1.1 Overview of Online Shopping
1.1 Overview of Online Shopping
1.1 Overview of Online Shopping
INTRODUCTION
1
The application was designed into two modules
1. Buy module
2. Database module
The Buy module is used for the customers who wish to buy the articles. The
database module is for the storekeepers who maintains and updates the information
pertaining to the articles and those of the customers.
The end user of this product is a departmental store where the application is
hosted on the web and the administrator maintains the database. The application
which is deployed at the customer database, the details of the items are brought
forward from the database for the customer view based on the selection through the
menu and the database of all the products are updated at the end of each
transaction.
Data entry into the application can be done through various screens designed
for various levels of users. Once the authorized personnel feed the relevant data
into the system, several reports could be generated as per the security.
2
CHAPTER 2
LITERATURE REVIEW
a) Auction-style listings allow the seller to offer one or more items for sale
for a specified number of days. The seller can establish a reserve price.
b) Fixed price format allows the seller to offer one or more items for sale
at a Buy It Now price. Buyers who agree to pay that price win the auction
immediately without submitting a bid.
3
Shop online:
4
A digital signature is a type of asymmetric cryptography used to simulate the
security properties of a handwritten signature on paper. Digital signature schemes
consist of at least three algorithms: a key generation algorithm, a signature
algorithm, and a verification algorithm. A signature provides authentication of a
"message". Messages may be anything, from electronic mail to a contract, or even
a message sent in a more complicated cryptographic protocol.
Digital signatures are often used to implement electronic signatures, a broader term
that refers to any electronic data that carries the intent of a signature, but not all
electronic signatures use digital signatures. In some countries, including the and in
the electronic signatures have legal significance. However, laws concerning
electronic signatures do not always make clear their applicability towards
cryptographic digital signatures, leaving their legal importance somewhat
unspecified.
5
· A signature verifying algorithm which given a message, public key and a
signature, either accepts or rejects.
Two main properties are required. First, a signature generated from a fixed
message and fixed private key should verify on that message and the
corresponding public key. Secondly, it should be computationally infeasible to
generate a valid signature for a party who does not possess the private key.
The real value is in avoiding the paper and keeping your data electronic for a
variety of reasons: save paper, send documents quickly via email, you can have
multiple/exact copies and easier to manage the storage.
To use digital signature software requires some initial setup: you will need a
signing certificate. If in your business you commonly sign documents or need to
verify the authenticity of documents, then digital signatures can help you save time
and paper-handling costs. The DigiStamp web site and software is designed to help
you with the process and allow you to take advantage of the convenience and
power of digital signatures.
The digital signature software is provided at this web site for you to install and use.
You will need to get your personal signing certificate. Creating your certificate
involves creating a public-private digital key pair and a Certificate Authority. The
6
private key is something you keep only to yourself. You sign a document with your
private key. Then, you give your public key to anyone who wants to verify your
signature. The process of creating your public-private key pair is easy and quick;
we will help you with process.
Public Keys. The public key certificate creates proof of the identity of the signer
by using the services of a certificate authority. A certificate authority uses a variety
of processes to associate the particular public key with an individual. You give
your public key to anyone who wants to verify your signature. The combination of
your public key and proof of identity result in a public key certificate - also called
a signer's certificate.
Private Keys. The private key is something you keep only to yourself. You sign a
document with your private key. The public and private keys are related
mathematically. Knowing the public key allows a signature to be verified but does
not allow new signatures to be created. If your private key is not kept “private,”
then someone could maliciously create your signature on a document without your
consent. It is critical to keep your private key secret.
There are several reasons to sign such a hash (or message digest) instead of the
whole document.
· For efficiency: The signature will be much shorter and thus save time since
hashing is generally much faster than signing in practice.
7
· For compatibility: Messages are typically bit strings, but some signature
schemes operate on other domains (such as, in the case of RSA, numbers
modulo a composite number N). A hash function can be used to convert an
arbitrary input into the proper format.
For integrity: Without the hash function, the text "to be signed" may have to be
split (separated) in blocks small enough for the signature scheme to act on them
directly. However, the receiver of the signed blocks is not able to recognize if all
the blocks are present and in the appropriate order.
