Wednesday, February 20, 2019
Library Management System Essay
get up of the Project VisionOnline depository library Online Library is a governance, which maintains books in the emcee in in all directat. It exclusivelyows storing books, schedules, audio and word-painting appoints. substance absubstance ab hirer bottom Search and open registers by giving a simple query. Online Library Management ashes is a organization, which maintains books, scrolls, audio/ pictorial matter accommodates. To maven-valued function this constitution exploiter essential be a portion in this. Then social functionr all(a)owed storing books, documents, A/V files. Then exercisingr scum bag search by giving a simple query. It is very(prenominal) sticky search books manually. Online Library makes well-situated.Deliver qualifieds / Functional SpecificationsOnline Library engrosss user cozy feedback from user to make better search service in every searching. It a ilk uses mighting to pose documents very fast in searching which reboot to q uery. Main designing of online Library system is providing exceedingly relevant documents in very unforesightful period after giving query. It is safe like Search Engine. It uses vector space Model and Probabilistic Model to light upon similitude coefficient, weights. exploiter Interface Requirements in excogitateationbase Centralized ONLINE depository library BY M.SATHISH KUMAR paginate 2 nett browser found musical accompaniment OF ONLINE subroutine libraryJuly 24, 2012Requirements Integration Requirements pet Technologies J2EE Technologies i.e. JSP, Servlets, jdbc Frontend Html, javaScript, c takeee bean master of ceremonies pages. Backend seer 10g. Hardw be Requirement Pentium 4 central addressor with 256 MB RAM, 40 GB Hard disk mesh establish InterfaceONLINE library BY M.SATHISH KUMAR summon 3 reenforcement OF ONLINE subroutine libraryJuly 24, 2012 inventionONLINE depository library BY M.SATHISH KUMAR foliate 4 keep OF ONLINE subroutine libraryJuly 24, 2 012INTRODUTIONOnline Library Management strategy is a system, which maintains books, documents, audio/video files. To use this system user must be a subdivision in this. Then user cedeed storing books, documents, A/V files. Then user stooge search by giving a simple query. It is very difficult search books manually. Online Library makes simple. Online Library uses user indispensable feedback fromuser to improve search process in every searching. It also uses indexing to locate documents very fast in searching which get in touch to query. Main aim of online Library system is providing tallly relevant documents in very short period after giving query. It is just like Search Engine. It uses Vector space Model and Probabilistic Model to find similarity coefficient, weights. active SystemEarly days Libraries atomic number 18 managed manually. It required lot of cartridge holder to record or to retrieve the details. The employees who have to record the details must per traffic p attern their job very conservatively. Even a small err would grow m both problems. Security of in degreeation is very less. Report generations of all the entropy is very tough task. Maintenance of Library catalogue and formation of the books to the catalogue is very complex task. In addition to its precaution of part details, issue dates and return dates etc. manually is a complex task. any the motions must be performed in perfect manner for the maintenance of the library without any degradation, which may finally result in the reverse of the entire system.Benefits of automationAutomation is procedure of converting a traditional system in to a computer organization. To overcome the defects of the existing system automation was introduced by the computerization of organization we get many benefits.ONLINE subroutine library BY M.SATHISH KUMAR paginate 5 certification OF ONLINE subroutine libraryJuly 24, 2012The main bearin consecrates of undertaking this understand arg on The students go out register them through and through with(predicate) Online Individually to each atomic number 53 member exit have his account through which he can assenting the info he rentinesss. Books, documents, A/V files atomic number 18 shopd in server. drug abuser impart enter simplequery in text cut and click on the Search plainlyton. Server plows the request and processes it. Returns hyper links of documents with their light upons, ranks weights and exposition. If the user clicks on name of the document because it pull up stakes open with various(prenominal) computer program and rank of document depart increase for that query.(for example .pdf files with adobe Reader) User can upload documents, books and a/v files. Time consume is low, gives accurate results, reliability can be improved with the help of gage.Proposed SystemTo solve the inconveniences as menti wizardd above, an Online Library proposed.PROCESS LOGIC1. The user inputs en tropy (e.g. fills out an hypertext mark-up language form and clicks the submit howeverton.) 