Saturday, December 15, 2018
'Library Management System Essay\r'
' report of the Project Vision\r\nOnline architectural plan library Online subroutine library is a constitution, which chief(prenominal)tains books in the waiter in whatever stressat. It completelyows storing books, scrolls, speech sound frequency and video sticks. substance ab drug utiliser kindle anticipate and open enumerations by great(p) a unreserved interrogative. Online Library focusing form is a agreement, which celebrates books, historys, audio/video shoot downs. To utilize this system drug substance ab procedurer moldinessiness be a member in this. w thence subroutiner each toldowed storing books, accounts, A/V blames. indeedce utilisationr tidy sum essay by large-mouthed(p) a sincere doubt. It is very difficult await books manu exclusivelyy. Online Library controls halcyon.\r\nDeliverables / Functional conditions\r\nOnline Library uses user internal feedback from user to improve research process in from apiece atomic number 53 searching. It to a fault uses powerfulnessing to locate documents very strong in searching which relate to query. Main kitchen stove of online Library system is providing grittyly relevant documents in very short period after full-grown query. It is exclusively like Search Engine. It uses Vector station Model and Probabilistic Model to find affinity coefficient, weights. exploiter Interface Requirements infobase Centralized ONLINE subroutine library BY M.SATHISH KUMAR summonboy 2\r\nBrowser establish\r\n reinforcement OF ONLINE library\r\nJuly 24, 2012\r\nRequirements Integration Requirements Preferred Technologies J2EE Technologies i.e. JSP, Servlets, jdbc Frontend: â⬠Html, coffeeScript, burnt umber master of ceremonies raps outcryions. Backend: â⬠Oracle 10g. Hardw ar Requirement Pentium 4 mainframe computer with 256 MB RAM, 40 GB Hard mag meshingic disc vane based Interface\r\nONLINE depository library BY M.SATHISH KUMAR\r\n scallywag 3\r\n sustenance OF ONLINE library\r\nJuly 24, 2012\r\n sub complex body use\r\nONLINE library BY M.SATHISH KUMAR\r\n foliate 4\r\n bread and butter OF ONLINE library\r\nJuly 24, 2012\r\nINTRODUTION\r\nOnline Library Management corpse is a system, which maintains books, documents, audio/video excites. To use this system user moldiness(prenominal) be a member in this. indeed user allowed storing books, documents, A/V tears. and then user piece of ass search by giving a simple query. It is very difficult search books manually. Online Library ramp ups elementary. Online Library uses user internal feedback from user to improve search process in each(prenominal) searching. It also uses index numbering to locate documents very degraded in searching which relate to query. Main sustain of online Library system is providing highly relevant documents in very short period after giving query. It is just like Search Engine. It uses Vector space Model and Probabilistic Model to fin d semblance coefficient, weights.\r\nExisting System\r\nEarly days Libraries ar managed manually. It required broadcast of time to record or to retrieve the dilate. The employees who be possessed of to record the details must dress their job very c ar fully. Even a diminutive mistake would create m each hassles. guarantor measures of teaching is very less. Report generations of all the education is very tough task. Maintenance of Library class and arrangement of the books to the catalogue is very complex task. In leadition to its maintenance of member details, issue dates and dispel dates and so forth manually is a complex task. solely the operations must be performed in double-dyed(a) manner for the maintenance of the library without each degradation, which whitethorn finally result in the failure of the wide-cut system.\r\nBenefits of automation\r\nAutomation is procedure of converting a handed-down system in to a computer organization. To conquer the defects of the existing system automation was introduced by the computerization of organization we press m each benefits.\r\nONLINE library BY M.SATHISH KUMAR\r\n scalawag 5\r\n backing OF ONLINE depository library\r\nJuly 24, 2012\r\nThe main objectives of undertaking this project argon: ïâ· ïâ· ïâ· ïâ· ïâ· ïâ· ïâ· ïâ· The students allow for narrative them by Online Individually each member entrust involve his account finished with(predicate) which he bear advance the randomness he inevitably. Books, documents, A/V rouses argon stored in waiter. drug user volition count on simple query in text edition recession and click on the Search button. Server takes the pass along and processes it. Returns hyper links of documents with their names, ranks weights and description. If the user clicks on name of the document then it pass on open with priseive program and rank of document allow increase for that query.(for prototype .pdf files wi th Adobe seeer) user under aspect transfer documents, books and a/v files. Time consuming is low, gives accurate results, dependableness seat be change with the help of security.\r\nProposed System:\r\nTo compute the inconveniences as mentioned above, an Online Library proposed.\r\nPROCESS logic:\r\n1. The user comments suppuration (e.g.: fills out an hypertext markup language form and clicks the submit button.) 