Download - networkbaseDocumentation(6) harendra singh sit -5.doc

Transcript
  • 8/10/2019 networkbaseDocumentation(6) harendra singh sit -5.doc

    1/44

    REPORT

    The project name is Location based services in Cellular Network. This

    project is for accessing the services provided in some Base stations. e have

    divided all areas into number of clusters. !nside each cluster there will be lot of

    base stations and mobile nodes. "ach base station have lot of services like

    hospitals# theater# hotel and train etc.. !f we want to access those services# then

    we have to give the user name# password and mobile number for authentication.

    $nl% authenticated users can access the services when the% move from onebase station to other stations.

    !t is similar like mobile roaming from one place to another place. !f an%

    person who have the mobile with him# moves from one base station to other one

    he gets the tower of that particular base station. &ince he has mobile with him# he

    can easil% identif% the services provided in that base station easil%. 'll the

    services providing and authenticating the user are done b% the administrator. (e

    has the power to add the clusters# base stations and services to those.

    )eople whom are interested to access the services of his destination base

    station have to register and view the services.

    *odules are+

    'dministrator *odule

    ,ser *odule

    &ervices *odule

  • 8/10/2019 networkbaseDocumentation(6) harendra singh sit -5.doc

    2/44

    1. INTRODUCTION

    1.1 OBJECTIVES

    !n this fast moving world ever%one is working like a machine. The% are not

    interested to remember each and ever place around the world where the% would

    like to go. But it is essential to know information about that without spending lot

    of time on that. &ince we made surve% on this and found a better choice of using

    mobile communication. !n the present world most of the people having the

    mobiles in their hands# if we satisf% their need b% using with what the% are havingin their hands means the% will accept. To obtain that features we are developing

    this location based cellular network.

    This s%stem provides the service to the members those whom were

    registered alread% in this particular s%stem. !f an% one newl% wants to register in

    this s%stem it provides the registration facilit% also. B% registering here he can

    know the services like hospitals# Theater and (otels etc.

    The cellular networks are divided into number of clusters- each cluster has

    some base stations to transfer signals from one station to another station. "ver%

    base station has some mobile nodes to pass services information within the base

    stations.

    B% selecting the destination base station from Brower screen we can

    easil% finds the services provided in that particular base station.

    This is the platform that we have chosen to work upon for the following

    reasons+

    Because of its essential in da%/to/da% life.

    &implicit% of its use.

    "as% accessibilit%.

  • 8/10/2019 networkbaseDocumentation(6) harendra singh sit -5.doc

    3/44

    FEASIBILITY STUDY

    'n important outcome of the initial investigation of the s%stem is that

    the s%stem is found to be feasible. Three ke% considerations are in the

    feasibilit% anal%sis vi0. economic# technical and operational.

    Economical Feasibili!"

    "conomic anal%sis is the most fre1uentl% used for evaluating the

    effectiveness of the s%stem. !t is used to determine the benefits and saving

    that are e2pected from the s%stem and then compare them with the cost.

    O#e$aional %easibili!"

    The proposed s%stem is user friendl% and to operate. The s%stem provides

    the following advantages+ /

    Completel% menu driven.

    ith appropriate error message for ever% screen# the user can easil%

    operate the s%stem.

    The s%stem provides proper validation checks on the fields used in

    the s%stem.

  • 8/10/2019 networkbaseDocumentation(6) harendra singh sit -5.doc

    4/44

    &. PROBLE' DEFINITION AND 'ET(ODOLO)Y

    &.1 DEFINITION

    The project *Locaion base+ cell,la$ ne-o$/ is used to know the

    services provided b% the destination base stations. This project has three

    modules. The% are

    'dministrator *odule

    ,ser *odule

    &ervices *odule

    A+minis$ao$ 'o+,le

    This module will describe various functionalities of the 'dministrator. "ach

    'dministrator will be given with one user name and password. ith this the'dministrator has to enter into his module. !f a 'dministrator login to his page

    then he will be given his home page called the 'dmin page. !n this page the

    functionalities and controls of the 'dministrator will be given. These are the

    tasks of this 'dministrator module. The% are#

    'dd base station

    'dd cluster

    'dd service details

    A++ base saion

    This sub/module is used to add the base stations to each cluster. (ere

    the details of all the base stations will be given. These details comprise Base

    station number# base station name# to which cluster we are adding this base

    station.

  • 8/10/2019 networkbaseDocumentation(6) harendra singh sit -5.doc

    5/44

    A++ cl,se$

    This sub/module is used to add the clusters to each 'rea. (ere the details of

    the entire cluster will be given. These details comprise the clusters number

    and clusters name.

