SlideShare a Scribd company logo
1 of 35
Voice Mail System
A Major Project Report
Submitted in partial fulfillment of the requirements for the award of the
Degree of
Bachelor of Technology
In
Information Technology
Submitted By:
Ajeet Singh
Roll No. CSJMA12001390123
Durgesh Kumar Sharma
Roll No. CSJMA12001390128
DEPARTMENT OF INFORMATION TECHNOLOGY
UNIVERSITY INSTITUTE AND ENGINEERING AND TECHNOLOGY
CSJM UNIVERSITY, KANPUR-208024, U.P. (INDIA)
1 | P a g e
CERTIFICATE
We hereby certify that the work which is being presented in the B.Tech. Major Project
Report entitled “Voice Mail System” in partial fulfillment of the requirements for the award
of Bachelor of Technology in Information Technology and submitted to the Department of
Information and Technology, of University Institute and Engineering and technology, done
by Mr. Ajeet Singh & Mr. Durgesh Kumar Sharma Roll No. CSJMA12001390123 &
CSJMA12001390128 respectively is an authentic work carried out during a period of August
2015 to April 2016 under the supervision of Mr. Shubhendra Singh, Lecturer, IT
Department.
The matter presented in this thesis has not been submitted by us for the award of any other
degree elsewhere.
Signature of
Candidates
Ajeet Singh
CSJMA12001390123
Duegesh Kumar Sharma
CSJMA12001390128
This is to certify that the above statement made by the candidates is correct to the best of my
knowledge.
Date: 27/04/2016 Signature of Supervisor
Mr. Shubhendra Singh
Signature:
Head of Department
Department Information Technology
UIET, CSJM UNIVERSITY, Kanpur
2 | P a g e
ACKNOWLEDGEMENT
Before we get into thick of the project report we would like to add a few heartfelt words for
the people who were part of this project in numerous ways, people who gave unending
support right from the stage the project idea was conceived.
We wish to acknowledge with a great sense of gratitude to our guide Mr. Shubhendra Singh. It
gives us immense pleasure to acknowledge our indebtedness to the various faculty members of
U.I.E.T. CSJM University, Kanpur for helping us to design the project work as a part of our
course curriculum.
Ajeet Singh
Durgesh Kumar Sharma
3 | P a g e
TABLE OF CONTENTS
1. ABSTRACT........................................................................................................................................................5
2. INTRODUCTION.............................................................................................................................................6
3. LITERATURE REVIEW...................................................................................................................................7
3.1 Front End...................................................................................................................................................7
3.1.1 Fundamental of HTML..................................................................................................................7
3.1.2 Cascading Style Sheets ................................................................................................................8
3.1.3 J2EE………………………………………………………………………………………………...9
3.2 Back End…………………………………………………………………….……………………………………………..13
3.2.1 Java Database Connectivity…………………………………………………………………...13
4. SPECIFICATION REQUIREMENT………………………………………………………………………18
4.1 Hardware Requirement……………………………………………………………………………………………..18
4.2 Software Requirement………………………………………………………………………………18
5. METHODOLOGY……………………………………………………………………………………..…….………………..19
5.3 Working Process…………………….……………………….…………………………………………………………19
5.1 Existing System…………………………………………………………………………………………..……………..21
5.2 Proposed System…………………………………………………………………………………………..…………..21
6. SCREENSHOTS……………....…………………………………………………………………………………………………22
7. REFERENCES…………………………………………………………………………………………..………………………32
4 | P a g e
LIST OF TABLES/FIGURES
1. FIGURE 1..........................................................................................................................................................1
2. FIGURE 2..........................................................................................................................................................1
3. FIGURE 3..........................................................................................................................................................1
4. FIGURE 4..........................................................................................................................................................1
5. FIGURE 5..........................................................................................................................................................1
6. FIGURE 6..........................................................................................................................................................1
7. FIGURE 7..........................................................................................................................................................1
8. FIGURE 8..........................................................................................................................................................1
9. FIGURE 9..........................................................................................................................................................1
10. FIGURE 10.....................................................................................................................................................1
11. FIGURE 11.....................................................................................................................................................1
12. FIGURE 12.....................................................................................................................................................1
