Project Report ON: Library Management System
Project Report ON: Library Management System
ON
LIBRARY MANAGEMENT SYSTEM
SUBMITTED IN PARTIAL FULFILLMENT OF THE
REQUIREMENT FOR THE AWARD OF
THE DEGREE IN MASTER OF SCIENCE
(COMPUTER SCIENCE)
Session : 2019-21
I would like to acknowledge my sincere thanks towards my college and its Computer
Science Faculties for their valuable guidance and suggestions that have resulted in
successful completion of project. I would like to give my sincere thanks to Mrs.
Poonam under whose guidance this project completed.
I am grateful to all those who have directly or indirectly helped me in completion of the
project.
Bhawna
M.Sc. (C.S) 4th Sem.
Roll No. 3065720020
Department of Computer Science Certificate
This is to certify that Bhawna Roll No. 3065720020, Class - M.Sc (Computer Science) 4 th
Sem. has carried out the project work titled “Library Management System” under the
supervision of Mrs. Poonam.
This project work is originally work carried out by the student and has not been submitted to
any other college/institute to the best of knowledge.
Mrs. Poonam
Supervisor
TABLE OF CONTENTS
1. Introduction
2. Analysis
3. Selected Software
4. Design
4.2 Normalization
6.2 Validations
7. Conclusion
8. Scope for Expansion
9. Bibliography
INTRODUCTION
Virtual Private Network (VPN)
This paper deals with the upcoming technology, VPN - Virtual Private
between remote places via a secured network thus paving way for Data
Security
The VPN has the ability of providing connection between the user
(client) & the server of the organization not within the workplace itself but
from home too with the data being transferred & received in a highly
secured way. For example Telecommuters and those who travel often might
find VPNs to be a more convenient way to stay "plugged in" to the corporate
Intranet.
models.
VPN connection taking into consideration the Key Aspects of VPN namely,
Data Authentication
Data Integrity
Data Confidentiality
Each stage explains of the ways in which these get invoked. Hitherto
the Architecture of the same along with its types has been discussed. The
role of the various Protocols namely PPTP, L2TP and IPSEC are clearly
LAN-to-LAN internetworking
certificates of authenticity.
guarantee that the two parties exchanging information are really who they
has ever issued and information on their status: valid, expired, or revoked.
Evolution of vpn:
information from one place to another namely in the case of a WAN where
there was every single possibility of the data being hacked midway between
the two terminals. Further this security measure involved a great deal of
money if we were to use a long distance leased line , both these factors
concept of using a public network say for example the ISDN invoking some
this may require a long distance call, but in many cases a local
A more subtle way that VPNs may lower costs is through offloading
of the support burden. With VPNs, the service provider rather than the
organization must support dial-up access for example. Service providers can
in theory charge much less for their support than it costs a company
thousands of customers.
Project formulation
the leading technologies at present and has attracted the attention of many
user (client) & the server of the organization not within the workplace itself
but even from home too with the data being transferred & received in a
highly secured way. For example Telecommuters and those who travel often
might find VPNs to be a more convenient way to stay "plugged in" to the
corporate Intranet.
certain key points that have got to be remembered throughout the process.
These stand as pillars to make the VPN the “Technology most wanted” at
present. They include Data Integrity: 1. the condition existing when data is
unchanged from its source and has not been accidentally or maliciously
recipient's public key is used to encrypt the message content. The recipient
(i.e., the recipient whose private key is paired with the public key used to
recipient by placing the key in the encrypted-data of the message token for
that recipient. The key may also be distributed by some other means (e.g.,
by prior agreement).
information that may be derived from its observation. This service counters
equipment or information.
MODULAR DESCRIPTION
modules
Administration module
Marketing module
Training module
Office details
Staff details
Office details
Enquiry
Student Registration
Salary details
Staff Details
Staff attendance
Adding Clients
Client list
Placement details
Course details
Project training
J2EE Training
Software Testing
Networking
List of projects
PROJECT DEVELOPMENT
Requirement analysis
Software specification
Operating System : Windows XP & above
server
Hardware specification
Hard disk : 80 GB
Drive summary
Floppy Drive : 1.44 MB fdd
CDROM : 52 X
System Analysis
Feasibility study
economic feasibility.
is solely responsible for the client privileges. Also the clients receives their
status in the organization. Any client in the network can access the server
If the user is certified he can access the modules other than that is forbidden
can be done by
for that particular organization and hence most suitable but considering the
cost involved is so high that the need for alter nature is a must.
