety of different databases. JDBC is the mechanism for doing this.
Web Application for a Company 22
JDBC extends what can be done in Java. For example, with Java and the JDBC
API, it is possible to publish a web page containing an applet that uses information
obtained from a remote database. Or an enterprise can use JDBC to connect all its
employees (even if they are using a conglomeration of Windows, Macintosh, and UNIX
machines) to one or more internal databases via an intranet. With more and more
programmers using the java programming language, the need for easy database
access from Java is continuing to grow.
MIS managers like the combination of Java and JDBC because it makes
disseminating information easy and economical. Business can continue to use their
installed databases and access information easily even if it is stored on different
database management systems. Development time for new applications is short.
Installation and version control are greatly simplified. A programmer can write an
application or an update once, put it on the server, and everybody has access to the
latest version. And for business selling information services, java and JDBC offer a
better way of getting out information updates to external customers.
The following code fragment gives a basic example of these three steps:
Connection con=DriverManager.getConnection (
“Jdbc:odbc:company”,”login”,”password”);
Statement stmt=con.createStatement ();
ResultSet rs=stmt.executeQuery ("select a, b, c from company");
While (rs.next ())
{
int x=rs.getInt ("a");
String s=rs.getString ("b");
float f=rs.getFloat ("c");
}
1. The first step in using a JDBC driver to get a database connection involves
loading the specific driver class into the application’s JVM. This makes the driver
available later, when we need it for opening the connection. An easy way to load the
driver class is to use the Class.forName () method:
Class.forName(“sun.jdbc.odbc.JdbcOdbcDriver”);
2. The next step is to ask the DriverManager class to open a connection to a given
database, where the database is specified by a specially formatted URL.The
method used to open the connection is DriverManager.getConnection().It returns a
class that implements the java.sql.Connection interface:
Connection con =
DriverManager.getConnection(“jdbc:odbc:somedb”,”user”,”passwd”)
Web Application for a Company 24
3. The third step is creating the statements (SQL / DML / DDL) and executes the
query. The method of Connection that is used to obtain a new statement object is:
Statement stmt = con.createStatement();
The method that executes the statement and returns a java.sql.
ResultSet that encapsulates the retrieved data is:
ResultSet rs = stmt.executeQuery (“SELECT * FROM Customers”);
JDBC is a "low-level" interface, which means that it is used to invoke (or "call")
SQL commands directly. It works very well in this capacity and is easier to use than
other database connectivity APIs, but it was designed also to be a base upon which to
build higher-level interfaces and tools. A higher-level interface is "user-friendly", using a
more understandable or more convenient API that is translated behind the scenes into
a low-level interface such as JDBC. At the time of this writing, two kinds of higher-level
APIs are under development on top of JDBC:
1. An embedded SQL for Java. At least one vendor plans to build this. DBMSs
implement SQL, a language designed specifically for use with databases. JDBC
requires that the SQL statements be passed as Strings to Java methods. An
embedded SQL preprocessor allows a programmer to instead of mix SQL
statements directly with Java: for example, a Java variable can be used in a SQL
statement to receive or provide SQL values. The embedded SQL preprocessor
then translates this Java/SQL mix into java with JDBC calls.
Web Application for a Company 25
2. A direct mapping of relational database tables to Java classes. Javasoft and others
have announced plans to implement this. In this "object/relational" mapping, each
row of the table becomes an instance of that class, and each column value
corresponds to an attribute of that instance. Programmers can then operate
directly on Java objects; the required SQL calls to fetch and store data are
automatically generated "beneath the covers". More sophisticated mappings are
also provided, for example, where rows of multiple tables are combined in a java
class.
As interest in JDBC has grown, more developers have been working on JDBC-
based tools to make building programs easily, as well. Programmers have also been
writing applications that make accessing a database easier for the end user. For
example, an application might present a menu of database tasks from which to
choose. After a task is selected, the application presents prompts and blanks for filling
in information needed to carry out the selected task. With the requested input typed in,
the application then automatically invokes the necessary SQL commands. With the
help of such an application, users can perform database tasks even when they have
little or no knowledge of SQL syntax.