13. FIGURE 13.....................................................................................................................................................1
14. FIGURE 14.....................................................................................................................................................1
5 | P a g e
ABSTRACT
The Voice Mail System (VMS) will be able to send voice messages from sender to
receiver. It is a simple mailing system. The software developers use Oracle Data Base
Management System software to store data. The speed of sending message should be
depending upon size of voice messages and server. As above description, Users
communicate each other via voice messages under server. So there is a need of external
data base which is managed by server. User only sends and receives messages and rest of
things should perform by server i.e. authentication, data base management, creating
account for user etc. There is also need of internet connection for using this Voice Mail
System application .The Login option performs user authentication process to check that
user is authorised or not. If user is authorised then new window will displays on the user
interface. If user is not authorised and needs a user id and password then user can register
to click ‘Register’ option. After clicking a new window will be opened and user can fill
his/her details and gets a user id and password. This operation is performed by
Registration. After this user will be an authorised user and go to Login option.After
Login, User sends or receives messages. User record voice message then Voice Mail
System notifies the user to click option ‘Send’. After communicate user can logout to
click ‘Logout’ option, this task is performed by Logout process. All messages should be
stored by Data Base in a client account. Only authenticated user can modify his inbox
after clicking ‘Modify’ option. This system describe the requirements associated with
any communications functions required by this product, including web browser(server),
network server communications protocols, electronic forms, and so on. It also define
pertinent message formatting and Identify communication standards that will be used,
such as FTP and HTTP. It also specify any communication security or encryption issues,
data transfer rates, and synchronization mechanisms.
6 | P a g e
INTRODUCTION
The purpose of this document is to present a description of the voice mail system, a web base-
d java application project. It will explain what is the purpose of voice mail system and what
are the features and interfaces of the system, what the system will does, the constraints under
which it must operate and how the system will react. This document is intended for both the
instructors and the developers of the system .This section gives an overview of the functional-
ity of the product. It describes the informal requirements and is used to establish a context for
the technical requirements. The Voice Mail System is based on communication. It needs two
active users to communicate, first sender who sends the message and second receiver who re-
ceives the message. Messages are in form of voice that’s why we call it voice mail system .
This application is based on client server communication. Many clients can use this applicati-
on at same time. Every client communicates each other with a particular server. Every client,
either senders or receivers, must have unique user identification (mail id) with the help of us-
er id and password they will login first and server checks whether client is authorised or not.
If client is an authenticated user then they send messages and perform communication other-
wise they can’t proceed further. This is a small overview of voice mail system. The purpose
of this software development project is to create a new application called Voice Mail System.
The client for this project wishes to enter the PC-based internet environment. The Voice Mail
System will be PC-base with an internet, allowing authenticated users to communicate throu-
gh their voice. The application will provide the following capabilities. The application will be
access via an internet on a PC at any place. Authenticated users will be able to manage their
user accounts including remove, change, and add other users. For this task user must have a
voice mail account. The application will provides facility to users to communicate through
recording their voice as long as sending text messages.
The project's client has determined that this application will provide the following benefits:
• Provide additional flexibility and convenience to the voice mail users.
• Provide better reliability and security of the user information.
• Provide a more productive environment for the users.
• Reduce the cost of typing.
7 | P a g e
LITERATURE REVIEW
The literature is divided into two sections. Section 3.1 contains Fundamental of HTML,
CSS ,J2EE and section 3.2 contains Fundamentals of Orcale Database.
3.1 FRONT END:
3.1.1. FUNDAMENTAL OF HTML:
HTML stands for Hyper Text MarkUp Language and it is most widely used langu-
age to write Web Pages .
• Hypertext refers to the way in which Web pages (HTML documents) are link-
ed together. Thus the link available on a web page are called Hypertext.
• As its name suggests, HTML is a Markup Language which means you use
HTML to simply "mark up" a text document with tags that tell a Web browser how to
structure it to display.Originally, HTML was developed with the intent of defining the
structure of documents like headings, paragraphs, lists, and so forth to facilitate the
sharing of scientific information between researchers.
