warehouse executor

Download Warehouse Executor

If you can't read please download the document

Upload: tprkl769012

Post on 28-Oct-2014

123 views

Category:

Documents


5 download

TRANSCRIPT

WAREHOUSE EXECUTORSubmitted in partial fulfillment of the requirements for the award of the degree of Master of Computer Applications

Padmasri Dr. B.V. Raju Institute of Computer Education Vishnupur - Bhimavaram

Guide: V.Bhaskara Murthy MSc Senior Lecturer

Submitted by: P.Raaja Badra Regd.no:20805030030

Submitted to Andhra University

Page 1 of 143

Visakhapatnam

CERTIFICATE

This is to certify that this project entitled warehouse executor submitted in partial fulfillment of the degree of MASTER OF COMPUTER APPLICATIONS to Andhra University through Padmasri Dr. B.V. Raju Institute of Computer Education, done by Mr. P.Raaja Badra Regd. No.20805030030 is an authentic work carried out by him/her during the Academic Year 2009-20010 at BVRICE under my guidance. The matter embodied in this project work has not been submitted earlier for award of any degree or diploma to the best of my knowledge and belief.

Internal Guide

Head of the Department

External Examiner

Principal

Page 2 of 143

DECLARATION

This is to certify that the project report entitled ______________________ is done by me is an authentic work carried out for the partial fulfillment of the requirements for the award of the degree of Master of Computer Applications under the guidance of _______________________. The matter embodied in this project work has not been submitted earlier for award of any degree or diploma to the best of my knowledge and belief.

Signature of the student P.Raaja Badra

Name of the student: P.Raaja Badra Regd.No:20805030030 Padmasri Dr. BVRICE

Page 3 of 143

INDEX

Page 4 of 143

1. Introduction 1.1 1.2 1.3 Objective & Scope of the Project Background Details Definition of the Problem

2. System Requirements Specification 2.1 Functional Requirements 2.2 Non Functional Requirements 3. Requirements Analysis Document 3.1 System Models 3.1.1 3.1.2 3.2 Identifying Actors Identifying Scenarios

Use case model 3.2.1 3.2.2 Identifying Use Cases Use case Diagrams

3.3

Object Model 3.3.1 3.3.2 Data Dictionary Class Diagrams

3.4

Dynamic Models 3.4.1 Sequence Diagrams 3.4.2 3.4.3 State chart Diagrams Activity Diagrams

Page 5 of 143

4. System Design Document 4.1 4.2 Subsystem Decomposition Design Goals

5. Object Design Document 5.5 Object Design Model

6. Front End and Back End Tools 6.1 6.2 Details about Front End Details about Back End

7. Screens 8. Reports 9. Source Code 10. Testing10.1

Unit Testing

10.2 Test Report 11. Conclusion 12. Bibliography

Page 6 of 143

Introduction

Page 7 of 143

1. Introduction

1.1

Objective & Scope of the Project

Warehouse Executer is a "Management of storage of products and services rendered on the products within the four wall of a warehouse". Warehouse Executer as perceived by the Industry today Warehouse Executer is not just managing within the boundaries of a warehouse today, it is much wider and goes beyond the physical boundaries. Inventory management, inventory planning, cost management, IT applications & communication technology to be used are all related to warehouse executor. The container storage, loading and unloading are also covered by warehouse executer today. Warehouse executer today is part of SCM (Supply Chain Management)and demand management. Even production management is to a great extent dependent on warehouse management.

Efficient warehouse

management gives a cutting edge to a retail chain

distribution company. Warehouse management does not just start with receipt of material but it actually starts with actual initial planning when container design is

Page 8 of 143

made for a product. Warehouse design is also part of warehouse executor. Warehouse executor is part of Logistics and SCM.

Warehouse executor monitors the progress of products through the warehouse. It involves the physical warehouse infrastructure, tracking systems, and

communication between product stations.

Warehouse executor deals with receipt, storage and movement of goods, normally finished goods, to intermediate storage locations or to final customer. In the multi-echelon model for distribution, there are levels of warehouses, starting with the Central Warehouse(s), regional warehouses services by the central warehouses and retail warehouses at the third level services by the regional warehouses and so on. The objective of warehousing executor is to help in optimal cost of timely order fulfillment by managing the resources economically.

Cargo space strategy has great impact of warehouse performance. Compared to static storage policy where the product locations are fixed during the order picking process, dynamic storage is a storage method which has the potential to enhance warehouse performance to a degree that cannot easily be achieved by static storage methods.

1.2

Background DetailsPURPOSE OF THE SYSTEM

Page 9 of 143

The aim of the project is to create and manage a warehouse for an organization. It is involved in the process of storage and discharging of an item from cargo spaces or warehouses. The warehouse executer is required to maintain considerable information regarding stores, items/ products, brands, storage types, package types and unit types. It should also maintain check in, check out, payment details.

1.3

Definition of the Problem It automates information related to one cargo station. Complexity in management of items in cargo station. Check in and Check out details is not maintained properly. The existing system may not provide security to cargo station. This system is not providing secure registration and profile

management of all the users properly. This system may not fulfill the requirements managing of cargo

storages properly.

Page 10 of 143

System Specification

Requirements

Page 11 of 143

2. System Requirements Specification2.1

Functional Requirements The main functionalities of this system are:

1. Registrations. 2. Employee in charge details. 3. Company brand /products/packages details. 4. Storage maintenance details. 5. Discharges details. 6. Security details. 7. Users Information. 8. Warehouse gate pass/payments details

2.1

Non Functional Requirements

Page 12 of 143

1. Secure access of confidential data (users details). 2.24 X7 availability. 3. Better component design to get better performance at peak time. 4. Flexible service based architecture will be highly desirable for future extension.

Requirements Analysis Document

Page 13 of 143

3.1

System Models

3.1.1 Actors

Identifying

In order to identify the actors, you need to consider who or what uses the system, and what roles They play in their interactions with the system. You can arrive at the roles that people and things Play in relation to a system by a consideration of cases of specific people and things, and then generalizing.