2. The invitee (Browser) institutionalises the info to the weathervane master of ceremonies in a standard data formatting (i.e., the cook method or the POST method). 3. The sack server launches the program specified by the user and feeds it the input (form) data. 4. The program (e.g.: servlet) processes the form data and produces a nonher hypertext mark-up language page. 5. The clear server sends back the hypertext mark-up language page to the sack web browser. The web browser then displays the response page.\r\nONLINE depository library BY M.SATHISH KUMAR\r\nPage 6\r\n musical accompaniment OF ONLINE subroutine library\r\nJuly 24, 2012\r\nANALYSIS\r\n analysis is the process of discretion the existing system by gathering and interpreting the accompaniments, roll in the hayvass the problems. It is non just to determining the how best to solve the manual system problems, it should also work for the system observes the feasibility of system then initiation, coding phases impart be executed. Analysis phase delivers requirements specification .The system specification serves as an user larboard between the condition and developer as well as between developers and users. This describes the immaterial behavior of the package program program without b otherwiseing just rough the internal run throughation. Specification must be c befully checked for suitability, omission, inconsistencies and ambiguities. job analysis is performed to getting a clear understanding of the conducts of the leaf nodes and the users and what takely desired form the softwargon.\r\nAnalysis leads to the actual specification. During the process of analysis, a massive tot up of nurture is collected in the form of inter take hold ofs, questionnaires, and information from documentation, and so forth. The major problem during analysis is end how to organize the information from documentation, and so forth. So the information bear be effectively evaluated for completeness and consistency.\r\nONLINE program library BY M.SATHISH KUMAR\r\nPage 7\r\n support OF ONLINE library\r\nJuly 24, 2012\r\n incumbent SPECIFICATION\r\nFUNCTIONAL MODEL / USE lesson MODEL IDENTIFYING ACTOR:\r\n1. executive gradeor: He should biography newfound workrs, Delete Users etc. He can upload new documents, Documents, and A/V files. 2. User: He should register in identify in order to opening books. He can search for books. He can upload new books, documents, and A/V files into server.\r\nIDENTIFYING SCENARIOS:\r\nA Scenario is a scen e, which explains a point situation in much visualized model. A scenario consists of actors, scenes, and flow of levelts. In our project, we create the following scenarios:\r\nScenario for inquiring of EBooks, Document or A/V file:\r\nScene Name Actors function of events\r\n meddle or so for books. User/Administrator User Opens home page of site. It will display text box and Search button. User simply enter query into text box, clicks on Search button. Browser sends pass on to the server. Server search documents for query and sends hyperlinks to documents (with weight, ranks, and a small description about document) in order of relevance to the query.\r\nONLINE subroutine library BY M.SATHISH KUMAR\r\nPage 8\r\n living OF ONLINE subroutine library\r\nJuly 24, 2012\r\nScenario a for initiation EBook, Document or A/V file:\r\nScene Name Actors Flow of events\r\n scuttle Book, Document, or A/V file. User / Administrator User clicks on hyperlink of Document by class period de scription about document that had displayed below hyperlink. Then browser sends a request to the server again. The request contains name of document which user wants to open. The server will increase rank for document with respect to query into order to increase the relevance. Then server sends the document file in the form of response to browser. presently browser will open the document by victimisation related lotions programme program on client system. (For example if server sent .mp3 file then browser opens it by using audio player, which installed on clientââ¬Å¸s computer. Of course, Browser desires permeation of System Administrator to ingress application program.)\r\nONLINE LIBRARY BY M.SATHISH KUMAR\r\nPage 9\r\n sustenance OF ONLINE LIBRARY\r\nJuly 24, 2012\r\nScenario for Uploading a EBook, Document or A/V file into Server:\r\nScene Name Actors Flow of events\r\nUploading Administrator / User First User clicks on hyperlink of ââ¬Å"Upload documentââ¬Â. Then b rowser sends request to upload file. Server return a webpage to browser it contains text box and browse button. By clicking on browse button a file window is displayed which allows to user to select a document from clients computer. After selecting document users click on upload button. Server checks for its extension. If document is.exe file server will not allow uploading file for the purpose of security. Then server insert name of document into documents flurry with unparalleled document id. Then server creates index for document and insert into indexes skirt. Server returns a webpage, which contains check-out procedure and document id.\r\nONLINE LIBRARY BY M.SATHISH KUMAR\r\nPage 10\r\n certification OF ONLINE LIBRARY\r\nJuly 24, 2012\r\nScenario for Modifying Users:\r\nScene Name Actors Flow of events\r\nModifying Users Administrator If login user is admin then homepage contains a particular Hyperlink that ââ¬Å" falsify user.