Вы находитесь на странице: 1из 102

Project Document Online share Trading

Mr. Debabrata Dash,


BIITM, Bhubaneswar.

On

Under the guidance of

Soumya Baran Sahoo


BCA-6th semester Reg No-35981/07 Roll No-66218UT07028

Biju Patnaik Institute Of Information Technology & Management Studies (BIITM) Utkal University, Odisha

Chapter-I Organization Profile

1.1 About Online Share Trading Trading online has become very popular in todays time when you just need a trading account and after that you can trade comfortably while sitting at your home. Apart from comfort of trade it provides various facilities like: Ease of buying and selling of shares. Online receipt of contract notes/ trade statement for the transactions. Direct deposits of dividends/ bonus amount etc to account.

Various trading tools for ease of making investment decision. One click of mouse button is of ample importance while trading online as the process of trading is very easy through an online share trading website. Online trading provides facility to place limit orders. If you dont have sufficient time to keep track of the stock prices, fix up a buy/sell price based on your judgment and go for limit orders. Moreover limit orders help you take ample advantage of volatile session during the day. The experience of trading through Internet is a great deal as you may be getting tired of the paperwork involved after every trade, in writing cheques in case of off-line trading which you will not face in case of Online Share Trading. In case of online share trading your broking account, bank account and demat account are linked electronically. So when you punch in a buy or sell order, the system checks the funds/shares availability and automatically credits/debits the accounts once the order is executed by the exchange.

Windows 2000 Targeting the need and demands of home and small business users and hoping to keep windows users from being wooded away by the frills of IBMs OS/2 or various UNIX alternatives to DOS and windows3.x, Microsoft has spent the several years developing a robust and feature- rich operating system intended to replace the somewhat windows3.x and make us all happy. Windows 2000 is a multipurpose operating system with integrated support for client/server and peer-to-peer networks. The Windows 2000 family of products has been designed to increase reliability, deliver higher levels of system availability, and provide for scalability from a small network to large enterprise network. Windows 2000 incorporates technologies that reduce the total cost of ownership by allowing organizations. To increase the value of their exiting investments while lowering overall computing costs. Microsoft has released 4 editions of Windows 2000: Windows 2000 Professional, Windows 2000 Server, Windows 2000 Advanced Server and Windows 2000 Data center Server.

Windows 2000 Professional Windows 2000 Professional is the main Microsoft desktop operating system for businesses of all sizes. It is a high-performance, secure-network client computer and corporate desktop operating system that incorporates the best business features of Windows 98 and builds in the traditional strengths of Windows NT w3orkstation. Windows 2000 Professional includes a simplified user interface, plug and play capabilities, enhanced power management and support for a board range of hardware devices .In addition, Windows 2000 Professional significantly extends the manageability, reliability and security of Windows NT because of its new file encryption system and applications management tools. WHY STRUTS? The remarkable thing about Struts is its early adoption, which is obviously a testament to both its quality and utility. The java community, both commercial and private, has really gotten behind Struts. It is currently supported by all of the major application servers including BEA, Sun, Caucho, and of course Apaches Jakarta-Tomcat. Forms Forms are the objects that expose properties, which define their appearance and methods and define the interaction with the user. By setting the properties of the form and writing JSP code to respond to its events, we customize the object to meet the requirement of the application. Controls Controls are objects that are contained within form objects. Each type of controls has its own set of properties, methods and events that makes it suitable for a particular purpose. Some of the controls are best suited for entering or displaying text. Other controls let you access to other application and process data as if the remote application was part of your code.

STRUTS FRAME WORK:Model The model components of the struts frame work represent the data object of the struts application. They often represents business objects or other backend Systems and can be implemented as simple java beans, Enterprise java beans, object representation of the data stored in the relational database. The View Each view component in the struts Framework mapped to the JSP that contain any combination of HTML, JSP, and struts custom tag. It acts as the presentation layer of a previously executed Controller Action. It also act to gather data that is require to perform particular Controller Action. The Controller The Controller component of the Struts Framework is the backbone of all struts Web application. It is implemented using a servlet named org.apache.struts.action.ActionServlet. This servlet receives HTTP request and delegates control of each request, based on the URI of the incoming request, to a user defined org.apache.struts.action.ActionClass. The action class is where the Model of the application is retrieved and or retrieved or modified. Once the Action class has completed its processing, it returns a key to the ActionServlet. This key is use to determine the view that will represent the results of the Action classs processing.

Chapter-II System Specification

Environmental:Hardware and Software requirements (1) The system must be user friendly. (2) The system must be able to handle large volume of data. (3) Processing speed of the system should be huge. 2.1 Hardware Specification The software has been developed on computers with the following specifications. The Client Machines: Processor Speed RAM Hard Disk Key Board (104 keys) Network Card The Server Machines: Processor Speed RAM Hard Disk 2.2 Software Specification Operating System Language Tools 3.1 , AJAX Database Application Server :ORACLE 10g :Tomcat 6 : Windows 2000 Professional : JAVA, SQL :JSP,HTML,XML,STRUTS-1.1,HIBERNATE: Intel Core 2 Duo : 3.45GHz : 2GB : 160 GB : Intel Pentium IV : 2.66GHz : 512 MB : 80 GB : Standard :

Architectures and Frameworks used in the project:Architectures:


MVC Architecture Front Controller Model ORM Model(Hibernate) Factory Model(Hibernate SessionFactory) DAO(Data Access Object) Model Singleton Design Pattern

Frameworks:
Struts 1.1 Framework Tiles Framework Hibernate 3.1

Expansion in terms of other frameworks:


Spring framework which contains Hibernate package inside.

Services and Validation tools:


JavaScript Ajax JNDI(Java Naming and Directory Interface) Transaction Service WebService and SOA service

Chapter-III Requirements Analysis

3.1 Problem Definition and Description:-

Proposed System
The proposed system is completely web based. It is an internet based application. Client need not search whole site for particular information. If any information is required then he can directly click on appropriate option mention on the site. The system should be user friendly so that any client can easily access this site from any place at any time.

ADVANTAGES OF THE PROPOSED SYSTEM: a) Manpower can concentrate on mainstream jobs & machines can do repetitive nature of jobs. b) Introduction of self-checking mechanics can reduce errors and prevent ignorant or intentional irregularities. c) Systematic storage and retrieval of large amount of data. d) Capturing information from the accounts can develop allied MIS. e) Decision makers can decide budgetary requirements and allocations. f) Expenses can be streamlined by knowing the ways and means position. g) Internal auditing and control can be carried out.

Chapter-IV System Analysis & Design

4.1 Introduction:Analysis is the focus of system developing and is the stage when system designers have to work at two levels of definition regarding the study of situational issues and possible solutions in terms of what to do and how to do.