Administrator

User Warehouse executor

Page 14 of 143

Employee Admin: Employee: User:

3.1.2 Identifying Scenarios 1. Add Company

Use Case:AddCompany Actors: employee/admin Preconditions: 1.the user must logged in as employee or administrator Flow Of events: 1. The user select the add company. 2. The system asks for company details. 3. The user must give all the required details. 4. Then click on adds Company button. 5. Then the system updates the database. Post conditions:

2. Add Product

Page 15 of 143

Use Case:Addproduct Actors: employee/admin Preconditions: 1.the user must logged in as employee or administrator Flow Of events: 1. The user select the add product. 2. The system asks for product details. 3. The user must give all the required details. 4. Then click on add product button. Post conditions:

3. AddBrands Use Case:addBrands Actors: employee/admin Preconditions: 1.the user must logged in as employee or administrator Flow Of events: 1. The user select the add Brand for specific company. 2. The system asks for Brand details. 3. The user must give all the required details. 4. Then provide the brand product. 5. Select the storage type. 6.Then click on add Company button. Post conditions:

Page 16 of 143

4. AddSecurity Use Case:AddSecurity Actors: employee/admin Preconditions: 1.the user must logged in as employee or administrator Flow Of events: 1. The user select the add security. 2. The system asks for security details. 3. The user enters the vehicle no and drivers name. 4. The user enters the license no and RC no. 5. The user clicks on the add security button. 6. Then the systems update security details on the database.

5. Payments Use Case:payments Actors: employee/admin Preconditions: 1.the user must logged in as employee or administrator Flow Of events: 1. The user select the add company. 2. The system asks for company details. 3. The user must give all the required details. 4.Then click on add Company button. Post conditions:

Page 17 of 143

6. ProductStorageUSeCase:ProductStorage

Actors: employee/admin Preconditions: 1.the user must logged in as employee or administrator Flow Of events: 1. The user selects the product storage tab. 2. The user has to enter the vehicle number. 3.user must provide the in which warehouse the product must be stored 4. User must provide the company name. 5. and click on add button. 6. The system will store the information in database. Post conditions:

7. ProductDischarge Usecase:productdischarge: Actors:admin/employee: Preconditions: 1.the user must logged in as employee or administrator Flow of events: 1.the user select the product discharge tab; 2. The system ask user for ware house name from which the product is discharging. 3. Provide the company name of the discharging product. 4. Provide employee name who discharges the goods. 5. The system will ask the vehicle no which is used for transport.

Page 18 of 143

Postconditions:

3.2

Use case model

3.2.1 Identifying Use Cases

1. USERS REGISTRATION USERS

The general users who can get cargo stations or warehouse general information and its location, services and contact details etc EMPLOYEE This employee plays main role in organization that he has to manage the security details mean maintaining vehicle check in date and time ,check out date and time, driver name, number of people are enter into warehouse, vehicle number

Page 19 of 143

etc,..gate pass introducing to customers before leaving warehouse and he checks once again vehicle number, driver name, license number, number of people, etc.

2. COMPANY MANAGEMENT: These warehouse systems can stores different type of company products in cargo stations. When different type of product stores in different warehouses here we are concentrating which company item, the person who enters into warehouse with which type of package type ,unit type, storing expecting dates, vehicle number, check in time, driver name etc,.. if already existing storage is exist current how much of quantity will to raise all these details are collected from user by incharges of

particular warehouse. COMPANY BRANDS

In developing countries several companies are competitive them self to introducing new item with different brands according to wishing of consumers or attracting consumers, these companies are manufacturing items and send to their warehouses if those companies have lack of warehouses to store their manufacturing items .So the companies prefers to Cargo stores 3. PRODUCTS MANAGMENT The administrator take the responsible for entering products, its details like its brands and its storage incharge employees details are managing and some

modification in product details like product description and images done by authorize person.

Page 20 of 143

BRAND, PACKAGE AND UNIT MANAGEMENT

The cargo stations consist of various items(products) with brands that are packed in different types like container, boxes, looses and covers maintained with

different units like tons, kilo grams, grams, liter, etc, The administrator is privileges to insert into data base, and can modify their data according to requirements.

4. WAREHOUSE MANAGEMENT

PRODUCT STORAGE Companies are preferring to stores there item in their own warehouse or private sector warehouses to maintain their goods or cargoes in different storage types like some item may stores in colds places and other items may store at different places .These warehouse has to maintain its data like address details ,contact details ,storage type details and the in charge employee details who maintain data of warehouses. The administrative take care of maintain warehouse which stores different type of products(cargoes) with different brands with different type of

packages these package types like container ,some products stores in particular conditions like in temperature wise, should maintain warehouse details like how much of present stock available, existing stock quantity ,instructions how to store cargoes because in some condition two type of product may not keep together causes

chemical actions and its store different company cargoes list as above mansion and he has to responsible to maintain storing of item into warehouse .

PRODUCT DISCHARGES

Page 21 of 143

When the particular company is willing to discharges their item they has to first fall consult the in charges of warehouses who observes users bill detail and then issues their products with gate passes by considering of vehicle number and security persons take care of warehouses by noticing of vehicle number, driver name ,license numbers, number ,vehicle R.C number, people enter at what time that is check in time and checkout time of vehicle with gate pass details by checking it the product discharges outside of warehouses. 5. PAYMENT MANAGEMENT All the Company who store there items in warehouses in has to charge the amount to warehouse administrator. The administrator collect information of payment type reasons, payment amount, amount paid, next dues date, that payment type may be cash/cheque/DD, infavour of administrator.

6. REPORTS: A. Products Report B. Company details Report C. Package, Brands and Unit type details D. Warehouse details E. Product storage status

Page 22 of 143

3.2.2

Use case Diagrams

SYSTEM DIAGRAM

Page 23 of 143

System

A dm inist ra t or

W a re Hous e Ex e cut or Em ploy e e

Use r

ADMINISTRATOR:

