|
1 |
| -# College-Library-Management |
2 |
| - |
3 |
| - |
4 |
| -High level design of Library Management System. |
5 |
| -=============================================== |
6 |
| - |
7 |
| -User Management: |
8 |
| -User Registration |
9 |
| -User Login |
10 |
| -User Profile Management |
11 |
| - |
12 |
| -Book Management: |
13 |
| -Add/Update/Delete Books |
14 |
| -Search Books |
15 |
| -Overdue Books |
16 |
| -View Books |
17 |
| -Check-In/Check-Out Books |
18 |
| - |
19 |
| -Member Management: |
20 |
| -Add/Update/Delete Members |
21 |
| -Search Members |
22 |
| -View Members |
23 |
| - |
24 |
| -System Management: |
25 |
| -Database Management |
26 |
| - |
27 |
| -Security: |
28 |
| -User Authentication |
29 |
| -User Authorization |
30 |
| -Password Management |
31 |
| - |
32 |
| -Low level design of Library Management system |
33 |
| -=============================================== |
34 |
| -User Management: |
35 |
| -User Registration: User provides basic details like name, email, and password. A new record is created in the user table with a unique ID, and the details are stored in the user profile. |
36 |
| -User Login: User provides username and password, which is verified against the database. If the details are correct, a session ID is generated and stored in the session table. |
37 |
| - |
38 |
| -Book Management: |
39 |
| -Add/Update/Delete Books: Admin can add, update, or delete books. When adding a new book, admin provides details like title, author, ID. A new record is created in the book table with a unique ID, and the details are stored in the book details table. |
40 |
| -Search Books: Users can search books by title, author, or Id. The search query is executed against the book details table. |
41 |
| -View Books: Users can view book details like title, author, ID. The details are fetched from the book details table. |
42 |
| - overdue-Books: A report is generated that displays all books that are overdue for return. |
43 |
| -Check-In/Check-Out Books: When a user checks out a book, a new record is created in the checkout table with the book ID, user ID, and checkout date. When a user returns a book, the record is updated with the return date. |
44 |
| - |
45 |
| -Member Management: |
46 |
| -Add/Update/Delete users: Admin can add, update, or delete users. When adding a new user, admin provides details like name, email, and address. A new record is created in the user table with a unique ID, and the details are stored in the user details table. |
47 |
| -Search user: user can be searched using Id by querying from database. |
48 |
| - |
49 |
| - |
50 |
| -Database Management: Admin can create, update or delete tables, views or stored procedures as per requirement. |
51 |
| - |
52 |
| -Security: |
53 |
| -User Authentication: Passwords are hashed and stored in the database. When a user logs in, the entered password is hashed and compared against the hashed password stored in the database. |
54 |
| -User Authorization: Different user roles can be defined like admin or member, with different levels of access. |
55 |
| - |
56 |
| - |
57 |
| - |
58 |
| -Architecture |
59 |
| -============ |
60 |
| -Presentation Layer: This layer is responsible for handling the user interface and user interactions. It includes the web pages, forms, and other elements that users interact with when using the system. The presentation layer communicates with the business logic layer to retrieve and display data. |
61 |
| - |
62 |
| -Business Logic Layer: This layer contains the business logic of the system. It handles the application flow, data validation, and other business rules. The business logic layer communicates with the data access layer to retrieve and update data. |
63 |
| - |
64 |
| -Data Access Layer: This layer is responsible for accessing the database and retrieving or updating data. It includes the database schema, stored procedures, and other database-related elements. The data access layer communicates with the business logic layer to retrieve and update data. |
65 |
| - |
66 |
| -Database: This layer contains the actual data stored in the system. It includes the user data, book data, and other system-related data. The database communicates with the data access layer to store and retrieve data. |
67 |
| - |
68 |
| -Regarding user authorization, here's an architecture: |
69 |
| - |
70 |
| -Authentication Module: This module handles user authentication. When a user logs in, the entered password is hashed and compared against the hashed password stored in the database. If the passwords match, a session ID is generated and stored in the session table. |
71 |
| - |
72 |
| -Authorization Module: This module handles user authorization. Different user roles can be defined like admin or member, with different levels of access. When a user logs in, their role is checked, and they are granted access to the appropriate features based on their role. |
73 |
| - |
74 |
| -Access Control Module: This module handles access control. It ensures that users can only access the features they are authorized to access based on their role. If a user tries to access a feature they are not authorized to access, they are denied access. |
75 |
| - |
76 |
| -User Management Module: This module handles user management. It allows administrators to create, update, or delete user accounts, as well as define user roles and permissions. |
77 |
| - |
| 1 | +Problem Statement : |
| 2 | +Create a Web application to manage Library Information. |
| 3 | +Approach: Implement the below feature in your application. |
| 4 | +1. Student Registration. |
| 5 | +2. Book Management: Add a new book, delete a book, update a book's details, |
| 6 | + and search a book. |
| 7 | +3. Allow students a maximum of 15 days to borrow the book. If the book is not |
| 8 | + returned within 15 days, calculate the fine. One day equals ten rupees. |
| 9 | +4. Limit each pupil to three books. |
| 10 | +5. Enable book searches by author, title, and category. |
| 11 | +6. Registration of librarians |
| 12 | +7. Any Librarian may issue books to any student. |
| 13 | +8.You can also create your own functions. |
| 14 | + |
| 15 | +Technology: |
| 16 | +Database: Choose MySQL or NoSQL database as per your preference |
| 17 | +Backend- end : JDBC, Servlet , JSP |
| 18 | +Front - end : Create a Basic UI using HTML, CSS or any framework |
0 commit comments