Dialup connection
amount of data that can transferred is less switch on router user mode
prompt.
Frame Relay
involved is less. But the bandwidth divided among the organizations is not
effectively used.
Electronic Mail
In this case the company has to relay on the internet for the data
transfer. The information on the internet can be easily hacked by hackers and
SYSTEM
PROPOSED SYSTEM
a highly secure way. This process a router, ATM switch and internet to
sites.
software is divided into two the Server side or the Head Office program and
the Client side or the Branch Office program. The Client comprises of the
“Data Collecting Forms” and the Server side comprises of the “Report Box”
algorithm. When received by a client, the bit stream will be decrypted using
a public key and a private key pair. This decrypted message will then be
provided by the Server administrator who is running the server. This project
deeply the topic of data encryption and securities. Second, it allows the
ENHANCEMENT MODELS :
refers to the inclusion of new clients within the network. If this provision is
not provided the whole of the network may prove to be of little use in future
Remote Back up Server – This extends its way out to creating a back up for
to the server( vice-versa) and the response of the same to it.This proves to be
keep track of all the activities done by every single individual or client
within the network. This helps in avoiding the misuse of the systems
Providing Certification - In order for the two (or more) LANs to interact
either user level or the server level or both so as to provide security. This has
has reached the correct destination and that too without any error in the
signals back to the front end once the data have reached the destination . Our
task here is to generate a code which shall verify if the data have been
History of java:
Java language was developed by James Gosling and his team at sun
micro systems and released formally in 1995. Its former name is oak. Java
Development Kit 1.0 was released in 1996. To popularize java and is freely
available on Internet.
Overview of java:
language. Java programs are compiled by the java compiler into Byte Codes
which are secure and portable across different platforms. These byte codes
Jvm verifies these byte codes when downloaded by the browser for
integrity. Jvm available for almost all OS. JVM converts these byte codes
Features of java:
programming.
programming language. Internet users can use java to create applet programs
and run them locally using java enabled browser search as hot java. Applets
can be downloaded from remote machine via internet and run it on local
machine.
web pages that provide both information and controls. We can navigate to a
new web page in any direction. This is made possible worth HTML java was
animation graphics, games and other special effect. The web has become
more dynamic and interactive with support of java. We can run a java
Java Environment:
Java environment includes a large no. of tools which are part of the
methods, and interfaces grouped into packages forms part of java standard
library (JSL).
Java Architecture:
byte codes for the java virtual machine which are then interpreted on each
solid code.
Java Virtual Machine:
When we compile the code, java compiler creates machine code (byte
code) for a hypothetical machine called java virtual machine (jvm). The jvm
will execute the byte code and overcomes the issue of portability. The code
is written and compile for one machine and interpreted all other machines.
About HTML:
HTML (hyper text markup language) is a language used to
create hyper text documents that have hyper links embedded in them. It
mark up tags to help format the document for subsequent display to a reader.
platform independent. WWW (World Wide Web) pages are written using
HTML. HTML tags control in part the representation of the WWW page
when view with web browser. The browser interprets HTML tags in the web
Netscape
Internet Explorer
JavaDataBaseConnectivity (JDBC)
The JDBC 1.0 API provided result sets that had the ability to scroll in
a forward directionally. Scrollable result sets allow for more flexibility in the
processing of results by providing both forward and backward movement
through their contents. In addition, scrollable result sets allow for relative
and absolute positioning. For example, it’s possible to move to the fourth
row in a scrollable result set directly, or to move directly to the third row
following the current row, provided the row exists. The JDBC API allows
objects (Java objects) and a mapping for SQL99 data types such as binary
large objects, and structured types, has been added to the JDBC API. An
application may also customize the map-ping of SQL99 structured types into
Row sets:
As its name implies, a row set encapsulates a set of rows. A row set
may or may not maintain an open database connection. When a row set is
‘disconnected’ from its data source, updates performed on the row set are
control algorithm. Row sets add support to the JDBC API for the JavaBeans
construct an application.