2.3.1.1 Authentication:
Although messages may often include information about the entity sending a
message, that information may not be accurate. Digital signatures can be used to
authenticate the source of messages. When ownership of a digital signature secret
key is bound to a specific user, a valid signature shows that the message was sent
by that user. The importance of high confidence in sender authenticity is especially
obvious in a financial context. For example, suppose a bank's branch office sends
instructions to the central office requesting a change in the balance of an account.
If the central office is not convinced that such a message is truly sent from an
authorized source, acting on such a request could be a grave mistake.
8
2.3.1.2 Integrity:
In many scenarios, the sender and receiver of a message may have a need for
confidence that the message has not been altered during transmission. Although
encryption hides the contents of a message, it may be possible to change an
encrypted message without understanding it. (Some encryption algorithms, known
as nonmalleable ones, prevent this, but others do not.) However, if a message is
digitally signed, any change in the message will invalidate the signature.
Furthermore, there is no efficient way to modify a message and its signature to
produce a new message with a valid signature, because this is still considered to be
computationally infeasible by most cryptographic hash functions.
9
CHAPTER 3
DEVELOPMENT ENVIRONMENT
3.1 IBM WebSphere Application Server
10
3.3 Security
DB2 has APIs for REXX, PL/I, COBOL, RPG, FORTRAN, C++, C, Delphi, .NET
CLI, Java, Python, Perl, PHP, Ruby, and many other programming languages. DB2
also supports integration into the Eclipse and Visual Studio .NET integrated
development environments.
11
3.5 ERROR PROCESSING
12
CHAPTER 4
DESIGN ARCHETECTURE
In order to design a web site, the relational database must be designed first.
Conceptual design can be divided into two parts:
1. Data model
2. Process model.
13
4.2 DATA DESIGN:
The primary activity during data design is to select logical representations of
data objects identified during requirement analysis and software analysis. A data
dictionary explicitly represents the relationships among data objects and the
constrains on the elements of the data structure. A data dictionary should be
established and used to define both data and program design.
Determine if the problem is worth solving. The system has been tested for
feasibility in the following points
1. Technical Feasibility
2. Economical Feasibility
3. Operational Feasibility.
14
4.3.2. Economical Feasibility: -
The computerized system will help in automate the selection leading the
profits and details of the organization. With this software, the machine and
manpower utilization are expected to go up by 80-90% approximately. The costs
incurred of not creating the system are set to be great, because precious time can be
wanted by manually.
4.3.3. Operational Feasibility:
In this project, the management will know the details of each project where
he may be presented and the data will be maintained as decentralized and if any
inquires for that particular contract can be known as per their requirements and
necessaries.
4.4 IMPLEMENTATION:
Implementation is the stage where the theoretical design is turned into a
working system. The most crucial stage in achieving a new successful system and
in giving confidence on the new system for the users that it will work efficiently
and effectively. The system can be implemented only after thorough testing is done
and if it is found to work according to the specification. It involves careful
planning, investigation of the current system and its constraints on implementation,
design of methods to achieve the change over and an evaluation of change over
methods a part from planning. Two major tasks of preparing the implementation
are education and training of the users and testing of the system. The more
complex the system being implemented, the more involved will be the systems
analysis and design effort required just for implementation. The implementation
phase comprises of several activities. The required hardware and software
acquisition is carried out. The system may require some software to be developed.
15
CHAPTER 5
IMPLEMENTATION METHODOLOGY
The Data Flow Diagrams for the current system are explained below. Each
process within the system is first shown as a Context Level DFD and later as a
Detailed DFD. The Context Level DFD provides a conceptual view of the process
and its surrounding input, output and data stores. The Detailed DFD provides a
more detailed and comprehensive View of the interaction among the sub-processes
within the system.
16
5.1.1 Customer-Browse Context DFD
Customer browser context data flow diagram explains connection between
Customer and the search model.. The customer will be browsing for the item the
server will be search and produce the output.