As told earlier, HTML is a markup language and makes use of various tags to format the
content. These tags are enclosed within angle braces <Tag Name>.Except few tags, most
of the tags have their corresponding closing tags. For example <html> has its closing tag
</html> and <body> tag has its closing tag </body> tag etc.
Tag Description
<! DOCTYPE...>
This tag defines the document type and HTML version.
<html>
This tag encloses the complete HTML document and mainly
comprises of document header which is represented by
<head>...</head> and document body which is represented by
<body>...</body> tags.
<head> This tag represents the document's header which can keep other
HTML tags like <title>, <link> etc.
<title> The <title> tag is used inside the <head> tag to mention the
document title.
8 | P a g e
<body>
This tag represents the document's body which keeps other
HTML tags like <h1>, <div>, <p> etc.
Table:1 html tags
3.1.2. CASCADING STYLE SHEETS:
Cascading Style Sheets, fondly referred to as CSS, is a simple design language intended
to simplify the process of making web pages presentable. CSS handles the look and feel
part of a web page. Using CSS, you can control the color of the text, the style of fonts,
the spacing between paragraphs, how columns are sized and laid out, what background
images or colors are used, layout designs ,variations in display for different devices
and screen sizes as well as a variety of other effects. CSS is easy to learn and understa-
nd but it provides powerful control over the presentation of an HTML document. Most
commonly, CSS is combined with the markup languages HTML or XHTML.
Styling can be added to HTML elements in 3 ways:
• Inline - using a style attribute in HTML elements.
• Internal - using a <style> element in the HTML <head> section.
• External - using one or more external CSS files.
Inline css: Inline styling is used to apply a unique style to a single HTML element:
Inline styling uses the style attribute .This example changes the text color of the <h1>
element to blue:
<h1 style="color:blue;">This is a Blue Heading</h1>
Internal css: Internal styling is used to define a style for one HTML page.Internal
styling is defined in the <head> section of an HTML page, within a <style> element:
<!DOCTYPE html>
<html>
<head>
<style>
body {background-color:lightgrey;}
h1 {color: blue;}
p {color: green;}
</style>
9 | P a g e
</head>
<body>
<h1>This is a heading</h1>
<p>This is a paragraph.</p>
</body></html>
External css: An external style sheet is used to define the style for many pages. With
an external style sheet, you can change the look of an entire web site by changing one
file .To use an external style sheet, add a link to it in the <head> section of the HTML.
EXAMPLE:-
<!DOCTYPE html>
<html>
<head>
<link rel="stylesheet" href="styles.css">
</head>
<body>
<h1>This is a heading</h1>
<p>This is a paragraph.</p>
</body>
</html>
An external style sheet can be written in any text editor. The file should not contain a-
ny html tags. The style sheet file must be saved with a .css extension. Here is how the
"styles.css" looks:
body {
background-color: lightgrey;
}
h1 {
color: blue;
}
p {
color:green;
}
10 | P a g e
3.1 J2EE:
Using the Java 2 Platform, Standard Edition (J2SE) as a basis, Java 2 Platform,
Enterprise Edition (J2EE) builds on top of this to provide the types of services that
are necessary to build large scale, distributed, component based, multi-tier
applications. Essentially, J2EE is a collection of APIs that can be used to build such
systems, although this is only half of the picture. J2EE is also a standard for building
and deploying enterprise applications, held together by the specifications of the APIs
that it defines and the services that J2EE provides. In other words, this means that the
"write once, run anywhere" promises of Java apply for enterprise applications too:
• Enterprise applications can be run on different platforms supporting the Java 2
plateform.
• Enterprise applications are portable between application servers supporting the
J2EE.
J2EE is comprised of many APIs that can be used to build enterprise applications.
Although the total list of APIs initially seems overwhelming, it is worth bearing in
mind that some are primarily used by the J2EE environment in which your application
executes, while some provide services that your specific application may not require.
Therefore, it is worth remembering that you don't have to use all of them in order to
build J2EE applications. For completeness, however, the full list of technologies that
make up J2EE is as follows:
• Java Servlet
• Java Server Pages (JSP)
• Java Database Connectivity (JDBC)
Java Servlet: Servlet Technology is used to create web applications. Servlet technology
uses java language to create applications. Web applications are helper applications that
reside at web server and build dynamic web pages. A dynamic page could be anything
like a page that randomly chooses picture to display or even a page that displays the cu-
rrent time. As Servlet Technology uses Java, web applications made using Servlet are
Secured, Scalable and Robust.