2. The client (Browser) sends the info to the sack server in a quantity format (i.e., the GET method acting or the POST method). 3. The web server launches the program specified by the user and feeds it the input (form) data. 4. The program (e.g. servlet) processes the form data and produces a nonher hypertext mark-up language page. 5. The web server sends back the hypertext mark-up language page to the browser. The web browser then displays the solution page.ONLINE library BY M.SATHISH KUMAR scalawag 6 musical accompaniment OF ONLINE libraryJuly 24, 2012ANALYSIS analytic thinking is the process of taking into custody the existing system by gathering and interpreting the occurrences, diagnosing the problems. It is non just to find out the how better(p) to solve the manual system problems, it should also work for the system observes the feasibility of system then design, coding phases will be executed. Analysis phase delivers requirements specialisedation .The system specification serves as an porthole in the midst of the designer anddeveloper as well as between developers and users. This describes the external carriage of the package without bothering somewhat the internal apparatusation. Specification must be c atomic number 18fully checked for suitability, omission, inconsistencies and ambiguities. Problem analysis is performed to getting a clear accord of the requisites of the clients and the users and what exactly desired form the softwargon.Analysis leads to the actual specification. During the process of analysis, a massive amount of tuition is collected in the form of interviews, questionnaires, and instruction from documentation, and so forth. The major problem during analysis is resolving how to rig out the information from documentation, and so forth. So the information can be in effect evaluated for completeness and consistency.ONL INE library BY M.SATHISH KUMAR summon 7DOCUMENTATION OF ONLINE LIBRARYJuly 24, 2012 prerequisite SPECIFICATIONFUNCTIONAL MODEL / delectation CASE MODEL IDENTIFYING player1. Administrator He should register clean Users, Delete Users etc. He can upload brisk documents, Documents, and A/V files. 2. User He should register in site in order to inlet books. He can search for books. He can upload tender books, documents, and A/V files into server.IDENTIFYING SCENARIOSA Scenario is a scene, which explains a particular situation in to a slap-uper extent visualized model. A scenario consists of actors, scenes, and flow of events. In our project, we have the sp atomic number 18- period activity scenariosScenario for Searching of EBooks, Document or A/V file background Name Actors Flow of eventsSearching for books. User/Administrator User Opens understructure page of site. It will display text box and Search button. User simply enter query into text box, clicks on Search button. Browse r sends request to the server. Server search documents for query and sends hyperlinks to documents (with weight, ranks, and a small interpretation about document) in order of relevance to the query.ONLINE LIBRARY BY M.SATHISH KUMARPage 8DOCUMENTATION OF ONLINE LIBRARYJuly 24, 2012Scenario a for rise EBook, Document or A/V file exposure Name Actors Flow of events commencement Book, Document, or A/V file. User / Administrator User clicks on hyperlink of Document by reading description about document that had displayed to a lower come forth hyperlink. Then browser sends a request to the server again. The request contains name of document which user wants to open. The server will increase rank for document with regard as to query into order to increase the relevance. Then server sends the document file in the form of response to browser. Now browser will open the document by use related natural covering program on client system. (For example if server sent .mp3 file then browser opens it by using audio player, which installed on clients computer. Of course, Browser needs permeation of System Administrator to glide slope diligence program.)ONLINE LIBRARY BY M.SATHISH KUMARPage 9DOCUMENTATION OF ONLINE LIBRARYJuly 24, 2012Scenario for Uploading a EBook, Document or A/V file into ServerScene Name Actors Flow of eventsUploading Administrator / User First User clicks on hyperlink of Upload document. Then browser sends request to upload file. Server return a webpage to browser it contains text box and browse button. By clicking on browse button a file window is displayed which allows to user to select a document from clients computer. After selecting document users click on upload button. Server checks for its extension. If document is.exe file server will non allow uploading file for the purpose of security. Then server insert name of document into documents tabular array with unique document id. Then server creates index for document and insert into indexes table. Server returns a webpage, which contains confirmation and document id.ONLINE LIBRARY BY M.SATHISH KUMARPage 10DOCUMENTATION OF ONLINE LIBRARYJuly 24, 2012Scenario for Modifying UsersScene Name Actors Flow of eventsModifying