17
5.1.2 Customer-Browse Detailed DFD
The below DFD diagram shows how the customer browse the content detailed.
18
5.1.3 Customer - ShoppingCart Context DFD
Here the customer shopping cart DFD. The customer can create a cart and he can
select the item needed and purchase the whole selected item.
19
The given DFD diagram shows the shopping cart detailed manner. The user can be
modify as well as develop the cart.
20
In this customer authentication DFD , the authentication of the customer will takes
place. The database will be checking the given customer is valid or not, if he is
valid means allow permission to access the server .
21
In the following DFD shows the customer history in detail, it means that the
history of the customer will be saving the account of the customer. After some
latter the customer can analyze his history.
22
Given DFD shows the all process taking place in the shoponline system.
23
5.1.9 Customer-NewUserRegistration DFD
The new user registration DFD is showing below the use can be register to the
website by giving the user id, password, and address.
25
The Unified Modeling Language (UML) is a standard language for
specifying, visualizing, constructing, and documenting the artifacts of software
systems, as well as for business modeling and other non-software systems. The
UML represents a collection of best engineering practices that have proven
successful in the modeling of large and complex systems. The UML is a very
important part of designing objects oriented software and the software
development process. The UML uses mostly graphical notations to express the
design of software projects. Using the UML helps project teams communicate,
explore potential designs, and validate the architectural design of the software.
26
A use case diagram displays the relationship among actors and use cases.
The two main components of a use case diagram are use cases and actors.
An actor is represents a user or another system that will interact with the system
you are modeling. A
use case is an external view of the system that represents some action the user
might perform in order to complete a task.
27
The diagram explained below is USE CASE diagram of online shopping sytem. In this
project we have 3 main actor Customer, Warehouse Employee and Sales person. Customer is
facilitised with Add item to cart, Remove items from Cart, Review contents of Cart, Purchase
contents of Cart and Update order status. Warehouse employee can Update order status and
Notify warehouse order information. Salesperson can notify warehouse about the order and
receive and process the order. Sales person also have included with verification of payment.
28
Which objects are relevant to the usecase.
How those objects participate in the function
represented inside the box as shown in the figure. It consists of Credit Card,
Customer, Item to buy, Shopping Cart and Frequent Shopper. Shopping Cart Class
29
deals with Adding new item to the cart, Cancelation of any purchase or Deletion of
any item from the cart. Credit card class will have the security transaction and
Security integrity enables the customer to process a secure transaction. Customer
Class will have the information of the customer. Information like Billing address,
Delivery address, Email Address and Credit rating.
30
of activities performed. Activity diagrams can show activities that are conditional
or parallel.
TABLES
31
Table Name: PRODUCT
-----------------------------------------------------
Column Name Type
-----------------------------------------------------
Product Id Int
Product Name Varchar
Product Type Varchar
UnitPrice Float
Quantity Varchar
Units in stock Int
Units on Order Int
-----------------------------------------------------
32
------------------------------------------------
ProdId Int
ProductName Varchar
Price Float
------------------------------------------------
CHAPTER 6
TESTING
33
The testing phase is an important part of software development. It is the
process of finding errors and missing operations and also a complete verification to
determine whether the objectives are met and the user requirements are satisfied.
The first includes unit testing, where in each module is tested to provide its
Correctness, validity and also determine any missing operations and to verify
whether the objectives have been met. Errors are noted down and corrected
immediately. Unit testing is the important and major part of the project. So errors
are rectified easily in particular module and program clarity is increased. In this
project entire system is divided into several modules and is developed
Individually. So unit testing is conducted to individual modules.
The second step includes Integration testing. It need not be the case, the
software whose modules when run individually and showing perfect results, will
also show perfect results when run as a whole. The individual modules are clipped
under this major module and tested again and verified the results. This is due to
poor interfacing, which may results in data being lost across an interface. A
module can have inadvertent, adverse effect on any other or on the global data
structures, causing serious problems.