only and uses read-only concurrency. No performance hints are given by the
example, so the driver is free to do whatever it thinks will result in the best
is used for the result set that is created. Note that this code is just written
using the JDBC 1.0 API, and that it produces the same type of result set that
Connection con =
DriverManager.getConnection("jdbc:my_subprotocol:my_subname");
transactional applications for the enterprise and leverage the speed, security,
designed, built, and produced for less money, faster, and with fewer
transaction control. Not only can you deliver innovative customer solutions
one vendor.
you are a new or an experienced enterprise developer, you should find the
a good place to start. Here you will learn the J2EE architecture, become
acquainted with important terms and concepts, and find out how to
tiers described in the bullet list below. The J2EE application parts shown in
EIS server
three different locations: client machines, J2EE server machine, and the
run in this way extend the standard two-tiered client and server model by
into a J2EE application with its related classes and files and communicates
with each other components. The J2EE specification defines the following
J2EE components:
The difference when you work with the J2EE platform, is J2EE
components are assembled into a J2EE application, verified that they are
to production where they are run and managed by the J2EE server.
user(client) & the server of the organization not within the workplace itself
but even from home too with the data being transferred & received in a
which aid in fulfilling all the KeyAspects necessary for VPN discussed
previously.
People generally associate PPTP with Microsoft because nearly all flavors of
Windows include built-in support for the protocol. The initial releases of
experts claimed were too weak for serious use. Microsoft continues to
encryption and authentication. Two products that both fully comply with the
on L2F, the best features of it and PPTP were combined to create new
standard called L2TP. L2TP exists at the data link layer (layer two) in the
encryption scheme within L2TP or PPTP. IPsec exists at the network layer
(layer three) in OSI unlike the SSL and TLS which exist only on the
communication link.
Client and the Server or between two Routers . The former case is called the
The Transport Mode enforces the IPsec policies for traffic between
systems and supports Windows 2000 security. This is the default mode for
IPsec.
The Tunnel Mode enforces IPsec policies for all Internet traffic and
point security and specifies tunnel end point at both the Routers.
Step 1. The remote user dials into their local ISP and logs into the ISP’s
network as usual.
Step 2. When connectivity to the corporate network is desired, the user
initiates a tunnel request to the destination Security server on the corporate
network. The Security server authenticates the user and creates the other end
of tunnel.
Step 3. The user then sends data through the tunnel which encrypted by the
VPN software before being sent over the ISP connection.
Step 4. The destination Security server receives the encrypted data and
decrypts. The Security server then forwards the decrypted data packets onto
the corporate network. Any information sent back to the Remote user is also
encrypted before being sent over the Internet.
The figure below illustrates that VPN software can be used from any
location through any existing ISP’s dial-in service.
Certificate Authority:
security system to guarantee that the two parties exchanging information are
certificate can include its owner's public key and name, the expiration date
them once it determines that the request is genuine. (There may also be the
has issued. Any user should also be able to look up a certificate by user
advantageous for organizations to issue their own certificates for their own
members of staff. In such an instance, the company itself is the CA. In order
for these certificates to be trusted by third parties, the company will itself
or is fired
valid. It is nothing more than a list of digital certificate serial numbers stored
contain additional information such as the reason for revocation. If the serial
PKI
PKI stands for Public Key Infrastructure. It is the software used to manage
keys is used to encrypt a message that can only be decrypted by the other
related key. One is kept secret by the owner while the other is made public.
Routers
Routers are devices that inter connect complex LAN’s and WAN’s
technique for routing data.The routers can handle large networks. The
based on which the routing decisions are made. The routing table can be
built using.
Static Routing
This is done by entering the CLI command line interface)
Dynamic Routing
IGRP are some dynamic routing protocols.
Encryption
Strong authentication
Address translation for security
Router configuration:
This involves the analysis of all the client and servers so as to identify
the various IP addresses and then configure them into the router by means of
within the network. Here the configuration refers to the preparing of the
SERVER PROCESS
The server is dedicated for the application and contains the entire list
of clients. It provides the clients the to access the modules only if they
receive certificates.
examining the status of the clients with respect to management. The users
The clients receive the certificate ID if they are authorized. Else the request
will be rejected.