Users Administrator If login user is admin then homepage contains a special Hyperlink that switch user. If admin clicks on that hyperlink he will navigate to another webpage which contains details of users. In thatadmin can modify user details admin can delete users who violated terms of site.IDENTIFYING USE CASESA use case is a description of systems behaviour from a users stand grade. It is a tried and squ atomic number 18 technique for gathering systems requirement from a users point of view.ONLINE LIBRARY BY M.SATHISH KUMARPage 11DOCUMENTATION OF ONLINE LIBRARYJuly 24, 2012USE CASE DIAGRAMSUse case diagram for entire Online Library SystemONLINE LIBRARY BY M.SATHISH KUMARPage 12DOCUMENTATION OF ONLINE LIBRARYJuly 24, 2012Use Case plat for SearchingU se case Diagram for Uploading fileONLINE LIBRARY BY M.SATHISH KUMARPage 13DOCUMENTATION OF ONLINE LIBRARYJuly 24, 2012 taking over DIAGRAMSSequence Diagram for SearchingONLINE LIBRARY BY M.SATHISH KUMARPage 14DOCUMENTATION OF ONLINE LIBRARYJuly 24, 2012Sequence Diagram for uploading fileONLINE LIBRARY BY M.SATHISH KUMARPage 15DOCUMENTATION OF ONLINE LIBRARYJuly 24, 2012Sequence Diagram for Opening fileONLINE LIBRARY BY M.SATHISH KUMARPage 16DOCUMENTATION OF ONLINE LIBRARYJuly 24, 2012COLLABORATION DIAGRAMS coaction Diagram for SearchingONLINE LIBRARY BY M.SATHISH KUMARPage 17DOCUMENTATION OF ONLINE LIBRARYJuly 24, 2012Collaboration Diagram for uploading fileCollaboration Diagram for Opening fileONLINE LIBRARY BY M.SATHISH KUMARPage 18DOCUMENTATION OF ONLINE LIBRARYJuly 24, 2012ACTIVITY DIAGRAMSActivity Diagram for SearchingONLINE LIBRARY BY M.SATHISH KUMARPage 19DOCUMENTATION OF ONLINE LIBRARYJuly 24, 2012Activity Diagram for Uploading fileONLINE LIBRARY BY M.SATHISH KUMARPage 20DOC UMENTATION OF ONLINE LIBRARYJuly 24, 2012Activity Diagram for Opening fileONLINE LIBRARY BY M.SATHISH KUMARPage 21DOCUMENTATION OF ONLINE LIBRARYJuly 24, 2012CLASS DIAGRAMSDBHandler Class DBHandler is respnosible for performing all operations which be need interaction with informationbase. It perform all operation in database like inserting document, creating index, inserting query, mating database consistency , creating tables, recovering database when database crashed. It highly simplifies maintains of database. Adminstrator need not worry about database at any time.ONLINE LIBRARY BY M.SATHISH KUMARPage 22DOCUMENTATION OF ONLINE LIBRARYJuly 24, 2012VectroSpaceModel Class VectorSpaceModel is form it trustworthy for calculating similarity coefficients of documents with respect to query. After calculating similarity coefficient it passes documents with similarity coefficients to probabilistic model pattern, which will finds weights using similarity coefficients.ProbabilisticMode l Class Probabilisticmodel class responsible for calculating weights for documents using similarity coefficients. After calculating weights, it will get ranks for documents from rank table. And return documents to Search class.ONLINE LIBRARY BY M.SATHISH KUMARPage 23DOCUMENTATION OF ONLINE LIBRARYJuly 24, 2012Read Class Read class for responsible for reading text from text files. It will read text from distinct format of text files. For example .doc, .pdf, .xls, .txt, .html etc. It read reads text and clean text and returns as string. If the file is not text file then it will return name and extension of file as string.Search Class Search Class acts as device driver class. It does not perform any tasks. It makes all class working together.ONLINE LIBRARY BY M.SATHISH KUMARPage 24DOCUMENTATION OF ONLINE LIBRARYJuly 24, 2012DEPLOYMENT DIAGRAMONLINE LIBRARY BY M.SATHISH KUMARPage 25DOCUMENTATION OF ONLINE LIBRARYJuly 24, 2012DESIGNSOFTWARE organize Softw be is fundamental characterist ic of computer softw atomic number 18 program.Softwargon structure is to tumble the complex groups of module into sub modules i.e., Process, Menus, Inputs and Reports. The most general form of the software structure is the lucre. The structure is the meshwork. The structure inside a complex affect node might consist of concurrent processes executing in match and communication through some combination of shared variables. infoBASE DESIGN think the Database The most important consideration in designing the database is how the information will be employ. Business activities that will use the database to perform. Business rules that apply to these activities Data wanted to maintain in the databaseThe main objectives of designing a database are Data integration Data integrity Data libertyDATA INTEGRATION In a database, information from several files is co-ordinate, raged and operand upon as though it is single file.ONLINE LIBRARY BY M.SATHISH KUMARPage 26DOCUMENTATION OF ONLINE LIBRARYJuly 24, 2012Logically, the information is centralized, physical, the data may be located facilities. send off methodological analysis excogitate is concerned with identifying software comp wiznts, specifying relationships among component, specifying software structure and providing a gritty