The answer is that you can use ODBC from java, but this is best done with the help of
JDBC in the form of the JDBC-ODBC Bridge, which we will cover shortly. The question
now becomes, "Why do you need JDBC?" There are several answers to this question:
Web Application for a Company 26
1. ODBC is not appropriate for direct use from Java because it uses a C interface.
Calls from java to native C code have a number of drawbacks in the security,
implementation, robustness, and automatic portability of applications.
2. A literal translation of the ODBC C API into a java API would not be desirable. For
example, Java has no pointers, and ODBC makes copious use of them, including
the notoriously error-prone generic pointer "void*". You can think of JDBC as
ODBC translated into an object-oriented interface that is natural for java
programmers.
3. ODBC is hard to learn. It mixes simple and advanced features together, and it
has complex options for even simple queries. JDBC, on the other hand, was
designed to keep simple things simple while allowing more advanced capabilities
where required.
4. A Java API like JDBC is needed in order to enable a "pure Java" solution. When
ODBC is used, the ODBC driver manager and drivers must be manually installed
on every client machine. When the JDBC driver is written completely in Java,
however, JDBC code is automatically installable, portable, and secure on all Java
platforms from network computers to mainframes.
In summary the JDBC API is a natural Java interface to the basic SQL abstractions and
concepts. It builds on ODBC rather than starting from scratch, so programmers familiar
with ODBC will find it very easy to learn JDBC. JDBC retains the basic design features
of ODBC: in fact, both interfaces are based on the X/open SQL CLI (call level
interface). The big difference is that JDBC builds on and reinforces the style and
virtues of Java, and, of course, it is easy to use.
More recently, Microsoft has introduced new APIs beyond ODBC: ADO, and OLEDB.
These designs move in the same directions as JDBC in many ways, that is, in being an
object-oriented database interface based on classes that can be implemented on
ODBC. How ever, we did not see compelling functionality in any of these interfaces to
make them an alternative basic to ODBC, especially with ODBC driver market well
Web Application for a Company 27
established. Mostly they represent a thin veneer on ODBC. This is not say that JDBC
does not need to evolve from the initial release; however, we feel that most new
functionality belongs in higher-level APIs such as the object/relational mappings and
embedded SQL mentioned in the previous section.
The JDBC API supports both two-tier and three-tier models for database access.
In the two-tier model, a java applet or application talks directly to the database. This
requires a JDBC driver that can communicate with the particular database
management system being accessed. A user's SQL statements are delivered to the
database, and the results of those statements are sent back to the user. The database
may be located on another machine to which the user is connected via a network. This
is referred to as a client/server configuration, with the user's machine as the client, and
the machine housing the database as the server. The network can be an intranet, for
example, connects employees within a corporation, or it can be the Internet.
Java
Application
JDBC
DBMS
In the three-tier model, commands model, commands are sent to a "middle tier"
of services, which then send SQL statements to the database. The database
processes the SQL statements and sends the results back to the middle tier, which
then sends them to the user. MIS directors find the three-tier model very attractive
because the middle tier makes it possible to maintain control over access and the kinds
of updates that can be made to corporate data. Another advantage is that when there
is a middle tier, the user can employ and easy-to-use higher-level API, which is
translated by the middle tier into the appropriate low-level calls. Finally, in many cases
the three-tier architecture can provide performance advantages.
Java Applet or
HTMLbrowser
Application
Server (Java)
JDBC
DBMS
Until now the middle tier has typically been written in languages such as C or C++,
which offer fast performance. However, with the introduction of optimizing compilers
that translate java byte code into efficient machine-specific code, it is becoming
practical to implement the middle tier in java. This is a big plus, making it possible to
take advantage of java's robustness, multithreading, and security features. JDBC is
important to allow database access from a java middle tier.
