You are on page 1of 58

E-SHOPPING

Session: 2010 2011 A Project Stage -I Report Report Submitted To


Rajasthan Technical University, Kota (Raj.) Towards Partial Fulfillment of Degree of BACHELOR OF TECHNOLOGY IN COMPUTER ENGINEERING

Submitted To: Shuchi Jani Shah(08ESHCS107) Lecturer C.O.E Kovadiya(08ESHCS051) Nathdwara

Submitted By: Ripal Tohid

Department of Computer Engineering


SHRINATHJI INSTITUTE NATHDWARA OF TECHNOLOGY & ENGINEERING,

[Approved by AICTE and Affiliated to RTU, Kota]

CERTIFICATE

This is to certify that the dissertation work entitled UNIQUE DHOTEL 1.0 submitted by Mr.Ripal Shah & Mr.Tohid Kovadiya students of final year B.Tech(Computer Enginering) in the year 2011 of Computer Engineering department of this institute,is a satisfactory account of his dissertation work based on syllabus which is approved for the award of degree of Bachelor of Technology in Computer Engineering.

Internal Examinar Examinar

External

ACKNOWLEDGEMENT
After th completition of this minor project work phase-1,words ar not enough to express our feelings about all thos who helped us to reach our goal,felings above this is us to almighty for providing us this moment. Its a grate pleasure and moment of immense satisfaction for us to express our profound gratitude to Shuchi Jani,Lect. Of Computer Engineering Department,sit Nathdwara.whose constant encouragement enabled us to work enthusiastically her perpectual motivation,patienc and excellence expertise instruction and discussion during the progress of the dissertation work have benefit us to an extent,which is byond expression.hie depth and breadth of knowledgeof computer science engineering feld made us raliz that theortical knowledge always helps to develop efficient operational software,which is ablend of all core subjects of the feild.We are highly indebted to him for her valuable guidance has ben a fruitful and unforgettable experience. We also extended our deed gratitude to Mr.Ashok parik,Director,SITE,Nathdwara for providing all necessary facilitiesand true encouraging environment to bring out th e best of our endeavors. We sincrly wish to express our grateful thanx to all of the staff of computers engineering dpartment and all those who have embeded us with technical knowledge of computer and information technology during various stages of B.Tech computer engineering. We would like to acknowledge all our freinds,who have contributed directly or indirectly in this major project work.Finally we thank our family members for the moral support they give to us in completion of our major project. To successful completion of minor project genrally not an individual effort.It is an outcome of the commulative eeforts of a number of persons,each having their own special way include the completion of this dissertation.

CONTENT (1) Abstract (2) Introduction (3) Feasibility study 3.1 Technical Feasibility Study 3.2 Economical Feasibility Study Requirement Gathering 4.1 Questionnaires 4.2 Domain Data Dictionary (5) Requirement Analysis 5.1 Identify entity 5.2 Actor 5.3 Identify Use cases model 5.4 Use cases model 5.4.1 Use Cases Diagram 5.4.1.1 Use Cases Description 5.4.2 Sequence Diagrams 5.4.2.1 Sequence Diagram Description 5.4.3 Collaboration Diagram 5.4.4.1 Description 5.4.4 Class Diagrams 5.4.3.1 Class Description (6) Design 6.1 Architecture 6.2 Mechanisms 6.3 Data Model 6.3.1 ER-Diagrams 6.3.2 DFD 6.3.3 Logical and Physical Level (7) Design Classes 7.1 Persistent Classes (8) Specification (9) References / Bibliography (10) Conclusion

PAGE NO. 5 6 7 7 7 8 8 16 21 21 22 23 24 25 26 27 28 29 30 31 32 35 35 37 38 39 40 44 45 52 56 58 59

ABSTRACT
Abstraction refers to the act of representing essential features without including the background details or implementation; it converts large documentation into specific details of the system. Here we are making a project of E-SHOPPING which can be used for customers to buy online products which are available on the website. It provides a fastest and easiest way to buy or sell the product. Online shopping is the process whereby consumers directly buy goods or services from a seller in real-time, without an intermediary service, over the Internet. It is a form of electronic commerce. An online shop, e-shop, e-store, internet shop, web shop, web store, online store, or virtual store evokes the physical analogy of buying products. The process is called Business-to-Consumer (B2C) online shopping. When a business buys from another business it is called Business-to-Business (B2B) online shopping. Online shopping has become popular. In order to shop online, one must be able to have access to a computer as well as a credit card. Shopping has evolved with the growth of technology. The Impact of Internet User Shopping Patterns and Demographics on Consumer Mobile Buying Behaviour. Journal of Electronic Commerce Research, An influential factor in consumer attitude towards non-store shopping is exposure to technology, since it has been demonstrated that increased exposure to technology increases the probability of developing favourable attitudes towards new shopping channels.