11 | P a g e
Fig.1 client-server model
Advantages of using Servlets
• Less response time because each request runs in a separate thread.
• Servlets are scalable.
• Servlets are robust and object oriented.
• Servlets are platform independent.
Servlet Architecture:-
Following diagram shows the position of Servlets in a Web application.
Fig.2 Servlet Architecture
Servlet Life Cycle :A servlet life cycle can be defined as the entire process from its
creation till the destruction. The following are the paths followed by a servlet.
• The servlet is initialized by calling the init () method.
• The servlet calls service() method to process a client's request.
• The servlet is terminated by calling the destroy() method.
• Finally, servlet is garbage collected by the garbage collector of the JVM.
12 | P a g e
Fig.3 Servlet life cycle
Java Server Pages (JSP) :-
Java Server Pages (JSP) is a technology for developing web pages that support
dynamic content which helps developers insert java code in HTML pages by making
use of special JSP tags, most of which start with <% and end with %>.
A Java Server Pages component is a type of Java servlet that is designed to fulfill the
role of a user interface for a Java web application. Web developers write JSPs as text
files that combine HTML or XHTML code, XML elements, and embedded JSP
actions and commands.
Using JSP, you can collect input from users through web page forms, present records
from a database or another source, and create web pages dynamically.
JSP tags can be used for a variety of purposes, such as retrieving information from a
database or registering user preferences, accessing JavaBeans components, passing
control between pages and sharing information between requests, pages etc.
Java Server Pages often serve the same purpose as programs implemented using the
Common Gateway Interface (CGI). But JSP offer several advantages in comparison
with the CGI.
•Performance is significantly better because JSP allows embedding Dynamic Elements
in HTML Pages itself instead of having a separate CGI files.
•JSP are always compiled before it's processed by the server unlike CGI/Perl which
requires the server to load an interpreter and the target script each time the page is
requested.
•Java Server Pages are built on top of the Java Servlets API, so like Servlets, JSP also
has access to all the powerful Enterprise Java APIs, including JDBC, JNDI, EJB,
JAXP etc.
13 | P a g e
• JSP pages can be used in combination with servlets that handle the business logic, the
model supported by Java servlet template engines.
Finally, JSP is an integral part of Java EE, a complete platform for enterprise class
applications. This means that JSP can play a part in the simplest applications to the
most complex and demanding.
A JSP life cycle can be defined as the entire process from its creation till the
destruction which is similar to a servlet life cycle with an additional step which is
required to compile a JSP into servlet.
The following are the paths followed by a JSP
•Compilation
•Initialization
•Execution
•Cleanup
Fig.3 JSP Life Cycle
3.2 Back End
3.2.1 Java Database Connectivity (JDBC) :-
JDBC stands for Java Database Connectivity, which is a standard Java API for
database-independent connectivity between the Java programming language and a
14 | P a g e
wide range of databases. The JDBC library includes APIs for each of the tasks
mentioned below that are commonly associated with database usage.
• Making a connection to a database.
• Creating SQL or MySQL statements.
• Executing SQL or MySQL queries in the database.
• Viewing & Modifying the resulting records.
Fundamentally, JDBC is a specification that provides a complete set of interfaces that
allows for portable access to an underlying database. Java can be used to write
different types of executables, such as –
• Java Applications
• Java Applets
• Java Servlets
• Java Server Pages (JSPs)
• Enterprise JavaBeans (EJBs)
JDBCArchitecture:-
The JDBC API supports both two-tier and three-tier processing models for database
access but in general, JDBC Architecture consists of two layers −
• JDBC API: This provides the application-to-JDBC Manager connection.
• JDBC Driver API: This supports the JDBC Manager-to-Driver Connection.
The JDBC API uses a driver manager and database-specific drivers to provide transparent
connectivity to heterogeneous databases. The JDBC driver manager ensures that the correct
driver is used to access each data source. The driver manager is capable of supporting
multiple concurrent drivers connected to multiple heterogeneous databases.