SQL Conformance:
Web Application for a Company 29
databases support stored procedures or outer joins, and those that do are not
consistent with each other. It is hoped that the portion of SQL that is truly standard
will expand to include more and more functionality. In the meantime, however, the
JDBC API must support SQL as it is.
One way the JDBC API deals with this problem is to allow any query string to be
passed through to an underlying DBMS driver. This means that an application is free to
use as much SQL functionality as desired, but it runs the risk of receiving an error on
some DBMSs. In fact, an application query need not even be SQL, or it may be a
specialized derivative of SQL designed for specific DBMS (for document or image
queries, for example).
The escape syntax provides a standard JDBC syntax for several of the more
common areas of SQL divergence. For example, there are escapes for date literals
and for stored procedure calls. For complex applications, JDBC deals with SQL
conformance in a third way. It provides descriptive information about the DBMS by
means of the Database Metadata interface so that applications can adapt to the
requirements and capabilities of each DBMS.
Web Application for a Company 30
Because the JDBC API will be used as a base API for developing higher-level
database access tools and APIs, it also; has to address the problem of conformance
for anything built on it. The designation "JDBC COMPLIANT" was created to set a
standard level of JDBC functionality on which users can rely. In order to use this
designation, a driver must support at least ANSI SQL-2 Entry Level. (ANSI SQL-2
refers to the standards adopted by the American National Standards Institute in 1992.
Entry Level refers to a specific list of SQL capabilities.) Driver developers can
ascertain that their drivers meet these standards by using the test suite available with
the JDBC API.
JDBC Products:
At the time of this writing, a number of JDBC based products have already been
deployed or are under development. O course, the information in this section will
quickly become dated, so the reader should consult the JDBC web page for the latest
information. It can be found by navigating from the following URL:
http://java.sun.com/products/jdbc
Java Soft provides three JDBC product components as part of the java
Development kit (JDK):
The JDBC driver manager is the backbone of the JDBC architecture. It actually
is quite small and simple; its primary function is to connect java applications to the
correct JDBC driver and then get out of the way.
The JDBC driver test suite provides some confidence that JDBC drivers will run
your program. Only drivers that pass the JDBC driver test suite can be designated
JDBC COMPLIANT.
JAVA APPLICATION
The JDBC drivers that we are aware of at this time fit into one of four
categories:
1. JDBC-ODBC Bridge plus ODBC driver: The java soft bridge product
provides JDBC access via ODBC drivers. Note that ODBC binary code, and in many
cases database client code, must be loaded on each client machine that uses this
driver. As a result, this kind of driver is most appropriate on a corporate network where
client installations are not a major problem, or for application server code written in java
in a three-tier architecture.
2. Native-API partly-java driver: This kind of driver converts JDBC calls into
calls on the client API for Oracle, Sybase, Informix, DB2, or other DBMS. Note that, like
the bridge driver, this style of driver requires that some binary code be loaded on each
client machine.
Web Application for a Company 33
3. JDBC-Net pure java driver: This driver translates JDBC calls into a DBMS-
independent net protocol, which is then translated, to a DBMS protocol by a server.
This net server middleware is able to connect its pure java clients to many different
databases. The specific protocol used depends on the vendor. In general, this is the
most flexible JDBC alternative. It is likely that all vendors of this solution will provide
products suitable for Intranet use. In order for these products to also support Internet
access, they must handle the additional requirements for security, access through
firewalls, and so on, that the web imposes. Several vendors are adding JDBC drivers
to their existing database middleware products.
4. Native-protocol pure java driver: This kind of driver converts JDBC calls
into the network protocol used by DBMS directly. This allows a direct call from the
client machine to the DBMS server and is a practical solution for Intranet access.
Since many of these protocols are proprietary, the database vendors themselves will
be the primary source, and several database vendors have these in progress.