CLIENT LOGIN
ENQUIRY TABLE
CLIENT DETAILS
REGISTRATION
SALARY DETAILS
TRAINING
Sends the
Client Request Remote server is invoked
Router by the client and responds
to Client
DFD Level 2:
Overall module:
ADMIN LOGIN
MARKETING LOGIN
SERVER
TRAINING LOGIN
User module
Client Server DB
Certificate
Login
Admin module
Admin login
Office
Staff
details
Admin main
Enquiry
Attendance
Registration
Course details
Salary details
Marketing module:
Marketing login
Marketing main
Client details
Add client
J2EE
TRAINING MODULE BATCH
CALL
COURSE CENTER
DETAIL
S/W
TESTING
NETWORKING
ER-Diagram:
System Testing
generation. Once the source code has been generated the program should be
executed before the customer gets it with the specific intent of finding and
removing all errors, tests must be conducted systematically and tests must be
errors.
software does not fail, i.e. it will run according to the speciation and in the
way the users expects. Preparation of the data plays a vital role in the system
testing. Different set of data are generated and the system under study is
tested using data. While testing using data errors are again uncovered and
Unit Testing
Integration Testing
Validation Testing
Output Testing
Unit Testing
design and the module. This is known as module testing. Each module is
connecting, spy mode activity, client system controls are tested separately.
connected with their required clients. Similarly the spy mode activity
module and client system controls modules should be tested. Each and
software architecture. Data can be lost across the interfaces; one module
been displayed and whether the desktop is connected. Again it checks for
the remote client for the proper continues signals. In this project all the
Validation Testing
been constructed. The validation that has been identified such as project
team and bug administration has been tested. This test provides the final
Output testing
No system could be useful it does not produce the required output in
the specific format. The outputs generated or displayed by the system under
consideration are tested along the users about the format required by them.
User acceptance of the system is the key factor of success. The system
touch with the prospective system users at time of developing and making
System implementation
The final and most important phase I the system life cycle is the
system.
found out initially. Next the system is properly tested and at the same time
following formalities.
Careful planning
MAIN
<html>
<body bgcolor="pink">
<form method="post" action="secure.jsp">
<center>
<h3>VIRTUAL PRIVATE NETWORK </H3>
<BR>
<h2>Login Form</h2>
<br>
<table cellspacing="30">
<tr><td>Login</td><td><input type="text" name="user"></td></tr>
</td></tr>
<tr><td>Password</td><td><input type="password"
name="pass"></td></tr>
<tr><td><input type="submit" value="Submit"></td><td><input
type="reset" value="Reset"><tr>
</table>
</center>
</form>
</body>
</html>
CERTIFICATE
<%@page import="java.sql.*"%>
<%
String user=request.getParameter("user");
String pass=request.getParameter("pass");
String id;
System.out.println(pass);
Connection con=null;
PreparedStatement pr=null;
try
{
Class.forName("sun.jdbc.odbc.JdbcOdbcDriver");
con=DriverManager.getConnection("jdbc:odbc:central");
pr=con.prepareStatement("select cid from cert where pwd=? and name=?");
pr.setString(1,pass);
pr.setString(2,user);
ResultSet rs=pr.executeQuery();
if(rs.next())
{
String cid = rs.getString(1);
System.out.println(cid);
%>
<jsp:forward page="id.jsp?id=<>" />
<%
System.out.println(rs.getString(1));
}
con.close();
}
catch(Exception ae)
{
out.println("Exception in Login form" +ae);
}
%>
</body>
</html>
CID
<html>
<head> cer </head>
<body>
certificate
<% String id=request.getParameter("id");
System.out.println(id);
%>
</form>
</body>
</html>
LOGIN
<html>
<body bgcolor="Peachpuff">