System Study:DEFINITION OF THE SYSTEM: A system is an orderly grouping of independent components linked together according to a plan to achieve a specific objective. Its main characteristics are organization, interaction, independent, integration and central objective a system does not necessarily mean to a computer system. It may be a manual system or any other names. NEEDS OF THE SYSTEM Social and economic factor: a wave of social and economic changes often follows in the wake of the new technology. New opportunities may arise to improve on a production process or to do something that was not previously possible. Changes in the ways individuals are organized into groups may then be necessary, and the new groups may complete for economic resources with established units. Technological factor: people have never before in a time when the scope of scientific inquiry was so broad, so when the speed of applying the new technology accounts for many changes in the organization. High level decisions and operating processes: in response to technological, socio-economical factors, top level managers may decide to recognize operations and introduce new products.

To deal with these needs, people commonly seek new modified information to support the decision. When that happens, then they obtain turn to a computer system for help the information users and data processing specialist then work together to complete a series of steps in a system study to produce output results to satisfy information needs.

System analysis
System Analysis is a process by which we attribute process or goals to a human activity, determine how well those purpose are being achieved and specify the requirements of the various tools and techniques that are to be used within the system if the system performances are to be achieved. 1. SYSTEM PLANNING Planning for information systems has a time horizon and a focus dimension. The time horizon dimension specifies the time range of the plan, where as the focus dimension relates whether the primary concern is strategic, managerial, or operational. The system i.e. The Project that we were assigned was required to complete within 20 weeks. What we had planned is as follows: Requirements analysis, Preliminary Investigation & Information Gathering should be covered within the 1st and 2nd week. Since I was not aware of MYECLIPSE IDE it require 1 week for me to adjust with that tool. 12 Weeks for the design of the system under development. 1 week for Testing & Implementation. And rest 2 reserve weeks. 2. PRELIMINARY INVESTIGATION The initial investigation has the objective of determining the validity of the users request for a candidate system and whether a feasibility study should be conducted. The objectives of the problem posed by the user must be understood within the framework of the organizations MIS plan. I had investigated from the concerned authority about the project 3. INFORMATION GATHERING A key part of feasibility analysis is gathering information about the present system. The analyst must know what information to gather, where to

find it, how to collect it, and what to make of it. The proper use of tools for gathering information is the key to successful analysis. The tools are the traditional interview, questionnaires, and on-site observation.

4. STRUCTURED ANALYSIS The traditional tools of data gathering have limitations. An English narrative description is often vague and difficult for the user to grasp. System flowcharts focus more on physical than on logical implementation of the candidate system. Because of these drawbacks, structured tools were introduced for analysis. Structured analysis is a set of techniques and graphical tools (DFD) that allow the analyst to develop a new kind of system specifications that are easily understandable to the user.

Online Share Trading

Login

Admin

Broker

Customer

4.2. Data Flow Diagram Data Flow Diagram is a diagrammatic representation of data movement through a system manual or automated - from inputs to outputs through processing. The data flow diagrams help in the analysis of the flow of data through a system and thus help in identifying the system requirements. These

are of two types Logical Data Flow Diagrams and Physical Data Flow Diagrams. The Data Flow Diagram (DFD) clarifies system requirements and identifies major transformations that will become programs in system design. It is the starting point of system design that decomposes the requirements specifications down to the lowest level of detail. Logical Data Flow Diagrams: The Logical Data Flow Diagrams represent the transformation of the data from input to output through processing logically and independently of the physical components that may be associated with the system.

Physical Data Flow Diagrams: The Physical Dataflow Diagrams show the actual implementation and movement of data between people, departments, and workstations. Each component of a DFD is labeled with a descriptive name. Process names are further numbered that will be used for identification purposes. The number assigned to a specific process does not correspond to the sequence of processes. It is strictly for identification purposes. A data flow diagram allows parallel activities i.e. a number of data-flows coming out from the source and going into the destination. A DFD concentrates on the data moving through the system and not on the devices or equipments. A DFD may consist of a number of levels. The top-level diagram is called the Context Diagram, which consists of a single process and plays a very important role in studying the system. It gives the most general and broadest view of the system. Move over it gives the pictorial representation of the scope boundaries of the system under study.

NOTATIONS: Data-Flows show the movement of data in a specific direction from the source to the destination. It represents a packet of data.

Processes show the operations performed on the data, which transform it from input to output.

Sources and Destinations of data are the external sources and destinations of data, which may be people, programs, organizations or other entities interacting with the system, but are outside its boundary.

Data Stores are places where data are stored such as files and tables.

Below is the top level DFD showing how the Users request processed by the server with database interaction and sends the response back to the user.

CONTEXT LEVEL DIAGRAM (ZERO LEVEL)

Tips Details Company Details

Todays Tips

ADMIN

Broker Details Company Details Customer Details

Online Share Trading


BROKER

System 0

Customer Details Broker Details Company Details

CUSTOMER

DATA FLOW DIAGRAM (LEVEL1)

Company Details

Customer Details

BrokerDetails

Broker Manage ment

Company Manage ment

Manage Custome r

Tips Manage ment

Tips

Broker-Details

0.1
CompanyDetails

0.2
CompanyDetails

0.3
CustomerDetails

0.4
Tips_of_day

Company

Company_Price

Customer Broker

Tips_Of_Day

BrokerTodays Id tips

Company-Details Customer- Id

ShareBrokerDetails CompanyDetails Details ShareDetails

Broker-Details
Company-Details

Message Message

Customer Process 0.5

Message

Broker Process 0.6

Company-Details

Message Message

Message Message Message

Broker-Id

CustomerId

ShareDetails

ShareDetails

Customer-

Id

Message

Broker_Custome r

Dataflow Diagram (LEVEL-2) e -Admin-

Share_Purchas

Broker
BrokerDetails BrokerDetails Broker-Details

BrokerDetails

BrokerDetails

Add
Broker

Edit
Broker

Delete
Broker

0.1.1

0.1.2

0.1.3

Company
Company Details Company Details Company-Details

CompanyDetails

CompanyDetails

Add
Compan y

Edit
Compan y

Delete
Compan y

0.2.1
CompanyDetails Company Details CompanyDetails

0.2.2
Company Details

0.2.3

Company_Price

Tips_Of_Day

Tips

Tips

Tips

Tips Broker-Details

Add Tips 0.4.1

Edit
Tips

Delete
Tips

0.4.2

0.4.3

Dataflow Diagram (LEVEL-2) -Customer-

Broker

Company

Company_Price

Company-Details Broker-Details

Share-Details

Broker-Details

Show Broker 0.5.2

Show Compan y Details

0.5.1
Broker-Id CompanyDetails

Request For Broker 0.5.3


BrokerId CustomerId

Broker_Custome r

Message

View Messag e 0.5.4

Send Messag e 0.5.5

Message

Message

Message

Message

Dataflow Diagram (LEVEL-2) -Broker-

Broker

Company

Company_Price

Company-Details Broker-Id

Share-Details

Customer-Id

Approve Custome r

Show Compan y Details

Company Details

0.5.2 0.5.1
ShareDetails ShareDetails

Purchas e Share 0.5.3

Sale Share 0.5.3

ShareDetails

Share-Details

Broker_Custome r Share_Purchas e

Message

View Messag e 0.5.4

Send Messag e 0.5.5

Message

Message

Message

Message

DATA DICTIONARY A Data Dictionary is a structured repository of data about data. It offers the primary advantages of documentation & improving analyst/user communication by establishing consistent definitions of various elements, terms, & procedures. The three classes to be defined are data elements (smallest unit of data), data structures (group of data elements handled as a unit), and data flows and data stores (Data structures in motion & rest respectively).