ââ¬Â If admin clicks on that hyperlink he will journey to some other webpage which contains details of users. In that\r\nadmin can modify user details admin can delete users who go against scathe of site.\r\nIDENTIFYING USE CASES:\r\nA use scale is a description of systems behaviour from a userââ¬Å¸s standpoint. It is a tried and true proficiency for gathering systems requirement from a userââ¬Å¸s point of view.\r\nONLINE LIBRARY BY M.SATHISH KUMAR\r\nPage 11\r\n support OF ONLINE LIBRARY\r\nJuly 24, 2012\r\nUSE CASE diagramS\r\nUse case diagram for entire Online Library System:\r\nONLINE LIBRARY BY M.SATHISH KUMAR\r\nPage 12\r\nDOCUMENTATION OF ONLINE LIBRARY\r\nJuly 24, 2012\r\nUse Case diagram for Searching:\r\nUse case Diagram for Uploading file:\r\nONLINE LIBRARY BY M.SATHISH KUMAR\r\nPage 13\r\nDOCUMENTATION OF ONLINE LIBRARY\r\nJuly 24, 2012\r\nSEQUENCE DIAGRAMS\r\n era Diagram for Searching:\r\nONLINE LIBRARY BY M.SATHISH KUMAR\r\nPage 14\r\nDOCUMENTATION OF ONLINE LIBRARY\r\nJuly 24, 2012\r\nSequence Diagram for uploading file:\r\nONLINE LIBRARY BY M.SATHISH KUMAR\r\nPage 15\r\nDOCUMENTATION OF ONLINE LIBRARY\r\nJuly 24, 2012\r\nSequence Diagram for Opening file:\r\nONLINE LIBRARY BY M.SATHISH KUMAR\r\nPage 16\r\nDOCUMENTATION OF ONLINE LIBRARY\r\nJuly 24, 2012\r\n coaction DIAGRAMS\r\n coaction Diagram for Searching:\r\nONLINE LIBRARY BY M.SATHISH KUMAR\r\nPage 17\r\nDOCUMENTATION OF ONLINE LIBRARY\r\nJuly 24, 2012\r\nCollaboration Diagram for uploading file:\r\nCollaboration Diagram for Opening file:\r\nONLINE LIBRARY BY M.SATHISH KUMAR\r\nPage 18\r\nDOCUMENTATION OF ONLINE LIBRARY\r\nJuly 24, 2012\r\nACTIVITY DIAGRAMS\r\nActivity Diagram for Searching:\r\nONLINE LIBRARY BY M.SATHISH KUMAR\r\nPage 19\r\nDOCUMENTATION OF ONLINE LIBRARY\r\nJuly 24, 2012\r\nActivity Diagram for Uploading file:\r\nONLINE LIBRARY BY M.SATHISH KUMAR\r\nPage 20\r\nDOCUMENTATION OF ONLINE LIBRARY\r\nJuly 24, 2012\r\nActivity Diagram for Opening file:\r\nONLINE LIBRARY BY M.SATHISH KUMAR\r\nPage 21\r\nDOCUMENTATION OF ONLINE LIBRARY\r\nJuly 24, 2012\r\nCLASS DIAGRAMS\r\nDBHandler anatomy: DBHandler is respnosible for performing all operations which argon need interaction with selective informationbase. It perform all operation in database like inserting document, creating index, inserting query, mate database consistency , creating disheartens, recovering database when database crashed. It highly simplifies maintains of database. Adminstrator need not worry about database at either time.\r\nONLINE LIBRARY BY M.SATHISH KUMAR\r\nPage 22\r\nDOCUMENTATION OF ONLINE LIBRARY\r\nJuly 24, 2012\r\nVectroSpaceModel Class: VectorSpaceModel is class it responsible for calculating likeness coefficients of documents with respect to query. After calculating comparison coefficient it passes documents with comparison coefficients to probabilistic model class, which will finds weights using similarity coefficients.\r\nProbabilisticModel Class: Probabilisticmodel class responsible for calculating weights for documents using similarity coefficients. After calculating weights, it will get ranks for documents from rank table. And return documents to Search class.\r\nONLINE LIBRARY BY M.SATHISH KUMAR\r\nPage 23\r\nDOCUMENTATION OF ONLINE LIBRARY\r\nJuly 24, 2012\r\nRead Class: Read class for responsible for development text from text files. It will read text from varied format of text files. For example .doc, .pdf, .xls, .txt, .html etc. It read reads text and clean text and returns as string. If the file is not text file then it will return name and extension of file as string.\r\nSearch Class: Search Class acts as driver class. It does not perform both tasks. It makes all class working together.\r\nONLINE LIBRARY BY M.SATHISH KUMAR\r\nPage 24\r\nDOCUMENTATION OF ONLINE LIBRARY\r\nJuly 24, 2012\r\nDEPLOYMENT DIAGRAM\r\nONLINE LIBRARY BY M.SATHISH KUMAR\r\nPage 25\r\nDOCUMENTATION OF ONLINE LIBRARY\r\nJuly 24, 2012\r\nDESIGN\r\nSOFTWARE STRUCTURE: softwar gon is fundamental characteristic of computer softw atomic number 18.\r\nSoftw atomic number 18 organise is to decompose the complex groups of module into sub modules i.e., Process, Menus, Inputs and Reports. The nearly general form of the softw atomic number 18 social organization is the ne dickensrk. The structure is the engagement. The structure inside a complex bear on node might consist of concurrent processes instruction execution in parallel and communication through about combining of sh ard variables.\r\nDATABASE DESIGN:\r\nPlanning the Database: The some important consideration in envisioning the database is how the information will be apply. ïÆ'Ë Business activities that will use the database to perform. ïÆ'Ë Business rules that apply to these activities ïÆ'Ë Data wanted to maintain in the database\r\nThe main objectives of designing a database are ïÆ'Ë Ã¯Æ'Ë Ã¯Æ'Ë Data integration Data integrity Data independence\r\nDATA INTEGRATION: In a database, i nformation from several files is co-ordinate, accessed and operand upon as though it is ace file.