    A++ se$0ice +eails

    This sub/module is used to add the service details to each service. (ere

    the details of all the services will be given. These details comprise like

    specific number# specific name# phone number# location etc3 to each

    services.

    Use$ 'o+,le

    This module provides the registration facilit% to the users those who want

    to become a member. ,sers those who are alread% a member can onl% access

    these services. To become a *ember# he have to give details like username#

    password and mobile number for authentication and personal details like first

    name# last name# address# phone number and location etc. The registered users

    are allowed to access the services onl% after getting e2act user name# password

    and mobile number.

    Se$0ices 'o+,le

    This module is developed to know the information about the services

    present in the Base stations and its *obile nodes. e are taking some areas and

    dividing them into number of clusters each cluster has some Base station# each

    of these base stations have lot of *obile nodes. hen we enter from our base

    station to destination Base station# we can get list of services like hospitals#

    Theater# (otels etc. are shown to the user. (e can select an% service and get the

    knowledge about that service.

  • 8/10/2019 networkbaseDocumentation(6) harendra singh sit -5.doc

    6/44

    . DEVELOP'ENT PROCESS AND DOCU'ENTATION

    .1. RE2UIRE'ENT ANALYSIS AND SPECIFICATIONS

    .1.1. (ARD3ARE RE2UIRE'ENTS

    )rocessor + )entium !!! 455 *(0

    *emor% si0e + 674 *B 8'*

    &torage + 75 9B (ard :isk

    6.;; *B / lopp% :isk

    :ispla% + "9'?@9' Color *onitor

    A55 2 455 )i2els 8esolution (igh Color 6A BitDe% Board + 'n% with minimum re1uired ke%s

    *ouse + 'n%

    .1.& SOFT3ARE RE2UIRE'ENTS

    $perating &%stem + indows 7k famil%.

    >ront/"nd Tool + (T*L# Eava &cript# E7""

    &ervlet# E&)# E:BC and Eava Bean

    eb &erver + 'pache Tomcat =.5.

    Back/"nd Tool + *s/'ccess

  • 8/10/2019 networkbaseDocumentation(6) harendra singh sit -5.doc

    7/44

    .1. DATA DICTIONARY

    :ata dictionar% is a repositor% that contains all the description of all data

    produced b% the software. !t is an organi0ed listing of all data elements that are

    pertinent to the s%stem.

    'no+e 4'obile no+e5

    Desc$i#ion" !t stores the details of the mobile nodes.

    Fiel+ Name Fiel+ T!#e Si6e Cons$ains Desc$i#ion

    bno Te2t =5 No Base station number mno Te2t =5 No *obile node number

    uname Te2t =5 No ,ser name of the user pass Te2t =5 No )assword to the user

    cell Te2t =5 No!n which cell he presentsnow.

    ltime Te2t =5 No Login time of the user.

    8emote Te2t =5 No!t which 8emote networkaddress he is.

    Base4Base saion5

    Desc$i#ion" !t stores the details of the Base station.

    Fiel+ Name Fiel+ T!#e Si6e Cons$ains Desc$i#ion

    bno Te2t =5 No Base station number.

    cno Te2t =5 No*obile nodes present in aparticular Base station

    name Te2t =5 No Name of the *obile node.

    Cl,se$

    Desc$i#ion" !t stores the details of the Cluster.

    Fiel+ Name Fiel+ T!#e Si6e Cons$ains Desc$i#ion

    )lno Te2t =5 No Cluster number.location Te2t =5 No Cluster name.

  • 8/10/2019 networkbaseDocumentation(6) harendra singh sit -5.doc

    8/44

    'no+ein%o4,se$ able5

    Desc$i#ion" !t stores the details of the ,ser.

    Fiel+ Name Fiel+ T!#e Si6e Cons$ains Desc$i#ion

    mno Te2t =5 No *obile node number.fame Te2t =5 No >irst name of the user.lname Te2t =5 No Last name of the user.dod Te2t =5 No :ate of birth of user.se2 Te2t =5 No *ale or female

    address Te2t =5 No 'ddress of user.)hone Te2t =5 No )hone number of user.countr% Te2t =5 No !n which Countr% he is in.

    &tate Te2t =5 No !n which state he is in.

    Se$0iceca

    Desc$i#ion" !t stores the details of the &ervices.

    Fiel+ Name Fiel+ T!#e Si6e Cons$ains Desc$i#ion

    &no Te2t =5 No &ervice number.Name Te2t =5 No &ervice name.

    Sa0ail45

    Desc$i#ion" !t stores the details of the Cluster.