Data Structure

Table1: Name Description

: Login : This table keeps the username,password and level of the Admin and Users. Primary Key : Username. A unique Name is given to all the entries in this table. It is String type. Column name Username Password Level1 Table2:Name Description Primary key Column name Company_Id Name Share_Amount No_Of_Share Data Type Varchar2 Varchar2 Varchar2 Length 40 40 40 Description Primary key. A unique name that is assigned to all the entries in the table. It keeps the password of users. It keeps the level of the user.

: Company : This table keeps the details of the Companies in Stock Exchange. : Company_ id Data Type Number Varhar2 Number Number Length 22 40 22 22 Description Primary key. A unique number that is assigned to all the entries in the table. It keeps the name of the Company It keeps the price of the share of the Company. It keeps the no. of shares of the Company availabl.e

Table3:Name Description with Primary key Column name Cp_id Company_id

: Company_Price : This table keeps the details of shares of the companies their prices on the current date : Cp_id Data type Number Number Length 22 22 Description Primary key. A unique number that is assigned to all the entries in the table. It keeps the company id from Company table and its the foreign key with reference to Company_id column of Company table. It keeps the date of the share on which the share details are modified. It keeps the price of the share of the Company.

Date1 Share_Amt

Varchar2 Number

40 22

Quantity_Avil

Number

22

It keeps the no. of shares of the Company availabl.e

Table4:Name Description Primary Key Column name Cust_Id Name Password Address Sex Mail Phone

: Customer : This table keeps the details of the Customers. : Cust_Id Data type Number Varchar2 Varchar2 Varchar2 Varchar2 Varchar2 Varchar2 Length 22 40 40 80 40 200 40 Description Primary key. A unique number that is assigned to all the entries in the table. It keeps the name of Customer It keeps the password of the Customer. It keeps the contact address of Customer It keeps the sex of the Customer. It keeps the e-mail id of the Customer It keeps the phone number of the customer.

Table5:Name Description Primary Key Column name Broker_Id Name Password Address Sex Mail Phone

: Broker : This table keeps the details of the Brokers. : Broker_Id Data type Number Varchar2 Varchar2 Varchar2 Varchar2 Varchar2 Varchar2 Length 22 40 40 80 40 200 40 Description Primary key. A unique number that is assigned to all the entries in the table. It keeps the name of Broker It keeps the password of the Broker. It keeps the contact address of Broker It keeps the sex of the Broker. It keeps the e-mail id of the Broker. It keeps the phone number of the Broker.

Status

Varchar2

40

It keeps the experience status of the Broker.

Table6:Name Description Primary Key Column name Bc_Id Broker_Id Cust_Id Status

: Broker_Customer : This table keeps the details of the customers under every broker. : Bc_Id Data type Number Number Varchar2 Varchar2 Length description 40 Primary key. A unique number that is assigned to all the entries in the table 22 Its the foreign key with reference to Broker_id column of Broker table. 40 Its the foreign key with reference to Cust_id column of Customer table. 5 It keeps the approval status of the customer.

Table7:Name Description Primary Key Column name Sp_Id Broker_Id Cust_Id Comp_Id Date1 Quantity

: Share_Purchase : This table keeps the details of the sale and purchase of shares : Sp_Id Data type Number Number Number Varchar2 Varchar2 Varchar2 Length 22 40 20 20 7 30 Description Primary key. A unique number that is assigned to all the entries in the table Its the foreign key with reference to Broker_id column of Broker table.. Its the foreign key with reference to Cust_id column of Customer table. Its the foreign key with reference to Company_id column of Company table. It keeps the date at which the share is sold or purchased. It stores the no. of shares available.

Table8:Name Descriptio

: Message : This table keeps the details about sent and received messages by broker and customer to each other

Primary Key Column name Message_Id Broker_Id Cust_Id

: Message_Id Data type Number Number Number Length 40 40 40 Description Primary key. A unique number that is assigned to all the entries in the table Its the foreign key with reference to Broker_id column of Broker table. Its the foreign key with reference to Cust_id column of Customer table It keeps the message sent by the customer to broker. It keeps the message sent by the Broker to Customer.

Broker_Inbox Customer_Inbox

Varchar2 Varchar2

200 200

Table9:Name Description home Primary Key Column name Tips_Id Tips

: Tips_Of_Day : This table keeps the tips details showed on the page. : Tips_Id Data type Number Varchar2 Length 40 400 Description Primary key .A unique number that is assigned to all entries in the table This field keep the tips to be shown in home page.

Decision Tree & Structured English

A Decision Tree sketches the logical structure based on some criteria. It is easy to construct, read, and update. It shows only the skeletal aspects of the picture however, and does not lend itself to calculations. The alternative is Structured English. Structured English uses logical constructs and imperative sentences designed to carry out instruction for action. Decisions are made through IF, THEN, ELSE, and SO statements.

Decision Table A Decision Table is a table of contingencies for defining a problem and the actions to be taken. It is a single representation of the relationships between conditions and actions. 4.2 Feasibility Study Feasibility is the determination of whether or not a project should be taken or not. Feasibility study is undertaken tight constraints and culminated in the written and moral feasibility report. The contents of this report were used as a sound basis for the decision of the proceeding, postponing or cancellation of the project. 4.2.1 Technical Feasibility The main purpose of technical feasibility is to test whether with the existing H/W & S/W the project can proceed. Since the Spice Board of India, Bhubaneswar has the required H/W, Windows NT Based Server, Apache Web Server, Tomcat Engine, Oracle8i Server, and Browsers technically the system is feasible. 4.2.2 Operational Feasibility Any project can be beneficial only if it can meet the organizations operating requirements. The operational feasibility is very much important in order to find out whether the system is work after it is developed & installed. Also it includes the options of the users, their remarks and their involvement in the project.

4.2.3 Economical Feasibility

A system that can be developed technically and that will be used if installed must still be a good investment for the organization. The organization possesses all the H/W, S/W and of course the trained personnel. So implementing the system will not cause any additional investment for the organization. Feasibility studies discussed above indicates that the system in feasible.