Chapter 1

INTRODUCTION

E-commerce is fast gaining ground as an accepted and used business paradigm. More and more business houses are implementing web sites providing functionality for performing commercial transactions over the web. It is reasonable to say that the process of shopping on the web is becoming commonplace. The objective of this project is to develop a general purpose e-commerce store where any product (such as books, CDs, computers, mobile phones, electronic items, and home appliances) can be bought from the comfort of home through the Internet. However, for implementation purposes, this paper will deal with an online book store. An online store is a virtual store on the Internet where customers can browse the catalogue and select products of interest. The selected items may be collected in a shopping cart. At checkout time, the items in the shopping cart will be presented as an order. At that time, more information will be needed to complete the transaction. Usually, the customer will be asked to fill or select a billing address, a shipping address, a shipping option, and payment information such as credit card number. An e- mail notification is sent to the customer as soon as the order is placed. In this project, we have implemented an on line shopping cart and order management system which provides trading community options to buy and sell products online through online shopping. Only registered users will be allowed to participate in this process. The registered sellers can add his item with full details which consists of item description and seller description. Any user (buyer) can enter in to the system and he can browse and search the products. User can add his item in to the cart and can make the checkout. Before entering shipping information and payment details he must register him self .After the dealing system will send a message to the corresponding seller. Administrator is the third user of this item and he can add categories, subcategories, products, disable user etc. In this project, we have implemented auction system. Auctions have been around for centuries. People with goods wanted an efficient way to sell those goods to people who wanted those goods. For many people, the memory of an auction involves a fast-tongued auctioneer belting out numbers to a loosely organized crowd. Historically, the highest level of technology used for an auction involved plugging a microphone into a wall. Then someone realized that the Internet could be more than a paperless catalogue. The Internet could be used to expand the universe of potential buyers for any one item. It could be used by buyers to compare goods more efficiently and accurately. Anyone could enjoy an auction from a comfortable seat unencumbered by time or location. Online shoppers commonly use credit card to make payments. So, we have implemented credit card system for online shopping. In this project user can give their feedback or queries to the admin. As well as admin can reply to customer.

3.FEASIBILITY STUDY
Feasibility is a test of a system proposal according to its workability,impact on the organization,ability to meet user needs and effective use of resources.In feasibility study phase,we had undergone to various steps like identify the origin of th information at different level.Identify the expextation of user from system,analyze the drawback of exsisting system etc. System must be feasible from Technical feasibility and feasibility from economical point of view is known as technical feasibility from economical point of view it is known as economical feasibility.

3.1

TECHNICAL FEASIBILITY :-

Technical feasibility is related to the avaibility of the hardware and software to perform th essential computing.College management system is conducted as a simplest way to solve the problems which are faced by the organizations, colleges and schools etc.Every Organizations or college wants manage their data systematically and properly but this process is so time consuming and so tedious.The people of this era want to make their use of preceious time rather then wasting.the solution of this problem is college management system which is technically feasible. By developing a college management system we want to save time and also we can secure all data in a proper database.College management system can handle all the records of students.By using the technical feasibility it reduces th loss of data and give th efficient result. In technical feasibility the following issue are taken into consideration: Whether the reqired technology is available or not. Whether the required resources are available.

3.2

ECONOMICAL FASIBILITY :-

For any system the expected benefits equal or exceeds costs,the system can be judged to be economically feasible.In th economic feasibility,cost benefit analysis is done in which expected costs and benefit analysis is done in which expected costs and benefits are evaluated.Economic analysis is used for evaluating th effectiveness of proposed system. In economic feasibility,the most important is cost benefit analysis.As the name suggest ,it is an analysis of th cost to be incurred in the system and benefits derivable out of the system.click on the linhk below which will get you the page that explains what cost benefit analysis is and how u can perform a cost benefit analysis. No special management is required to manage th software.No much complex or specific training is required for employees to use the software.since,after developing that application we provide the organization with profits.Profit can b in the form of improved working envoirnment.In the end result of the feasibility study is

produced which is formal document which will tell about the nature and scope of proposed solution.This document also describes about the-statement of the problem,summary of results and recommendations and conclusions.sinc our project shows feasibility in both areas.

4.REQUIREMENT GATHERING 4.1 QUESTIONERIES :

What is PHP?

PHP stands for PHP: Hypertext Preprocessor PHP is a server-side scripting language, like ASP PHP scripts are executed on the server PHP supports many databases (MySQL, Informix, Oracle, Sybase, Solid, PostgreSQL, Generic ODBC, etc.) PHP is an open source software PHP is free to download and use

What is a PHP File?


PHP files can contain text, HTML tags and scripts PHP files are returned to the browser as plain HTML PHP files have a file extension of ".php", ".php3", or ".phtml"

What is MySQL?

MySQL is a database server MySQL is ideal for both small and large applications MySQL supports standard SQL MySQL compiles on a number of platforms MySQL is free to download and use

PHP + MySQL

PHP combined with MySQL are cross-platform (you can develop in Windows and serve on a Unix platform)

Why PHP?