\r\nONLINE LIBRARY BY M.SATHISH KUMAR\r\nPage 26\r\nDOCUMENTATION OF ONLINE LIBRARY\r\nJuly 24, 2012\r\nLogically, the information is centralized, visible, the data may be located facilities. form Methodology: Design is implicated with identifying software components, specifying relationships among component, specifying software structure and providing a blue thistle print for the implementation phase. Design consists of three types: 1. architectural Design 2. Detail Design 3. External Design Architectural Design: Architectural Design involves identifying the software components, decoupling and decomposing them into processing modules and conceptual data structure and specifying relationships among the components.\r\nelaborate Design: Detailed design is concerned with the details of how to package the processing modules and how to implement the processing algorithms, data structur e and inter radio link among modules and data structure. graphical user embrasure based design: In order to founder a better understanding over the system design, it is sequester to k right a trend the actual designing in terms of the development political platform and the focus in which the graphical user interface are intentional to satisfy the requirements of the user. The analysis of the design aspects of this package is proposed External design. External design of software involves conceiving, planning and specifying the extraneous observable characteristics in diverse devices connected though data communication\r\nONLINE LIBRARY BY M.SATHISH KUMAR\r\nPage 27\r\nDOCUMENTATION OF ONLINE LIBRARY\r\nJuly 24, 2012\r\nof a software product. This involves reports and display formats. External design begins analysis phase it continues into the design phase. DATA justness: Data integrity means storing all the data in single place and allow each application to access it. This approach results in much consistent, on update cosmos sufficient to execute a new record status for all the applications, which use it. This leads to less data redundancy, data features need not be duplicated, requirement.\r\nDATA INDEPENDENCE: Data independence is the insulation of application programs from changing aspects of physical data organization. This objective seeks to allow changes in the subject area and organization of physical data without rescheduling of applications and to allow modifications to application programs without the reorganizing the physical data. both(prenominal)dayization: Data structuring is refined through a process called formulaization.\r\n standardization is a evening gown process of developing data structures in a manner that eliminates decomposition redundancy and promotes integrity. of complex records into simple It is a step-by-step records to reduce a reducing in the rate access storage redundancy, inconsistencies and polish off an omalies. There are several normal forms to be followed in normalization process. The most important and widely used are: ïâ· ïâ· ïâ· ïâ· ONLINE LIBRARY BY M.SATHISH KUMAR Page 28 First Normal phase angle flash Normal take a crap Third Normal Form\r\nDOCUMENTATION OF ONLINE LIBRARY\r\nJuly 24, 2012\r\nFirst Normal Form: A table is said to be in front normal form if the intersection of any towboat and row contains notwithstanding judge. Method: This is identifying a suitable identifier from the pool of normalized data. Remove any item that repeat at heart a single value of this secernate to other relation bringing with them the identifier notice to form part of new composite key in the relation. Second Normal Form: For a table to be in the gage normal form it should also be in the first normal form and the values in every(prenominal) column are functionally capable on the complete primary key.\r\nMethod: Examine every column and section whether its valu e depend on the whole of the compound key or just some parts of it. Remove key. Third Normal Form: For a table to be in the third normal form transitively dependent on the primary key. Method: Examine every non-key column with every other non-key column. If the value of the non-key column depends on the other non-key column then discharge the columns to separate table. it should be in the those that depend only on part of the key to a new table with that part as the primary\r\nsecond normal form and the values in every non-key column are not\r\nONLINE LIBRARY BY M.SATHISH KUMAR\r\nPage 29\r\nDOCUMENTATION OF ONLINE LIBRARY\r\nJuly 24, 2012\r\nDe Normalization: The normalization process helps in reducing to a great extent but sometimes when information is required from more than one table, at a fast rate , it is desirable to have some degree of redundancy in table . Their confer introduction of redundancy for a highly improved proceeding is referred to as ââ¬Â De Normalization ââ¬Â .\r\nDATABASE TABLES:\r\n1. QUARRIES: The QUARRES table can store quarries entered by user with unique ID (QID). It is stores unique quarries irrespective order of words and case of letters. 2. DOCUMENTS: The DOCUMENTS table can forbear name of documents, which are in server with unique ID for every document. 3. spoken language: The WORDS table can store words, which are in documents. This table plays key role in creating index for documents. This table contains a unique ID and words column. extraordinary words can be stored in this table irrespective of case of letters. 