06-10-2014, 04:45 PM
Intranet Mailing System.doc (Size: 429.5 KB / Downloads: 8) Intranet Mailing System
ABSTRACT
The Intranet Mailing System is applicable within an organization only. In this fast growing world where every qualified person is in urgent need of a job, they join places, working at odd times. The organization have shift times and it becomes dificult for an employee of the shift to communicate with another employee of a different shift. In these circumstances the Intranet Mailing System proves its worth, if the organization has an Intranet Mailing System facility available to all its employees then each employee can register himself/herself and send mails to any other registered employee and thus making the communication easier. Also the employees do not have to pay for the mails and get this facility free of cost. The mails of that employee send reaches the destination within no time. Although the Intranet Mailing System works in similar fashion as that of internet miling system, there is no neded to get an internet connection for our mailing system. The various branches of the organization can be connected to a singled host server and then an employyee of one brach can send a message to an employee of another branch through the server.
INTRODUCTION
2.1 Introduction to project
The Project allows the user to create a new e-mail account where the uset give a non-existent (with in orgnaization) user_id (e,g., kamesh) and a password. The program must read all the mails and segregate the mails by user_ids. Take a sample e-mail address. All the mails in the server will be in the in-box. When you have read the mails, the ‘kamesh’ string is available and this helps in the segregation of the mails. If no lsuch user_id is available, the mails are not going to lbe stored any where in the data base. One of the most popular and widely-used application on the intranet is e-mail. E-mail does not require the recipient’s presence when mail is sent to him, like in an EPABX system, nor does the sender receive an ‘engaged’ tone. Presently, the college does not have any kind of e-mail system.
We propose an intra-college e-mail system in which anybody in the campus should be able to send e-mail. The system should be able to send e-mail outside the campus when the college acquires an Internet connection. But since students do not have their personal logins, the application should be such that a student not having a valid login on a server can also send and receive e-mail. Hence, we propose a system on the lines of Hotmail on the Internet. Hotmail allows members to send and receive e-mail by logging in at the Hotmail Website. Membership is free and the income is through advertisements.
The e-mail system should allow new users to be created without any supervision from the administrator. Mail should be stored in the member’s mailbox till it is read or deleted. Features such as personalised address books and personalised settings should be provided to ease the task of a user.
2.2 INTRODUCTION TO ORGANIZATION:
NeoApp TECHNOLOGIES builds intelligent, cost-effective IT solutions that bridge the gaps in Data, Information and Knowledge that exist across the enterprise - its processes, people and technologies. DOMINOPOINT TECHNOLOGIES perceives itself as a high-tech company bringing the technological innovations and practices to the industry. Our company products are centered on the concept of "work from anywhere" for customers, employees and associates and "administer from anywhere" for configuration managers, system administrators and executives. These products help in bridge the communication gaps that are detrimental for the parties involved. This company is a global scalable distributed solution provider with expertise in multi-platform development and project management.
System Analyses:
System Analysis is first stage according to System Development Life Cycle model. This System Analysis is a process that starts with the analyst. Analysis is a detailed study of the various operations performed by a system and their relationships within and outside the system. One aspect of analysis is defining the boundaries of the system and determining whether or not a candidate should consider other related systems. During analysis, data is collected from the available files, decision points, and transactions handled by the present system. Logical system models and tools are used in analysis. Training, experience, and common sense are required for collection of the information needed to do the analysis
Logical system models and tools are used in analysis. Training, experience, and common sense are required for collection of the information needed to do the analysis. This System Analysis is a process that starts with the analyst. Analysis is a detailed study of the various operations performed by a system and their relationships within and outside the system.
SYSTEM DESIGN
5 System Design:
The most creative and challenging phase of the life cycle is system design. The term design describes a final system and the process by which it is developed. It refers to the technical specifications that will be applied in implementations of the candidate system. The design may be defined as “the process of applying various techniques and principles for the purpose of defining a device, a process or a system with sufficient details to permit its physical realization”.
The designer’s goal is how the output is to be produced and in what format. Samples of the output and input are also presented. Second input data and database files have to be designed to meet the requirements of the proposed output. The processing phases are handled through the program Construction and Testing. Finally, details related to justification of the system and an estimate of the impact of the candidate system on the user and the organization are documented and evaluated by management as a step toward implementation.
The importance of software design can be stated in a single word “Quality”. Design provides us with representations of software that can be assessed for quality. Design is the only way where we can accurately translate a customer’s requirements into a complete software product or system. Without design we risk building an unstable system that might fail if small changes are made. It may as well be difficult to test, or could be one who’s quality can’t be tested. So it is an essential phase in the development of a software product.