    Fiel+ Name Fiel+ T!#e Si6e Cons$ains Desc$i#ion

    &ano Te2t =5 No &aval number.&no Te2t =5 No &ervice number.Bno Te2t =5 No Base station number.

    (os#ial

    Desc$i#ion" !t stores the details of the service/(ospital.

    Fiel+ Name Fiel+ T!#e Si6e Cons$ains Desc$i#ion

    (osno Te2t =5 No (ospital number.Bno Te2t =5 No Base station number.

    hosname Te2t =5 No Name of the hospital.(osloc Te2t =5 No Location of the hospitalhospno Te2t =5 No )hone number of the

  • 8/10/2019 networkbaseDocumentation(6) harendra singh sit -5.doc

    9/44

    hospital.:name Te2t =5 No :octor Name

    &pl Te2t =5 No :octors &peciali0ation.

    (oels

    Desc$i#ion" !t stores the details of the service/(otel.

    Fiel+ Name Fiel+ T!#e Si6e Cons$ains Desc$i#ion

    (otno Te2t =5 No (otel number.Bno Te2t =5 No Base station number.

    (otname Te2t =5 No Name of the hotel.(otloc Te2t =5 No Location of the hotel.Cata Te2t =5 No Categor% of the hotel.)rice Te2t =5 No Level of price high?low

    hotpno Te2t =5 No )hone number of the hotel.

    T7eae$

    Desc$i#ion" !t stores the details of the service/Theater.

    Fiel+ Name Fiel+ T!#e Si6e Cons$ains Desc$i#ion

    Thno Te2t =5 No (ospital number.Bno Te2t =5 No Base station number.

    Thname Te2t =5 No Name of the hospital.Thloc Te2t =5 No Location of the hospital.

    capacit% Te2t =5 No Capacit% of the theater.

    Thpno Te2t =5 No)hone number of thehospital.

    T$ain

    Desc$i#ion" !t stores the details of the service/Train.

    Fiel+ Name Fiel+ T!#e Si6e Cons$ains Desc$i#ion

    Trno Te2t =5 No Train number.

    Bno Te2t =5 No Base station number.&tart Te2t =5 No &tarting place of train.

    :estin Te2t =5 No :estination place of train. 'time Te2t =5 No 'rrival time of train.

    :time Te2t =5 No :eparture time of train.

  • 8/10/2019 networkbaseDocumentation(6) harendra singh sit -5.doc

    10/44

    SYSTE' DESI)N

    F,n+amenal +esi8n Conce#s

    >undamental design concepts are evolved over the past three decades.

    'lthough the degree of interest in each concept has varied over the %ears# each

    has stood the test of time. "ach provides the software designer with a foundation

    from which more sophisticated design methods can be applied. >undamental

    design concepts provide the necessar% framework for getting it right.

    Abs$acion

    'bstraction permits one to concentrate on a problem at some level of

    generali0ation without regard to irrelevant low level details# use of abstraction

    also permits one to work with concepts and terms that are familiar in the problem

    environment without having to transform them to an unfamiliar structure. Two

    t%pes of abstraction are there# one is procedural abstraction and data abstraction.

    ' procedural abstraction is a named se1uence of instructions that has a specific

    and limited function. ' data abstraction is a named collection of data that

    describes a data object.

    'o+,la$i!

    *odularit% is the single attribute software that allows a program to be

    intellectuall% manageable. &oftware architecture embodies modularit%# that is#

    software is divided into named and addressable components# called modules

    that are integrated to satisf% problem re1uirements.

    So%-a$e A$c7iec,$e&oftware 'rchitecture alludes to the overall structure of the software and

    the wa%s in which that structure provides conceptual integrit% for a s%stem.

    Control hierarch% also called program structure# represents the organi0ation of

    control. The tree structure used to represent the control hierarch%.

  • 8/10/2019 networkbaseDocumentation(6) harendra singh sit -5.doc

    11/44

    S$,c,$al Pa$iionin8

    The program structure should be partitioned both hori0ontall% and

    verticall%. (ori0ontal partitioning defines separate branches of the modular

    hierarch% for each major program function# @ertical partitioning called factoring#

    suggest that control and work should be distributes top/down in the program

    architecture. Top level modules should perform control functions and do little

    actual processing work. *odules reside low in the architecture should be the

    workers# performing all input# computational# an output tasks.

    Daa S$,c,$e

    :ata &tructure is a representation of logical relationship among

    individual elements of data. Because the structure of information will invariabl%

    affects the final procedural design# data structure is ver% important as the

    program structure to the representation of the software architecture. :ata

    structure dictates the organi0ation# methods of access# degree of associativel%#

    and processing alternatives for information. The organi0ation and comple2it% of a

    data structure are limited onl% b% the ingenuit% of the designer. &calar item arra%

    and linked list are some of the representations of the data structure.