Page 24 of 143

Po u t r d cs

C ma y o pn

Pca ey e akgTp

Ba d r ns

Ui nts

Wr h u e ae o s s

A m i t ao d ins r t r So a e n t u to s t r g I sr ci n

S c rty e ui

So a e t r gs

P y e ts a mn

D c ag s is h r e

EMPLOYEE

Page 25 of 143

Se curit y

W a re House s

Pro duct St o ra ge

Em ploy e e W a re house Pa y m e nt s

W a r e ho use Discha rge Ga t e Pa ss

Pro duct Dis cha rge

Page 26 of 143

USER

Co m pa ny

Pro duct s

Pa ck a ge Ty pe De t a ils Us e r Wa re Ho us e De t a ils

Br a nd Pa ck a ge Unit Pr ice Lis t

Page 27 of 143

Object Model

3.3

Object Model

Page 28 of 143

3.3.1

Data Dictionary

TABLE: BRNDPCKGUNITMSTRPRICES

TABLE: COMPANYBRANDSMASTER

TABLE: COMPANYMASTER

Page 29 of 143

TABLE: DEPARTMENTMASTER

TABLE: DESIGNATIONMASTER

TABLE: EMPADDRESS

Page 30 of 143

TABLE: EMPCONTACTPHONES

TABLE: EMPLOYEESMASTER

TABLE: PACKAGETYPEMASTER

Page 31 of 143

TABLE:PRODUCTDISCHARGEDMASTER

TABLE: PRODUCTDISCHRGDTLS

TABLE: PRODUCTMASTER

TABLE: PRODUCTSTORAGEDETAILS

Page 32 of 143

TABLE: PRODUCTSTRAGMASTER

TABLE: SECURITYMASTER

Page 33 of 143

TABLE: STORAGEINSTRUMASTER

TABLE: UNITMASTER

TABLE: USERAHTHDETAILS

Page 34 of 143

TABLE: WAREHOUSEMASTER

TABLE: WAREHOUSEPAYMENTMASTER

TABLE: WAREHOUSEPYMNTDETAILS

Page 35 of 143

TABLE: WAREHOUSESTREAGMASTER

TABLE: WARHOUSECMPNYBRANDSMASTER

Page 36 of 143

TABLE: WRHUSEDISCHARGGATEPAS

3.3.2

Class Diagrams

CLASS DIAGRAM

Class diagrams describe the structure of the system in terms of classes and objects. The servlet api class diagram will be as follows.

JSP: Implicit ObjectsPage 37 of 143

CLASS COLLABORATIVE DIAGRAME

Page 38 of 143

Page 39 of 143

Page 40 of 143

Page 41 of 143

Com panyD A O + c o n : C o n n e c t io n ~ f la g : b o o le a n = f a ls e

P r o d u c t D is c h a r g D A O + c o n : C o n n e c t io n ~ f la g : b o o le a n = f a ls e

< < c r e a t e > > + C o m p a n y D A O ( ) < < c r e a t e > > + P r o d u c t D is c h a r g D A O ( ) + a d d C o m p a n y ( a d d c o m p a n y m o +d ae d d Cp or om dp ua cnt yd M co hd ae rl)( :a db d p rleo ad nu c t d is c h m o d e l: P r o d u c t D is c h a r g M o d e l) : b o o le a n l: is oo + g e tC o m p a n y N a m e s (): C o re H a s h D epartM entD A O + c o n : C o n n e c t io n - f la g : b o o le a n < < c re a te > > + D e p a rtM e n tD A O () + g e tD e p a rt m e n ts (): C o re H a s h E m p lo y e e D A O ~ c o n : C o n n e c t io n = n u ll + g e t E m p lo y e e N a m e s ( ) : C o r e H a s h P ro d u ctD A O + c o n : C o n n e c t io n ~ f la g : b o o le a n = f a ls e

C o m p a n y B ra n d D A O + c o n : C o n n e c t io n ~ f la g : b o o le a n = f a ls e

+ ~ < +

< < c re a te > > + C o m p a n y B ra n d D A O () + a d d c o m p a n y b r a n d ( a d d c o m p a n y b r a n d m o d e l: C o m p a n y B r a n d M o d e l) : b o o le a n D e s ig n a t io n D A O + g e t B ra n d s (): C o re H a s h A b s tra c tD a t a A c c e s s O b je c t + c o n : C o n n e c t io n = n u ll B r n d P a k U n it P r ic e s D A O + m C o n : C o n n e c t io n - f la g : b o o le a n - m P r o p s : P r o p e r t ie s c o n : C o n n e c t io n < < c r e a t e > > + D e s ig n a t io n D A O ( ) f la g : b o o le a n = f a ls e + g e t P r o p e r t ie s ( ) : P r o p e r t ie s + g e t D e s ig n a t io n N a m e s ( ) : C o r e H a s h + s e t P r o p e r t ie s ( a P r o p s : P r o p e r t ie s ) < c r e a t e > > + B r n d P a k U n it P r ic e s D A O ( ) + g e t C o n n e c t io n ( ) : C o n n e c t io n a d d b r n d p a k u n it p r ic e ( a d d b r n d p k u n t m s t r p r is m o d e l: B r a n d P a c k a g e U n it M s t e r P r ic e s M o d e l) : b o o le a n + g e t S e q u e n c e I D ( t a b le N a m e : S t r in g , p k id : S t r in eg )c :u in itt y D A O S r PackageD A O ~ c o n : C o n n e c t io n + f la g : b o o le a n = f a ls e < < c r e a t e > > + P a c k a g e D A O () + a d d P a c k a g e ( a d d p a c k a g e m o d e l: P a c k a g e M o d e l) : b o o le a n + g e tP a c k a g e T y p e N a m e (): C o re H a s h P ro d u ctS to ra g e D A O + c o n : C o n n e c t io n ~ f la g : b o o le a n = f a ls e + c o n : C o n n e c t io n + f la g : b o o le a n = f a ls e

< < cre a te > > + P ro d u c tD A O () + a d d P r o d u c t ( a d d p r o d u c t m o d e l: P r o d u c t M o d e l) : b o o le + g e t P ro d u ct s (): C o re H a s h

< < c r e a t e > > + S e c u r it y D A O ( ) + a d d s e c u r it y ( a d d s e c u r it y m o d e l: S e c u r i t y M o d e l) : U n it D A O + c o n : C o n n e c t io n ~ f la g : b o o le a n = f a ls e

< < c r e a t e > > + U n it D A O ( ) + a d d u n it ( a d d u n it m o d e l: U n it M o d e l) : b o o le a n < < cre a te > > + P ro d u c tS to ra g e D A O () + g e t U n it N a m e s ( ) : C o r e H a s h + a d d p r o d u c t s t o r a g e ( a d d p r o d u c t s t r a g e m o d e l: P r o d u c t S t o r a g e M o d e l) : P r o d u c t S t o r a g e D e t a ils M o d e l + g e tS to ra g e T x Id s (): C o re H a s h S to ra g e In stru ctD A O + c o n : C o n n e c t io n + f la g : b o o le a n = f a ls e