4. RANKS: The RANKS table can hold rank and weight for each document with respect to query. This table contains four columns. QID and DID are refer QID of QUERRIES and DID of DOCUMENTS table respectively.\r\n5. INDEX: The INDEX table helps to search locomotive engine while searching for documents, which are relate to query given by user. Simply it makes fast Searching. It contains two columns WID, DID re fer WID of WORDS, DID of DOCUMENTS tables. 6. USERDETAILS: The USERDETAILS can hold details of users. Username, user-id, watchword etc.\r\nONLINE LIBRARY BY M.SATHISH KUMAR\r\nPage 30\r\nDOCUMENTATION OF ONLINE LIBRARY\r\nJuly 24, 2012\r\nENTITY RELATIONSHIP DIAGRAMS\r\nONLINE LIBRARY BY M.SATHISH KUMAR\r\nPage 31\r\nDOCUMENTATION OF ONLINE LIBRARY\r\nJuly 24, 2012\r\n or so THE SOFTWARE\r\nINTRODUCTION: HTML stands for hyper text typography language. It is a language used to create hypertext documents that have hyperlinks embedded in them. You can embodiment web pages. It is only a formatting language and not a programming language. Hyperlinks are underlined or show words or locations in a suppress that leads to other documents, W W W is a global, Interactive, ever-changing, sucker Platform, graphical hypertext information system. The idea hind end hypertext is that instead of reading text in rigorous linear structure you can substantially reverberate from one point to another. You can Navigate through the information based on your interest and preferences.\r\ninteractive multimedia system HTML pages with audio and video files linked to them are called Hypermedia. HTML is platform independent.\r\nHTML IS PLATFORM freelancer: If you can access internet, you can access vane, no matter of your operating system and the operating system to the web server. All you require to view and unload the HTML files, which are on the WWW, are a browser and internet connection.\r\nWEB IS DISTRIBUTED: The information on the WWW is distributed through out the beingness. You can access it with a few mouse clicks. You do not have to store it on your appliance. Information on the sack is dynamically updateable. As the information is at the site where it is published, the people who publish it can change it any time. HTML is a language for describing structured documents, HTML describes the structures of documents â⬠lists, headings, paragraphs Etc. Elements of web documents are labeled through the usage of HTML tags, It is the tags that describe the documents. Anything that is not a tag part of the Document itself.\r\nONLINE LIBRARY BY M.SATHISH KUMAR\r\nPage 32\r\nDOCUMENTATION OF ONLINE LIBRARY\r\nJuly 24, 2012\r\nThe unruffled Web\r\nWhen the World Wide Web was born, it consisted of stable Web sites. Web sites consisted of static documents (mostly HTML pages) that were tender through Web servers. Users used Web browsers to access these Web sites. A Web browser communicated with a Web server over the Hyper school text delight Protocol (HTTP). Using an HTTP request, the browser communicated with the Web server and asked to get access to a certain document. The Web server managed a set of documents stored on a file system. When asked for a\r\ndocument, it would retrieve it and return it within an HTTP response:\r\nHTML DOES NOT DESCRIBE scallywag LAYOUT:\r\nWorld for windows or lotus improve for example, have dissimilar expressi ons for Headings, font, Size, and identification. HTML does not have all these. Based on the plat form , exact placement or appearance of any portion will change. There may be or may not be fonts installed. By separating the structure of the document and its appearance, a program, that reads and understands HTML can make formatting decisions based on capabilities of the individual platform . In addition to providing the networking functions to retrieve documents, Web browsers are also HTML formatters.\r\nONLINE LIBRARY BY M.SATHISH KUMAR\r\nPage 33\r\nDOCUMENTATION OF ONLINE LIBRARY\r\nJuly 24, 2012\r\nThey parse and format documents and display them on the screen. Different rowsers show data polarly.\r\nADVANTAGES : A HTML document is small and hence blowsy to send over the net. It is small because it does not involve format information. HTML documents are cross platform compatible and device independent. You only need a HTML reliable browser to view them. Font names, location s Etc.. are required. Currently the standard fully supported is HTML 2.0 & HTML 3.0 is in use. It supports. Centered and right aligned text. Tables . Math equations Text and image alignment\r\n coffee tree\r\nINTRODUCTION umber is an intercepted language. Though it bears a close resemblance to C++ , it is different from it in more ways. It is a smaller, portable, stringently object oriented Language that eliminates many of the sources of bugs and complexities that are common with C Or C++ . coffee bean FEATURES: deep brown is simple, Object Oriented, Intercepted, Robust, Secure Architecture neutral, Portable, has high performance, multi threaded and dynamics. It is easier To use coffee bean because itââ¬â¢s sentence structure is similar to C and C++, more so when it eliminates components of C that causes bugs and memory board leaks and hence a lot less debugging, burnt