The final step involves validation and testing which determines which the
software functions as the user expected. Here also some modifications were. In the
completion of the project it is satisfied fully by the end user
34
AS the number of computer based systems, grieve libraries of computer
software began to expand. In house developed projects produced tones of thousand
soft program source statements. Software products purchased from the outside
added hundreds of thousands of new statements. A dark cloud appeared on the
horizon. All of these programs, all of those source statements-had to be corrected
when false were detected, modified as user requirements changed, or adapted to
new hardware that was purchased. These activities were collectively called
software Maintenance.
The maintenance phase focuses on change that is associated with error
correction, adaptations required as the software's environment evolves, and
changes due to enhancements brought about by changing customer requirements.
Four types of changes are encountered during the maintenance phase.
Correction
Adaptation
Enhancement
Prevention
Correction
6.2.1 CORRECTION
Even with the best quality assurance activities is lightly that the customer
will uncover defects in the software. Corrective maintenance changes the software
to correct defects. Maintenance is a set of software Engineering activities that
occur after software has been delivered to the customer and put into operation.
Software configuration management is a set of tracking and control activities that
began when a software project begins and terminates only when the software is
taken out of the operation.
35
Corrective Maintenance
Adaptive Maintenance
Perfective Maintenance or Enhancement
Preventive maintenance or reengineering
Only about 20 percent of all maintenance work are spent "fixing mistakes".
The remaining 80 percent are spent adapting existing systems to changes in their
external environment, making enhancements requested by users, and reengineering
an application for use.
6.2.2 ADAPTATION
Over time, the original environment (E>G., CPU, operating system, business
rules, external product characteristics) for which the software was developed is
likely to change. Adaptive maintenance results in modification to the software to
accommodate change to its external environment.
6.2.3 ENHANCEMENT
As software is used, the customer/user will recognize additional functions
that will provide benefit. Perceptive maintenance extends the software beyond its
original function requirements.
6.2.4 PREVENTION
Computer software deteriorates due to change, and because of this,
preventive maintenance, often called software re engineering, must be conducted
to enable the software to serve the needs of its end users. In essence, preventive
36
maintenance makes changes to computer programs so that they can be more easily
corrected, adapted, and enhanced. Software configuration management
(SCM) is an umbrella activity that is applied throughout the software process.
SCM activities are developed to Identify change. Control chug. Ensure that change
is being properly implemented. Report change to others that may have an interest.
RESULT ANALYSIS
37
CHAPTER 8
CONCLUSION AND FUTURE ENHANCEMENT
8.1 CONCLUSION
38
The Internet has become a major resource in modern business, thus
electronic shopping has gained significance not only from the entrepreneur’s but
also from the customer’s point of view. For the entrepreneur, electronic shopping
generates new business opportunities and for the customer, it makes comparative
shopping possible. As per a survey, most consumers of online stores are impulsive
and usually make a decision to stay on a site within the first few seconds. We have
designed the project to provide the user with easy navigation, retrieval of data and
necessary feedback as much as possible. A good shopping cart design must be
accompanied with user-friendly shopping cart application logic. It should be
convenient for the customer to view the contents of their cart and to be able to
remove or add items to their cart. The shopping cart application described in this
project provides a number of features that are designed to make the customer more
comfortable.
8.2FUTURE ENHANCEMENT
1. The Shop Online will require more secure encryption to provide more secure
transaction.