P r o d u c t S t o r a g e D e t a ils D A O + c o n : C o n n e c t io n + f la g : b o o le a n = f a ls e

< < c re a te > > + S t o ra g e In s tru c tD A O () < duc + a d d s t r g in s t r c t ( a d d s t r a g in s t r c t m o d e l: S t o r a g e I n s l) : +b Po roo le a n t S t o r a g e D e t a ils D A O ( ) e> + g e t S t o r a g e I n s t r u c t io n T y p e N a m e ( ) : C o r e H a s h + a d d p r o d u c t s t r g d t ls ( a d d p r o d u c t s t r g d t ls m o d e l: P r o d P r o d u c t D is c h a r g e d D A O + c o n : C o n n e c t io n + f la g : b o o le a n = f a ls e < < c r e a t e > > + P r o d u c t D is c h a r g e d D A O ( ) + a d d p r d u c t d s c h r g ( a d d p r d u c t d s c h r g m o d e l: P r o d u c t D is c h a r g e d M o d e l) : P r o d u c t D + g e t D is c h a r g T x I d ( ) : C o r e H a s h

Page 42 of 143

Dynamic Models

Page 43 of 143

3.4

Dynamic Models

3.4.1

Sequence Diagrams

Page 44 of 143

1.ADMINISTRATOR

Authentication

Company Details

Brands Details

Package Type

Unit Details

Warehouses

Product and Storages

WarehousePayments

Product Discharges

Logout

: Administrator 1 : LoginCheck() If Fail 2 : Fail() 3 : AddCompanyDetails() 4 : ModifyCompanyDetails() If Success

5 : ViewCompanyDetails() 6 : AddBrands() 7 : UpdateBrands()

8 : ViewBrands() 9 : AddPackageTypes()

10 : ModifyPackageTypes()

11 : ViewPackagesTypes() 12 : AddUnitDetails()

13 : ModifyUnitDetails()

14 : ViewUnitDetails() 15 : AddWarehouses()

16 : ModifyWarehouses()

17 : ViewWareHouses() 18 : AddProducts() 19 : ModifyProducts() 20 : AddStorageDetails() 21 : ModifyStorageDetails()

22 : ViewAllProducts() 23 : ViewStorageDetails() 24 : PerformPaymentDetails() 25 : PerformProductDischarges()

26 : Logout()

27 : Login()

2.EMPLOYEE

Page 45 of 143

Athentication

Security

Warehouses

ProductStorage

WarehousePayments

ProductDischarges

Logout

: Employee 1 : LoginCheck() If Success If Fail 2 : Fail() 3 : Security()

4 : AddWarehouse() 5 : ModifyWarehouse()

6 : ViewWarehouse() 7 : AddProductStorage()

8 : ModifyProductStorage()

9 : ViewProductStorages() 10 : PerformWarehousePayments() 11 : PerformProductDischarges()

12 : Logout()

13 : Login()

3.USER

Page 46 of 143

C ompany

Product

PackageTy pes

W arehouse

BrandPackageUnitPriceList

: User 1 : ViewC ompany Details()

2 : ViewProductDetails()

3 : ViewPackageTy peDetails()

4 : ViewAllW arehouses()

5 : ViewAllBrandPackageUnitPriceList()

3.4.2

State chart Diagrams

1.Administrator

Page 47 of 143

authentication if fail

company Details

BrandDeatails

packageTypes

unitDetails

Warehouse

view/modify

product&stor...

payments

product Disch...

LogOut

2.Employee

Page 48 of 143

autehntic... if fail

security

warehouses

productsto...

view/modify

payments

productdis...

logout

3.userPage 49 of 143

company

product

packagetype

view

warehouse

brandpkg/pricel...

Page 50 of 143

3.4.3

Activity Diagrams

SERVLET CONTAINER ACTIVITY DIAGRAME:

Page 51 of 143

1.ADMINISTRATOR

Administrator

Login

Enter Username,Password

If Fail Check Username,password

If Success

Product

Company

Brands,PakageTypes And Units

Warehouses

AddProduct

ViewAllProduct

AddCompany

ViewAllCompanies

Brands

PackageTypes

Units

BrandPackagePriceList

AddWarehouses

ModifyWarehousesDetails

Page 52 of 143

Administrator

Login

Enter Username,password

If Fail Validation

If success

StorageInstructions

Employees

Security

ProductStorage

WarehousePayments

ProductDischarge

Page 53 of 143

2.EMPLOYEE:

Employee

Login

Validation

If Fail

FailSuccess

Home

Security

Storage

Payments

Discharge

Logout

Page 54 of 143

3.USER:

Users

Company

Products

PackageType

BrandPackageUnitPriceList

WareHouse

Page 55 of 143

System Design Document

Page 56 of 143

4. System Design Document 4.1 Subsystem Decomposition

1. User Registration. 2. Company Management. 3. Products Management. 4. Warehouse Management. 5. Payment Management. 6. Reports.

1.USERS REGISTRATIONUSERS The general users who can get cargo stations or warehouse general information and its location, services and contact details etc EMPLOYEE This employee plays main role in organization that he has to manage the security details mean maintaining vehicle check in date and time, check out date and time, driver name, number of people are enter into warehouse, vehicle number etc.Gate pass introducing to customers before leaving warehouse and he checks once again vehicle number, driver name, license number, number of people, etc.

2. COMPANY MANAGEMENT:

Page 57 of 143

These warehouse systems can stores different type of company products in cargo stations. When different type of product stores in different warehouses here we are concentrating which company item, the person who enters into warehouse with which type of package type ,unit type, storing expecting dates, vehicle number, check in time, driver name etc. if already existing storage is exist current how much of quantity will to raise all these details are collected from user by in charge of particular warehouse. 3. PRODUCTS MANAGMENT The administrator take the responsible for entering products, its details like its brands and its storage in charge employees details are managing and some

modification in product details like product description and images done by authorize person..