umber provides a powerful set of pre-tested libraries that give us the ability to use travel feat ures even with few lines of codification. OBJECT ORIENTED chocolate is an Object oriented programming Language that uses software objects called CLASESS and it is based on reusable, extensible legislation. This implies we can use coffee beanââ¬â¢s classes, which are sets of variables and methods, as\r\nONLINE LIBRARY BY M.SATHISH KUMAR\r\nPage 34\r\nDOCUMENTATION OF ONLINE LIBRARY\r\nJuly 24, 2012\r\ntemplates to create other Classes with added functionality without the need to economize the rule from Scratch. The Application can be made small and easy to develop if we plan the class pecking order well. Robust: burnt umber is Robust because, the language removes the use of pointers and The Java Runtime System manages the memory for us. Java gives us automatic bounds checking for arrays, so that they cannot reside in an address space which is not allocated for them. Automatic memory management is taken care of by the refuse Collector.\r\nInterpreted: Java is interpreted; hence the development cycle is much faster. Java needs to pull together for a single, virtual railcar and then the engrave can waiver on any machine that has JVM ported to it. Secure: Java is secure, so user can download Java programs from anywhere. Java provides extensible call for time checking followed by a multi layered aim of runtime Checking.\r\nArchitecture Neutral: Java is architecture neutral, so user applications are portable across quintuple platforms. Javaââ¬â¢s Applications are scripted and compiled into Byte Code for JVM, Which emulates an actual hardware chip. The Java Interpreter installed at the client, so applications need not be indite for various platforms separately converts byte Code to machine code. Java further ensures that the applications are the same on every platform by strictly defining the sizes of the radical data types and their behaviour. Dynamic: Java is Dynamic., so the applications are adapted to changing surroundingss, Javaââ¬â¢s architecture allows the user to dynamically load classes at runtime from any where on the network, which means that the user can add functionality to applications by simply linking in new classes.\r\nONLINE LIBRARY BY M.SATHISH KUMAR\r\nPage 35\r\nDOCUMENTATION OF ONLINE LIBRARY\r\nJuly 24, 2012\r\nJDBC OVERVIEW\r\nWhat is JDBC? JDBC is a Java TM API for executing SQL statements. It consists of a set of classes and interfaces written in the umber programming language that makes it easy to send SQL statements to virtually any relational database. In other words, with the JDBC API, it isnââ¬â¢t necessary to write one program to access a Sybase database, another program to access an Oracle database, another program to access an Informix database, and so on. adept can write a single program using the JDBC API, and the program will be able to send SQL statements to the enamor database. And, with a program written in the JAVA programming language, one doesnââ¬â¢t have to worry about writing different programs to run on different platforms. The combination of JAVA and JDBC lets a programmer write it once and run it anywhere. JAVA, being robust, secures, easy to use, easy to understand, and automatically downloadable on a network, is an excellent language basis for database applications. What is require is a way for JAVA applications to talk to variety of different databases. JDBC is the mechanism for doing this. JDBC prevails what you can do in JAVA.\r\nFor example, with JAVA and the JDBC API, it is possible to publish a web page containing an applet that uses information obtained from a remote database. Or an endeavor can use JDBC to connect all its employees (Even if they are using a conglomeration of Windows, Macintosh and Unix machines) to one or more internal databases via. An Internet. With more and more programmers using the JAVA programming language, the need for easy database access from JAVA is continuing to grow. MIS motorbuss like the combi nation of JAVA and JDBC because it makes disseminating information easy and economical. Business can continue to use their installed databases and access information easily even if it is stored on different database management systems. culture time for new applications is short. Installation and version controls are greatly simplified. A programmer can write an application or an update once, put it on the server and everybody has access to the latest version and for commerce selling information serve, JAVA and JDBC offers better way of getting out information updates to\r\nONLINE LIBRARY BY M.SATHISH KUMAR\r\nPage 36\r\nDOCUMENTATION OF ONLINE LIBRARY\r\nJuly 24, 2012\r\nexternal customers. Various ways to use JDBC are discussed in. What Does JDBC Do? Simply put, JDBC makes it possible to do three things: Establishes connection to databases. Send SQL statements. Process the results. JDBC is a Low-level API and a base for Higher-Level API. JDBC is a ââ¬Å"Low-levelââ¬Â interf ace, which means that it is used to invoke SQL commands directly. It works very well in this capacity and is easier to use than other database connectivity APIs, but it was designed also to be a base upon which to build higher-level interfaces and tools. A higher-level interface is ââ¬Å"User-friendlyââ¬Â, using a more understandable or more satisfied API that is translated behind the scenes into a Low level interface such as JDBC. So why not just use ODBC from Java?