PHP runs on different platforms (Windows, Linux, Unix, etc.) PHP is compatible with almost all servers used today (Apache, IIS, etc.) PHP is FREE to download from the official PHP resource. PHP is easy to learn and runs efficiently on the server side

What Is a Session? A session is a logical object created by the PHP engine to allow you to preserve data across subsequent HTTP requests.There is only one session object available to your PHP scripts at any time. Data saved to the session by a script can be retrieved by the same script or another script when requested from the same visitor.Sessions are commonly used to store temporary data to allow multiple PHP pages to offer a complete functional transaction for the same visitor. What is meant by PEAR in php? PEAR is short for PHP Extension and Application Repository and is pronounced just like the fruit. The purpose of PEAR is to provide: A structured library of open-sourced code for PHP users A system for code distribution and package maintenance A standard style for code written in PHP The PHP Foundation Classes (PFC), The PHP Extension Community Library (PECL), A web site, mailing lists and download mirrors to support the PHP/PEAR community PEAR is a community-driven project with the PEAR Group as the governing body. The project has been founded by Stig S. Bakken in 1999 and quite a lot of people have joined the project since then.

How can we repair a MySQL table? The syntex for repairing a mysql table is: REPAIR TABLE tablename REPAIR TABLE tablename QUICK REPAIR TABLE tablename EXTENDED

This command will repair the table specified. If QUICK is given, MySQL will do a repair of only the index tree. If EXTENDED is given, it will create index row by row.

What Is a Persistent Cookie? A persistent cookie is a cookie which is stored in a cookie file permanently on the browsers computer. By default, cookies are created as temporary cookies which stored only in the browsers memory. When the browser is closed, temporary cookies will be erased. You should decide when to use temporary cookies and when to use persistent cookies based on their differences:

Temporary cookies can not be used for tracking long-term information. Persistent cookies can be used for tracking long-term information. Temporary cookies are safer because no programs other than the browser can access them. Persistent cookies are less secure because users can open cookie files see the cookie values.

What are the different types of error in PHP? 1. Notices: These are trivial, non-critical errors that PHP encounters while executing a script for example, accessing a variable that has not yet been defined. By default, such errors are not displayed to the user at all although you can change this default behavior. 2. Warnings: These are more serious errors for example, attempting to include() a file which does not exist. By default, these errors are displayed to the user, but they do not result in script termination. 3. Fatal errors: These are critical errors for example, instantiating an object of a non-existent class, or calling a non-existent function. These errors cause the immediate termination of the script, and PHPs default behavior is to display them to the user when they take place. Whats the special meaning of __sleep and __wakeup? sleep returns the array of all the variables than need to be saved, while __wakeup retrieves them. What are the differences between GET and POST methods in form submitting, give the case where we can use GET and we can use POST methods? GET and POST are methods used to send data to the server: With the GET method, the browser appends the data onto the URL. With the Post method, the data is sent as standard input. Major Difference In simple words, in POST method data is sent by standard input (nothing shown in URL when posting while in GET method data is sent through query string. What are the different functions in sorting an array? Sorting functions in PHP: asort() arsort() ksort()krsort() uksort()

sort() natsort() How many ways we can pass the variable through the navigation between the pages? At least 3 ways:

1. Put the variable into session in the first page, and get it back from session in the next page.

2. Put the variable into cookie in the first page, and get it back from the cookie in the next page.

3. Put the variable into a hidden form field, and get it back from the form in the next page. What is meant by MIME? MIME is Multipurpose Internet Mail Extensions is an Internet standard for the format of e-mail. However browsers also uses MIME standard to transmit files. MIME has a header which is added to a beginning of the data. When browser sees such header it shows the data as it would be a file (for example image) Some examples of MIME types: audio/x-ms-wmp image/png application/x-shockwave-flash

What is the difference between PHP4 and PHP5? PHP4 cannot support oops concepts and Zend engine 1 is used. PHP5 supports oops concepts and Zend engine 2 is used. Error supporting is increased in PHP5.

How can we submit from without a submit button? Trigger the JavaScript code on any event ( like onSelect of drop down list box, onfocus, etc ) document.myform.submit(); This will submit the form. Whats the difference between accessing a class method via -> and via ::?

:: is allowed to access methods that can perform static operations, i.e. those, which do not require object initialization. How many ways we can give the output to a browser? HTML output PHP, ASP, JSP , Servlet Function Script Language output Function Different Type of embedded Package to output to a browser.

Steps for the payment gateway processing? An online payment gateway is the interface between your merchant account and your Web site. The online payment gateway allows you to immediately verify credit card transactions and authorize funds on a customers credit card directly from your Web site. It then passes the transaction off to your merchant bank for processing, commonly referred to as transaction batching. Explain the ternary conditional operator in PHP? Expression preceding the ? is evaluated, if its true, then the expression preceding the : is executed, otherwise, the expression following : is executed.Whats the difference between include and require? Its how they handle failures. If the file is not found by require(), it will cause a fatal error and halt the execution of the script. If the file is not found by include(), a warning will be issued, but execution will continue. How many ways can we get the value of current session id? session_id() returns the session id for the current session. In how many ways we can retrieve the data in the result set of MySQL using PHP? You can do it by 4 Ways 1. mysql_fetch_row. 2. mysql_fetch_array 3. mysql_fetch_object 4. mysql_fetch_assoc What is the difference between $message and $$message?