Eventually, we expect that driver categories 3 and 4 will be the preferred way to
access databases from JDBC. Driver categories 1 and 2 are interim solutions where
direct pure java drivers are not yet available. There are possible variations on
categories 1 and 2 (not shown in the table below) that require a connector, but these
are generally less desirable solutions. Categories 3 and 4 offer all the advantages of
java, including automatic installation (for example, downloading the JDBC driver with
an applet that uses it);
The following chart shows the four categories and their properties:
At the time of this writing, there are dozens of drivers in category 1: ODBC
drivers that can be used with Java Soft 's bridge. There are currently about a dozen
category 2 drivers built on top o native APIs for DBMSs. There are a few category 3
drivers. Currently there are at least two category 4 drivers, but by the end of 1997, we
expect that there will be category 4 drivers for all of the major DBMSs.
To get the latest information on drivers, check the JDBC web page at
http://java.sun.com/products/jdbc. The first vendors with category 3 drivers available
were SCO, Open Horizon, Visigenic, and Web Logic. Java Soft and Intersolv, a
leading database connectivity vendor, worked together to produce the JDBC-ODBC
Bridge and JDBC Driver Test Suite.
JSP Overview:
Java Server Pages (JSP) lets you separate the dynamic part of your
pages from the static HTML. You simply write the regular HTML in the normal manner,
Web Application for a Company 35
using whatever web page-building tools you normally use. You then enclose the code
for the dynamic parts in special tags, most of which start with "<%" and end with "%>".
For example, here is a section of a JSP page that results in something like “Thanks for
ordering Core Web programming for a URL of
“http://host/orderconfirmation.jsp?Title=score+web+programming”
Thanks for ordering
<I><%=request.getParameter ("title")%></I>
You normally give your file a .jsp extension, and typically install it in any place
you could place a normal web page. Although what you write often looks more like a
regular HTML file than a servlet, behind the scenes, the JSP page just gets converted
to a normal servlet, with static HTML simply being printed to the output stream
associated with the servlet 's service method. This is normally done the first time the
page is requested, and developers can simply request the page themselves when first
installing it if they want to be sure that the first real user doesn't get a momentary delay
when the JSP page is translated to a servlet and the servlet is compiled and loaded.
Note also that many Web servers let you define aliases that so that a URL that appears
to reference an HTML file really points to a servlet or JSP page.
JSP
Page
Web Application for a Company 36
Web Generated
Browser Servlet
Compiled
Servlet
Aside from the regular HTML, there are three main types of JSP constructs that
you embed in a page: scripting elements, directives, and actions. Scripting elements
let you specify java code that will become part of the resultant servlet, directives let you
control the overall structure of the servlet, and actions let you specify existing
components that should be used, and otherwise control the behavior of the JSP
engine. To simplify the scripting elements, you have access to a number of predefined
variables such as request in the snippet above. Note that this tutorial covers version
1.0 of the JSP specification. JSP has changed dramatically since version 0.92, and
Web Application for a Company 37
although these changes were almost entirely for the better, you should note that
version 1.0 JSP pages are almost totally incompatible with the earlier JSP engine.
Servlets are indeed useful, and JSP by no means makes them obsolete.
However, the list of topics for which servlets excels. They are all tasks related to
programming or data processing. But servlets are not so good at presentation.
Servlets have the following deficiencies when it comes to generating the output.
together. Besides, it simply does not look like HTML, so it is harder to visualize.
Compare this servlet style with Listing where you hardly even notice that the page is
not an ordinary HTML document.
Web Application for a Company 39
BENEFITS OF JSP:
JSP pages are translated into servlets. So, fundamentally, any task JSP pages
can perform could also be accomplished by servlets. However, this underlying equivalence
does not mean that servlets and JSP pages are equally appropriate in all scenarios. These
issue is not the power of the technology, it is the convenience, productivity, and
maintainability of one or the other. You can do on a particular computer platform in the java
programming language you could also do in assembly language.