Chapter-V E-R Diagram

User_Name

Password

Level1

Login

Company_Id

Name

Share_Amount

Company
Company_Id=Comp_Id

1 has
Company_Id= Company_Id No_Of_Shar e

Cp_Id

Company_I d

Share_Amt

Company_Price

has
Quantity_Av il

Date1

Name

Password Address

Broker_Id Sex

Broker 1 ha s
Broker_Id=Broker_Id Mail

Phone Status

Bc_Id

Broker_Id

Broker_Id=Broker_Id

Cust_Id

Broker_Customer

1 1 has
Status

ha s M

Cust_Id=Cust_Id

Name

Password Address

Cust_Id Sex

Customer
Mail

Phone

has

Cust_Id=Cust_Id Cust_Id=Cust_Id

Sp_Id

Broker_Id Cust_Id

Comp_Id

Share_Purchase
Date1

1
Quantity

has

Message_Id Broker_Id

has
Cust_Id

M
Broker_Id=Broker_Id

Message
Broker_Inbox Customer_In box

Tips_Id

Tips

Tips_Of_Day

Chapter VI Layouts

Homepage

AboutUs Page

Contact Us Page

Admin Login Page

Customer Login Page

Broker Login Page

Start of Admin module Layouts

1st Page after Admin login

Company Management Page

Add Company Page

Edit Company Page

Delete Company Page

Broker Management Page

Add Broker Page

Edit Broker Page

Delete Broker Page

Tips Management page

Add Tips Page

End of Admin module Layouts..

Start of Broker module Layouts Broker Home page after Broker login

View Price Page

Purchase Share Page

Sale Share Page

Customer Management Page of Broker

Customer Approval page of Broker

Show Customer Page of Broker

Delete Customer Page of Broker

Message Management Page of Broker

Send Message page of Broker

View Message page of Broker

Report Management page of Broker

Report of Customer with Share Details page of Broker

End of Broker module Layouts..

Start of Customer module Layouts Customer Registration Page

Customer Page after Login

Broker search page of Customer

Company Search Page of Customer

Broker Management Page of Customer

Request Broker page of Customer

Show Broker Page of Customer

Delete Broker Page of Customer

View Share Details Page of Customer

Message Management Page Of Customer

Send message page of Customer

View Message Page of Customer

End of Customer module Layouts..

Chapter-VII System Testing

SYSTEM TESTING System testing is the process in which the system undergoes experimental testing so as to check that the system does not fail i.e. to check whether the required system is running according to specification and user expectation. System testing also tests to find discrepancies between the system and its original objective, current specification and systems documentation. Hence most useful and practical approach is with the understanding that

testing is the process of executing a program with the explicit intention of finding errors that is making the program fail. Testing performs a very critical role for quality assurance and ensuring the reliability of the software. During testing, the program to be tested is executed with a set of test cases and output of the program for the test cases and output of the program for the test case is evaluated to determine if the program is performing as it is expected to. Hence Testing is the process of executing a program with the intention of finding errors. A good test case is the one that has a high probability of finding as yet undiscovered error. A successful test is one yet uncovers as yet undiscovered errors.

Testing is performed according to two different strategies: 1. Code Testing: The code testing strategy examines the logic of program i.e. the analyst develops test cases that results in executing every instruction in the program. Basically during code testing every path through the program is tested. 2. Specification Testing: To perform specification testing the analyst examines the specification starting what the program should do and how it should perform under various conditions. Then test cases are developed for each .In order to find which strategies to follow, levels of testing should be followed Levels of Testing The basic levels are unit testing, integration testing, system testing and acceptance testing. These different levels of testing attempt to Detect different types of faults. The different levels of testing are as follows: 1. Unit testing: In this testing different modules are tested against specification produced during design of the modules. Unit testing is essential for verification of code produced during the coding phase and hence its main goal is to test internal logic modules. 2. Integration testing:

In this testing tested modules are combined into subsystems which are then tested. The goal here is to see if the modules can be indicated properly and emphasis is being on testing interfaces between modules. 3. System testing: In this testing the entire software system is tested. The reference document for this process is the requirements document and the goal is to see if the system meets its requirements. This is normally performing on realistic data of the client to demonstrate for the software is working satisfactorily. Testing here focus on external behavior of the system.

Chapter-VIII IMPLEMENTATION

System Implementation Implementation is the stage of the project when the theoretical design turned into a working system. At this stage the main workload, the up heal and the major impact on the existing practices shift to user department. If the implementation stage is not carefully planned and controlled, it can cause chaos. Thus it can be considered to be the most crucial stage in achieving a new successful system and in giving the users confidence that the users confidence that the new system will work and be effective. The implementation view of software requirements presents the real worlds manifestation of processing functions and information structures. In some cases a physical representation is developed as the first step in software design. However most computer based systems are specified in a manner that dictates accommodation of certain implementation details.

Implementation involves careful planning, investigation of current system and constraints on implementation, design of methods to achieve the changeover, training of staff in the changeover procedures and evaluation of changeover methods. The first task is the implementation planning i.e. deciding the methods and time scale to be adopted. Once the planning has been completed, the major effort in the computer department is to ensure that the programs in the system are working properly. At the same time the user department must concentrate on training user staff. What the staffs have been trained, a full system test can be carried out, involving both the computer and clerical procedures. The main steps of implementation includes 1. Installing client machine. 2. Installing the software on the server. 3. Training the operational staff. Requirements keep changing with time so the implementation of this project may change with time hence implementation is an ongoing process, which may change in future.

Chapter-IX

Scope and future expansion of the software

SCOPE & FUTURE EXPANSION OF THE SOFTWARE Our client is an IT company, which is having branches all across the world. All branches are working on the same set of this type of software(project) so communication and interaction is very essential part of this company , for communication purpose there are different way to interacting with the students which are included in the software of our client like complain-mail and Feedback-mail facility as well as personal contact. In this software we have all aspect of the problem which are faced by the client are investigated through system analysis and our software development team which has tried there best sorting out and eliminating these problem and tried to make software user friendly which enables the consumption time as well as describe the work load of the operator and respective user. Although I tried my best for making the software error free and fulfill the requirements of client. But still there are some future scopes and require some modification like:-

IN THE CASE DATABASE In the case of database I had Oracle 10.0g Database, in the other case we can upgrade database system with future version of oracle because in Oracle 8i database the capacity of storing data is much bigger and vast as compare to Oracle 8.0 database can b upgraded for fulfilling the future requirements of ABC university. MORE TEXT FIELDS CAN BE ADDED Although we had taken all the attributes related to Customers but as per the requirements of the website more text fields can be added to keep complete record of customers in the database.

EXPANSION OF MODULES In this case we had taken only the present modules, in the company, but as per the future requirements of the company some more modules can be added into it for solving the problem of the customers which may arise due to the expansion in facilities provided by the website.

SECURITY FEATURES Security is the main point of consideration of every software development in this software every respective department has its own user name as well as password of accessing the data but these password and username cannot be changed. Since security is the main thing in software, considering the future expansion and growth of the website all the user name and passwords of respective departments can be changed according to the user to avoid unauthorized accessing of database.