It is a classic example of PHPs variable variables. take the example.

following

$message = Mizan;$$message = is a moderator of PHPXperts.;$message is a simple PHP variable that we are used to. But the $$message is not a very familiar face. It creates a variable name $mizan. with the value is a moderator of PHPXperts. assigned. break it like this$ {$message} => $mizanSometimes it is convenient to be able to have variable variable names. That is, a variable name which can be set and used dynamically. Where to Start? To get access to a web server with PHP support, you can:

Install Apache (or IIS) on your own server, install PHP, and MySQL Or find a web hosting plan with PHP and MySQL support

What are the types of data base ? Operational database

These databases store detailed data about the operations of an organization. They are typically organized by subject matter, process relatively high volumes of updates using transactions. Essentially every major organization on earth uses such databases. Examples include customer databases that record contact, credit, and demographic information about a business' customers, personnel databases that hold information such as salary, benefits, skills data about employees, manufacturing databases that record details about product components, parts inventory, and financial databases that keep track of the organization's money, accounting and financial dealings. Data warehouse Data warehouses archive modern data from operational databases and often from external sources such as market research firms. Often operational data undergoes transformation on its way into the warehouse, getting summarized, anonymized, reclassified, etc. The warehouse becomes the central source of data for use by managers and other end-users who may not have access to operational data. For example, sales data might be aggregated to weekly totals and converted from internal product codes to use UPC codes so that it can be compared with ACNielsen data.Some basic and essential components of data warehousing include retrieving and analyzing data, transforming,loading and managing data so as to make it available for further use. Analytical database Analysts may do their work directly against a data warehouse, or create a separate analytic database for Online Analytical Processing. For example, a company might extract sales records for analyzing the effectiveness of advertising and other sales promotions at an aggregate level.

Distributed database These are databases of local work-groups and departments at regional offices, branch offices, manufacturing plants and other work sites. These databases can include segments of both common operational and common user databases, as well as data generated and used only at a users own site. End-user database These databases consist of data developed by individual end-users. Examples of these are collections of documents in spreadsheets, word processing and downloaded files, or even managing their personal baseball card collection. External database These databases contain data collected for use across multiple organizations, either freely or via subscription. The Internet Movie Database is one example Hypermedia databases The Worldwide web can be thought of as a database, albeit one spread across millions of independent computing systems. Web browsers "process" this data one page at a time, while web crawlers and other software provide the equivalent of database indexes to support search and other activities. What are the function of Data Base ? Functions can be used or included in the following: The select list of a query that uses a SELECT statement to return a value. Copy SELECT DB_NAME(); GO A WHERE clause search condition of a SELECT or data modification (SELECT, INSERT, DELETE, or UPDATE) statement to limit the rows that qualify for the query.

Copy USE AdventureWorks2008R2; GO SELECT SalesOrderID, ProductID, OrderQty FROM Sales.SalesOrderDetail WHERE OrderQty = (SELECT MAX(OrderQty) FROM Sales.SalesOrderDetail); GO

Copy

The search condition, WHERE clause, of a view to make the view dynamically comply with the user or environment at run time.

CREATE VIEW ShowMyEmploymentInfo AS SELECT FirstName, LastName FROM Person.Person WHERE BusinessEntityID = SUSER_SID(); GO Copy CREATE TABLE SalesContacts (SalesRepID INT PRIMARY KEY CHECK (SalesRepID = SUSER_SID() ), ContactName VARCHAR(50) NULL, ContactPhone VARCHAR(13) NULL); GO Copy CREATE TABLE SalesContacts ( SalesRepID INT PRIMARY KEY CHECK (SalesRepID = SUSER_SID() ), ContactName VARCHAR(50) NULL, ContactPhone VARCHAR(13) NULL, WhenCreated DATETIME DEFAULT GETDATE(), Creator INT DEFAULT SUSER_SID() ); GO What is MySQL? MySQL is a database. The data in MySQL is stored in database objects called tables. A table is a collection of related data entries and it consists of columns and rows. Databases are useful when storing information categorically. A company may have a database with the following tables: "Employees", "Products", "Customers" and "Orders". A DEFAULT constraint or trigger to supply a value in case one is not specified by an INSERT. Any expression. A CHECK constraint or trigger to look for specified values when data is inserted.

Database Tables A database most often contains one or more tables. Each table is identified by a name (e.g. "Customers" or "Orders"). Tables contain records (rows) with data. Below is an example of a table called "Persons": LastName Hansen Svendson Pettersen FirstName Ola Tove Kari Address Timoteivn 10 Borgvn 23 Storgt 20 City Sandnes Sandnes Stavanger

The table above contains three records (one for each person) and four columns (LastName, FirstName, Address, and City). Queries

A query is a question or a request. With MySQL, we can query a database for specific information and have a recordset returned. Look at the following query: SELECT LastName FROM Persons The query above selects all the data in the "LastName" column from the "Persons" table, and will return a recordset like this: LastName Hansen Svendson Pettersen Facts About MySQL Database One great thing about MySQL is that it can be scaled down to support embedded database applications. Perhaps it is because of this reputation that many people believe that MySQL can only handle small to medium-sized systems. The truth is that MySQL is the de-facto standard database for web sites that support huge volumes of both data and end users (like Friendster, Yahoo, Google).