Now, this discussion is not to say that you should stop using servlets and use only JSP
instead. Almost all projects will use both. For some requests in your project, you will use
servlets. For others, you will use JSP. For still others, you will combine them with the MVC
architecture.
INTRODUCTION TO DBMS:
Database management Systems can be described as one of the most rapidly gaining
areas of computer and information science. DBMS is nothing more than a computer-based
record keeping systems i.e., a system whose overall purpose is to record and maintain
information.
WHY DBMS?
Web Application for a Company 41
DBMS is the key to solve the problem of information management. In general, a DBMS
must be able to reliably manage a large amount of data in a multi-user environment so that
many users can concurrently access the same data. All this A DBMS must be able to secure
the database from unauthorized access and provide efficient failure recovery.
INTRODUCTION TO “SQL”:
SQL is a “Structured Query Language”. It is a language like “C” or “COBOL”, with “while” or
“for” loops. To retrieve data in a procedural language, the end users must provide procedural
constructs, which is very difficult.
A “non-procedural language”, like SQL enables the user to make the database
transactions with ease and comfort. This is due to the user-friendliness provided by the
language.
• Create user and grant privileges for security purpose using Data Control Language
(DCL) commands.
3. REQUIREMENT ANALYSIS
3.1 INTRODUCTION:
The system analysis is the first phase in any project development. It is not only
the very first phase but also an important phase. Analyzing the project includes analysis of
each and every module of the project and thus completes as a whole.
The main aim of the analysis phase of the project development is the
identification of the requirements of the project from the customer.
Web Application for a Company 43
Structured analysis
Selecting between the two types depend on the particular application. We are
going for both the types of analysis have their own advantages and disadvantages.
Allocate functions to software and hardware, database and other system elements.
Create a system definition that forms the foundation for all subsequent work
Both software and hardware expertise are required to successfully attain the above
objectives.
REQUIREMENT ANALYSIS:
Web Application for a Company 44
System
Engineering
Software
Requiremen
t
Analysis
Software
Requirement analysis allows the software engineer to refine the software allocation
to build models of data; functional and behavioral domains that will be treated by software
Requirement analysis provide the software designer with modals that can be translated in
to data architectural and procedural design. Finally, the requirements specification
provides the developer with the means to assess quality once software is built.
Software Requirements analysis may be divided into five areas of effort.
They are:
• Problem Recognition
• Evaluation and Synthesis
• Modeling
• Specification
• Review
Web Application for a Company 45
The hardware and the software specifications for this project are as shown below
HDD : 10GB
RAM : 128MB
Cache : 512KB
Secondary Devices : 1.44 “ FDD, 52 X CD Drive
Monitor : 15 “ SVGA Color.
To run the JSP we require the httpdnoexe file. Along with these We
require a java development kit also for the project .All the above requirements are
necessary.
FUNCTIONS OF ANALYST:
time. Months or years of effort, thousands or millions of dollars, and untold professional
embarrassment can be averted if an ill-convinced system is recognized early in the
definition phase.
Economic Feasibility
Technical Feasibility
Legal Feasibility
Alternatives
ECONOMIC FEASIBILITY:
TECHNICAL FEASIBILITY:
A study of function, performance and constraints that may effect the ability to
achieve acceptable system.
LEGAL FEASIBILITY:
ALTERNATIVES:
Web Application for a Company 48
Technical Feasibility is frequently the most difficult area to assess at this stage
of the product engineering process. Because objectives, functions, and performance are
somewhat hazy, anything seems possible if right assumptions are made. It is essential that
the process of analysis and definition be conducted in parallel with an assessment of
technical feasibility. In this way concrete specifications may be judged, as they are
determined.
ATTENDANCE MANAGEMENT:
4. SYSTEM DESIGN
4.1 INTRODUCTION:
The design must implement all the explicit requirements contained in the
analysis model, and it must accommodate all of the implicit requirements desired by
the customer.
The design must be a readable, understandable guide for those who generate
code and for those who test and subsequently maintain the software.