4. WAREHOUSE MANAGEMENT Companies are preferring to stores there item in their own warehouse or private sector warehouses to maintain their goods or cargoes in different storage types like some item may stores in colds places and other items may store at different places .These warehouse has to maintain its data like address details ,contact details ,storage type details and the in charge employee details who maintain data of warehouses. The administrative take care of maintain warehouse which stores different type of products(cargoes) with different brands with different type of

packages these package types like container ,some products stores in particular conditions like in temperature wise, should maintain warehouse details like how much of present stock available, existing stock quantity ,instructions how to store cargoes

Page 58 of 143

because in some condition two type of product may not keep together

causes

chemical actions and its store different company cargoes list as above mansion and he has to responsible to maintain storing of item into warehouse . When the particular company is willing to discharges their item they has to first fall consult the in charges of warehouses who observes users bill detail and then issues their products with gate passes by considering of vehicle number and security persons take care of warehouses by noticing of vehicle number, driver name ,license numbers, number ,vehicle R.C number, people enter at what time that is check in time and checkout time of vehicle with gate pass details by checking it the product discharges outside of warehouses. 5. PAYMENT MANAGEMENT All the Company who store there items in warehouses in has to charge the amount to warehouse administrator. The administrator collect information of payment type reasons, payment amount, amount paid, next dues date, that payment type may be cash / cheque / DD, in favor of administrator.

6. REPORTS: F. Products Report G. Company details Report H. Package, Brands and Unit type details I. Warehouse details J. Product storage status

Page 59 of 143

COMPONENT DIAGRAM

Page 60 of 143

Page 61 of 143

DEPLOYMENT DIAGRAMS

Page 62 of 143

Page 63 of 143

4.1

Design Goals

Page 64 of 143

1. Robustness: The system development must be able to maintain details of employee. 2. Reliability: The system development must be reliable. Hence there should not Be deviation in the observed behavior. 3.Security: The system development must be able to withstand malicious attacks. 4. Development Cost: The cost of developing the initial must be Low .The cost of the installing the system and training the users must be low. 5. Portability: The system developed must be easy to port to any other platform. 6. Readability: The code developed must be easy to port to any other platform. 7. Usability: The code developed must be reusable.

Page 65 of 143

Object Design Document

5. Object Design Document

5.1 Object Design ModelIn object design we link the application objects and components by finding additional object. These objects are called as final objects

Page 66 of 143

Object design includes four groups of activities 1. Reuse 2. Interface specification. 3. Restructuring. 4. Optimization.

1) Reuse: Off the self components identified during system design are used to help in the realization of each sub system. Classes libraries are additional components are selected for basic data structure and services. 2) Interface Specification: During this activity, the subsystem services identified during system design are specified in the terms of class interface, including operations 3) Structuring: Restructuring activities manipulate the system model to increase code reuse or meet other design goals .It includes Realize association like unidirectional ,bidirectional one-one ,one-many and many-many associations and reusability by taking abstract class like button class 4) Optimization: Optimization activities address performance requirements of the system model. This includes changing algorithms to respond to speed or memory

requirements .Optimization includes access path optimization by examining the attributes, operations and associations, identifying collapsing classes by identifying the classes

Page 67 of 143

Which are not usable so far and identify and then delay complex classes

Page 68 of 143

Front End and Back End Tools

Page 69 of 143

6. Front End and Back End Tool6.1 Details about Front End

HTMLHTML, an initialize of Hypertext Markup Language, is the predominant markup language for web pages. It provides a means to describe the structure of textbased information in a document by denoting certain text as headings, paragraphs, lists, and so on and to supplement that text with interactive forms, embedded images, and other objects. HTML is written in the form of labels (known as tags), surrounded by angle brackets. HTML can also describe, to some degree, the appearance and semantics of a document, and can include embedded scripting language code which can affect the behavior of web browsers and other HTML processors.

HTML is also often used to refer to content of the MIME type text/html or even more broadly as a generic term for HTML whether in its XML-descended form (such as XHTML 1.0 and later) or its form descended directly from SGML Hyper Text Markup Language Hypertext Markup Language (HTML), the languages of the World Wide Web (WWW), allows users to produces Web pages that include text, graphics and pointer to other Web pages (Hyperlinks). HTML is not a programming language but it is an application of ISO Standard 8879, SGML (Standard Generalized Markup Language), but specialized to hypertext

Page 70 of 143

and adapted to the Web. The idea behind Hypertext is that instead of reading text in rigid linear structure, we can easily jump from one point to another point. We can navigate through the information based on our interest and preference. A markup language is simply a series of elements, each delimited with special characters that define how text or other items enclosed within the elements should be displayed. Hyperlinks are underlined or emphasized works that load to other documents or some portions of the same document. HTML can be used to display any type of document on the host computer, which can be geographically at a different location. It is a versatile language and can be used on any platform or desktop. HTML provides tags (special codes) to make the document look attractive. HTML tags are not case-sensitive. Using graphics, fonts, different sizes, color, etc., can enhance the presentation of the document. Anything that is not a tag is part of the document itself.

Advantages

A HTML document is small and hence easy to send over the net. It is small because it does not include formatted information.

HTML is platform independent. HTML tags are not case-sensitive.

JavaScriptJavaScript is a script-based programming language that was developed by Netscape Communication Corporation. JavaScript was originally called Live Script and renamed as JavaScript to indicate its relationship with Java. JavaScript supports

Page 71 of 143

the development of both client and server components of Web-based applications. On the client side, it can be used to write programs that are executed by a Web browser within the context of a Web page. On the server side, it can be used to write Web server programs that can process information submitted by a Web browser and then update the browsers display accordingly Even though JavaScript supports both client and server Web programming, we prefer JavaScript at Client side programming since most of the browsers supports it. JavaScript is almost as easy to learn as HTML, and JavaScript statements can be included in HTML documents by enclosing the statements between a pair of scripting tags .. . JavaScript statements Here are a few things we can do with JavaScript:

Validate the contents of a form and make calculations. Add scrolling or changing messages to the Browsers status line. Animate images or rotate images that change when we move the mouse over them.

Detect the browser in use and display different content for different browsers. Detect installed plug-ins and notify the user if a plug-in is required. We can do much more with JavaScript, including creating entire application.

JavaScript Vs Java

Page 72 of 143

JavaScript and Java are entirely different languages. A few of the most glaring differences are:

Java applets are generally displayed in a box within the web document; JavaScript can affect any part of the Web document itself.

While JavaScript is best suited to simple applications and adding interactive features to Web pages; Java can be used for incredibly complex applications.