4.2 DOMAIN DATA DICTIONARY :


1. Login table:

Field Name
login_Id Password

Data type
char varchar

Description
Name of the user Unique Key

2. User table : Field Name User_id Password User_name Sex Address Date_of_birth Date _of_register Phone_no. Email_id 3. Admin table : Field Name User_id Password Data type Text varchar Description A unique key of admin Unique Key Data type char varchar char char varchar date date int varchar Description A unique key of Every user Unique Key Name of user Sex of the user Full address of the user Birthdate of the user Date of when user registered Phone number of the user Emil id of the user

4. Category table : Field Name Cat_id Cat_name Data type number Text Description A unique key of category Name of the category

5. product table : Field Name Prod_id Cat_id Prod_name Prod_descp Price Add_date Data type number number text text number date Description A unique key of category Name of the category Name of the product Information about product Price of product Date, when the product is added

6. Temp table : Field Name Prod_id Prod_name Price per unit Quantity Data type number text number number Description A unique key of product Name of the product Price for each product Number of product

User_id Purchase_date Order_no Total_price

Varchar date number number

Unique key of user Date when the product purchased Registered Order number is

Total price of all the purchased products

7. Store table : Field Name Order_no report Data type number Text Description Registered Order number Information about product

8. Feedback table :

Field Name User_id type feedback comment Feedback_date

Data type varchar text text text date

Description A unique key of user Types of feedback telling about product Query or doubts Date when feedback is uploaded

9. Account table :

Field Name Bank_name Account_no

Data type text number

Description Name of the bank Account number in that bank

password balance

varchar number

Unique key for accout Available money in the account

10. sell table : Field Name Prod_id Prod_name Price per unit quantity User_id Purchase_date Order_no Total_price Data type number text number number Varchar date number number Description A unique key of product Name of the product Price for each product Number of product Unique key of user Date when the product is purchased Registered Order number Total price of all the purchased products

5. REQUIREMENT ANALYSIS

5.1 IDENTIFY ENTITES:

Seven type of entities are there in this project, such as 1. user 2. general public 3. admin 4. shopping cart 5. operation 6. application

Roles of entities
1. User : user is the person who may use this project and perform various operations, like input/output. User is also represented by Actor. We describe these Actors in section 5.2 2. General public : General public cant buy product but can see all the details of the updated product. 3. Admin : admin can permit to seller to sell his/her product and also can update,delete or insert the record of the product details . 4. Shopping Cart : it is like a cart which product want to buy that add to the cart and then buy .Its easy way to shoppping. 5. Operation : this is basic entity of this project, including all basic information about what activities are performed in this project. Such as add, save, delete, copy, save, update, debug, modify etc. 6. Application : application is also termed as facilities. In this project different types of application are used .These application are described in section 5.3.

5.2 IDENTIFY ACTORS :


Three types of actors are used in this system

1. 2. 3.

Admin User Seller Each user has its own role to play, as describe below

1.Admin: Administrator is the one , or may be a comity for authenticate and evaluate the application, which are given by clients, for being a part of community. Some rules and terms are imposed by this comity for being a seller. This all conditions are asked in application form, if 70% terms are fulfilled by seller, then his allowed to sell the product on website. It may control and manipulate the other two actors account, and update the system time by time. 2. User : Customers use the website for buying the products.Customer can see the different products details and then can buy it as shopping cart system Customer can also write feedbacks for products and services.Thats all buying process require userid and passsword. 3.General user General public can use the system to see the product,their prices and quantity available.General user can not buy the products.

5.3 IDENTIFY USE-CASES :


User access are also known as tasks , which are performed by actors . these are following tasks or use cases , which are performed in this project.

1. Login: Login is process of access by input password . If password is correct ,


then user may allow for use the system. Login process is performed by each user, at initial state. Sub activities , related to login are as follows : Enter password Check password Splash message Access to next window

2. Control System
A. Authentication B. Check system C. Debug D. modify E. Update

: This task is performed by administrator , it means he manipulate the system, by performing these sub activities.

3. Update Information and Status : 4. Product details :

This task is performed by all three Actors or replace their old information with existing. Theres no sub activity. This task is permormed for seeing the essential information of the product and its price.

5.Purchase prooduct : This task is performed by the customers with the help of
cart system.

6.Feedback :

This task is only performed by users . He may allow writing down

self opinion about any product and about the project.