print for the implementation phase. Design consists of three types 1. Architectural Design 2. peak Design 3. immaterial Design Architectural Design Architectural Design involves identifying the software components, decoupling and decomposing them into processing modules and conceptual data structure and specifying relationships among the components.Detailed Design Detailed design is concerned with the details of how to package the processing modules and how to implement the processing algorithms, data structure and interconnection among modules and data structure. GUI based design In order to have a better understanding over the system design, it is appropriate to know the ac tual designing in terms of the development platform and the air in which the GUI are designed to satisfy the requirements of the user. The analysis of the design aspects of this package is proposed away design. External design of software involves conceiving, planning and specifying the external observable characteristics in disparate devices connected though data communicationONLINE LIBRARY BY M.SATHISH KUMARPage 27DOCUMENTATION OF ONLINE LIBRARYJuly 24, 2012of a software product. This includes reports and display formats. External design begins analysis phase it continues into the design phase. DATA INTEGRITY Data integrity centre storing all the data in single place and allow each application to access it. This approach results in more(prenominal) consistent, on update being sufficient to achieve a new record status for all the applications, which use it. This leads to less data circumlocution, data breaker points need not be duplicated, requirement.DATA INDEPENDENCE Data independence is the insulation of application programs from changing aspects of physical data organization. This objective seeks to allow changes in the content and organization of physical data without re programing of applications and to allow modifications to application programs without the reorganizing the physical data. typicalization Data structuring is refined through a process called frequentization. ordinaryization is a formal process of developing data structures in a manner that eliminates decomposition redundancy and promotes integrity. of complex records into simple It is a step-by-step records to reduce a reduction in the direct access storageredundancy, inconsistencies and remove anomalies. There are several median(prenominal) forms to be followed in normalisation process. The most important and broadly used are ONLINE LIBRARY BY M.SATHISH KUMAR Page 28 First Normal rebound Second Normal Form Third Normal FormDOCUMENTATION OF ONLINE LIBRARYJuly 24, 2012Fir st Normal Form A table is state to be in first normal form if the intersection of any towboat and row contains still value. Method This is identifying a suitable identifier from the kitty-cat of normalized data. Remove any item that repeat within a single value of this lynchpin to another relation bringing with them the identifier key to form part of new composite key in the relation. Second Normal Form For a table to be in the second normal form it should also be in the first normal form and the values in every column are functionally unfree on the complete primary key.Method picture every column and section whether its value depend on the whole ofthe compound key or just some parts of it. Remove key. Third Normal Form For a table to be in the third normal form transitively open on the primary key. Method Examine every non-key column with every other non-key column. If the value of the non-key column depends on the other non-key column then remove the columns to separate tab le. it should be in the those that depend moreover on part of the key to a new table with that part as the primarysecond normal form and the values in every non-key column are notONLINE LIBRARY BY M.SATHISH KUMARPage 29DOCUMENTATION OF ONLINE LIBRARYJuly 24, 2012De Normalization The normalization process helps in reducing to a great extent but sometimes when information is required from more than one table, at a fast rate , it is desirable to have some degree of redundancy in table . Their deliberate innovation of redundancy for a highly improved execution is announcered to as De Normalization .DATABASE TABLES1. QUARRIES The QUARRES table can store quarries entered by user with unique ID (QID). It is stores unique quarries irrespective order of terminology and case of letters. 2. DOCUMENTS The DOCUMENTS table can hold name of documents, which are in server with unique ID for every document. 3. WORDS The WORDS table can store lyric, which are in documents. This table plays key role in creating index for documents. This table contains a unique ID and words column. Unique words can be stored in this table irrespective of case of letters. 4. RANKS The RANKS table can hold rank and weight for each document with respect to query. This table contains four columns. QID and DID are refer QID of QUERRIES and DID of DOCUMENTS table respectively.5. list The INDEX table helps to search engine while searching for documents, which are relate to query given by user. Simply it makes fast Searching. It contains two columns WID, DID refer WID of WORDS, DID of DOCUMENTS tables. 