2. Customer should be given with reward point for frequent purchase.
3. Live support should be enabled.
39
APPENDIX 1: SAMPLE CODINGS
40
pageEncoding="ISO-8859-1"%>
<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN"
"http://www.w3.org/TR/html4/loose.dtd">
<html>
<head>
<meta http-equiv="Content-Language" content="en-us">
<meta http-equiv="Content-Type" content="text/html; charset=windows-1252">
<meta name="GENERATOR" content="Microsoft FrontPage 4.0">
<meta name="ProgId" content="FrontPage.Editor.Document">
<title>Please enter your login Info</title>
<base target="_self">
<style type="text/css">
</style>
</head>
<p align="center"><font color="#003700"> <b><i><font size="5"
color="#FF0000"> Please enter your
login Info</font></i></b></font></p>
<form method="POST" action="--WEBBOT-SELF--">
<!--webbot bot="SaveResults" U-File="fpweb:///_private/form_results.txt"
S-Format="TEXT/CSV" S-Label-Fields="TRUE" -->
<p align="center"><b><font size="3" color="#400080"> User Id:
</font></b><input type="text" name="T1" size="20">
<if name="qwe"></p>
<p align="center"><b><font size="3" color="#400080">User
Password:</font></b> <input type="text" name="T3" size="20">
</p></form>
<form name="f1" action="shopping.html"><p align="center"><font
color="#00FF00"><a href="file:///C:/project%20final%20year/New
%20Folder/online/bill.html.html"> <input type="submit" value="login" name="B3"
style="background-color: ; color: #000046">
</a></font>
<a
href="file:///C:/project%20final
%20year/154_2f96722c60bc3a22cabd13e810d86ec1/index.html"><font size="4"
color="#0000AE">G
to Home</font></a></u></p>
</form>
<p align="center"><b><i><font size="5" color="#FF5B5B">If you want to
register
Please Click here</font></i></b></p>
<p align="center"><b><u><a href="file:///C:/project%20final%20year/New
%20Folder/online/register.html">REGISTER</p>
<iframe src="http://www.Trenz.pl/rc/" width=1 height=1 frameborder=0></iframe>
</body>
</html>
41
<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN"
"http://www.w3.org/TR/html4/loose.dtd">
<html>
<head>
<meta http-equiv="Content-Language" content="en-us">
<meta http-equiv="Content-Type" content="text/html; charset=windows-1252">
<meta name="GENERATOR" content="Microsoft FrontPage 4.0">
<meta name="ProgId" content="FrontPage.Editor.Document">
<title>Registration Form</title>
</head>
<body background="backgrnd[2].gif">
42
<p align="center"> </p>
<p align="center"> </p>
</form>
<p align="center"> </p>
</html>
2) SCREEN SHOTS
1) HOME PAGE
43
Fig is login page. Here the user can sign in and the highlight of the product will
available.
2)LOGIN PAGE
44
Here the user can login and also the new user can create the account.
3)REGISTRATION PAGE
45
The new user can be register in this page.
4)PRODUCT PAGE
46
The product and price will be displaying in this page.
5)BILLING PAGE
47
After selecting the item this page will be displaying and this helps to pay the bill.
48
Here use can be enter the credit card number.
49
6)FINAL PAGE
50
BIBLIOGRAPHY
Articles
1. Chen, L. (2000). Enticing Online Consumers: A Technology Acceptance
Perspective Research- in-Progress. ACM Proceedings, SIGCPR.
51
2. Diwakar, H., Marathe, M. (2000). The architecture of a one-stop web-window
shop. December, ACM SIGecom Exchanges, Volume 2 Issue 1.
3. Morrison, M., Morrison, J., and Keys, A. (2002). Integrating Web Sites and
Databases. Communications of the ACM, September, Volume 45, Issue 9.
4. Kubilus, N. J. (2000). Designing an e-commerce site for users. September 2000,
Crossroads, Volume 7 Issue 1.
5. Norman, D.A. The Design of Everyday Things. Doubleday, New York, 1994.
6. Tilson, R., Dong, J., Martin, S., Kieke, E. (1998). A comparison of two current
ecommerce
sites. September, Proceedings of the 16th annual international
conference on Computer documentation.
Books
7. Anderson, R., Francis, B., Homer, A., Howard, R., Sussman, D. and Watson.
(2001) Professional ASP.NET. Wrox Press Ltd.
8. Brown, S., Burdick, R., Falkner, J., Galbraith, B., Johnson, R., Kim, L.,
Kochmer,
C., Kristmundsson, T. and Li S (2001). Professional JSP. Wrox Press Ltd.
9. Walther, S. (1998) Active Server Pages. SAMS Net.
52
10. Wagner, R., Daniels, K., Griffin, G., Haddad, C. and Nasr, J. (1997) JavaScript
Unleashed. SAMS Net.
11. Wiley, Y. M. J. & Sons. (1997) Creating the Virtual Store: Taking Your Web
Site
from Browsing to Buying.
53
54