There are many other differences but the important thing to remember is that JavaScript and Java are separate languages. They are both useful for different things; in fact they can be used together to combine their advantages. Advantages

JavaScript can be used for Sever-side and Client-side scripting. It is more flexible than VBScript. JavaScript is the default scripting languages at Client-side since all the browsers supports it.

Java TechnologyInitially the language was called as oak but it was renamed as Java in 1995. The primary motivation of this language was the need for a platformindependent (i.e., architecture neutral) language that could be used to create software to be embedded in various consumer electronic devices. Java is a programmers language. Java is cohesive and consistent.

Page 73 of 143

Except for those constraints imposed by the Internet environment, Java gives the programmer, full control.

Finally, Java is to Internet programming where C was to system programming.

Importance of Java to the InternetJava has had a profound effect on the Internet. This is because; Java expands the Universe of objects that can move about freely in Cyberspace. In a network, two categories of objects are transmitted between the Server and the Personal computer. They are: Passive information and Dynamic active programs. The Dynamic, Selfexecuting programs cause serious problems in the areas of Security and probability. But, Java addresses those concerns and by doing so, has opened the door to an exciting new form of program called the Applet.

Java can be used to create two types of programsApplications and Applets: An application is a program that runs on our Computer under the operating system of that computer. It is more or less like one creating using C or C++. Javas ability to create Applets makes it important. An Applet is an application designed to be transmitted over the Internet and executed by a Java compatible web browser. An applet is actually a tiny Java program, dynamically downloaded across the network, just like an image. But the difference is, it is an intelligent program, not just a media file. It can react to the user input and dynamically change.

Page 74 of 143

Features of Java SecurityEvery time you that you download a normal program, you are risking a viral infection. Prior to Java, most users did not download executable programs frequently, and those who did scan them for viruses prior to execution. Most users still worried about the possibility of infecting their systems with a virus. In addition, another type of malicious program exists that must be guarded against. This type of program can gather private information, such as credit card numbers, bank account balances, and passwords. Java answers both these concerns by providing a firewall between a network application and your computer. When you use a Java-compatible Web browser, you can safely download Java applets without fear of virus infection or malicious intent.

PortabilityFor programs to be dynamically downloaded to all the various types of platforms connected to the Internet, some means of generating portable executable code is needed .As you will see, the same mechanism that helps ensure security also helps create portability. Indeed, Javas solution to these two problems is both elegant and efficient.

The Byte codeThe key that allows the Java to solve the security and portability problems is that the output of Java compiler is Byte code. Byte code is a highly optimized set of instructions designed to be executed by the Java run-time system, which is called the

Page 75 of 143

Java Virtual Machine (JVM). That is, in its standard form, the JVM is an interpreter for byte code. Translating a Java program into byte code helps makes it much easier to run a program in a wide variety of environments. The reason is, once the run-time package exists for a given system, any Java program can run on it. Although Java was designed for interpretation, there is technically nothing about Java that prevents on-the-fly compilation of byte code into native code. Sun has just completed its Just In Time (JIT) compiler for byte code. When the JIT compiler is a part of JVM, it compiles byte code into executable code in real time, on a piece-bypiece, demand basis. It is not possible to compile an entire Java program into executable code all at once, because Java performs various run-time checks that can be done only at run time. The JIT compiles code, as it is needed, during execution.

Java Virtual Machine (JVM)Beyond the language, there is the Java virtual machine. The Java virtual machine is an important element of the Java technology. The virtual machine can be embedded within a web browser or an operating system. Once a piece of Java code is loaded onto a machine, it is verified. As part of the loading process, a class loader is invoked and does byte code verification makes sure that the code thats has been generated by the compiler will not corrupt the machine that its loaded on. Byte code verification takes place at the end of the compilation process to make sure that is all accurate and correct. So byte code verification is integral to the compiling and executing of Java code. Overall Description

Page 76 of 143

Java Source

Java byte code.Class

JavaVM

java

Picture showing the development process of JAVA ProgramJava programming uses to produce byte codes and executes them. The first box indicates that the Java source code is located in a. Java file that is processed with a Java compiler called javac. The Java compiler produces a file called a. class file, which contains the byte code. The .Class file is then loaded across the network or loaded locally on your machine into the execution environment is the Java virtual machine, which interprets and executes the byte code.

Java ArchitectureJava architecture provides a portable, robust, high performing environment for development. Java provides portability by compiling the byte codes for the Java Virtual Machine, which is then interpreted on each platform by the run-time environment. Java is a dynamic system, able to load code when needed from a machine in the same room or across the planet.

Compilation of codeWhen you compile the code, the Java compiler creates machine code (called byte code) for a hypothetical machine called Java Virtual Machine (JVM). The JVM is supposed to execute the byte code. The JVM is created for overcoming the issue of

Page 77 of 143

portability. The code is written and compiled for one machine and interpreted on all machines. This machine is called Java Virtual Machine.

S o u r c e C o d e .. .. ..

J av a PC Compiler M acinto sh C ompil er S PARC Pl atf or m I nd ep en de nt) B yt e co de ( J ava I nter pret er ava PC) nter ava pret er nter pret Mac er into sh) Spa re) J ( I J I ( (

Compiler

Compiling and interpreting Java Source CodeDuring run-time the Java interpreter tricks the byte code file into thinking that it is running on a Java Virtual Machine. In reality this could be a Intel Pentium Windows 95 or Sun SARC station running Solaris or Apple Macintosh running system and all could receive code from any computer through Internet and run the Applets.

Simple

Page 78 of 143

Java was designed to be easy for the Professional programmer to learn and to use effectively. If you are an experienced C++ programmer, learning Java will be even easier. Because Java inherits the C/C++ syntax and many of the object oriented features of C++. Most of the confusing concepts from C++ are either left out of Java or implemented in a cleaner, more approachable manner. In Java there are a small number of clearly defined ways to accomplish a given task.

Object-OrientedJava was not designed to be source-code compatible with any other language. This allowed the Java team the freedom to design with a blank slate. One outcome of this was a clean usable, pragmatic approach to objects. The object model in Java is simple and easy to extend, while simple types, such as integers, are kept as highperformance non-objects.

RobustThe multi-platform environment of the Web places extraordinary demands on a program, because the program must execute reliably in a variety of systems. The ability to create robust programs was given a high priority in the design of Java. Java is strictly typed language; it checks your code at compile time and run time. Java virtually eliminates the problems of memory management and deallocation, which is completely automatic. In a well-written Java program, all run time errors can and should be managed by your program.