6. USERDETAILS The USERDETAILS can hold details of users. Username, user-id, password etc.ONLINE LIBRARY BY M.SATHISH KUMARPage 30DOCUMENTATION OF ONLINE LIBRARYJuly 24, 2012ENTITY RELATIONSHIP DIAGRAMSONLINE LIBRARY BY M.SATHISH KUMARPage 31DOCUMENTATION OF ONLINE LIBRARYJuly 24, 2012ABOUT THE SOFTWAREINTRODUCTION hypertext mark-up language stands for hyper text makeup language. It is a language u sed to create hypertext documents that have hyperlinks embedded in them. You can build web pages. It is only a formatting language and not a programming language. Hyperlinks are underlined or emphasized words or locations in a projection screen that leads to other documents, W W W is a global, Interactive, dynamic, cross Platform, pictorial hypertext information system. The idea behind hypertext is that instead of reading text in rigid linear structure you can easily jump from one point to another. You can Navigate through the information based on your interest and preferences.HYPERMEDIA HTML pages with audio and video files linked to them are called Hypermedia. HTML is platform independent.HTML IS PLATFORM INDEPENDENT If you can access internet, you can access WWW, Irrespective of your operating system and the operating system to the web server. All you require to view and unload the HTML files, which are on the WWW, are a browser and internet connection.WEB IS DISTRIBUTED The inf ormation on the WWW is distributed through out the world. You can access it with a few mouse clicks. You do not have to store it on your tool. Information on the clear is dynamically updateable. As the information is at the site where it is troubleed, the people who publish it can change it any time. HTML is a language for describing structured documents, HTML describes the structures of documents lists, headings, paragraphs Etc. Elements of web documents are labeled through the usage of HTML tags, It is the tags that describe the documents. Anything that is not a tag part of the Document itself.ONLINE LIBRARY BY M.SATHISH KUMARPage 32DOCUMENTATION OF ONLINE LIBRARYJuly 24, 2012The Static WebWhen the World Wide Web was born, it consisted of static Web sites. Web sites consisted of static documents (mostly HTML pages) that were accessible through Web servers. Users used Web browsers to access these Web sites. A Web browser communicated with a Web server over the Hyper Text sell Protocol (HTTP). Using an HTTP request, the browser communicated with the Web server and asked to get access to a certain document. The Web server managed a set of documents stored on a file system. When asked for adocument, it would retrieve it and return it within an HTTP responseHTML DOES NOT DESCRIBE PAGE LAYOUTWorld for windows or white lotus improve for example, have antithetic paths for Headings, font, Size, and identification. HTML does not have all these. Based on the plat form , exact placement or appearance of any element will change. There may be or may not be fonts installed. By separating the structure of the document and its appearance, a program, that reads and understands HTML can make formatting decisions based on capabilities of the individual platform . In addition to providing the networking functions to retrieve documents, Web browsers are also HTML formatters.ONLINE LIBRARY BY M.SATHISH KUMARPage 33DOCUMENTATION OF ONLINE LIBRARYJuly 24, 2012They parse and format documents and display them on the screen. Different rowsers immortalise data differently.ADVANTAGES A HTML document is small and hence light-colored to send over the net. It is small because it does not include format information. HTML documents are cross platform compatible and device independent. You only need a HTML reliable browser to view them. Font names, locations Etc.. are required. Currently the standard fully contained is HTML 2.0 & HTML 3.0 is in use. It reenforcements. Centered and right aligned text. Tables . Math equations Text and image conglutination chocolateINTRODUCTION coffee is an intercepted language. Though it bears a close similarity to C++ , it is different from it in many ways. It is a smaller, man-portable, purely object oriented Language that eliminates many of the sources of bugs and complexities that are common with C Or C++ . JAVA FEATURES coffee bean is simple, Object Oriented, Intercepted, Robust, Secure architecture neutral, Portable , has high performance, multi threaded and dynamics. It is easier To use burnt umber because its syntax is similar to C and C++, more so when it eliminates components of C that causes bugs and memory leaks and hence a lot less debugging, umber provides a powerful Set of pre-tested libraries that give us the ability to use groundbreaking features even with few lines of mandate. target area ORIENTED coffee tree is an Object oriented programming Language that uses software objects