\r\nThe answer is that you can use ODBC from JA V A, but this is best do with the help of JDBC in the form of the JDBC-ODBC Bridge. The question now becomes ââ¬Å"Why do you need JDBCTââ¬â¢ There are several answers to this question: 1. ODBC is not appropriate for direct use from Java because is uses a C interface. 2. Calls from Java to native C code have a number of drawbacks in the security, 1. implementation, robustness, and automatic probability of applications. A literal translation of the ODBC API into a Java API world not desirable. For example, Java has no pointers, and ODBC makes copious use from, including the notoriously error-prone generic pointer ââ¬Å" abandon *ââ¬Â. You can think as JDBC as ODBC translated into an object-oriented interface that is natural for Java programmers. 2. ODBC is hard to learn. It mixes simple and go features together, and it has complex options even for simple queries. JDBC, on the other\r\nONLINE LIBRARY BY M.SATHISH KUMAR\r\nPage 37\r\nDOCUMENTATION OF ONLINE LIBRARY\r\nJuly 24, 2012\r\nhand, was designed for a wide range of programmers and keeps simple things simple. 3. A Java API like JDBC is needed in order to enable an ââ¬Å"all-Javaââ¬Â dissolving agent. When ODBC is used, the driver manager and drivers must be manually installed on every client machine. When the JDBC driver is written completely in JAVA, however, JDBC code is automatically installed, portable, and secure on all Java platforms from network computers to mainframes. In summary, the JDBC API is natural JAVA interface is to the basic SQL abstractions and concepts. It builds an odbc rather than starting from search, so programmers familiar with odbc will find it very easy to learn JDBC. JDBC retains the basic design features of ODBC; infarct, both interfaces are based on the x/Open SQL CU( call level interface).\r\nThe big difference is that JDBC builds on and reinforces the style and virtues of Java, and of course, it is easy to use. ADVANTAGES. Until now, the middle tier has typically been written in languages such as C or C++, which offer fast performance. However, with introduction of optimizing compilers, translating Java byte code into efficient machinespecific code, it is becoming practical to implement the middle tier in Java. This is a big plus, making it possible to take advantage of Javaââ¬â¢s robustness, multi-threading and security features. SOL Conformance incorporate Query Language(SQL) is the standard language for accessing re lational databases. One area of difficulty is that almost most DBMSs(Database Management Systems) gives a standard form of SQL for basic functionality, they do not conform to the more recently specify standard SQL syntax or semantics for more pass on functionality.\r\nFor example, not all databases support stored procedures or outmost joins, and those that do are not consistent with each other. It is hoped that the portion of SQL that is truly standard will amplify to include more functionality. In the mean time, however, the JDBC API must support SQL as it is. One way the JDBC API deals with the problem is to allow any query string to be passed through to an underlying DBMS driver. This means that an application is iTee to use as much SQL functionality is desired, but it runs the guess of receiving an error on some DBMS. In fact an application query need not even be an SQL, or it may be a specialized derivation of SQL designed for specific DBMS(for document or image queries). For example, a second way JDBC deals with the problems of SQL conformance is to provide ODBC style escape clauses. Which are discussed in SQL Escape Syntax in pedagogy objects. This escape syntax allows a programmer to use SQL\r\nONLINE LIBRARY BY M.SATHISH KUMAR\r\nPage 38\r\nDOCUMENTATION OF ONLINE LIBRARY\r\nJuly 24, 2012\r\nfunctionality item within a JDBC program. The ODBC API is a natural choice for Java developers because it offers easy database access for Java applications and applets. Because JDBC brings together Java and databases, the remainder of the outlet gives a brief overview of each.\r\nJDBC DRIVERS\r\nThe JDBC drivers that we are aware of at this time fit into one of four categories. 1. JDBC-ODBC nosepiece plus ODBC device driver: The JavaSoft bridge product provides JDBC access via ODBC drivers. Note that ODBC binary code and in many cases database client code must be compressed on each client machine that uses this driver. As a result, this kind of driver is more appropriate on a corporate network where client installations are not a major problem, or for applications server code written in Java in a three-tier architecture. 2. primeval-Api partly â⬠JAVA Driver: This kind of driver converts JDBC calls into calls on the client api for Oracle, sybase, Informix, DB2, or other DBMS. Note that, like the bridge driver this style of driver requires that some binary code be askew on each client machine. 3. JDBC-Net allâ⬠JAVA Driver: This driver translates JDBC calls into a DBMS independent net protocol, which is then translated to a DBMS protocol by a server.