<form method="post" action="reg.jsp">
<center>
<h3>CENTRALIZED MANAGEMENT SYSTEM </H3>
<BR>
<h2>Login Form</h2>
<br>
<table cellspacing="30">
<tr><td>Login</td><td><select name="login">
<option value="Administrator">Administrator</option>
<option value="Marketing">Marketing</option>
<option value="Faculty">Faculty</option>
</select></td></tr>
<tr><td>Password</td><td><input type="password"
name="pass"></td></tr>
<tr><td><input type="submit" value="Submit"></td><td><input
type="reset" value="Reset"><tr>
</table>
</center>
</body>
</html>
LOGIN.JSP
<%@page import="java.sql.*"%>
<%
String log=request.getParameter("login");
String pass=request.getParameter("pass");
Connection con=null;
PreparedStatement pr=null;
try
{
Class.forName("sun.jdbc.odbc.JdbcOdbcDriver");
con=DriverManager.getConnection("jdbc:odbc:central");
pr=con.prepareStatement("select username from login1 where
password=?");
pr.setString(1,pass);
ResultSet rs=pr.executeQuery();
rs.next();
System.out.println(rs.getString(1));
System.out.println(log);
String s1=rs.getString(1);
System.out.println("before");
if(s1.equals(log))
{
System.out.println("a");
%>
<jsp:forward page="Admin.html"/>
<%
}
else
{
System.out.println("b");
%>
<jsp:forward page="Marketing.html"/>
<%
}
con.close();
}
catch(Exception ae)
{
out.println("Exception in Login form" +ae);
}
%>
</body>
</html>
ADMIN
<html>
<body bgcolor="Peachpuff" link="blue" alink="black">
<input type=button
name=b1> <font
size=5><b>Office</b></font>
<ul>
<font size=4>
<li><b><a href="Enquiry1.html">Enquiry form</a></b><br></li>
<br>
<li><b><a href="Registration1.html">Registration form</a></b><br></li>
<br>
<li><b><a href="Course1.html">Course and fees details</a></b><br></li>
<br>
<li><b><a href="Salary.html">Salary details</a></b><br></li>
</font>
</ul>
<br>
<input type=button
name=b2> <font
size=5><b>Staff</b></font>
<ul>
<font size=4>
<li><b><a href="staffattendance.html">Attendance</a></b><br></li>
<br>
</font>
</ul>
</body>
</html>
REGISTRATION
<%@page import="java.sql.*"%>
<%
String log=request.getParameter("login");
String pass=request.getParameter("pass");
Connection con=null;
PreparedStatement pr=null;
</body>
</html>
REGISTRATION 1
<%@page import="java.sql.*"%>
<html>
<body bgcolor="Peachpuff">
<CENTER><B><h3> J2EE BATCH I STUDENT LIST </H3>
<H4>TIME 10.AM TO 12.PM </H4></B></CENTER>
<CENTER>
<table BORDER="1" cellpadding="10">
<tr><td>RegNo</td><td>Name</td><td>Course</td><tr>
<%
try
{
Connection con=null;
Statement stat=null;
ResultSet rs=null;
Class.forName("sun.jdbc.odbc.JdbcOdbcDriver");
con=DriverManager.getConnection("jdbc:odbc:central");
stat=con.createStatement();
rs=stat.executeQuery("select regno,name,coursename from registration
where coursename='J2EE' and batchtimings='10am to 12pm'");
while(rs.next())
{
%>
<tr><td><%=rs.getString(1)%></td>
<td><%=rs.getString(2)%></td>
<td><%=rs.getString(3)%></td></tr>
<%
}
}
catch(Exception e)
{
out.println("error");
}
%>
</table>
</body>
</html>
ADDPALCEMENT.JAVA
package centre;
import java.util.*;
import java.sql.*;
import java.lang.*;
public class addplacement
{
public Connection con=null;
try
{
Class.forName("sun.jdbc.odbc.JdbcOdbcDriver");
public void insert()
{
try
{
Query="insert into PlacementDetails values(' "+name+" ',' "+placement+" ','
"+company+" ',' "+person+" ',' "+dop+" ')";
st=con.createStatement();
st.executeQuery(Query);
}catch(Exception e){}
}
}
Screenshots
OUTPUT
CLIENT LOGIN
ADMIN PAGE
ENQUIRY
REGISTRATION
COURSE DETAILS
SALARY
MARKETING
ADD CLIENT
PLACEMENT
J2EE TRAINING
PROJECTS
CONCLUSION
Data Security
The VPN has the ability of providing connection between the user
(client) & the server of the organization not within the workplace itself but
from home too with the data being transferred & received in a highly
secured way.
Websites
www.internetwk.com
www.bitpipe.com
www.howstuffworks.com
www.securitydogs.com
www.acronymfinder.com