Chapter-X Conclusion

Conclusion
As we discussed earlier during project time does not permit to complete the entire project, so as a part of the whole is being carried out and being submitted as the project for 6th semester of MCA Degree. Total software along with extensive features will be submitted as Major project, here is the entire Online Share Trading system with extensive features fulfilling the requirements of any modern software organization. Although we have attempted to make the entire package full proof of errors, it may have some inherent bugs (beyond our knowledge) as it is yet to being tested with real time data.

Lastly, we will carry our effort in developing the software fulfilling the basic requirements of any software organization, if time permits. We do believe that the system will satisfy the basics and will prove to be user friendly and effective software whenever its being implemented in the organization.

Chapter-XI

Bibliography

Book 1. Java Complete Reference 2. Java Server Programming 3. The Complete Reference 4. HTML Complete 5. Professional Jakarta struts 1.1

Author Name Herbert Schmidt S.Allamraju, KarlAvedal& Co. Loney and Koch Gary Masters,BonnieBills & Co James Goodwill, Richard Hightower

WEB REFERENCES: www.java.sun.com www.javalobby.org

www.visualbuilder.com www.knowledgeisland.com www.codenotes.com www.coreservelets.com www.javaboutique.com www.wrox.com

Chapter-XII

Appendix

Appendix-1

JAVA
The java platform is becoming a mainstream vehicle for software development and deployment. Adoption of the Java platform is growing explosively in many dimensions: from credit cards to mainframes, from web page applets to large commercial applications. As a result, the quality, maturity, and performance of Java technology is of critical importance to developers and users everywhere. Sun Microsystems, Inc., is investing heavily in technologies to raise the bar across many processor and operating system platforms, so that software developers can count on their Java technology based programs running efficiently and reliably, regardless of processor or operating system.

One major reason for the interest in Java platform is that unlike programs written in traditional languages, Java technology based programs are distributed in a portable, secure form. In the past, use of a portable distribution format generally implied a performance penalty during execution. By applying modern dynamic compilation technology it is possible to alleviate this performance penalty. To take a very simple but important example, a Java-technology compiler can be made to generate optimal machine code on-the-fly for a particular processor version (e.g. although Pentium and Pentium II processors can run the same machine code, there is no single machine code that is optimal for both) . Thus, Java programming languages byte code distribution format not only provides portability, but can actually offer new opportunities for performance improvement. Java Language Overview Java consists of: A language specification, A byte code compiler A virtual machine that interprets at runtime A set of class that interprets the byte code at runtime A set of class library APIs Implementations of the class libraries specific to the target machine A runtime environment in which the interpreter, byte code verifier, class loader, etc. run, also specific to the target machine Other development tools such as a debugger, a disassembler and an applet viewer for testing applets outside of a web browser. There is also a web browser written in Java called Hot Java. The library APIs are frozen, and consist of the following packages: Java.lang is considered part of the language itself, and is automatically imported by the compiler. It creates classes for math functions, limited process control, a security manager, strings, threads, and wrapping primitive data types. The class system creates an interface to system facilities, such as stdin / stdout / stderr, environment variables, garbage collection, etc.

java.awt: GUI/windowing toolkit java.awt.image: image processing java.io: file input/output, pipes java.util: hash table, bit sets, dates, random numbers, vectors java.net: sockets, Internet address, URLs java.util: hash table, bit sets, dates, random numbers, vectors, etc. Java is an evolution of current object oriented programming languages, influenced by the design of Eiffel, Smalltalk, C++, Objective-C and Cedar/Mesa, among others. The syntax of the language comes from C/C++. The way that Java is presented gives the impression that it was designed as an improvement to C+ +, removing features that were judged to be redundant, confusing, or not worth the complexity. There is no preprocessor, since preprocessing can make the source code unreachable and non-local (i.e. you have to read all the include files before knowing what your code actually does). Its object design eliminates the need for typedefs and structs. Unions and Pointers are removed as a way to break type safety. The go to statement is removed in favor of structured control. Multiple inheritance, Operator overloading, and automatic coercion are removed as a way to break type safety.

Language Features Simple: Simple Secure Portable Object-oriented Robust Multithreaded Architectural-neutral Interpreted High performance Distributed Dynamic

Java was designed with view to help professional programmer to learn and use it effectively. Programmer with basic knowledge of object oriented features fined it easy to learn. Object-Oriented: The object model in Java is simple and easy to extend, while simple types, such as integers, are kept as high-performance no objects. Robust: The multiplatform environment of the Web places extraordinary demands on a program, because the program must execute reliably in a variety of systems. The ability to create robust programs is one of the features of Java. Java checks code at compile time as well as run time and it is a strictly typed language. Multithreaded: Java supports multithreaded programming to meet the real-world requirement of creating interactive, networked programs. Javas easy-to-use approach to multithreading allows developer to think about the specific behavior of programs, not on the multitasking subsystem. Architectural-Neutral: Java meets the challenge of programs longevity and portability. Written Java program can be run on machine of any configuration, which is due to Java Virtual Machine.

Interpreted and High Performance: Java allows architectural neutral feature, which is due to generation of intermediate code called Byte Code. This code can be interpreted on any system that provides a Java Virtual Machine. Java byte code was carefully designed so that it would be easy to translate directly into native machine code for very high performance by using a just-in-time compiler. Distributed:

Java is designed for the distributed environment of the Internet, because it handles TCP/IP protocols. Java uses a feature called Remote Method Invocation (RMI) to achieve this. Dynamic: Java programs carry with them substantial amounts of run-time type information that is used to verify and resolve accesses to objects at run time. This allows to dynamically link code in a safe and expedient manner Types: Java has four data types: class types, interface types, array types, and primitive types. All variables hold either a value of a primitive type or reference to a dynamically allocated object. The primitive types are integer (8, 16, 32 and 64 bit, twos complement), float (32 and 64 bit IEEE 751), character (16 bit Unicode) and Boolean (1 bit). The format of these primitive types fixed by language definition and is not implementation specific. The other three types are called reference types because they are implemented using references to dynamically allocated objects. A dynamically allocated object is either a class instance or an array instance. A variable of type interface holds a reference to a class instance, which implements the interface. Primitive types can be converted between each other, with the exception of the Boolean type. There are no conversions possible between primitive type and reference types. Class types can be converted only to types that are super classes of it. Similarly, the run-time type of a variable must be a subtype of its compile time type. With these restrictions, Java implements strong compile-time type checking, but allows subtypes to replace type at runtime. Objects are tagged and can be queried at runtime to discover their run-time type. Arrays Arrays are dynamically created objects containing some number of variables called components. All components have the same type T, and the array has type T []. T may be any type: class, interface, array or primitive. As