called CLASESS and it is based on reusable, protrusile principle. This implies we can use Javas classes, which are sets of variables and methods, asONLINE LIBRARY BY M.SATHISH KUMARPage 34DOCUMENTATION OF ONLINE LIBRARYJuly 24, 2012templates to create other Classes with added functionality without the need to release the enrol from Scratch. The application program can be made small and unaccented to develop if we plan the class hierarchy well. Robust Java is Robust because, the language removes th e use of pointers and The Java Runtime System manages the memory for us. Java gives us automatic jump checking for arrays, so that they cannot reside in an address space which is not allocated for them. spontaneous memory management is taken care of by the Garbage Collector. taken Java is interpreted hence the development cycle is a lot quick. Java needs to compile for a single, virtual work and then the write in code can run on any machine that has JVM ported to it. Secure Java is secure, so user can download Java programs from anywhere. Java provides protractible compile time checking followed by a multi layered level of runtime Checking.Architecture Neutral Java is architecture neutral, so user applications are portable across multiple platforms. Javas Applications are written and compiled into Byte Code for JVM, Which emulates an actual hardware chip. The Java Interpreter installed at the client, so applications need not be written for various platforms separately convert s byte Code to machine code. Java further ensures that the applications are the same on every platform by strictly defining the sizes of the staple fiber data types and their behaviour. Dynamic Java is Dynamic., so the applications are adapted to changing environments, Javas architecture allows the user to dynamically load classes at runtime from any where on the network, which means that the user can add functionality to applications by simply linking in new classes.ONLINE LIBRARY BY M.SATHISH KUMARPage 35DOCUMENTATION OF ONLINE LIBRARYJuly 24, 2012JDBC OVERVIEWWhat is JDBC? JDBC is a Java TM API for executing SQL statements. It consists of a set of classes and interfaces written in the JAVA programming language that makes it easy to send SQL statements to virtually any relational database. In other words, with the JDBC API, it isnt necessary to write one program to access a Sybase database, another program to access an Oracle database, another program to access an Informix databa se, and so on. One can write a single program using the JDBC API, and the program will be able to send SQL statements to the appropriate database. And, with a program written in the JAVA programming language, one doesnt have to worry about writing different programs to run on different platforms. The combination of JAVA and JDBC lets a software engineer write it once and run it anywhere. JAVA, being robust, secures, easy to use, easy to understand, and automatically downloadable on a network, is an excellent language substructure for database applications. What is needed is a way for JAVA applications to talk tovariety of different databases. JDBC is the mechanism for doing this. JDBC pass overs what you can do in JAVA.For example, with JAVA and the JDBC API, it is possible to publish a web page containing an applet that uses information obtained from a remote database. Or an enterprise can use JDBC to connect all its employees (Even if they are using a conglomeration of Windows, Macintosh and Unix machines) to one or more internal databases via. An Internet. With more and more programmers using the JAVA programming language, the need for easy database access from JAVA is continuing to grow. MIS managers like the combination of JAVA and JDBC because it makes disseminating information easy and economical. Business can continue to use their installed databases and access information easily even if it is stored on different database management systems. Development time for new applications is short. Installation and version controls are greatly simplified. A programmer can write an application or an update once, put it on the server and everybody has access to the latest version and for business selling information services, JAVA and JDBC offers better way of getting out information updates toONLINE LIBRARY BY M.SATHISH KUMARPage 36DOCUMENTATION OF ONLINE LIBRARYJuly 24, 2012external customers. versatile ways to use JDBC are discussed in. What Does JDBC Do? S imply put, JDBC makes it possible to do three things Establishes connection to databases. Send SQL statements. Process the results. JDBC is a Low-level API and a base for Higher-Level API. JDBC is a Low-level interface, which means that it is used to invoke SQL commands flat. It workings very well in this capacity and is easier to use than other database connectivity APIs, but it was designed also to be a base upon which to build higher-level interfaces and tools. A higher-level interface is User-friendly, using a more understandable or more convenient API that istranslated behind the scenes into a Low level interface such as JDBC. So why not just use ODBC from Java?The answer is that you can use ODBC from JA V A, but this is best done with the help of JDBC in the form of the JDBC-ODBC Bridge. The question now becomes why do you need JDBCT There are several answers to this question 1. ODBC is not appropriate for direct use from Java because is uses a C interface. 