The design should provide a complete picture of the software, addressing the
data, functional, and behavior domains from an implementation perspective.
Guidelines:
A design should be modular; that is, the software should be logically partitioned
into elements that perform specific functions and sub functions.
Web Application for a Company 52
NAME TYPE
FNAME VARCHAR2(30)
LNAME VARCHAR2(30)
Web Application for a Company 53
ID VARCHAR2(30)
FATHERNAME VARCHAR2(30)
DOB VARCHAR2(30)
GENDER VARCHAR2(6)
MARRIED VARCHAR2(10)
ADDRESS VARCHAR2(50)
PHONENUMBER NUMBER(15)
QUALIFICATION VARCHAR2(20)
MARKS1 VARCHAR2(4)
MARKS2 VARCHAR2(4)
MARKS3 VARCHAR2(4)
MARKS4 VARCHAR2(4)
RESUME VARCHAR2(1000)
EXAM VARCHAR2(5)
PORTNO VARCHAR2(20)
NAME TYPE
QNO NUMBER(3)
QUESTION VARCHAR2(500)
A VARCHAR2(20)
B VARCHAR2(20)
C VARCHAR2(20)
Web Application for a Company 54
D VARCHAR2(20)
ANS VARCHAR2(20)
NAME TYPE
ID VARCHAR2(30)
FNAME VARCHAR2(30)
LNAME VARCHAR2(30)
FATHERNAME VARCHAR2(30)
PASSWORD VARCHAR2(30)
DOB VARCHAR2(30)
GENDER VARCHAR2(8)
QUALIFICATION VARCHAR2(20)
ADDRESS VARCHAR2(50)
PHONENUMBER NUMBER(15)
MARRIED VARCHAR2(20)
LANGUAGES VARCHAR2(30)
POSITION VARCHAR2(30)
SALARY NUMBER(8)
ATTENDANCE NUMBER(2)
ADMITDATE VARCHAR2(20)
LEAVESREM NUMBER(1)
NAME TYPE
MAILTO VARCHAR2(30)
Web Application for a Company 55
MAILFROM VARCHAR2(30)
SUBJECT VARCHAR2(30)
DATETIME VARCHAR2(40)
DATA VARCHAR2(1000)
NAME TYPE
ID VARCHAR2(30)
DAYS NUMBER(3)
DAYFROM VARCHAR2(20)
DAYTO VARCHAR2(20)
CAUSE VARCHAR2(100)
NAME TYPE
ID VARCHAR2(30)
LOGINDATE VARCHAR2(20)
LEVEL-0 DFD
USER USER
Examination
Conduction
& Evaluation
Web Application for a Company 57
DATABASE
LEVEL-1 DFD
REGISTRATIO
N
USER EXAM
DATABASE
RESULT DISPLAY
LEVEL-2 DFD
Displays
Not eligible
Web Application for a Company 58
Online Aptitude Test is conducted to recruit the staff for the company.
This test consists of 15 questions retrieved randomly from the database. The
User will be eligible for the exam only if he got score more than 10 marks.
Timer is also maintained for the exam. All the users must be complete the
exam within that time only.
LEVEL-0 DFD
INBOX:
The employees use this option to see offline messages send.
Messag
e
Hyper
Inbox
Web Application for a Company 59
Reply
Receiver Inbox Move
If delete is
Delete
selected
COMPOSE:
This option is used to send messages to other users.
employees working within the company. This phase consists of requirements such as
database tables to hold the number of valid users and the tables for the individual users to
hold the messages related to them.
FLOWCHART:
START
HOME PAGE
Web Application for a Company 60
N ARE U
Y
CURRENT
CAREERS LOGIN
REGISTRATION
IS
VALID
N
ID &
EXAMINATION
CONDUCTION
&
EVALUATION Y
MAILING &
LEAVE TAKING
N RU Y LOGOUT
QUALIFIED
?
STOP