5.4 USE CASES MODEL


Writing use cases to capture the software requirements that are visible to system actors has been a common practice since Ivar Jacobson introduced them in 1992. But a common confusion has accompanied this practice. Once I have may use cases, how do I use them to get to my code? This two-part article series will present a case study that analyzes the requirements captured in use cases and transforms them into implement able representations that can be directly coded . My goal is to sufficiently clarify this transformation so that you can immediately apply these ideas to your current , or next , software project. The IBM Rational Unified Process advocates writing use cases to capture the operational requirements of a software system. Use cases are actually a constituent of a larger requirements package of documents collectively known as the Software Requirements Specification(SRS), which contains all the requirements for a software project. The SRS includes the following requirements artifacts: Use Case Model, which consist of :

1. Use case diagram: A visual representation of system users (actors) and the services they request from the system . 2. Actor definitions: A textural description of the requestors of services provided by your system , and services provided to your system . 3. Use case descriptions: Textural descriptions of the major services provided by the system under discussion. Supplementary Specification: A document that captures the system-wide requirements, and those functional aspects of the system which are neither visible to the systems actors, nor local to a specific use case. These requirements artifacts become inputs to the subsequent analysis and design activities of the Analysis and Design discipline in RUP. Exactly which requirements artifacts are produced, of course, depends on the forces driving your development effort. If you are doing hot fixes(i.e., critical bug fixes on a product already in production) you might not have any requirements documents, only bug reports that indicate the released software does not meet its originally stated requirements. If you are doing a maintenance or enhancement release of software (i.e., adding new functionality to an existing product) you might have one or two use cases describing how these new functions interact with a user, but you would not have a Supplementary Specification because no changes to the non-functional properties of the software have occurred.

In this discussion I am assuming brand-new, green-field development project for software that does not yet exist. This will be an object-oriented project using the Unified Modeling Language(UML) to represent concepts and relationships. I am also assuming that the reader is comfortable with the concepts of class and object, and is at least comfortable with reading UML version 1.x or 2.0 class diagrams, sequence diagrams, and

5.4.1 USE-CASE DIAGRAM

Login

Provide Access

Validate Details

Product Details User Add to Cart List Admin

Instant Record

Update Record

Purchase Product Delete Account Feedback

5.4.1.1 USE-CASE DESCRIPTION


This Use case diagram includes Two Actors, such as 1. User 2. Admin And 15 use cases, in which login case is used by all two actors, and control system use case is used by creator and Administrator. This use case also describe 1. Connectivity between actor and use cases. 2. System partition between users. 3. Define role of each user. 4. Basic working of system in separate modes.

5.4.2 SEQUENCE DIAGRAM

5.4.2.1 SEQUENCE DIAGRAM DESCRIPTION


This sequence diagram contents one actor such as user, and other attributes as follows 1.) 2.) 3.) 4.) 5.) Log in System Database Cart Paypal

This diagram shows simple process of online shopping.

5.4.3 COLLOBORATION DIAGRAM

User

Admin Verification Select Item & Add to Cart Login Paypal Product Information

5.4.3.1 COLOBRATION DIAGRAM DESCRIPTION

Collaboration and sequence diagram describe the same information, and can be transformed into one another without difficulty. The choice between the two depends upon what designer wants to make visually apparent. Collaboration diagram shows the collaboration between different entities, in step by step manner. As we can see the following diagram , each step is ranked according to their priority, by system. Both sequence diagrams and collaboration diagrams contain almost identical information, they just present it differently. Choosing which diagram to use is often a matter of convenience and personal preference . In the sequence diagram the objects are aligned at the top of diagram , and they have dashed lifelines that extend downward. The horizontal arrows with numbered text are called messages. In a sequence diagram, the sequence of message is shown positional: time proceeds down the page, so a message low in the diagram is sent after a message that is above it. The message start on one objects lifeline, and always terminate on a lifeline, usually another objects lifeline, but sometimes on the sending objects own lifeline. The sequence diagram offers a significant advantage over the collaboration diagram, which is the script on the left-hand side of the diagram. This text is taken from the use case, or scenario, that the sequence diagram depicts . The script on this diagram is just a terse rendering of the text in the use case. Placing the script into the diagram makes the context of the messages very clear, and links the messages and objects back to the original use case. It is always the case that a given statement in the use case will map to one or more messages sent between the objects in your system . The Sequence diagram makes this explicit. 1.) 2.) 3.) 4.) 5.) In this collaboration diagram, these three objects are given as follows Log in System Database Cart Paypal

Collaboration diagram for Administrator shows the step by step process Administrator in this system. First he /she have to login with universal password , this entry access him/her to main window, where he/she will get four types of user modes. He/she have to select the Administrator as user name or fulfill the given password. System verifies the entries, if correct, allow user to access on Administrator window. On this window he/she will get two options, such as check system: This command checks the whole system for finding any type of errors. Edit: This command is use for edit the system , such as color scheme , design etc. An Administrator is that person , who uses this system for his firm, and this system may load on his machine . he may allow changing only look of system via edit command. He may check system only, but he is not permitted to make any type of changes.

5.4.4 CLASS DIGRAM OF SYSTEM

5.4.4.1 CLASS DIAGRAM DESCRIPTION


Class diagram of system define each object as class, and each class has its own attributes and operations. A class of login object is shown below. Log in -User name -Password -Code -sign in() -sign out() -verify() -check Each class is divided I three blocks, first block contains name of that class, second block contains attributes code(). of that object, and third one contains operation of that class. If classs object is an activity, then that class must held by their actor or user. As we can see below , there are six classes , each is held or used by different users.

Class Diagram provides an overview of the target system by describing the objects and classes inside the system and the relationships between them. It provides a wide variety of usages; from modeling the domain-specific data structure to detailed design of the target system. With the share model facilities, you can reuse your class model in the interaction diagram for modeling the detailed design of the dynamic behavior. The Form Diagram allows you to generate diagram automatically with user-defined scope.

ACTIVITY DAIGRAM

Activity diagram shows the basic working of each entity in the system.This figure help us to find out the actual working of each entity,and correlation between them. This figure contains four elements such as

Starting State

End State

Dcesion Node

Action Node

Signal Node

ACTIVITY DIGRAM OF SYSTEM

Enter username and password

Select user

User

Admin

Check Product Details

Update, Delete, Insert Details

Add Product To Cart

View Sell Record

Purchase Product

The focus of activity modeling is the sequence and conditions for coordinating lowerlevel behaviors, rather than which classifiers own those behaviors. These are commonly called control flow and object flow models. The behaviors coordinated by these models can be initiated because other behaviors finish executing, because objects and data become available, or because events occur external to the flow.

6. DESIGN 6.1 INTRFACE DESIGN & ARCHITECTURE


METAPHORES : The fundamental terms imags and concepts thatcan be recognized and learned the metaphors

MENTAL MODEL :
The orgabization and representation data,function,task and role create mental model.

NAVIGATION RULE FOR THE MODEL :


These rules ar required to kno how to move among data.function and roles. LOOK : The characterstics of the systems appreance and convey information to the user are called the look.

FEEL :
The interaction technologies that provide an appealing experience for th user is feel.

ERROR HANDLING :

The error will be handeled through error warning messages.These messages will be generated when tthir is some error in further processing.

APPLICATION ACCESSIBILITY:
It is completely accessible with universal device like keyboard,mouse.

ARCHITECTURE
It mainly represents th structure of data & program components that we use windows architecture,with GUI application.This architecture is easier to produce a user friendly environment.ach window has som basic feature as follows Icons: Graphical Cmmand. Text boxes: Used for input data stram. Headers: Labels Command buttons: Add,Save etc. Key stroke: Pointer Intrupt and help messages: Trigger Links: Hyper links such as next page Address.

6.2 MECHANISM

Mechanism of project shows those methods which we are used for different operations by event driven programming but other feature are as follows:. SECURUTY: We use password protections.Each user has its own personel.

DISTRIBUTION: It shows the distribution of resources between tasks,for this we use linking.

DATA FLOW: This shows how actually data flow in the system.

DATA STORAGE: For data storage we use MY- SQL.Three typs of table created.

LINKING:

Retrive data from database query ar written in host language.

MANIPULATION: It may of three types:- Icon/command buttons,Text data,Queries.

AUTOMATED ACTIVITIES: Authentication is a key component of security based solution.

6.3 DATA MODEL

Models are collections of conceptual tools for describing data,data relationship,data semantics and data constraints. A data is not just a way of Structuring data,it also defines a set of operations that can be perform on the data.this is mainly of two types: 1.Object based logical models. 2.Record based logical models Consider the E_R Daigrams: Entity are of two types 1.USER 2.OPERATIONS Attribute of USER: User_Id User_Type User_name Address Attribute of OPERATIONS: Check_status

Update Debug Modify Contact Give self record

6.3.1 E-R DIGRAM OF SYSTEM

6.3.2 DATA FLOW DAIGRAM


Here DFD will let us knows how external entities or events define th entity type and amount of data type and amount of data that flows to a process which transforms it and creates an output. 0-LEVEL DFD shows basic working for:

1.ADMIN:
Log_in Go to operation window Use facilities

2. General public
See details

3.USER
Log_in Use facility

0-LEVEL DFD

ADMINISTR ATOR

AUTHENTICATION

Approved

LOG_I N

Application Operation Window Rejected

HOTEL MANAGMENT

USER

Facilities

1-LEVEL DFD FOR USER

6.3.3 TABLES
Tables are the simplest form of relational database.In this whole database is shown in the tabular form.This is another data modeling.It shows the contents similar as in the ERD.

LOGICAL TABLE:
This table shows that how data is represented at the logical levl.This level describe th different typeof data actually stored in the database.This level also indicates the relationship existing among th data items.At this level a database is described logically rather then physically.

PHYSICAL TABLE:
The lowest level is the internal level.Its on closest to physical storage device and also termed as physical level.It dscribes how data are actually stored on the storage medium such as hard disk,magnetic disk etc.

7.DESIGN CLASSES LOG-IN CLASS

Log-in class shows the step by step process of a login of each user in this system.Attributes of this class as follows: User name:He/She has to selct the cloent name or fulfill the given password. Password:It is consist of Alphanumeric code. Code: It is alphanumeric values maintained in password.

OPERATIONS: SIGN IN:


When the correct information is filled by th user,he may allow to access.The current information is shown on screen is stored in memory.

SIGN OUT:
This operation is used to exit the current status or to exit from the software. VERIFY: This operation is used to verify that enterd last value is equal to real values or not.

CHECK CODE:
This operation is allow system to check cods of password and user name with real values,stored in the database.

MAIN WINDOW CLASS

Main window is the window,where all user typs sre presented,so that a usr may Log in in user mode.Attribute of this class are: Username:Login with unique password. Password :Consist of alphanumeric codes. code :Consist of alphanumeric values. user type : 2 users are in this project,so it necessary to describe the type.

OPERATIONS:-

SIGN IN:
When the correct information is filled by th user,he may allow to access.The current information is shown on screen is stored in memory.

SIGN OUT:
This operation is used to exit the current status or to exit from the software. VERIFY: This operation is used to verify that enterd last value is equal to real values or not.

CHECK CODE:
This operation is allow system to check cods of password and user name with real values,stored in the database.

ACCESS TO USER:
Allow user to access in selected usr mode.

ADMIN WINDOW

Admin

When in main window user name is given an administrator,Administrator mode is activated.Attributes of this class are as follows:

NAME: Login with unique id and password password. Email-id: Consist of alphanumeric codes.

OPERATIONS:CONTROL SYSTEM:
This command checks the whole system for finding any type of errors,and manipulate the system to check that is system works correctly or not.This operation is used for update ionformatoin about user.Whenever he want to update his account,the last status of his account is shown on the screen.

VERIFY:
This command check the verification of the user and authenticate the user.

USER CLASS

Customer or user

When in user window given an ,Administrator mode is activated.Attributes of this class are as follows: NAME: Login with unique id and password. Email- ID: Consist of alphanumeric codes. ADDRESS:Address of user is filled by the User.

OPERATIONS:-

REGISTER: User can register on this web application and use features of this website. DETAILS: This operation is allow user to see the details of the product. PURCHASE: User can purchase the product. FEEDBACK: User can feedback to the admin about the product query or web-fault.

7.1 PERSISTENT CLASSES

LOGIN PROCESS STORE LOGIN INFORMATION

This class is related to perform the loginprocess,is not visible to user,its combination of both login and window class.Its associated and dependent on both login classes. Attributes of this class are: USER NAME: Login with unique password PASSWORD: Consist of alphanumeric codes CODE: Address of user filled by the user.

OPERATIONS: ASK USER NAME & PASSWORD:


When a user wants to login,the system ask about user name.Systm verify the enteries,if correct,allow user to accss on next window.

SAVE USER NAME & PASSWORD:


This operation is uused for access in th system first a blank form is shown in screen on right mode.The current information is shown on screen is stored in memory.

CONTROL CLASS Administrator

This class is related to perform the control process,its not visible to user,its associated and dependent on admin window class and also on administrator.Attributes of this class are: USER NAME: Login with unique password PASSWORD: Consist of alphanumeric codes CODE: Address of user filled by the user.

OPERATIONS:
EXCEPT APPLICATION:
When a user give applicationto join the community,this application is forwarded to the administrator.

CHECK WITH USER RECORD:


After receiving application from customer,administrator check this application with he given terms and condition & match the given

valueswithin the given user record.If user is already member of that community,then account of that user is updated.

8.SPECIFICATION

PERFORMANCE REQIREMENT
Adherence to various software and hardware reqirements.Any deviation from th given standard may render the application unsuitable for usage. Presence of suitable compiler.The developed application may not respond to different compilers and is suitable to be run only under the compiler which it was developed. Proper knowledge of the underlying software.This is prreqistite for the proper functioning of the application.

SECURITY REQIREMENT
The novice user must not be given all the access to the source code of the developed application as he may accidently change th source sode which may lead to tremendous system problem,as java is highly manipulative language.

Often circuit simulator do not take into account the process variation that occur when design is fabricated.

WEB APPLICATION QUALITY ATTRIBUTES


Some of the various software quality attributes are: ADAPTABILITY: This is regard to adapting of the devoloped software under any usage.It may be usd by the different target users in other words no restriction. REUSABILITY: The software developed may be simply changed and reused from time to time by making software undrgo mminor changes in the coding section. PORTABILITY: This attribute may be understood in the sense that it may be simply transferd from one machine to another constraint.

9.REFERNCES & BIBILOGRAPHY


www.onlinecomputerbooks.com www.webhosting.deveshed.com www.waseeker.com www.buyya.com www.agilemodeling.com www.algad.com www.mdsn.microsoft.com

www.suprshareware.com www.google.com www.sequencdaigram.com www.studentshangout.com

10.CONCLUSION
User can see all the product details and user can buy the product online.User has to enter just category name of the product and get all the available details of this category.User can also take advantage of auction system.User can give their feedback or queries to admin, as well as admin can give the answers of queries to user.Admin can manage all the record of the project.Thus this process is very simple for user to use online shopping.

You might also like