2. Calls from Ja va to native C code have a number of drawbacks in the security, 1. implementation, robustness, and automatic probability of applications. A literal translation of the ODBC API into a Java API world not desirable. For example, Java has no pointers, and ODBC makes copious use from, including the notoriously error-prone generic pointer void *. You can think as JDBC as ODBC translated into an object-oriented interface that is natural for Java programmers. 2. ODBC is hard to check over. It mixes simple and advanced features together, and it has complex options even for simple queries. JDBC, on the otherONLINE LIBRARY BY M.SATHISH KUMARPage 37DOCUMENTATION OF ONLINE LIBRARYJuly 24, 2012hand, was designed for a wide range of programmers and keeps simple things simple. 3. A Java API like JDBC is needed in order to enable an all-Java solution. When ODBC is used, the driver manager and drivers must be manually installed on every client machine. When the JDBC driver is written completely in J AVA, however, JDBC code is automatically installed, portable, and secure on all Java platforms from network computers to mainframes. In summary, the JDBC API is natural JAVA interface is to the basic SQL abstractions and concepts. It builds an odbc rather than starting signal from search, so programmers familiar with odbc will find it very easy to learn JDBC. JDBC retains the basic design features of ODBC infarct, both interfaces are based on the x/Open SQL CU( call level interface).The big difference is that JDBC builds on and reinforces the style and virtues ofJava, and of course, it is easy to use. ADVANTAGES. Until now, the nitty-gritty tier has typically been written in languages such as C or C++, which offer fast performance. However, with introduction of optimizing compilers, translating Java byte code into efficient machinespecific code, it is becoming practical to implement the middle tier in Java. This is a big plus, making it possible to take advantage of Javas robustne ss, multi-threading and security features. SOL Conformance incorporated Query Language(SQL) is the standard language for accessing relational databases. One area of fuss is that almost most DBMSs(Database Management Systems) gives a standard form of SQL for basic functionality, they do not conform to the more recently defined standard SQL syntax or semantics for more advanced functionality.For example, not all databases support stored procedures or outer joins, and those that do are not consistent with each other. It is hoped that the portion of SQL that is truly standard will expand to include more functionality. In the mean time, however, the JDBC API must support SQL as it is. One way the JDBC API deals with the problem is to allow any query string to be passed through to an underlying DBMS driver. This means that an application is iTee to use as much SQL functionality is desired, but it runs the risk of receiving an error on some DBMS. In fact an application query need not even be an SQL, or it may be a specialized derivation of SQL designed for specific DBMS(for document or image queries). For example, a second way JDBC deals with the problems of SQL conformation is to provide ODBC style escape clauses. Which are discussed in SQL Escape syntax in Statement objects. This escape syntax allows a programmer to use SQLONLINE LIBRARY BY M.SATHISH KUMARPage 38DOCUMENTATION OF ONLINE LIBRARYJuly 24, 2012functionality item within a JDBC program. The ODBC API is a natural choice for Java developers because it offers easy database access for Javaapplications and applets. Because JDBC brings together Java and databases, the remainder of the topic gives a brief overview of each.JDBC DRIVERSThe JDBC drivers that we are aware of at this time fit into one of four categories. 1. JDBC-ODBC tide over plus ODBC device driver The JavaSoft bridge product provides JDBC access via ODBC drivers. Note that ODBC binary code and in many cases database client code must be loaded o n each client machine that uses this driver. As a result, this kind of driver is more appropriate on a corporate network where client installations are not a major problem, or for applications server code written in Java in a three-tier architecture. 2. Native-Api partly JAVA device driver This kind of driver converts JDBC calls into calls on the client api for Oracle, sybase, Informix, DB2, or other DBMS. Note that, like the bridge driver this style of driver requires that some binary code be loaded on each client machine. 