Java Database Connectivity What Is JDBC?

Page 79 of 143

JDBC is a Java API for executing SQL statements. (As a point of interest, JDBC is a trademarked name and is not an acronym; nevertheless, JDBC is often thought of as standing for Java Database Connectivity. It consists of a set of classes and interfaces written in the Java programming language. JDBC provides a standard API for tool/database developers and makes it possible to write database applications using a pure Java API. Using JDBC, it is easy to send SQL statements to virtually any relational database. One can write a single program using the JDBC API, and the program will be able to send SQL statements to the appropriate database. The combinations of Java and JDBC lets a programmer write it once and run it anywhere.

What Does JDBC Do?Simply put, JDBC makes it possible to do three things:

Establish a connection with a database Send SQL statements Process the results.

JDBC versus ODBC and other APIsAt this point, Microsoft's ODBC (Open Database Connectivity) API is that probably the most widely used programming interface for accessing relational databases. It offers the ability to connect to almost all databases on almost all platforms. So why not just use ODBC from Java? The answer is that you can use ODBC from Java, but this is best done with the help of JDBC in the form of the JDBC-ODBC Bridge, which we

Page 80 of 143

will cover shortly. The question now becomes "Why do you need JDBC?" There are several answers to this question: 1. ODBC is not appropriate for direct use from Java because it uses a C interface. Calls from Java to native C code have a number of drawbacks in the security, implementation, robustness, and automatic portability of applications. 2. A literal translation of the ODBC C API into a Java API would not be desirable. For example, Java has no pointers, and ODBC makes copious use of them, including the notoriously error-prone generic pointer "void *". You can think of JDBC as ODBC translated into an object-oriented interface that is natural for Java programmers. 3. ODBC is hard to learn. It mixes simple and advanced features together, and it has complex options even for simple queries. JDBC, on the other hand, was designed to keep simple things simple while allowing more advanced capabilities where required. 4. A Java API like JDBC is needed in order to enable a "pure Java" solution. When ODBC is used, the ODBC driver manager and drivers must be manually installed on every client machine. When the JDBC driver is written completely in Java, however, JDBC code is automatically installable, portable, and secure on all Java platforms from network computers to mainframes.

Page 81 of 143

The JDBC API supports both two-tier and three-tier models for database access.In the two-tier model, a Java applet or application talks directly tothe database. This requires a JDBC driver that can communicate with the particular database management system being accessed. A user's SQL statements are delivered to the database, and the results of those statements are sent back to the user. The database may be located on another machine to which the user is connected via a network. This is referred to as a client/server configuration, with the user's machine as the

JAVA Application

Client machine

JDBC DBMS-proprietary protocol

Database server

DBMS

client, and the machine housing the database as the server. The network can be an Intranet, which, for example, connects employees within a corporation, or it can be the Internet.

Page 82 of 143

Java applet or Html browser

Client machine (GUI)

HTTP, RMI, or CORBA calls

Application Server (Java) JDBC

Server machine (business Logic) DBMS-proprietary protocol

Database server

DBMS

In the three-tier model, commands are sent to a "middle tier" of services, which then send SQL statements to the database. The database processes the SQL statements and sends the results back to the middle tier, which then sends them to the user. MIS directors find the three-tier model very attractive because the middle tier makes it possible to maintain control over access and the kinds of updates that can be made to corporate data. Another advantage is that when there is a middle tier, the user can employ an easy-to-use higher-level API which is translated by the middle tier into the appropriate low-level calls. Finally, in many cases the three-tier architecture can provide performance advantages. Until now the middle tier has typically been written in languages such as C or C++, which offer fast performance. However, with the introduction of optimizing compilers that translate

Page 83 of 143

Java byte code into efficient machine-specific code, it is becoming practical to implement the middle tier in Java. This is a big plus, making it possible to take advantage of Java's robustness, multithreading, and security features. JDBC is important to allow database access from a Java middle tier.

Page 84 of 143

JDBC Driver TypesThe JDBC drivers that we are aware of at this time fit into one of four categories: JDBC-ODBC bridge plus ODBC driver Native-API partly-Java driver JDBC-Net pure Java driver Native-protocol pure Java driver

JDBC-ODBC BridgeIf possible, use a Pure Java JDBC driver instead of the Bridge and an ODBC driver. This completely eliminates the client configuration required by ODBC. It also eliminates the potential that the Java VM could be corrupted by an error in the native code brought in by the Bridge (that is, the Bridge native library, the ODBC driver manager library, the ODBC driver library, and the database client library).

What Is the JDBC- ODBC Bridge?The JDBC-ODBC Bridge is a JDBC driver, which implements JDBC operations by translating them into ODBC operations. To ODBC it appears as a normal application program. The Bridge implements JDBC for any database for which an ODBC driver is available. The Bridge is implemented as the Sun.jdbc.odbc Java package and contains a native library used to access ODBC. The Bridge is a joint development of Innersole and Java Soft.

6.2Details about Back End

Page 85 of 143

Database:A database management system (DBMS) is computer software designed for the purpose of managing databases, a large set of structured data, and run operations on the data requested by numerous users. Typical examples of DBMSs include Oracle, DB2, Microsoft Access, Microsoft SQL Server, Firebird, PostgreSQL, MySQL, SQLite, FileMaker and Sybase Adaptive Server Enterprise. DBMSs are typically used by Database administrators in the creation of Database systems. Typical examples of DBMS use include accounting, human resources and customer support systems.

Originally found only in large companies with the computer hardware needed to support large data sets, DBMSs have more recently emerged as a fairly standard part of any company back office.

Description:A DBMS is a complex set of software programs that controls the organization, storage, management, and retrieval of data in a database. A DBMS includes: A modeling language to define the schema of each database hosted in the DBMS, according to the DBMS data model. The four most common types of organizations are the hierarchical, network, relational and object models. Inverted lists and other methods are also used. A given database management system may provide one or more of the four models. The optimal structure depends on the natural organization of the application's

Page 86 of 143

data, and on the application's requirements (which include transaction rate (speed), reliability, maintainability, scalability, and cost). The dominant model in use today is the ad hoc one embedded in SQL, despite the objections of purists who believe this model is a corruption of the relational model, since it violates several of its fundamental principles for the sake of practicality and performance. Many DBMSs also support the Open Database Connectivity API that supports a standard way for programmers to access the DBMS. Data structures (fields, records, files and objects) optimized to deal with very large amounts of data stored on a permanent data storage device (which implies relatively slow access compared to volatile main memory).