INPUT DESIGN:
The input design is the link that ties the information System into the real world of its users. The inputs, which are given by the user, will form the core of the processes. So the inputs have to be care fully analyzed and care has to be taken to avoid in correct inputs. The guidelines that have been followed in designing the input forms are.
• Minimizing the number of input by collecting only required Data and grouping similar or related data.
• Maintain consistently between information display and input.
• Providing help facilities those are context sensitive.
• The format of the same data in different screens must be same.
Consistent terminology’s are to be used throughout the system
OUTPUT DESIGN:
Computer out put is the most important and direct source of information to user. Efficient, intelligible output design should provide user with systems relationships and help in decision-making. The major form of output is hard copy from the printer; printouts are to be designed around the out put requirements of the user. The output devices to be considered depends on factors such as compatibility of the device with the system, response time requirements, expected print quality and number of copies needed. The output design was carried out in consultation with the user reports, which have many columns, are printed n compressor mode, which can be printed on laser printers and others in uncompressed mode so as to facilitate its usage online printers.
5.1 SELECTED SOFTWARE:
ABOUT JAVA:
The Internet helped catapult Java to the forefront of programming, and Java, in turn, has had a profound effect on the Internet. The reason for this is quite simple: Java expands the universe of objects that can move about freely in the cyberspace. In a network, two very broad categories of objects are transmitted between the server and our computer passive information and dynamic, active programs.
As desirable as dynamic, networked programs are, they also present serious problems in the areas of security and portability. Java achieves this security or protection by confining a Java program to the Java execution environment and not allowing it to access to other parts of the computer. Many types of the computers and operating systems are in use throughout the world and many are connected to the Internet. For programs to be dynamically downloaded to all the various types of platforms connected to the Internet, some means of generating portable executable code is needed.
Java was designed to be easy for the professional programmers to learn and use efficiently. The object model of Java is simple and easy to extend, while simple types, such as integers are kept as high-performance non-objects. The multiplatformed environment of the web places extraordinarily demands on a program, because the program must execute reliably in a variety of systems. Thus, the ability to create robust programs was given a high priority in the design of Java. At the same time, Java frees us from having to worry about many of the most common cause of programming errors. Because Java is strictly typed language, it checks our code at the compile time and also at run-time.
JDBC (JAVA DATA BASE CONNECTION)
It is a java data base connectivity having data base as a back-end of java as front end. Database is a collectivity of related data. A data base management system (DBMS) controls the storage or retrieval of data in the database. The main use of this JDBC is the database connectivity.
Using drivers we can get connection to the back-end:
1. Which drive we are going to connect back-end.
2. Create a data source name (dsn).
3. Create a statement for connection.
The package we use here is import java. Sql. *
Interfaces of jdbc include driver, connection, and statement; prepare statement, callable statement, Result Set, Result Set Meta data. Classes of JDBC are driver manages, driver property information, date, and time, and timestamp, type. The driver defined by the classJdbc odbc driver in package sun.jdbc.odbc. Class sun.jdbc.odbc.jdbc odbc driver represents the jdbc to odbc bridge driver.
HTML:
The hypertext markup language (HTML) is a simple markup language. Used to create a hypertext documents that are portable from one platform to another HTML documents are SGML (Standard generalized mark up language) documents with generic semantics that are appropriate for representing information from a wide range of applications. This specification defines HTML version 3.2. HTML 3.2 aims to capture recommended practice as of early ’96 and as such a replacement for HTML2.0 (RFC 1866).
A set of instructions embedded in a document is called mark up language. These instructions describe what the document text means and how it should look like in a display. Hyper Text Mark Up language (HTML) is the language used to encode World Wide Web documents.
7 DATABASE DESIGN:
Data dictionary consists of description of all the data used in the system. It consists of logical characteristics of current systems data stores including name, description, aliases, contents and organization. Data dictionary serves as the basis for identifying database requirements during system design. Data dictionary is a catalog, a depositary of the elements in the system.
The data dictionary is used to manage the details in the large system, to communicate a common meaning for all system elements, to document the future of the system and to locate errors and omission in the system.
Data dictionary contains two types of descriptions for the data flowing through the system attributes and tables. Attributes are grouped together to make up the tables. The most fundamental data level is attributes tables are a Set of data items, data related to one another and that collectively describes a component in the system. The description of the attributes consists of data names, data descriptions, aliases, and length and data values. The description of data structures consists sequence relation ship, selection relation ship, iteration relationship and operational relationship.