in C/C++, arrays are always one-dimensional, but multidimensional arrays can be created from arrays of arrays. An array of objects is actually an array of pointers to objects. An array whose components are primitive types, however are allocated efficiently in contiguous memory as in C/C++. The length of an array is not part of the array type, so that a variable may contain references to arrays of different lengths. However, once an array object is allocated, its length is never changed. All array accesses are checked at runtime that the index is within bounds, or an exception is thrown. Classes Each class type has exactly one parent class (immediate super class), which it extends by overriding parent methods and adding new methods or variables. Like Smalltalk, classes thus constitute a single inheritance hierarchy, with all classes having object at their root. Classes may be declared abstract, in which case they can not be instantiated but only subclasses. Classes may be declared final, in which case they cannot be sub classed. There are no standalone functions: everything is a method in some class. Methods that are declared static within a class (class methods) are the closest to a standalone function, because they do not belong to a class instance, but to the class itself. Class methods can only refer to other class methods or static class variables. All classes are themselves instances of the class Class, and a class object is instantiated when the class is loaded. Interfaces An interface creates a new abstract type that specifies a set of methods and named constants, but does not specify an implementation, like Objective Cs protocols. Interfaces may optionally extend one or more other interfaces, meaning that is implicitly specify all of the methods and contents of the interfaces that it extends. Thus interfaces constitute a multiple inheritance hierarchy similar to C++. A class may be declared to implement one or more interfaces, meaning that ay instance of the class implements all of the methods specified by the interface.

Interfaces thus allow code reuse between classes independent of the class inheritance hierarchy. It allows the creation of a specialized view of an object for export. Since the implementation of an interface must be provided by a single class, interfaces do not allow you to combine the methods of multiple classes into a single type, independent of the inheritance hierarchy. Program Structure A compilation unit is a single file containing one or more classes or interfaces, only one of which is declared public. The source file must be called <Name>.Java, and the resulting byte code is placed in the file <Name>.class, where <Name> is the name of the public class or interface. One or more compilation units may be grouped together into a package. Classes within the same package have access to each other, similar to friend classes in C++. Packages are given globally unique names to facilitate finding them on the web. All compilation units of a package are kept in the same subdirectory, and the package name becomes the subdirectory name, starting from some specified list of root directories. Information Hiding There are four levels of access control: 1) Public: accessible to anyone who imports it; 2) Protected: accessible to anyone in the same package, and to any subclasses; 3) Friendly: accessible to anyone in the same package; 4) Private: accessible only within the class body where it is declared. A class may be declared public or private, and defaults to friendly. A class variable or method may be declared public, protected, or private, and defaults to friendly. Interfaces can be thought of as a way to hide some of the methods of a class. Method Overloading And Overriding Like C++, Java allows the same method name to be declared with different number or types of parameters. This is called method overloading, and the compiler can correctly match the calling signature with the correct method. Methods in a class are accessible to its subclasses unless declared private. A method in a subclass with the same name and parameter signature as a

method in one of its super class is said to override the super class method. Overridden methods can still be accessed by using the syntax <name>,<method>, where <name> is the name of the super class, and <method> is the overridden method name. Methods can be declared final to prevent overriding. All non-static methods are dynamically bound, i.e. runtime lookup is used. Control Java looks much like c, having for, while and do statements. The go to statement is eliminated completely, but unconditional jumps can be done within iterations using break and continue statements. Labels can be used to break out of nested iterations. Exceptions A throw statement signals a run-time exception. Normal exceptions are status returns to be passed up through possibly may nest method calls, typically signaling some unusual but legal condition such as disk error or file access denial. Abnormal exceptions are subclass of class error Runtime Exception which signals an illegal operation or method call. Both kinds of exceptions can be caught and handled by an exception handler. Methods must declare any normal exceptions that are thrown. This declaration becomes part of the method signature, and is thought of as part of the contract with the calling routine. Overriding methods may only throw exceptions already declared by the overridden method.

Appendix -2

JSP
JSP stands for Java Server Pages. JSP simplify creation and management of dynamic web pages. It separates the content presentation from content generation. Content presentation is mainly taken care by the HTML where as content generation is by JSP. It contains all the tag of HTML with some enhancement. Now JSP is replacing Servlet. But along with Servlet it is making a powerful architecture known as MVC (Model, View, and Component) Architecture. The main advantages of this design over the html and Servlet is that if we are decoupling the middle tier because of the maintenance as our presentation layer in JSP, we can directly communicate

with the database leaving the middle tier components. Where as in HTML and Servlet it does not happen as HTML cannot communicate with the database directly.JSP pages are stored with a .jsp extension, but in the background of JSP there is a shadow of servlet program, which means all the JSP programs are translated into a servlet by a JSP engine and then the servlet engine compiles that Java file into the .class file. First Request JSP <JSP tags> <Java codes> Uses JSP <JSP tags> <Java codes>

Translated Client How JSP Works Generates Response Servlet

Uses

JSP <JSP tags> <Java codes>

1. The user goes to a web site made using JSP. The user goes to a JSP page (ending with .jsp). The web browser makes the request via the Internet. 2. The JSP request gets send to the Web server. 3. The Web server recognizes that the file requested is special (.jsp), therefore passes the JSP file to the JSP Servlet Engine (For ex. - Tomcat Engine). 4. If the JSP file has been called the first time, the JSP file is parsed, otherwise go to step 5. The next step is to generate a special Servlet from the JSP file. All the HTML required is converted to println statements. 6. The Servlet source code is compiled into a class. 7. The Servlet is instantiated, calling the init and service methods. 8. HTML from the Servlet output is send via the Internet. 9. HTML results are displayed on the users web browser.

THE JSP PAGE EXISTS IN THREE FORMS: The .jsp source files containing HTML statements and JSP elements The java source code for a Servlet program

The compiled java class The JSP elements can affect how the JSP container operates during two operational phases: Translation Time: - Generating the Java Servlet source code from a .jsp file Request Time: - Invoking the Servlet to handle an HTTP request There are 3 components in JSP, viz 1. Directives 2. Action elements 3. Scripting elements Directives: Directives serve as messages sent to the JSP container from the JSP. They are used to set global values such as class declarations, methods to be implemented, output content type, etc. They do not produce any output to the client. It includes 3 types: a. Page directive: The page directive is used to define and manipulate a number of

important page dependent attribute that affect the whole JSP, and communicates these attributes to the JSP container. A page can contain any number of page directives, in any order, anywhere in the JSP. Syntax is <%@ page ATTRIBUTES %>

b.

Include directive: The include directive instructs the container to include the content of

the resource in the current JSP, by inserting it inline, in the JSP in place of the directive. Here the content of the file is parsed by the JSP and it happens during translation time. <%@ include file=file name %> c. Tag-lib directive: It allows the pages to use tag extensions. It names the tag library that contains compiled Java code defining the tags to be used. The engine uses this tag library to find out what to do when it comes across the custom tags in the JSP.