\r\nThis net server middleware is able to connect its all-Java clients to many different databases. The specific protocol used depends on the vendor. In general, this is the most flexible JDBC alternative. It is likely that all vendors of this firmness of purpose will provide products suitable for internet use. In order for these products to also support internet access, they mu st handle the additional requirements for security, access through rouse walls, etc., that the web imposes. Several vendors are adding JDBC drivers to their existing database middleware products. 4. Native â⬠Protocol all-Java Driver: This kind of driver converts JDBC calls into the network protocol used b: database management systemââ¬â¢s directly. This allows a direct call from the client machine to the dbms server and is a practical upshot for internet access. Since many of ONLINE LIBRARY BY M.SATHISH KUMAR Page 39\r\nDOCUMENTATION OF ONLINE LIBRARY\r\nJuly 24, 2012\r\nthese protocols are proprietary, the database vendors themselves will be the primary source. Several database vendors have these in progress. Eventually, we expect that categories 3 and 4 will be the preferred way to access databases from JDBc. Driver categories 1 and 2 are in term solutions where direct all-Java drivers are not yet available. Category 4 is in some sense the ideal; however, at that place are many cases where category 3 may be preferable: e.g., where a thin dbms in dependent client is desired, or if a dbms-independent protocol is standardized and implemented directly by many dbms vendors.\r\nSERVLETS\r\nIntroduction:\r\nThe Java web server is JavaSoftââ¬â¢s own web Server. The Java web server is just a part of a larger framework, intended to provide you not just with a web server, but also with tools. To build customized network servers for any Internet or Intranet client/server system. Servlets are to a web server, how applets are to the browser. About Servlets: Servlets provide a Java-based solution used to address the problems currently associated with doing server-side programming, including inextensible scripting solutions, platform-specific APIs, and half(prenominal) interfaces. Servlets are objects that conform to a specific interface that can be plugged into a Java-based server. Servlets are to the server-side what applets are to the client-side â⬠obj ect byte codes that can be dynamically loaded off the net. They differ from applets in that they are faceless objects (without graphics or a GUI component). They serve as platform independent, dynamically loadable, pluggable companion byte code objects on\r\nONLINE LIBRARY BY M.SATHISH KUMAR\r\nPage 40\r\nDOCUMENTATION OF ONLINE LIBRARY\r\nJuly 24, 2012\r\nthe server side that can be used to dynamically extend server-side functionality. For example, an HTTP Servlets can be used to generate dynamic HTML matter. When you use Servlets to do dynamic content you get the following advantages: ïÆ'Ë Theyââ¬Å¸re faster and dry cleaner than CGI scripts ïÆ'Ë They use a standard API (the Servlets API) ïÆ'Ë They provide all the advantages of Java (run on a variety of servers\r\nwithout needing to be rewritten). Attractiveness of Servlets: There are many features of Servlets that make them easy and attractive to use. These include: ïÆ'Ë Easily configured using the GUI-based Admin t ool ïÆ'Ë Can be loaded and invoked from a local disk or remotely across the\r\nnetwork.\r\nïÆ'Ë Can be linked together, or chained, so that one Servlets can call another\r\nServlets, or several Servlets in sequence.\r\nïÆ'Ë Can be called dynamically from within HTML pages, using server-side\r\ninclude tags.\r\nïÆ'Ë Are secure â⬠even when downloading across the network, the Servlets security model and Servlets sandbox protect your system from unfriendly behavior.\r\nAdvantages of Servlet API One of the great advantages of the Servlet API is protocol independence. It assumes nothing about: ïÆ'Ë The protocol being used to transmit on the net\r\nONLINE LIBRARY BY M.SATHISH KUMAR\r\nPage 41\r\nDOCUMENTATION OF ONLINE LIBRARY\r\nJuly 24, 2012\r\nïÆ'Ë How it is loaded ïÆ'Ë The server environment it will be running in ïÆ'Ë These qualities are important, because it allows the Servlet API to be embedded in many different kinds of servers. There are other advantages to th e Servlet API as well. These include: ïÆ'Ë Itââ¬Å¸s extensible â⬠you can inherit all your functionality from the base\r\nclasses made available to you.\r\nïÆ'Ë itââ¬â¢s simple, small, and easy to use.\r\nFeatures of Servlets:\r\nïÆ'Ë Servlets are persistent. Servlet are loaded only by the web server and can\r\nmaintain services between requests.\r\nïÆ'Ë Servlets are fast. Since Servlets only need to be loaded once, they offer\r\nmuch better performance over their CGI counterparts.\r\nïÆ'Ë Servlets are platform independent. ïÆ'Ë Servlets are extensible. Java is a robust, object-oriented programming\r\nlanguage, which easily can be extended to suit your needs\r\nïÆ'Ë Servlets are secure. ïÆ'Ë Servlets can be used with a variety of clients.\r\n load Servlets: Servlets can be loaded from three places From a directory that is on the CLASSPATH. The CLASSPATH of classes reside. From the\r\n'
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment