Skip to content

Commit 863e958

Browse files
authoredMar 21, 2023
Update README.md
1 parent b7b138f commit 863e958

File tree

1 file changed

+18
-77
lines changed

1 file changed

+18
-77
lines changed
 

‎README.md

+18-77
Original file line numberDiff line numberDiff line change
@@ -1,77 +1,18 @@
1-
# College-Library-Management
2-
3-
4-
High level design of Library Management System.
5-
===============================================
6-
7-
User Management:
8-
User Registration
9-
User Login
10-
User Profile Management
11-
12-
Book Management:
13-
Add/Update/Delete Books
14-
Search Books
15-
Overdue Books
16-
View Books
17-
Check-In/Check-Out Books
18-
19-
Member Management:
20-
Add/Update/Delete Members
21-
Search Members
22-
View Members
23-
24-
System Management:
25-
Database Management
26-
27-
Security:
28-
User Authentication
29-
User Authorization
30-
Password Management
31-
32-
Low level design of Library Management system
33-
===============================================
34-
User Management:
35-
User Registration: User provides basic details like name, email, and password. A new record is created in the user table with a unique ID, and the details are stored in the user profile.
36-
User Login: User provides username and password, which is verified against the database. If the details are correct, a session ID is generated and stored in the session table.
37-
38-
Book Management:
39-
Add/Update/Delete Books: Admin can add, update, or delete books. When adding a new book, admin provides details like title, author, ID. A new record is created in the book table with a unique ID, and the details are stored in the book details table.
40-
Search Books: Users can search books by title, author, or Id. The search query is executed against the book details table.
41-
View Books: Users can view book details like title, author, ID. The details are fetched from the book details table.
42-
overdue-Books: A report is generated that displays all books that are overdue for return.
43-
Check-In/Check-Out Books: When a user checks out a book, a new record is created in the checkout table with the book ID, user ID, and checkout date. When a user returns a book, the record is updated with the return date.
44-
45-
Member Management:
46-
Add/Update/Delete users: Admin can add, update, or delete users. When adding a new user, admin provides details like name, email, and address. A new record is created in the user table with a unique ID, and the details are stored in the user details table.
47-
Search user: user can be searched using Id by querying from database.
48-
49-
50-
Database Management: Admin can create, update or delete tables, views or stored procedures as per requirement.
51-
52-
Security:
53-
User Authentication: Passwords are hashed and stored in the database. When a user logs in, the entered password is hashed and compared against the hashed password stored in the database.
54-
User Authorization: Different user roles can be defined like admin or member, with different levels of access.
55-
56-
57-
58-
Architecture
59-
============
60-
Presentation Layer: This layer is responsible for handling the user interface and user interactions. It includes the web pages, forms, and other elements that users interact with when using the system. The presentation layer communicates with the business logic layer to retrieve and display data.
61-
62-
Business Logic Layer: This layer contains the business logic of the system. It handles the application flow, data validation, and other business rules. The business logic layer communicates with the data access layer to retrieve and update data.
63-
64-
Data Access Layer: This layer is responsible for accessing the database and retrieving or updating data. It includes the database schema, stored procedures, and other database-related elements. The data access layer communicates with the business logic layer to retrieve and update data.
65-
66-
Database: This layer contains the actual data stored in the system. It includes the user data, book data, and other system-related data. The database communicates with the data access layer to store and retrieve data.
67-
68-
Regarding user authorization, here's an architecture:
69-
70-
Authentication Module: This module handles user authentication. When a user logs in, the entered password is hashed and compared against the hashed password stored in the database. If the passwords match, a session ID is generated and stored in the session table.
71-
72-
Authorization Module: This module handles user authorization. Different user roles can be defined like admin or member, with different levels of access. When a user logs in, their role is checked, and they are granted access to the appropriate features based on their role.
73-
74-
Access Control Module: This module handles access control. It ensures that users can only access the features they are authorized to access based on their role. If a user tries to access a feature they are not authorized to access, they are denied access.
75-
76-
User Management Module: This module handles user management. It allows administrators to create, update, or delete user accounts, as well as define user roles and permissions.
77-
1+
Problem Statement :
2+
Create a Web application to manage Library Information.
3+
Approach: Implement the below feature in your application.
4+
1. Student Registration.
5+
2. Book Management: Add a new book, delete a book, update a book's details,
6+
and search a book.
7+
3. Allow students a maximum of 15 days to borrow the book. If the book is not
8+
returned within 15 days, calculate the fine. One day equals ten rupees.
9+
4. Limit each pupil to three books.
10+
5. Enable book searches by author, title, and category.
11+
6. Registration of librarians
12+
7. Any Librarian may issue books to any student.
13+
8.You can also create your own functions.
14+
15+
Technology:
16+
Database: Choose MySQL or NoSQL database as per your preference
17+
Backend- end : JDBC, Servlet , JSP
18+
Front - end : Create a Basic UI using HTML, CSS or any framework

0 commit comments

Comments
 (0)