Actions Elements: Standard actions tags affect the runtime behavior of the JSP and the response sent back to the client. They have to be provided by all containers, irrespective of the implementation, Following are some of the Standard Action Elements a. <jsp:useBean> b. <jsp:setProperty> c. <jsp:getProperty> d. <jsp:param> e. <jsp:include> f. <jsp:forward> g. <jsp:plugin> Scripting Elements: JSP Scripting elements allow Java code-variable or method declarations, script lets, and expressions to be inserted into the JSP page. Declarations: A declaration is a block of Java code in a JSP that is used to define class-wide variables and methods in the generated servlet. Declarations are initialized when the JSP page is initialized, and have class scope in the generated servlet, so that anything defined in a declarations is available throughout the JSP to other declarations, expressions, and code. A declaration block is enclosed between <%! And %> and does not write anything to the output stream. <%! Java variable and method declaration %> Scriptlets: A Scriptlet is a block of java code that is executed during the requestprocessing time, and is enclosed between <% and %> tags. Multiple scriplets are combined in the generated servlet class in the order they appear in the JSP. Scriptlets, like any other Java code block or method, can modify objects inside them as a result of method invocations.

Expressions:

An expression is a shorthand notation for a scriptlet that sends the value of a Java expression back to the client. The expression is evaluated at HTTP request processing time, and the result is being converted to a String and displayed. An expression is enclosed in the <%= and %> tags. <%= Java code to be evaluated %>

Appendix-3

STRUTS 1.1
The Jakarta Struts project, an open-source project sponsored by the Apache Software Foundation is a server side java implementation of the Model-View-Controller(MVC) design pattern. The Struts project was originally created by Craig McClanahan in may 2000, but since that time it has been taken over by open source community. The Struts project was designed with the intention of providing an open source framework for creating web application that easily separate the presentation layer and allow it to be abstracted from the transaction and data

layers. Struts has received quite a bit developer support and is quickly becoming a dominant factor in the open-source community. MVC Design Pattern The three components of the MVC are: Model- Represents the data objects. The Model is what is being manipulated and presented to the user. View- serves as the screen representation of the Model. It is the object that presents the current states of the data objects. Controller-Defines the way the user interface reacts to the user input. The Controller component is the object that manipulates the model, or data object. Major benefits of using MVC are: Reliability-The presentation and transaction layers have clear separation, which allow you to change the look and feel of an application without recompiling Model or Controller code. High reuse and adaptability- The MVC lets you use multiples types of views, all accessing the same server side code. This includes anything from web browsers (HTTP) to wireless browsers (WAP). Very low development and lifecycle costs: The MVC makes it possible to have lower level programmer develop and maintain the user interfaces. Rapid deployment: Development time can be significantly reduced, because Java developer focuses solely on presentation. Maintainability: The separation of presentation and business logic also make it easier to maintain and modify a struts based web application.

The Struts Implementation of the MVC

View 1 ActionServlet (Controller) View 2

Acti on 1 Acti on 2

Acti on 3

Models

Model The model components of the struts frame work represent the data object of the struts application. They often represents business objects or other backend Systems and can be implemented as simple java beans, Enterprise java beans, object representation of the data stored in the relational database. The View Each view component in the struts Framework mapped to the JSP that contain any combination of HTML, JSP, and struts custom tag. It acts as the presentation layer of a previously executed Controller Action. It also act to gather data that is require to perform particular Controller Action.

The Controller The Controller component of the Struts Framework is the backbone of all struts Web application. It is implemented using a servlet named org.apache.struts.action.ActionServlet. This servlet receives HTTP request and delegates control of each request, based on the URI of the incoming request, to a user defined org.apache.struts.action.ActionClass. The action class is where the Model of the application is retrieved and or retrieved or modified. Once the Action class has completed its processing, it returns a key to the ActionServlet. This key is use to determine the view that will represent the results of the Action classs processing. Struts tag Library

HTML Tag Library <html: base /> <html: button /> <html: cancel /> <html: checkbox /> <html: errors /> <html: file /> <html: form /> <html: hidden /> <html: html /> <html: image /> <html: img /> <html: javascript /> <html: link /> <html: messages /> <html: multibox /> <html: option /> <html: options /> <html: optionsCollection /> <html: password /> <html: radio /> <html: reset /> <html: rewrite /> <html: select /> <html: submit /> <html: text />

<html: textarea /> <html: xhtml /> Tiles Tag Library <tiles: insert /> <tiles: defination /> <tiles: put / > <tiles: putList /> <tiles: add /> <tiles: get /> <tiles: getAsString /> <tiles: useAttribute /> <tiles: importAttribute /> <tiles: initComponentDefinitions />

Tiles Tag Library <logic: empty /> <logic: notEmpty /> <logic: equal /> <logic: notEqual /> <logic: forward /> <logic: redirect /> <logic: greaterEqual /> <logic: greaterThan /> <logic: iterate /> <logic: lessEqual /> <logic: lessThan />

<logic: match/> <logic: notMatch /> <logic: present /> <logic: notPresent /> Template Tag Library <template: get /> <template: insert /> <template: put /> Bean Tag Library <bean: cookie /> <bean: define /> <bean: header /> <bean: include/> <bean: message/> <bean: page/> <bean: parameter/> <bean: resource/> <bean: size/> <bean: struts/> <bean: write/>

Appendix-4

HIBERNATE 3.0

Hibernate is popular open source object relational mapping tool for Java Platform. It provides powerful, ultra-high performance object/relational Persistence and query service for Java. Hibernate lets you develop persistent Classes following common Java idiom - including association, inheritance, Polymorphism, composition and the Java collections framework. The Hibernate Query Language, designed as a "minimal" object-oriented extension to SQL, Provides an elegant bridge between the object and relational worlds. Hibernate also allows you to express queries using native SQL or Java-based Criteria and Example queries. Hibernate is now the most popular object/relational mapping Solution for Java.

The Hibernate 3.0 core is 68,549 lines of Java code together with 27,948 lines of unit tests, all freely available under the LGPL, and has been in development for well over a year. Hibernate maps the Java classes to the database tables. It also provides the data query and retrieval facilities that significantly reduces the development time. Hibernate is not the best solutions for data centric applications that only uses the stored-procedures to implement the business logic in database. It is most useful with object-oriented domain modes and business logic in the Java-based middle-tier. Hibernate allows transparent

persistence that enables the applications to switch any database. Hibernate can be used in Java Swing applications, Java Servlet-based applications, or J2EE applications using EJB session beans.

Features of Hibernate:

Hibernate 3.0 provides three full-featured query facilities: Hibernate Query Language, the newly enhanced Hibernate Criteria Query API, and enhanced support for queries expressed in the native SQL dialect of the database. Filters for working with temporal (historical), regional or permissioned data. Enhanced Criteria query API: with full support for projection/aggregation and subselects. Runtime performance monitoring: via JMX or local Java API, including a second-level cache browser. Eclipse support, including a suite of Eclipse plug-ins for working with Hibernate 3.0, including mapping editor, interactive query prototyping, schema reverse engineering tool. Hibernate is Free under LGPL: Hibernate can be used to develop/package and distribute the applications for free. Hibernate is Scalable: Hibernate is very performing and due to its dual-layer architecture can be used in the clustered environments. Less Development Time: Hibernate reduces the development timings as it supports inheritance, polymorphism, composition and the Java Collection framework. Automatic Key Generation: Hibernate supports the automatic generation of primary key for you.