A database query language and report writer to allow users to interactively interrogate the database, analyze its data and update it according to the users privileges on data. It also controls the security of the database. Data security prevents unauthorized users from viewing or updating the database. Using passwords, users are allowed access to the entire database or subsets of it called subschemas. For example, an employee database can contain all the data about an individual employee, but one group of users may be authorized to view only payroll data, while others are allowed access to only work history and medical data. If the DBMS provides a way to interactively enter and update the database, as well as interrogate it, this capability allows for managing personal databases.

Page 87 of 143

However, it may not leave an audit trail of actions or provide the kinds of controls necessary in a multi-user organization. These controls are only available when a set of application programs are customized for each data entry and updating function.

A transaction mechanism, that ideally would guarantee the ACID properties, in order to ensure data integrity, despite concurrent user accesses (concurrency control), and faults (fault tolerance). It also maintains the integrity of the data in the database. The DBMS can maintain the integrity of the database by not allowing more than one user to update the same record at the same time. The DBMS can help prevent duplicate records via unique index constraints; for example, no two customers with the same customer numbers (key fields) can be entered into the database. See ACID properties for more information (Redundancy avoidance).

The DBMS accepts requests for data from the application program and instructs the operating system to transfer the appropriate data. When a DBMS is used, information systems can be changed much more easily as the organization's information requirements change. New categories of data can be added to the database without disruption to the existing system. Organizations may use one kind of DBMS for daily transaction processing and then move the detail onto another computer that uses another DBMS better suited for random inquiries and analysis. Overall systems design decisions are performed by

Page 88 of 143

data administrators and systems analysts. Detailed database design is performed by database administrators. Database servers are specially designed computers that hold the actual databases and run only the DBMS and related software. Database servers are usually multiprocessor computers, with RAID disk arrays used for stable storage. Connected to one or more servers via a high-speed channel, hardware database accelerators are also used in large volume transaction processing environments. DBMSs are found at the heart of most database applications. Sometimes DBMSs are built around a private multitasking kernel with built-in networking support although nowadays these functions are left to the operating system.

SQLStructured Query Language (SQL) is the language used to manipulate relational databases. SQL is tied very closely with the relational model.

In the relational model, data is stored in structures called relations or tables. SQL statements are issued for the purpose of:

Data definition: Defining tables and structures in the database (DDL used tocreate, alter and drop schema objects such as tables and indexes).

Data manipulation: Used to manipulate the data within those schemaobjects (DML Inserting, Updating, Deleting the data, and Querying the Database).

A schema is a collection of database objects that can include: tables, views, indexes and sequences

Page 89 of 143

List of SQL statements that can be issued against an Oracle database schema are:

ALTER - Change an existing table, view or index definition (DDL) AUDIT - Track the changes made to a table (DDL) COMMENT - Add a comment to a table or column in a table (DDL) COMMIT - Make all recent changes permanent (DML - transactional) CREATE - Create new database objects such as tables or views (DDL) DELETE - Delete rows from a database table (DML) DROP - Drop a database object such as a table, view or index (DDL) GRANT - Allow another user to access database objects such as tables or views (DDL) INSERT - Insert new data into a database table (DML) No AUDIT - Turn off the auditing function (DDL) REVOKE - Disallow a user access to database objects such as tables and views (DDL) ROLLBACK - Undo any recent changes to the database (DML - Transactional) SELECT - Retrieve data from a database table (DML) TRUNCATE - Delete all rows from a database table (can not be rolled back) (DML) UPDATE - Change the values of some data items in a database table (DML)

Page 90 of 143

SERVLETS IntroductionThe Java web server is Java Softs own web Server. The Java web server is just a part of a larger framework, intended to provide you not just with a web server, but also with tools. To build customized network servers for any Internet or Intranet client/server system. Servlets are to a web server, how applets are to the browser.

About ServletsServlets provide a Java-based solution used to address the problems currently associated with doing server-side programming, including inextensible scripting solutions, platform-specific APIs, and incomplete interfaces. Servlets are objects that conform to a specific interface that can be plugged into a Java-based server. Servlets are to the server-side what applets are to the clientside - object byte codes that can be dynamically loaded off the net. They differ from applets in that they are faceless objects (without graphics or a GUI component). They serve as platform independent, dynamically loadable, pluggable helper byte code objects on the server side that can be used to dynamically extend server-side functionality. For example, an HTTP Servlets can be used to generate dynamic HTML content. When you use Servlets to do dynamic content you get the following advantages:

Theyre faster and cleaner than CGI scripts They use a standard API (the Servlets API) They provide all the advantages of Java (run on a variety of servers without needing to be rewritten).

Page 91 of 143

Attractiveness of Servlets There are many features of Servlets that make them easy and attractive to use. These include:

Easily configured using the GUI-based Admin tool Can be loaded and invoked from a local disk or remotely across the network. Can be linked together, or chained, so that one Servlets can call another Servlets, or several Servlets in sequence.

Can be called dynamically from within HTML pages, using server-side include tags.

Are secure - even when downloading across the network, the Servlets security model and Servlets sandbox protect your system from unfriendly behavior.

Advantages of the Servlet APIOne of the great advantages of the Servlet API is protocol independence. It assumes nothing about: The protocol being used to transmit on the net How it is loaded The server environment it will be running in

These qualities are important, because it allows the Servlet API to be embedded in many different kinds of servers. There are other advantages to the Servlet API as well. These include: Its extensible - you can inherit all your functionality from the base classes made available to you.

Page 92 of 143

Its simple, small, and easy to use.

Features of Servlets: Servlets are persistent. Servlet are loaded only by the web server and can maintain services between requests. Servlets are fast. Since Servlets only need to be loaded once, they offer much better performance over their CGI counterparts. Servlets are platform independent. Servlets are extensible. Java is a robust, object-oriented programming language, which easily can be extended to suit your needs Servlets are secure. Servlets can be used with a variety of clients.

Loading Servlets:Servlets can be loaded from three places

Page 93 of 143

From a directory that is on the CLASSPATH. The CLASSPATH of

the

JavaWebServer includes service root/classes/ which is where the system classes reside. From the