Friday, May 17, 2019

Library Management System Essay

hollo of the Project VisionOnline program library Online Library is a dodging, which maintains books in the legion in every nominateat. It reserves storing books, instruments, audio and delineation appoints. exploiter domiciliate bet and open documents by large a honest head. Online Library Management System is a system of rules, which maintains books, documents, audio/video files. To lend oneself this system user must be a member in this. past user entirelyowed storing books, documents, A/V files. Then user crowd out search by giving a simple query. It is actually awkward search books manually. Online Library makes easy.Deliver adequate to(p)s / Functional SpecificationsOnline Library uses user internal feedback from user to improve search do in e genuinely searching. It also uses indexing to locate documents very fast in searching which fix to query. Main aim of online Library system is providing extremely relevant documents in very short stop consonant a fter giving query. It is just equivalent Search Engine. It uses Vector space shape and Probabilistic dumbfound to find similarity coefficient, weights. User port sine qua nons infobase Centralized ONLINE program library BY M.SATHISH KUMAR knave 2 nett browser based supporting OF ONLINE libraryJuly 24, 2012Requirements Integration Requirements Preferred Technologies J2EE Technologies i.e. JSP, Servlets, jdbc Frontend Html, javaScript, java emcee pages. Backend Oracle 10g. Hardw argon Requirement Pentium 4 serve wellor with 256 MB RAM, 40 GB Hard disk entanglement based InterfaceONLINE library BY M.SATHISH KUMAR rogue 3 musical accompaniment OF ONLINE LIBRARYJuly 24, 2012INTRODUCTIONONLINE LIBRARY BY M.SATHISH KUMARvarlet 4authentication OF ONLINE LIBRARYJuly 24, 2012INTRODUTIONOnline Library Management System is a system, which maintains books, documents, audio/video files. To use this system user must be a member in this. Then user allowed storing books, documents, A/V files. Then user batch search by giving a simple query. It is very difficult search books manually. Online Library makes easy. Online Library uses user internal feedback fromuser to improve search surgical operation in every searching. It also uses indexing to locate documents very fast in searching which adjoin to query. Main aim of online Library system is providing highly relevant documents in very short accomplishment after giving query. It is just resembling Search Engine. It uses Vector space Model and Probabilistic Model to find similarity coefficient, weights.Existing SystemEarly days Libraries atomic number 18 managed manually. It required lot of magazine to disk or to retrieve the details. The employees who subscribe to record the details must perform their job very c atomic number 18fully. Even a weensy mistake would create some capers. Security of randomness is very less. writing generations of all the selective learning is very tough task. Maintenance of Library catalogue and arrangement of the books to the catalogue is very complex task. In addition to its maintenance of member details, issue dates and return dates and so forth manually is a complex task. All the operations must be performed in perfect manner for the maintenance of the program library without any degradation, which may finally result in the failure of the integral system.Benefits of mechanizationAutomation is social occasion of converting a traditional system in to a com put downer organization. To everyplacecome the defects of the existing system automation was introduced by the computerization of organization we get numerous benefits.ONLINE LIBRARY BY M.SATHISH KUMAR rogue 5 financial support OF ONLINE LIBRARYJuly 24, 2012The main objectives of undertaking this project ar The students go out register them by dint of Online Individually separately member will live with his account through which he cornerstone ingress the information he d estinys. Books, documents, A/V files are bloodd in innkeeper. User will enter simplequery in textual matter edition edition box and check on the Search vent. Server takes the indispensability and processes it. Returns hyper links of documents with their let outs, ranks weights and description. If the user clicks on name of the document therefore it will open with respective program and rank of document will increase for that query.(for example .pdf files with Adobe Reader) User can transfer documents, books and a/v files. Time eat is low, gives accurate results, reliability can be improved with the help of security.Proposed SystemTo solve the inconveniences as mentioned above, an Online Library proposed.PROCESS LOGIC1. The user inputs entropy (e.g. fills out an hypertext markup words form and clicks the submit scarceton.) 2. The lymph gland (Browser) sends the entropy to the web legion in a standard format (i.e., the GET method or the seat method). 3. The web serv er launches the program specified by the user and feeds it the input (form) selective information. 4. The program (e.g. servlet) processes the form information and produces a nonher HTML page. 5. The web server sends back the HTML page to the browser. The web browser thus boastings the response page.ONLINE LIBRARY BY M.SATHISH KUMAR scalawag 6 supporting OF ONLINE LIBRARYJuly 24, 2012ANALYSISAnalysis is the process of understanding the existing system by gathering and interpreting the facts, diagnosing the problems. It is not just to ascertain the how best to solve the manual system problems, it should also work for the system observes the feasibility of system then climb pattern, coding phases will be executed. Analysis phase delivers requirements detailation .The system specification serves as an larboard between the designer anddeveloper as well as between developers and users. This forces the external behavior of the software product without bothering to the highest d egree the internal implementation. Specification must be carefully checked for suitability, omission, in dwellencies and ambiguities. Problem analysis is performed to getting a clear understanding of the necessarily of the leaf nodes and the users and what exactly desired form the software.Analysis leads to the actual specification. During the process of analysis, a massive amount of information is collected in the form of inter get winds, disbeliefnaires, and information from documentation, and so forth. The major problem during analysis is resolving how to organize the information from documentation, and so forth. So the information can be efficaciously evaluated for completeness and consistency.ONLINE LIBRARY BY M.SATHISH KUMARPage 7 enfranchisement OF ONLINE LIBRARYJuly 24, 2012REQUIREMENT SPECIFICATIONFUNCTIONAL theoretical account / USE CASE MODEL IDENTIFYING ACTOR1. executive director He should register sensitive-fashioned Users, Delete Users etc. He can upload new do cuments, accounts, and A/V files. 2. User He should register in site in order to access books. He can search for books. He can upload new books, documents, and A/V files into server.IDENTIFYING SCENARIOSA Scenario is a scene, which explains a particular situation in much visualized model. A scenario consists of actors, scenes, and flow of events. In our project, we have the following scenariosScenario for Searching of EBooks, catalogue or A/V fileScene Name Actors Flow of eventsSearching for books. User/Administrator User Opens stand page of site. It will display text box and Search besideston. User simply enter query into text box, clicks on Search scarceton. Browser sends request to the server. Server search documents for query and sends hyperlinks to documents (with weight, ranks, and a small description about document) in order of relevance to the query.ONLINE LIBRARY BY M.SATHISH KUMARPage 8 support OF ONLINE LIBRARYJuly 24, 2012Scenario a for Opening EBook, Document or A /V fileScene Name Actors Flow of eventsOpening Book, Document, or A/V file. User / Administrator User clicks on hyperlink of Document by reading description about document that had displayed below hyperlink. Then browser sends a request to the server again. The request contains name of document which user wants to open. The server will increase rank for document with respect to query into order to increase the relevance. Then server sends the document file in the form of response to browser. Now browser will open the document by development related practise program on client system. (For example if server sent .mp3 file then browser opens it by apply audio player, which installed on clients computer. Of course, Browser needs permeation of System Administrator to access application program.)ONLINE LIBRARY BY M.SATHISH KUMARPage 9 documentation OF ONLINE LIBRARYJuly 24, 2012Scenario for Uploading a EBook, Document or A/V file into ServerScene Name Actors Flow of eventsUploading Adm inistrator / User First User clicks on hyperlink of Upload document. Then browser sends request to upload file. Server return a webpage to browser it contains text box and browse besideston. By clicking on browse button a file window is displayed which allows to user to select a document from clients computer. After selecting document users click on upload button. Server checks for its extension. If document is.exe file server will not allow uploading file for the purpose of security. Then server insert name of document into documents delay with uncomparable document id. Then server creates index for document and insert into indexes slacken. Server returns a webpage, which contains confirmation and document id.ONLINE LIBRARY BY M.SATHISH KUMARPage 10DOCUMENTATION OF ONLINE LIBRARYJuly 24, 2012Scenario for Modifying UsersScene Name Actors Flow of eventsModifying Users Administrator If login user is admin then homepage contains a special Hyperlink that modify user. If admin clicks on that hyperlink he will navigate to another webpage which contains details of users. In thatadmin can modify user details admin can delete users who violated terms of site.IDENTIFYING USE CASESA use case is a description of systems behaviour from a users standpoint. It is a seek and true technique for gathering systems requirement from a users point of view.ONLINE LIBRARY BY M.SATHISH KUMARPage 11DOCUMENTATION OF ONLINE LIBRARYJuly 24, 2012USE CASE DIAGRAMSUse case diagram for entire Online Library SystemONLINE LIBRARY BY M.SATHISH KUMARPage 12DOCUMENTATION OF ONLINE LIBRARYJuly 24, 2012Use baptismal font Diagram for SearchingUse case Diagram for Uploading fileONLINE LIBRARY BY M.SATHISH KUMARPage 13DOCUMENTATION OF ONLINE LIBRARYJuly 24, 2012SEQUENCE DIAGRAMSSequence Diagram for SearchingONLINE LIBRARY BY M.SATHISH KUMARPage 14DOCUMENTATION OF ONLINE LIBRARYJuly 24, 2012Sequence Diagram for uploading fileONLINE LIBRARY BY M.SATHISH KUMARPage 15DOCUMENTATION OF ONLINE LIBRARYJu ly 24, 2012Sequence Diagram for Opening fileONLINE LIBRARY BY M.SATHISH KUMARPage 16DOCUMENTATION OF ONLINE LIBRARYJuly 24, 2012COLLABORATION DIAGRAMSCollaboration Diagram for SearchingONLINE LIBRARY BY M.SATHISH KUMARPage 17DOCUMENTATION OF ONLINE LIBRARYJuly 24, 2012Collaboration Diagram for uploading fileCollaboration Diagram for Opening fileONLINE LIBRARY BY M.SATHISH KUMARPage 18DOCUMENTATION OF ONLINE LIBRARYJuly 24, 2012ACTIVITY DIAGRAMSActivity Diagram for SearchingONLINE LIBRARY BY M.SATHISH KUMARPage 19DOCUMENTATION OF ONLINE LIBRARYJuly 24, 2012Activity Diagram for Uploading fileONLINE LIBRARY BY M.SATHISH KUMARPage 20DOCUMENTATION OF ONLINE LIBRARYJuly 24, 2012Activity Diagram for Opening fileONLINE LIBRARY BY M.SATHISH KUMARPage 21DOCUMENTATION OF ONLINE LIBRARYJuly 24, 2012CLASS DIAGRAMSDBHandler straighten out DBHandler is respnosible for performing all operations which are need interaction with Database. It perform all operation in informationbase like inserting do cument, creating index, inserting query, mating database consistency , creating tables, recovering database when database crashed. It highly simplifies maintains of database. Adminstrator need not worry about database at any time.ONLINE LIBRARY BY M.SATHISH KUMARPage 22DOCUMENTATION OF ONLINE LIBRARYJuly 24, 2012VectroSpaceModel Class VectorSpaceModel is bod it responsible for calculative similarity coefficients of documents with respect to query. After calculating similarity coefficient it passes documents with similarity coefficients to probabilistic model class, which will finds weights using similarity coefficients.ProbabilisticModel Class Probabilisticmodel class responsible for calculating weights for documents using similarity coefficients. After calculating weights, it will get ranks for documents from rank table. And return documents to Search class.ONLINE LIBRARY BY M.SATHISH KUMARPage 23DOCUMENTATION OF ONLINE LIBRARYJuly 24, 2012Read Class Read class for responsible f or reading text from text files. It will read text from different format of text files. For example .doc, .pdf, .xls, .txt, .html etc. It read reads text and clean text and returns as wind. If the file is not text file then it will return name and extension of file as string.Search Class Search Class acts as number one wood class. It does not perform any tasks. It makes all class working together.ONLINE LIBRARY BY M.SATHISH KUMARPage 24DOCUMENTATION OF ONLINE LIBRARYJuly 24, 2012DEPLOYMENT DIAGRAMONLINE LIBRARY BY M.SATHISH KUMARPage 25DOCUMENTATION OF ONLINE LIBRARYJuly 24, 2012 objectSOFTWARE STRUCTURE Software is fundamental characteristic of computer software.Software structure is to decompose the complex groups of module into sub modules i.e., Process, Menus, Inputs and Reports. The most general form of the software structure is the profits. The structure is the network. The structure inside a complex processing node might consist of concurrent processes carrying into acti on in parallel and communication through some combination of shared variables. entropyBASE DESIGNPlanning the Database The most important consideration in calculative the database is how the information will be used. argumentation activities that will use the database to perform. Business rules that apply to these activities Data wanted to maintain in the databaseThe main objectives of designing a database are Data integration Data integrity Data independenceDATA consolidation In a database, information from some(prenominal) files is co-ordinate, accessed and operand upon as though it is single file.ONLINE LIBRARY BY M.SATHISH KUMARPage 26DOCUMENTATION OF ONLINE LIBRARYJuly 24, 2012Logi gripey, the information is centralized, physical, the data may be located facilities. instauration methodology Design is concerned with identifying software components, specifying relationships among component, specifying software structure and providing a blue print for the implementatio n phase. Design consists of deuce-ace types 1. architectural Design 2. Detail Design 3. outer Design Architectural Design Architectural Design involves identifying the software components, decoupling and decomposing them into processing modules and conceptual data structure and specifying relationships among the components.Detailed Design Detailed design is concerned with the details of how to package the processing modules and how to implement the processing algorithms, data structure and interconnection among modules and data structure. GUI based design In order to have a remedy understanding over the system design, it is allow to know the actual designing in terms of the development platform and the charge in which the GUI are designed to satisfy the requirements of the user. The analysis of the design aspects of this package is proposed External design. External design of software involves conceiving, planning and specifying the external observable characteristics in differ ent gubbinss connected though data communicationONLINE LIBRARY BY M.SATHISH KUMARPage 27DOCUMENTATION OF ONLINE LIBRARYJuly 24, 2012of a software product. This includes reports and display formats. External design begins analysis phase it continues into the design phase. DATA INTEGRITY Data integrity message storing all the data in single place and allow each application to access it. This approach results in much than logical, on update being sufficient to achieve a new record status for all the applications, which use it. This leads to less data redundancy, data items need not be duplicated, requirement.DATA INDEPENDENCE Data independence is the insulation of application programs from changing aspects of physical data organization. This objective seeks to allow changes in the content and organization of physical data without reprogramming of applications and to allow modifications to application programs without the reorganizing the physical data. Normalization Data structur ing is refined through a process called normalization.Normalization is a formal process of developing data structures in a manner that eliminates decomposition redundancy and promotes integrity. of complex records into simple It is a step-by-step records to trim back a reduction in the direct access storageredundancy, inconsistencies and remove anomalies. There are several normal forms to be followed in normalization process. The most important and widely used are ONLINE LIBRARY BY M.SATHISH KUMAR Page 28 First Normal Form Second Normal Form ternion Normal FormDOCUMENTATION OF ONLINE LIBRARYJuly 24, 2012First Normal Form A table is state to be in first normal form if the intersection of any mainstay and row contains single value. method This is identifying a suitable identifier from the pool of normalized data. Remove any item that repeat within a single value of this severalise to another relation bringing with them the identifier come upon to form part of new composite key in the relation. Second Normal Form For a table to be in the second normal form it should also be in the first normal form and the train in every column are functionally dependent on the complete primary key. method Examine every column and section whether its value depend on the whole ofthe compound key or just some parts of it. Remove key. Third Normal Form For a table to be in the third normal form transitively dependent on the primary key. Method Examine every non-key column with every other non-key column. If the value of the non-key column depends on the other non-key column then remove the columns to separate table. it should be in the those that depend single on part of the key to a new table with that part as the primarysecond normal form and the value in every non-key column are notONLINE LIBRARY BY M.SATHISH KUMARPage 29DOCUMENTATION OF ONLINE LIBRARYJuly 24, 2012De Normalization The normalization process helps in reducing to a great extent but sometimes when infor mation is required from much than one table, at a fast rate , it is enviable to have some degree of redundancy in table . Their deliberate introduction of redundancy for a highly improved performance is referred to as De Normalization .DATABASE TABLES1. QUARRIES The QUARRES table can store quarries entered by user with unique ID (QID). It is stores unique quarries irrespective order of words and case of letters. 2. DOCUMENTS The DOCUMENTS table can hold out name of documents, which are in server with unique ID for every document. 3. WORDS The WORDS table can store words, which are in documents. This table plays key role in creating index for documents. This table contains a unique ID and words column. Unique words can be stored in this table irrespective of case of letters. 4. RANKS The RANKS table can hold rank and weight for each document with respect to query. This table contains intravenous feeding columns. QID and DID are refer QID of QUERRIES and DID of DOCUMENTS table re spectively.5.INDEX The INDEX table helps to search engine while searching for documents, which are relate to query given by user. Simply it makes fast Searching. It contains two columns WID, DID refer WID of WORDS, DID of DOCUMENTS tables. 6. USERDETAILS The USERDETAILS can hold details of users. Username, user-id, password etc.ONLINE LIBRARY BY M.SATHISH KUMARPage 30DOCUMENTATION OF ONLINE LIBRARYJuly 24, 2012ENTITY race DIAGRAMSONLINE LIBRARY BY M.SATHISH KUMARPage 31DOCUMENTATION OF ONLINE LIBRARYJuly 24, 2012ABOUT THE SOFTWAREINTRODUCTION HTML stands for hyper text makeup lyric. It is a language used to create hypertext documents that have hyperlinks embedded in them. You can build web pages. It is only a formatting language and not a programming language. Hyperlinks are underlined or emphasized words or locations in a screen that leads to other documents, W W W is a global, Interactive, dynamic, cross Platform, graphical hypertext information system. The idea behind hypertext is that instead of reading text in rigid linear structure you can easily jump from one point to another. You can Navigate through the information based on your interest and preferences.HYPERMEDIA HTML pages with audio and video files linked to them are called Hypermedia. HTML is platform independent.HTML IS PLATFORM INDEPENDENT If you can access earnings, you can access WWW, Irrespective of your operating system and the operating system to the web server. All you require to view and unload the HTML files, which are on the WWW, are a browser and internet connection.WEB IS DISTRIBUTED The information on the WWW is distributed through out the world. You can access it with a few mouse clicks. You do not have to store it on your auto. Information on the Web is dynamically updateable. As the information is at the site where it is published, the people who publish it can change it any time. HTML is a language for describing structured documents, HTML describes the structures of documents lists, headings, paragraphs Etc. Elements of web documents are labeled through the usage of HTML tags, It is the tags that describe the documents. Anything that is not a tag part of the Document itself.ONLINE LIBRARY BY M.SATHISH KUMARPage 32DOCUMENTATION OF ONLINE LIBRARYJuly 24, 2012The Static WebWhen the World Wide Web was born, it consisted of atmospheric static Web sites. Web sites consisted of static documents (mostly HTML pages) that were accessible through Web servers. Users used Web browsers to access these Web sites. A Web browser communicated with a Web server over the Hyper Text Transfer Protocol (HTTP). Using an HTTP request, the browser communicated with the Web server and asked to get access to a certain document. The Web server managed a set of documents stored on a file system. When asked for adocument, it would retrieve it and return it within an HTTP responseHTML DOES not DESCRIBE PAGE LAYOUTWorld for windows or lotus improve for example, have different styles for Headings, font, Size, and identification. HTML does not have all these. Based on the plat form , exact placement or appearance of any element will change. There may be or may not be fonts installed. By separating the structure of the document and its appearance, a program, that reads and understands HTML can make formatting decisions based on capabilities of the individual platform . In addition to providing the networking functions to retrieve documents, Web browsers are also HTML formatters.ONLINE LIBRARY BY M.SATHISH KUMARPage 33DOCUMENTATION OF ONLINE LIBRARYJuly 24, 2012They parse and format documents and display them on the screen. several(predicate) rowsers show data differently.ADVANTAGES A HTML document is small and hence easy to send over the net. It is small because it does not include format information. HTML documents are cross platform compatible and device independent. You only need a HTML reliable browser to view them. Font names, locations Etc.. are required. currently the standard fully supported is HTML 2.0 & HTML 3.0 is in use. It supports. Centered and right aligned text. Tables . maths equations Text and image alignment javaINTRODUCTION Java is an intercepted language. Though it bears a close resemblance to C++ , it is different from it in many ways. It is a smaller,portable, purely object oriented Language that eliminates many of the sources of bugs and complexities that are common with C Or C++ . JAVA FEATURES Java is simple, Object Oriented, Intercepted, Robust, Secure computer architecture neutral, Portable, has high performance, multi threaded and dynamics. It is easier To use Java because its syntax is similar to C and C++, more so when it eliminates components of C that causes bugs and memory leaks and hence a lot less debugging, Java provides a potent Set of pre-tested libraries that give us the ability to use advanced features even with few lines of Code. OBJECT orient Java is an Object oriented programming Language that uses software objects called CLASESS and it is based on reusable, protractible code. This implies we can use Javas classes, which are sets of variables and methods, asONLINE LIBRARY BY M.SATHISH KUMARPage 34DOCUMENTATION OF ONLINE LIBRARYJuly 24, 2012templates to create other Classes with added functionality without the need to write the code from Scratch. The Application can be make small and easy to develop if we plan the class hierarchy well. Robust Java is Robust because, the language removes the use of arrows and The Java Runtime System manages the memory for us. Java gives us automatic bounds checking for arrays, so that they cannot tolerate in an address space which is not allocated for them. Automatic memory management is taken care of by the Garbage Collector.Interpreted Java is interpreted hence the development cycle is much rapid. Java needs to compile for a single, virtual machine and then the code can run on any machine that has JVM ported to it. Secure Java is secure, so user can download Java programs from anywhere. Java provides extensible compile time checking followed by a multi layered train of runtime Checking.Architecture Neutral Java is architecture neutral, so user applications are portable across multiple platforms. Javas Applications are pen and compiled into Byte Code for JVM, Which emulates an actual hardware chip. The Java Interpreter installed at the client, so applications need not be written for various platforms separately converts byte Code to machine code. Java further ensures that the applications are the same on every platform by strictly defining the sizes of the introductory data types and their behaviour. Dynamic Java is Dynamic., so the applications are adapted to changing environments, Javas architecture allows the user to dynamically load classes at runtime from any where on the network, which bastardlys that the user can add functionality to applications by simply linking in new classes.ONLINE LIBRARY BY M.SATHISH KUMARPage 35DOCUMENTATION OF ONLINE LIBRARYJuly 24, 2012JDBC OVERVIEWWhat is JDBC? JDBC is a Java TM API for executing SQL statements. It consists of a set of classes and interfaces written in the JAVA programming language that makes it easy to send SQL statements to nearly any relative database. In other words, with the JDBC API, it isnt necessary to write one program to access a Sybase database, another program to access an Oracle database, another program to access an Informix database, and so on. single can write a single program using the JDBC API, and the program will be able to send SQL statements to the appropriate database. And, with a program written in the JAVA programming language, one doesnt have to worry about writing different programs to run on different platforms. The combination of JAVA and JDBC lets a programmer write it once and run it anywhere. JAVA, being robust, secures, easy to use, easy to understand, and automatically downloadable on a network, is an excellent language basis for database applications. What is needed is a way for JAVA applications to talk to soma of different databases. JDBC is the mechanism for doing this. JDBC extends what you can do in JAVA.For example, with JAVA and the JDBC API, it is possible to publish a web page containing an applet that uses information obtained from a remote database. Or an enterprise can use JDBC to connect all its employees (Even if they are using a conglomeration of Windows, Macintosh and Unix machines) to one or more internal databases via. An Internet. With more and more programmers using the JAVA programming language, the need for easy database access from JAVA is continuing to grow. MIS managers like the combination of JAVA and JDBC because it makes disseminating information easy and economical. Business can continue to use their installed databases and access information easily even if it is stored on different database management systems. Development time for new applica tions is short. Installation and recital controls are greatly simplified. A programmer can write an application or an update once, put it on the server and everybody has access to the latest version and for business selling information services, JAVA and JDBC offers better way of getting out information updates toONLINE LIBRARY BY M.SATHISH KUMARPage 36DOCUMENTATION OF ONLINE LIBRARYJuly 24, 2012external customers. Various ways to use JDBC are discussed in. What Does JDBC Do? Simply put, JDBC makes it possible to do lead things Establishes connection to databases. Send SQL statements. Process the results. JDBC is a Low-level API and a base for Higher-Level API. JDBC is a Low-level interface, which means that it is used to invoke SQL commands directly. It works very well in this capacity and is easier to use than other database connectivity APIs, but it was designed also to be a base upon which to build higher-level interfaces and tools. A higher-level interface is User-friendly, us ing a more understandable or more convenient API that istranslated behind the scenes into a Low level interface such as JDBC. So why not just use ODBC from Java?The do is that you can use ODBC from JA V A, but this is best done with the help of JDBC in the form of the JDBC-ODBC Bridge. The question now becomes Why do you need JDBCT There are several answers to this question 1. ODBC is not appropriate for direct use from Java because is uses a C interface. 2. Calls from Java to native C code have a number of drawbacks in the security, 1. implementation, robustness, and automatic probability of applications. A literal translation of the ODBC API into a Java API world not desirable. For example, Java has no pointers, and ODBC makes copious use from, including the notoriously error-prone generic pointer void *. You can think as JDBC as ODBC translated into an object-oriented interface that is natural for Java programmers. 2. ODBC is hard to learn. It mixes simple and advanced features together, and it has complex options even for simple queries. JDBC, on the otherONLINE LIBRARY BY M.SATHISH KUMARPage 37DOCUMENTATION OF ONLINE LIBRARYJuly 24, 2012hand, was designed for a wide range of programmers and keeps simple things simple. 3. A Java API like JDBC is needed in order to enable an all-Java solution. When ODBC is used, the driver manager and drivers must be manually installed on every client machine. When the JDBC driver is written completely in JAVA, however, JDBC code is automatically installed, portable, and secure on all Java platforms from network computers to mainframes. In summary, the JDBC API is natural JAVA interface is to the basic SQL abstractions and concepts. It builds an odbc rather than get-go from search, so programmers familiar with odbc will find it very easy to learn JDBC. JDBC retains the basic design features of ODBC infarct, both interfaces are based on the x/Open SQL CU( call level interface).The big difference is that JDBC builds on and reinforces the style and virtues ofJava, and of course, it is easy to use. ADVANTAGES. Until now, the middle tier has typically been written in languages such as C or C++, which offer fast performance. However, with introduction of optimizing compilers, translating Java byte code into efficient machinespecific code, it is becoming virtual(a) to implement the middle tier in Java. This is a big plus, making it possible to take reinforcement of Javas robustness, multi-threading and security features. SOL Conformance Structured Query Language(SQL) is the standard language for accessing relational databases. One area of difficulty is that almost most DBMSs(Database Management Systems) gives a standard form of SQL for basic functionality, they do not conform to the more recently defined standard SQL syntax or semantics for more advanced functionality.For example, not all databases support stored procedures or outer joins, and those that do are not consistent with each other. It is hope d that the portion of SQL that is truly standard will expand to include more functionality. In the mean time, however, the JDBC API must support SQL as it is. One way the JDBC API deals with the problem is to allow any query string to be passed through to an underlying DBMS driver. This means that an application is iTee to use as much SQL functionality is desired, but it runs the risk of receiving an error on some DBMS. In fact an application query need not even be an SQL, or it may be a specialized derivation of SQL designed for specific DBMS(for document or image queries). For example, a second way JDBC deals with the problems of SQL conformance is to provide ODBC style make do clauses. Which are discussed in SQL Escape Syntax in Statement objects. This escape syntax allows a programmer to use SQLONLINE LIBRARY BY M.SATHISH KUMARPage 38DOCUMENTATION OF ONLINE LIBRARYJuly 24, 2012functionality item within a JDBC program. The ODBC API is a natural choice for Java developers because it offers easy database access for Javaapplications and applets. Because JDBC brings together Java and databases, the equaliser of the topic gives a brief overview of each.JDBC DRIVERSThe JDBC drivers that we are aware of at this time fit into one of four categories. 1. JDBC-ODBC bridge plus ODBC device driver The JavaSoft bridge product provides JDBC access via ODBC drivers. Note that ODBC binary star code and in many cases database client code must be loaded on each client machine that uses this driver. As a result, this kind of driver is more appropriate on a corporate network where client installations are not a major problem, or for applications server code written in Java in a three-tier architecture. 2. Native-Api partly JAVA Driver This kind of driver converts JDBC calls into calls on the client api for Oracle, sybase, Informix, DB2, or other DBMS. Note that, like the bridge driver this style of driver requires that some binary code be loaded on each client machine. 3. J DBC-Net all JAVA Driver This driver translates JDBC calls into a DBMS independent net protocol, which is then translated to a DBMS protocol by a server.This net server middleware is able to connect its all-Java clients to many different databases. The specific protocol used depends on the vendor. In general, this is the most flexible JDBC alternative. It is likely that all vendors of this solution will provide products suitable for internet use. In order for these products to also support internet access, they must handle the additional requirements for security, access through fire walls, etc., that the web imposes. Several vendors are adding JDBC drivers to their existing database middleware products. 4. Native Protocol all-Java Driver This kind of driver converts JDBC calls into the network protocol used b dbmss directly. This allows a direct call from the client machine to the dbms server and is a practical solution for internet access. Since many of ONLINE LIBRARY BY M.SATHISH KUMAR Page 39DOCUMENTATION OF ONLINE LIBRARYJuly 24, 2012these protocols are proprietary, the database vendors themselves will be theprimary source. Several database vendors have these in progress. Eventually, we expect that categories 3 and 4 will be the preferred way to access databases from JDBc. Driver categories 1 and 2 are in term solutions where direct all-Java drivers are not yet available. class 4 is in some sense the ideal however, there are many cases where category 3 may be preferable e.g., where a thin dbms in dependent client is desired, or if a dbms-independent protocol is standardized and implemented directly by many dbms vendors.SERVLETSIntroductionThe Java web server is JavaSofts own web Server. The Java web server is just a part of a larger framework, intended to provide you not just with a web server, but also with tools. To build customized network servers for any Internet or Intranet client/server system. Servlets are to a web server, how applets are to the b rowser. About Servlets Servlets provide a Java-based solution used to address the problems currently associated with doing server-side programming, including inextensible scripting solutions, platform-specific APIs, and incomplete interfaces. Servlets are objects that conform to a specific interface that can be plugged into a Java-based server. Servlets are to the server-side what applets are to the client-side object byte codes that can be dynamically loaded off the net. They differ from applets in that they are faceless objects (without graphics or a GUI component). They serve as platform independent, dynamically loadable, pluggable helper byte code objects onONLINE LIBRARY BY M.SATHISH KUMARPage 40DOCUMENTATION OF ONLINE LIBRARYJuly 24, 2012the server side that can be used to dynamically extend server-sidefunctionality. For example, an HTTP Servlets can be used to bring forth dynamic HTML content. When you use Servlets to do dynamic content you get the following advantages The yre faster and cleaner than CGI scripts They use a standard API (the Servlets API) They provide all the advantages of Java (run on a compartmentalisation of serverswithout needing to be rewritten). Attractiveness of Servlets There are many features of Servlets that make them easy and attractive to use. These include substantially configured using the GUI-based Admin tool Can be loaded and invoked from a local disk or remotely across thenetwork. Can be linked together, or chained, so that one Servlets can call anotherServlets, or several Servlets in sequence. Can be called dynamically from within HTML pages, using server-sideinclude tags. Are secure even when downloading across the network, the Servletssecurity model and Servlets sandbox protect your system from unfriendly behavior.Advantages of Servlet API One of the great advantages of the Servlet API is protocol independence. It assumes nothing about The protocol being used to lend on the netONLINE LIBRARY BY M.SATHISH KU MARPage 41DOCUMENTATION OF ONLINE LIBRARYJuly 24, 2012 How it is loaded The server environment it will be running in These qualities are important, because it allows the Servlet API to beembedded in many different kinds of servers. There are other advantages to the Servlet API as well. These include Its extensible you can get all your functionality from the baseclasses made available to you. its simple, small, and easy to use.Features of Servlets Servlets are persistent. Servlet are loaded only by the web server and canmaintain services between requests. Servlets are fast. Since Servlets only need to be loaded once, they offermuch better performance over their CGI counterparts. Servlets are platform independent. Servlets are extensible. Java is a robust, object-oriented programminglanguage, which easily can be extended to suit your needs Servlets are secure. Servlets can be used with a variety of clients.Loading Servlets Servlets can be loaded from three places From a directo ry that is on the CLASSPATH. The CLASSPATH of classes reside. From the

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.