    So%-a$e P$oce+,$e

    )rogram structure defines control hierarch% without regard to the se1uence

    of processing and decisions. &oftware procedure focuses on the processing

    details of each module individuall%. )rocedure must provide a precise

    specification of processing# including se1uence of events# e2act# decision points#

    repetitive operations and even data organi0ation ? structure. !nformation hiding

    suggests that modules be characteri0ed b% design decisions that hide from all

    others. !n other words# modules should be specified and designed so that

    information contained within module is inaccessible to other module.

    :esign is defining a model of the new s%stem and continues b% converting

    this model to a new s%stem. The method is used to convert the model of the

    proposed s%stem into computer specification. :ata models are converted to a

    database and processes and flows to user procedures and computer programs.

    :esign proposes the new s%stem that meets these re1uirements .This new

  • 8/10/2019 networkbaseDocumentation(6) harendra singh sit -5.doc

    12/44

    s%stem ma% be built b% a fresh or b% changing the e2isting s%stem. The detailed

    design starts with three activities# database design# user design and program

    design. :atabase design uses conceptual data model to produce a database

    design. ,ser procedure design uses those parts of the :>: outside the

    automation boundar% to design user procedures.

    Daa Flo- Dia8$am

    The data flow diagram :>: is one of the most important tools used b%

    s%stem anal%sts. :ata flow diagrams are made up of a number s%mbols# which

    represent s%stem components. *ost data flow modeling methods use four kinds

    of s%mbols. These s%mbols are used to represent four kinds of s%stem

    components. )rocesses# data stores# data flows and e2ternal entities. )rocesses

    are represented b% circles in :>:. :ata >low represented b% a thin line in the

    :>: and each data store has a uni1ue name and s1uare or rectangle represents

    e2ternal entities.

    ,nlike detailed flowchart# :ata >low :iagrams do not suppl% detailed

    description of the modules but graphicall% describes a s%stems data and how the

    data interact with the s%stem.To construct a :ata >low :iagram# we use#

    'rrow

    Circles

    $pen "nd Bo2

    &1uares

    'n arrow identifies the data flow in motion. !t is a pipeline through which

    information is flown like the rectangle in the flowchart. ' circle stands for process

    that converts data into information. 'n open/ended bo2 represents a data store#

    data at rest or a temporar% repositor% of data. ' s1uare defines a source or

    destination of s%stem data.

  • 8/10/2019 networkbaseDocumentation(6) harendra singh sit -5.doc

    13/44

    &i2 rules for constructing a :ata >low :iagram

    'rrows should not cross each other.

    &1uares# circles and files must bear names.

    :ecomposed data flow s1uares and circles can have same

    names.

    Choose meaningful names for data flow

    :raw all data flows around the outside of the diagram.

  • 8/10/2019 networkbaseDocumentation(6) harendra singh sit -5.doc

    14/44

    3.1.4 DATA FLO3 DIA)RA'

    1. A+min 'o+,le

    LOGI

    N

    BASE STATION

    ADMIN

    ADD BASE

    STATION

    CLUSTERS SERVICE

    DETAILS

    SERVICES

    ADD

    CLUSTER

    STATION

    ADD SERVICE

    DETAILS

    ADD

    SERVICES

  • 8/10/2019 networkbaseDocumentation(6) harendra singh sit -5.doc

    15/44

    &. Use$ 'o+,le

    Login

    User

    DestinationBase Station

    Selet

    Ser!ies

    Registratio

    n

    Ser!ies Re"ort

  • 8/10/2019 networkbaseDocumentation(6) harendra singh sit -5.doc

    16/44

    .&.1 DATABASE DESI)N

    :atabase design takes a pivotal role in the development of an% application

    software. ' database is a collection of tables is used to store the related

    information it minimum redundanc% to serve man% users 1uickl% and

    efficientl%. !n this project the tables are designed efficientl% Not duplicate or

    orphan records b% appl%ing >irst# &econd Normal form to reduce the

    redundanc% and not store the orphan records.

    No$mali6aion

    Normali0ation is a step/B%/step procedure of putting the relation in a form

    that is free from all sorts of anomalies. The normali0ation theor% is built

    around the concept of the normal forms. The relation is said to be in a

    particular form. !f it is satisfies certain specified.

    !n this project# normali0ation is carried out for the reason given bellow

    To reduce the redundanc% To structure the data

    Unno$mali6e+ Fo$m"

    The unnormali0ed table is that which does not satisf% an% constraints. The

    table is in unnormali0ed form if it has multipl% entries for a singlecorresponding entr%.

  • 8/10/2019 networkbaseDocumentation(6) harendra singh sit -5.doc

    17/44

    INPUT DESI)N

    The following inputs are re1uired in the proposed s%stem for database as

    well as for data manipulation. !nput for following modules.

    'dministrator *odule

    ,ser *odule

    &ervices *odule

    'll the above modules are used in the following controls. The% are

    B,ons"

    The most widel% used control is the push button. ' push button is a

    component that contains a label and that generates an event when it is pressed .

    Te9 A$ea+

    &ometimes a single line of te2t input is not enough for a given task. To

    handle this situation# the 'T includes a simple multi line editor called Te2t 'rea.

    Te9 Fiel+"

    Te2t field class implements a single line te2t entr% area# usuall% called an

    edit control. Te2t field allows the user to enter strings and to edit the te2t using

    the arrow ke%s# cut and paste ke%s and mouse selection.

    Ra+io B,on"

    !t is possible to create a set of mutuall% e2clusive check bo2es in which

    one and onl% one check bo2 in the group can be checked at an% one time.

    D$o#: +o-n Bo9"

    The dropF down bo2 class provides a compact# multiple/ choice# scrolling

    selection list. ,nlike the choice object# which shows onl% the single selected itemin this menu;

  • 8/10/2019 networkbaseDocumentation(6) harendra singh sit -5.doc

    18/44

    E9am#le"

    ADD NE3 USER

    USERNA'E"

    LO)IN NA'E "

    PASS3ORD "

    DOB "

    E

  • 8/10/2019 networkbaseDocumentation(6) harendra singh sit -5.doc

    19/44

    OUTPUT DESI)N

    :esigning computer should proceed in well thought out manner. The term

    output means an% information produced b% the information s%stem whether

    printed or displa%ed. hen anal%st design computer out put the% identified the

    specific output that is needed to meet the re1uirement. Computer is the most

    important source of information to the users. $utput design is a process that

    involves designing necessar% outputs that have to be used b% various users

    according to re1uirements.

    "fficient intelligent output design should improve the s%stem relationship

    with the user and help in decision making. &ince the reports are directl% re1uiredb% the management for taking decision and to draw the conclusion must be

    simple# descriptive and clear to the user. $ptions for outputs and forms are given

    in the s%stem menus.

    37en +esi8nin8 7e o,#,= s!sem anal!s m,s accom#lis7 7e %ollo-in8"

    :etermine the information to present.

    :ecide whether to displa%# print# speak the information and select

    the output medium

    'rrange the information in acceptable format.

    :ecide how to distribute the output to intended receipt.

  • 8/10/2019 networkbaseDocumentation(6) harendra singh sit -5.doc

    20/44

    I'PLE'ENTATION

    The implementation is the process of converting the design into actual

    code. The implementation process is done after completing the designing task.

    The goal is to provide the logical order for a creation of the modules and

    creation of the s%stem.

    The implementation of an% software re1uires perfect satisfaction of the

    user. The proposed s%stem takes into account the various difficult faced b% the

    users in operating s%stem and provides user friendl% operations. The s%stem is implemented in the server and checked for its performance

    and accurac%. &uccessful implementation of the software is accomplished. This

    project is to be done using J&EEas front end and 's

  • 8/10/2019 networkbaseDocumentation(6) harendra singh sit -5.doc

    21/44

    TESTIN)

    &oftware testing is a critical element of software 1ualit% assurance and

    represents the ultimate review of specification# design# coding. The engineer

    creates a serious of test cases that are intended to demolish the software that

    has been built. !n fact# testing is the one step in this software engineering

    process# which could be viewed as destructive rather than constructive. The

    testing process is divided into three major components as follows

    ,nit Testing

    !ntegration Testing

    @alidation Testing

    UNIT TESTIN)

    The software is tested using the unit test method. ,nit testing focuses

    verification effort on the smallest unit of software design module. ,sing the

    procedural design description as a guide# important control parts are tested to

    uncover errors with in the boundar% of the module.

    "ver% module in the project is checked for verification.

    E9am#le"

    Error Description Correction

    float avg;

    avg=avg+Double.parseDouble(rs1.getFloat(9)))

    Variable avg may

    not have been

    initialize.

    !issing "erm

    float avg=#;

    $ive the misse"erm

    .

    INTE)RATION TESTIN)

  • 8/10/2019 networkbaseDocumentation(6) harendra singh sit -5.doc

    22/44

    This testing is the s%stematic techni1ue for constructing the program structure

    b% performing the test in each module and later combining the entire individual module

    to form a ver% large program.

    E9am#le"

    E$$o$"

    There1uested resource http+??localhost+4545?dhana?html?resource.html is not

    available.

    Co$$ecion"

    The re1uested resource should be specified for calling the correct page.

    VALIDATION TESTIN)

    @alidation testing is the process of testing the input. hether the given

    inputs are valid or invalid.

    E9am#le"

    The error message will be displa%ed whenever the wrong data entered

    into the te2tbo2. !f )rjF!dGHHH then error message will be displa%ed. Because

    it accept onl% number.

    'AINTENANCE ISSUES

  • 8/10/2019 networkbaseDocumentation(6) harendra singh sit -5.doc

    23/44

    The term so%-a$e mainenance is used to describe the software

    engineering activities that occur following deliver% of a software product to the

    customer. The maintenance phase of the software life c%cle is the time period in

    which a software product performs useful work.

    This project deals adaptive maintenance. 'daptive of software to a new

    environment ma% involve moving the software to a different machine. )roblem

    correction involves modification and revalidation of software to correct errors.

    The enhancement of this project can be accomplished easil%. That is# an%

    new functional capabilities can be added to the project b% simpl% including the

    new module in the homepage and giving a h%perlink to that module. 'daptation

    of this project to a new environment is also performed easil%.

    A+a#i0e 'ainenance"

    'daptive maintenance results in the modification to the software to

    accommodate changes to its e2ternal environment. !n this project# d%namicall%

    we can add new components when ever necessar%. !t is designed to

    accommodate the new changes in further.

    'daptation of this software to a new environment ma% involve moving the

    software to a different machine. &uch as indows 7555# indows NT# indowsI4# indows I=.

    Re

  • 8/10/2019 networkbaseDocumentation(6) harendra singh sit -5.doc

    24/44

    The *Locaion base+ cell,la$ ne-o$/ has been developed to

    overcome the problem faced in the present s%stem. The developed package wasfound to work out the operation effectivel%. The objectives of the s%stem have

    been achieved.

    The goals that have been achieved are+

    "nsure process time and increase throughput.

    &implifies the operation.

    'void some manual work.

    8educe data redundanc% and inconsistenc%.

    ,ser friendl% input screens to enter data.

    ' consistent and efficient s%stem has been successfull% developed#

    implemented and tested. The s%stem has been developed using E7"" and *&

    'ccess under indows 7555. The s%stem is ver% fle2ible and user friendl%.

    >urther changes can be incorporated into the s%stem easil%. 'de1uate

    documentation provides for maintenance and future enhancement.

  • 8/10/2019 networkbaseDocumentation(6) harendra singh sit -5.doc

    25/44

    >. BIBLIO)RAP(Y

    Ja0a Se$0e$ Pa8es

    /Eames 9oodwill# B)B )ublications# ! "dition.

    So%-a$e En8inee$in8

    / 8ogers )ressman# *c 9raw (ill )ublications

    Ja0a& com#lee $e%e$ence

    /(erbert &childt

    Ja0aSc$i#/ :avid >lanagan $8eill%

  • 8/10/2019 networkbaseDocumentation(6) harendra singh sit -5.doc

    26/44

    APPENDI?

    SOFT3ARE PROFILE

    3in+o-s &@@@"

    The computing world was presented with the first release of the

    totall% new and revolutionar% operating s%stem. *icrosoft windows performance

    and features that previousl% has been accessible onl% on J75#555 annotations

    became instantl% available to an%one with a high/end personal computer.

    indows is now *icrosoft Corporations premier operating s%stem. :esigned

    around powerful and well thought software architecture# the primar% features that

    allow indows to use the full power of toda%s processors are+

    Scalabili!"

    'bilit% to run on a single pc with a single user up to a multi/user#

    microprocessor and network installation.

    T7e 3in+o-s )UI"

    The familiar graphical user interfaces it presents to the world.

    Tec7nolo8ies ,se+"

    J&EE"

    E7"" is introduced in 6II4 defines a multi/tier architecture for

    "nterprise !nformation &%stems "!&.B% defining the wa% in which the multi/tier

    application should be developed- E7"" reduces the costs# in both time and

    mone%# of developing large scale enterprise s%stems. The E7"" platform

  • 8/10/2019 networkbaseDocumentation(6) harendra singh sit -5.doc

    27/44

    specifies the logical application components within a s%stem and defines the

    roles pla%ed in the development process.

    hile developing a project# it is significant that the technologies using for

    development must be reliable# fle2ible and robust. !n case of a customer support

    tool application like this# the matter is more important because it details with a

    large number of clients and handles confidential data. 'fter comprehensive

    anal%sis# found that java and related technologies are more suitable for customer

    support tool applications since java has man% features set that allow it to be an

    effective platform for customer support tool.

    !n addition# &un has a strong understanding of the critical business

    issues necessar% to consider for customer tool. 'nother reason that java in

    variet% of application servers. Eava 7 "nterprise "dition E7"" makes the java

    language an even better in the customer arena because of some ke% features

    like+

    E7"" makes java a full%/fledged server/side development

    platform.

    E7"" has a solid infrastructure that provides a well/tested

    implementation of much common applications needs such as

    securit% and messaging.

    E7"" standardi0es development making it easier for companies to

    commit to E7"".

    Eava7 "nterprise "dition or E7"" is a package of specifier aligned to

    enable the development of multiplier enterprise applications.

    The specifications outline the various components needed within

    E7"" enterprise s%stems the technologies for accessing and

  • 8/10/2019 networkbaseDocumentation(6) harendra singh sit -5.doc

    28/44

    providing services and even the roles pla%ed during the

    development# deplo%ment and runtime lifec%cle.

    E7"" handles man% critical tasks of customer support tool such as

    login maintenance and database maintenance and access.

    J&EE A$c7iec,$e"

    !ntermediate compilation

    8untime @* interpretation

    A##licaion Com#onens

    >our application components are defined in E7"" )latform .The% are

    'pplication Components&tand alone java clients

    'ppletsjava code which e2ecutes within a browser

    eb ComponentsE&)s# &ervlets

    &erver Components"EBs# E7""# ')! implementations

    3eb Com#onens

    #AVACODE

    #AVA B$TE

    CODE

    %IN3& '()V* Solaris

  • 8/10/2019 networkbaseDocumentation(6) harendra singh sit -5.doc

    29/44

    The% are server side components generall% used to provide the

    presentation la%er to be returned to a client. 7 t%pes of web components e2isting

    are Eava &erver )ages E&)s and Eava# &ervlets.

    Ja0a Se$0e$ Pa8es"

    There are two wa%s to achieving d%namic content generation. The% are#

    )rogrammatic content generation.

    Template/based content generation

    Eava &ervlets fall into the first categor%# while Eava server pages belong to

    t%picall% comprise of

    &tatic (T*L?H*L components

    &pecial E&) Tags

    $ptionall%# snippet of code written in Eava )rogramming Language

    called &criplets.

    ,nlike a plain (T*L page# which contains static content that alwa%s

    remain the same# a Esp page can change its content based on an% number of

    variable items# including the identif% of the user# the users browser t%pe#

    information provided b% the user# and selections made b% the user.

    ' Esp page contains standard markup language element such as (T*L

    tags# just like a regular web page. Esp element that allow the server to insert

    d%namic content in the page. Esp elements can be used for a wide variet% of

    purposes# such as retrieving user preferences. Esp pages share the rite $nce#

    8un an%where characteristics of Eava technolog%. Esp technolog% is a ke%

  • 8/10/2019 networkbaseDocumentation(6) harendra singh sit -5.doc

    30/44

    component in the java 7 platform# enterprise edition# and &uns highl% scalable

    architecture for enterprise applications.

    Esp can use the full capabilit% of Eava components such as E:BC# 8*!#

    C$8B'# E*& and EN:!. Eava &erver )ages are built on top of Eava servlets and

    are designed to increase the efficienc% in which programmers and even non/

    programmers can create web content. The main advantages of using E&) are+

    E&) pages can be used in the combination with servlets that handle

    the business logic# the modal supported b% Eava servlet template

    engines.

    Ja0a Se$0e$ Pa8e P$ocess"

    E&) pages are interpreted onl% once- to java b%te/code and

    reinterpreted onl% when the file is modified.

  • 8/10/2019 networkbaseDocumentation(6) harendra singh sit -5.doc

    31/44

    E&) supports both scripting based and element based d%namic

    content# and allows programmers to develop custom tag libraries to

    satisf% application/specific needs.

    E&) pages are pre/compiled for efficient server processing.

    E&) run on all the main web servers.

    !t is true that both servlets and E&) pages have man% features in common

    and can be used for serving up d%namic web content. Naturall%# this ma% cause

    some confusion as to when to opt for one of the technologies over the other.

    Eava &erver )ages provide a much cleaner separation of presentation from logic#

    and are simpler to write. Together# E&) technolog% and servlets provide an

    attractive alternative to other t%pes of d%namic web scripting?programming that

    offers platform independence# enhanced performance# and separation of logic

    from displa%# ease of administration# e2tensibilit% into the enterprise and most

    importantl%# ease of use.

    Se$0e$ Com#onens

    &erver components can be in form of "EBs "nterprise Eava beans.

    "EBs e2ecutes within a container that manages the runtime behavior of "EBs.

    3o$in8 -i7 7e 'o+el Vie- Con$olle$

    T%picall% entit% beans are used to provide the model logic# while a mi2 of

    entit% beans and session beans are used to provide the control logic and web

    components are used to !mplement both control and presentation logic.

    The Eava Beans specification allows software components to be written in

    java# which encapsulates the logic behind the web application and remove the

    bulk of the script let code that would otherwise clutter up the jsp. The result Esp

  • 8/10/2019 networkbaseDocumentation(6) harendra singh sit -5.doc

    32/44

    code that is simpler# easier to maintain# and which is more readil% accessible to

    non/programmers.

    Eava uses the beans specification to allow the creation of software

    components that can be used b% other developers and designers to build

    specialist applications. Eavas cross platform nature means that the same Eava

    bean should be reusable across an% machine. This reall% frees us from

    dependence on an% particular platform

    Se$0e$ S#eci%icaion

    !ntroduction

    This is the top/level entr% point of the documentation bundle for the Tomca &ervlet?E&) container. Tomcat ; implements the &ervlet 7.?web.2ml.

    Se$0leJSP Ja0a+ocs / The &ervlet 7.< and E&) 6.7 ')!Eavadocs.

    Caalina De0elo#e$s

    The following documents are for Eava developers who wish to contribute to thedevelopment of the Catalinaservlet container portion of Tomcat itself# or to better

    http://java.sun.com/products/servlet/http://java.sun.com/products/jsp/http://java.sun.com/products/jsp/http://localhost:8080/tomcat-docs/appdev/index.htmlhttp://java.sun.com/products/servlet/download.htmlhttp://localhost:8080/tomcat-docs/servletapi/index.htmlhttp://java.sun.com/products/servlet/http://java.sun.com/products/jsp/http://java.sun.com/products/jsp/http://localhost:8080/tomcat-docs/appdev/index.htmlhttp://java.sun.com/products/servlet/download.htmlhttp://localhost:8080/tomcat-docs/servletapi/index.html
  • 8/10/2019 networkbaseDocumentation(6) harendra singh sit -5.doc

    33/44

    understand its internal architecture and operation.

    F,ncional S#eci%icaions / 8e1uirements specifications forfeatures of the Catalinaservlet container portion of Tomcat ;.

    Ja0a+ocs / Eavadoc ')! documentation for the Catalina servletcontainer portion of Tomcat ;.

    Con%i8,$in8 Tomca

    This section will ac1uaint %ou with the basic information used during the

    configuration of the container.

    'll of the information in the configuration files is read at startup# meaning that

    an% change to the files necessitates a restart of the container.

    http://localhost:8080/tomcat-docs/catalina/funcspecs/index.htmlhttp://localhost:8080/tomcat-docs/catalina/docs/api/index.htmlhttp://localhost:8080/tomcat-docs/catalina/funcspecs/index.htmlhttp://localhost:8080/tomcat-docs/catalina/docs/api/index.html
  • 8/10/2019 networkbaseDocumentation(6) harendra singh sit -5.doc

    34/44

    SCREEN S(OTS

    (O'E PA)E

  • 8/10/2019 networkbaseDocumentation(6) harendra singh sit -5.doc

    35/44

    AD'INISTRATOR PA)E

  • 8/10/2019 networkbaseDocumentation(6) harendra singh sit -5.doc

    36/44

    AD'IN PA)E

  • 8/10/2019 networkbaseDocumentation(6) harendra singh sit -5.doc

    37/44

    SELECTIN) SERVIES TO ADD DETAILS

  • 8/10/2019 networkbaseDocumentation(6) harendra singh sit -5.doc

    38/44

    ADDIN) DETAILS TO TRAIN SERVICE

  • 8/10/2019 networkbaseDocumentation(6) harendra singh sit -5.doc

    39/44

    LO)IN PA)E TO USER

  • 8/10/2019 networkbaseDocumentation(6) harendra singh sit -5.doc

    40/44

    RE)ISTRATION PA)E

  • 8/10/2019 networkbaseDocumentation(6) harendra singh sit -5.doc

    41/44

    SERVICES PA)E

  • 8/10/2019 networkbaseDocumentation(6) harendra singh sit -5.doc

    42/44

    SELECTIN) DESTINATION BASE STATION SERVICE

  • 8/10/2019 networkbaseDocumentation(6) harendra singh sit -5.doc

    43/44

    SERVICE DETAILS PA)E

  • 8/10/2019 networkbaseDocumentation(6) harendra singh sit -5.doc

    44/44