EJB3-style persistence operations: EJB3 defines the create() and merge() operations, which are slightly different to Hibernate's saveOrUpdate() and saveOrUpdateCopy()operations. Hibernate3 will support all four operations as methods of the Session interface.

Hibernate XML binding enables data to be represented as XML and POJOsinterchangeably. The EJB3 draft specification support for POJO persistence and annotations.

Appendix-5

AJAX
Ajax stands for Asynchronous JavaScript and XML. Ajax is used to fetch the data from web server without refreshing the whole page. JavaScript is used to send the request to web server in order to fetch the data. There are many frameworks available to help the developers to quickly construct the Ajax based web applications. You can use Ajax with any server side technologies such as PHP, JSP, Servlets, Perl, .NET, ASP etc. jQuery is one of the most used Ajax framework and it can be used with all the available server-side technologies. Asynchronous JavaScript and XML or Ajax for short is new web development technique used for the development of most interactive website. Ajax helps you in making your web application more interactive by retrieving small amount of data from web server and then showing it on your application. You can do all these things without refreshing your page. Usually in all the web applications, the user enters the data into the

form

and then clicks on the submit button to submit the request to the server. Server

processes the request and returns the view in new page ( by reloading the whole page). This process is inefficient, time consuming, and a little frustrating for you user if the only the small amount of data exchange is required. For example in an user registration form, this can be frustrating thing for the user, as whole page is reloaded only to check the availability of the user name. Ajax will help in making your application more interactive. With the help of Ajax you can tune your application to check the availability of the user name without refreshing the whole page.

Ajax is not a single technology, but it is a combination of many technologies. These technologies are supported by modern web browsers. Following are techniques used in the Ajax applications.

JavaScript: JavaScript is used to make a request to the web server. Once the response is returned by the webserver, more JavaScript can be used to update the current page. DHTML and CSS is used to show the output to the user. JavaScript is used very heavily to provide teh dynamic behavior to the application. Asynchronous Call to the Server: Most of the Ajax application used the XMLHttpRequest object to send the request to the web server. These calls are Asynchronous and there is no need to wait for the response to come back. User can do the normal work without any problem. XML: XML may be used to receive the data returned from the web server. JavaScript can be used to process the XML data returned from the web server easily.

Benefits of Ajax Ajax is new very promising technology, which has become extremely popular these days. Here are the benefits of using Ajax:

Ajax can be used for creating rich, web-based applications that look and works like a desktop application Ajax is easy to learn. Ajax is based on JavaScript and existing technologies like XML, CSS, DHTML. etc. So, its very easy to learn Ajax Ajax can be used to develop web applications that can update the page data continuously without refreshing the whole page.

Appendix-6

ORACLE 10g SERVER


Oracle 10g,a product of Oracle Systems Corporation, based in Redwood Shores, California, has been used as the back-end tool for developing theResearch Program Atomization System software for RMRC, Bhubaneswar center. The Oracle10g Server is a state-of-the art information management environment. It is a repository for very large amounts of data, and gives users rapid access to that data. The Oracle10g Server allows for the sharing of data between applications; the information is stored in one place and is used by many systems. It supports the following configurations. Host-based Users are connected directly to the same computer on which the database resides. Client/Server Users access the database from their personal computer (client) via a network, and the database sits on a separate computer (server). Distributed Processing Users access a database that resides on more than one computer. The database is spread across more than one machine, and the users are unaware of the physical location of the data they work with. Web-enabled computing: The ability to access data from an Internet based application. Features of Oracle10gServer

Security Mechanisms Oracles sophisticated security mechanisms control access to sensitive data by an assortment of privileges. Users are given rights to view, modify and create data based on the name they use to connect to the database. Customers use these mechanisms to ensure specified users get to see sensitive data, while others are forbidden. Backup and Recovery Oracle provides sophisticated backup and recovery routines. Backup creates a secondary copy of Oracle data; recovery restores a copy of data from that backup. Oracles backup and recovery strategy minimizes data loss and downtime when and if problems arise. Oracle Server also provides backup and recovery schemes that can allow uninterrupted access to the data 7 days a week, 24 hours a day, and 365 days a year. Space Management Oracle offers flexible space management. We can allocate disk space for storage of data and control subsequent allocations by instructing Oracle how much space to set aside for future requirements. It also has a series of special abilities that were designed with very large databases in mind.

Multiple-Process Oracle Instance User processes

User

User

User

User

System Global Area

(SGA)

Recoverer (RECO)

Process Monitor (PMON)

System Monitor (SMON)

Database Writer (DBWO)

Log Writer (LGWR)

Archiver (ARCH)

CLIENT/SERVER ARCHITECTURE ADO and remote data control can help to meet a specific set of client/server requirements. By using features one can get: Gain high performance data access against ODBC data sources. Manage multiple records

Limit the number of return rows. Utilize server side cursors. Execute queries asynchronously Reduce memory footprint

CLIENT-SERVER ARCHITECTURE OF THE SYSTEM Client-server architecture is based on a simple premise: Differed computers perform different tasks, and each computer can be optimized for a particular task. It makes sense therefore to separate the DBMS from the client application. In a network environment the DBMS resides on a single machine. However many applications access the databases, and all clients make requests from the same database.

ACKNOWLEDGEMEN T
The satisfaction that accompanies that the successful Completion of any task would be incomplete without the Mention of people

whose ceaseless co-operation made it Possible, whose constant guidance and encouragement Crown all efforts with success. We are grateful to our project guide Mr. Debabrata Dash for the guidance, inspiration and constructive suggestions that help us in the preparation of this project. Finally my sincere thanks to my project members, Soumya Baran Sahoo, Susant Kumar Sahu, Deepak Kumar Bihari, Sidharth Ranjan Dhal, Prakash Kumar Nayak without the help of whom this project could never have been completed on time.

PREFACE

The project entitled ONLINE SHARE TRADING SYSTEM based on Java and JSP (Java Servlet Page) designing is a major project, which is a part of our BCA course curriculum, helps us in real world. This is a period when we have Practical exposure to the real world .Till this period, we had only gained the theoretical knowledge that was imparted to us in our college but we had failed to understand practical importance during the college session and its implementation in the real world. Then by the collective effort, labour project. and cooperation of all the team members we got an in depth knowledge of the

DECLARATION
I, the undersigned, hereby declare that the Project report entitled ONLINE SHARE TRADING SYSTEM is designed, written and submitted by me as mini project of the requirement for the Degree of Bachelor of Computer Application is our original work. The empirical findings in this report are based on data collected by me through discussion with the project guide. I understand that, any such copying is liable to me punishment in way the university authorities deem fit.

Yours Faithfully,

Date: -

10/06/2010

Place:- Bhubaneswar
Soumya Baran Sahoo

Вам также может понравиться