3. JDBC-Net all JAVA driver This driver translates JDBC calls into a DBMS independent net protocol, which is then translated to a DBMS protocol by a server.This net server middleware is able to connect its all-Java clients to many different databases. The specific protocol used depends on the vendor. In general, this is the most flexible JDBC alternative. It is likely that all vendors of this solution will provide products suitable for internet use. In order fo r these products to also support internet access, they must handle the additional requirements for security, access through push aside walls, etc., that the web imposes. Several vendors are adding JDBC drivers to their existing database middleware products. 4. Native Protocol all-Java Driver This kind of driver converts JDBC calls into the network protocol used b database management systems directly. This allows a direct call from the client machine to the database management system server and is a practical solution for internet access. Since many of ONLINE LIBRARY BY M.SATHISH KUMAR Page 39DOCUMENTATION OF ONLINE LIBRARYJuly 24, 2012these protocols are proprietary, the database vendors themselves will be theprimary source. Several database vendors have these in progress. Eventually, we expect that categories 3 and 4 will be the preferred way to access databases from JDBc. Driver categories 1 and 2 are in term solutions where direct all-Java drivers are not yet available. Categor y 4 is in some sense the ideal however, there are many cases where category 3 may be preferable e.g., where a thin dbms in dependent client is desired, or if a dbms-independent protocol is standardized and implemented directly by many dbms vendors.SERVLETSIntroductionThe Java web server is JavaSofts own web Server. The Java web server is just a part of a larger framework, intended to provide you not just with a web server, but also with tools. To build customized network servers for any Internet or Intranet client/server system. Servlets are to a web server, how applets are to the browser. About Servlets Servlets provide a Java-based solution used to address the problems currently associated with doing server-side programming, including inextensible scripting solutions, platform-specific APIs, and incomplete interfaces. Servlets are objects that conform to a specific interface that can be plugged into a Java-based server. Servlets are to the server-side what applets are to the clie nt-side object byte codes that can be dynamically loaded off the net. They differ from applets in that they are faceless objects (without graphics or a GUI component). They serve as platform independent, dynamically loadable, pluggable helper byte code objects onONLINE LIBRARY BY M.SATHISH KUMARPage 40DOCUMENTATION OF ONLINE LIBRARYJuly 24, 2012the server side that can be used to dynamically extend server-sidefunctionality. For example, an HTTP Servlets can be used to generate dynamic HTML content. When you use Servlets to do dynamic content you get the following advantages Theyre faster and cleaner than CGI scripts They use a standard API (the Servlets API) They provide all the advantages of Java (run on a variety of serverswithout needing to be rewritten). Attractiveness of Servlets There are many features of Servlets that make them easy and attractive to use. These include Easily configured using the GUI-based Admin tool Can be loaded and invoked from a local anaesthetic disk or remotely across thenetwork. Can be linked together, or chained, so that one Servlets can call anotherServlets, or several Servlets in sequence. Can be called dynamically from within HTML pages, using server-sideinclude tags. Are secure even when downloading across the network, the Servletssecurity model and Servlets sandbox protect your system from unfriendly behavior.Advantages of Servlet API One of the great advantages of the Servlet API is protocol independence. It assumes nothing about The protocol being used to transpose on the netONLINE LIBRARY BY M.SATHISH KUMARPage 41DOCUMENTATION OF ONLINE LIBRARYJuly 24, 2012 How it is loaded The server environment it will be running in These qualities are important, because it allows the Servlet API to beembedded in many different kinds of servers. There are other advantages to the Servlet API as well. These include Its extensible you can inherit all your functionality from the baseclasses made available to you. its simple , small, and easy to use.Features of Servlets Servlets are persistent. Servlet are loaded only by the web server and canmaintain services between requests. Servlets are fast. Since Servlets only need to be loaded once, they offermuch better performance over their CGI counterparts. Servlets are platform independent. Servlets are extensible. Java is a robust, object-oriented programminglanguage, which easily can be extended to suit your needs Servlets are secure. Servlets can be used with a variety of clients.Loading Servlets Servlets can be loaded from three places From a directory that is on the CLASSPATH. The CLASSPATH of classes reside. From the
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.