Following is the architectural diagram, which shows the location of the driver manager with
respect to the JDBC drivers and the Java application −
15 | P a g e
Fig.4 JDBC ARCHITECTURE
16 | P a g e
SQL:-
SQL (pronounced "ess-que-el") stands for Structured Query Language. SQL is used to
communicate with a database. According to ANSI (American National Standards Institute), it
is the standard language for relational database management systems. SQL statements are
used to perform tasks such as update data on a database, or retrieve data from a database.
Some common relational database management systems that use SQL are: Oracle, Sybase,
Microsoft SQL Server, Access, Ingres, etc. Although most database systems use SQL, most
of them also have their own additional proprietary extensions that are usually only used on
their system. However, the standard SQL commands such as "Select", "Insert", "Update",
"Delete", "Create", and "Drop" can be used to accomplish almost everything that one needs to
do with a database. This tutorial will provide you with the instruction on the basics of each of
these commands as well as allow you to put them to practice using the SQL Interpreter
Using SQL in Your Web Site
To build a web site that shows data from a database, you will need:
• An RDBMS database program (i.e. MS Access, SQL Server, MySQL)
• To use a server-side scripting language, like PHP or ASP
• To use SQL to get the data you want
• To use HTML / CSS
RDBMS:-
• RDBMS stands for Relational Database Management System.
• RDBMS is the basis for SQL, and for all modern database systems such as MS SQL
Server, IBM DB2, Oracle, MySQL, and Microsoft Access.
• The data in RDBMS is stored in database objects called tables.
• A table is a collection of related data entries and it consists of columns and rows.
Database Tables:-
A database most often contains one or more tables. Each table is identified by a name
(e.g. "Customers" or "Orders"). Tables contain records (rows) with data.
In this tutorial we will use the well-known Northwind sample database (included in
MS Access and MS SQL Server).
Below is a selection from the "Customers" table:
17 | P a g e
Tab. 2
Some of The Most Important SQL Commands
• SELECT - extracts data from a database
• UPDATE - updates data in a database
• DELETE - deletes data from a database
• INSERT INTO - inserts new data into a database
• CREATE DATABASE - creates a new database
• ALTER DATABASE - modifies a database
• CREATE TABLE - creates a new table
• ALTER TABLE - modifies a table
• DROP TABLE - deletes a table
• CREATE INDEX - creates an index (search key)
• DROP INDEX - deletes an index
18 | P a g e
REQUIREMENT SPECIFICATIONS
4.1 Hardware Requirement
The minimum hardware requirements for developing the project are as follows:
Processor Standard 32-bit/64-bit processor with a speed of 1.6 GHz+
RAM 2GB RAM or more
Hard Disk 20GB or more
Monitor Standard Colored monitor
4.2 Software Requirement
The minimum software requirements for developing this project are as follows:
Operating System Windows 7/8.0/8.1/10 /Linux
Server Apache Tomcat
19 | P a g e
METHODOLOGY
The underlying project deals with basic layout of Voice Mial System with simple
methodology.
It starts with login by entering a valid username and password. And user can communicate
with another people through a voice messages , text message as well as attachment.
The Login option performs user authentication process to check that user is authorised or not.
If user is authorised then new window will displays on the user interface. If user is not
authorised and needs a user id and password then user can register to click ‘Register’ option.
After clicking a new window will be opened and user can fill his/her details and gets a user id
and password. This operation is performed by Registration. After this user will be an
authorised user and go to Login option. After Login, User sends or receives messages. User
record voice message then Voice Mail System notifies the user to click option ‘Send’. After
communicate user can logout to click ‘Logout’ option, this task is performed by Logout
process. All messages should be stored by Data Base in a client account. Only authenticated
user can modify his inbox after clicking ‘Modify’ option. This system describe the
requirements associated with any communications functions required by this product,
including web browser(server).
It uses some basic concepts.
Basic Concept:-
The following project “Voice Mail System” is based on following concept:-
1. Sign Up:-
Signup is a process to register a user with some essential information. In my project , It
contains some fields such as name ,username, password, re-enter password, mobile nu-
mber, date of birth , gender. Username should be unique and password should be atleast 8
character and mobile no should be also unique.
2. Log in:-
It starts with login by entering a valid username and password. And user can
communicate with another people through a voice messages, text message as well as
attachment. After login, user moves to profile page. Login page has two “link need an
20 | P a g e
account” and “Forget Password” .
3. User Profile:-
After Login, user moves to his profile . And profile page contains a inbox, sent mailbox,
Setting, logout ,current date of the system, Details about user and compose option .Inbo-
x contains some attribute such as “From”, “Subject”, “Date” , “Message”, “Attechments”
User can see his inbox, sentmail , Date of message received , attachment and compose
a message and can logout.
4. Sent Mail:-
In my project, sent mail contains some attribute such as “To”, “Subject”, “Date” ,mes-
sage, Attachment which user can view .
5. Inbox Mail:-
In my project, Inbo-x contains some attribute such as “From”, “Subject”, “Date” , “Mes-
sage”, “Attechments”. User can see his inbox.
6. Setting:-
Controls of a computer hardware or software (or of a device, equipment, or machine) as p-
reset by its manufacturer. Some types of default settings may be altered or customized by
the user.
In my project, User can change password, update his profile picture and cover photo and l-
ogout.
7. Recover password:-
If you have forgotten your password and you previously entered when signing up for the
account or in your Preferences, and you still have access to that account, then this special
page can help you recover access to your account .Go to Password Reset. You can enter
your username and your mobile number . The system will set a new password to your
saved account that will allow you to retrieve your account. You can also change the
password after you log in.
7. compose mail:-
21 | P a g e
In my project, User can send a text message , voice message, attachment to another regis-
tered user . Text message has two field, first one is subject and second is text message area
. And then user can send an attachment after that user can sent recorded voice messge.
8. About Us:-
In my project ,About us page has details about “Voice Mail System” , developers as well
guider .
9. Help Desk:-
A service providing information and support to computer users, especially within a comp-
any. In my Project , Help desk has essential information which tells about “help for login”
, ”help for sign up” , “help user’s profile” and “help for sending voice” .
10. Contact Us:-
Answer Desk is ready to help you with whatever you need: Get help with developers .It
Contains details about developers which help to user’s question Answering
5.1 Existing system:-
The most common mail services that we use in our day today life cat be used by visually
challenged people.This is because they provide any facility so that the person in front can
hear out the content of the screen. Aslo they can visualize what is already present on screen
they can make out where to click in order to perform the required operations. For a visually
challenged person using a computer ,it is for a normal user even though it is user friendly.
5.2 Proposed model:-
The proposed system is based on a completely novel ideaand is nowhere like the existing
mail systems. The most important aspect that has been kept in mind while developing the
proposed system is accessibility. A web system is said to be perfectly accessible only if it can
be used efficiently by all types of people .
22 | P a g e
5.3 Figures/Tables
Fig.5 HOME PAGE
23 | P a g e
Fig.6 LOGIN PAGE
Fig.7 USER PROFILE PAGE
24 | P a g e
Fig.8 SIGN UP
Fig.9 SETTING PAGE
25 | P a g e
Fig.10 UPDATE COVER PHOTO PAGE
26 | P a g e
Fig.11 UPDATE PROFILE PHOTO PAGE
Fig.12 HELP DESK PAGE
27 | P a g e
Fig.13 COMPOSE MAIL PAGE
Fig.14 TEXT MAIL PAGE
28 | P a g e
Fig.15 ATTACHMENT MAIL PAGE
29 | P a g e
Fig.16 VOICE MAIL PAGE
Fig.17 WELCOME PAGE
30 | P a g e
Fig.18 UPLOAD COVER PAGE
Fig.19 UPLOAD PROFILE PAGE
31 | P a g e
Fig.20 VMAIL TABLE
Fig.21 MESSAGE TABLE
32 | P a g e
Fig.22 RECOVER PASSWORD PAGE
Fig.23 CONTACT PAGE
33 | P a g e
REFERENCES
[1] Wikipedia
[2] Rajib Mall, “Software Engineering Book”
[3] www.google.com
[4]W3school.com
[5]tutorialpoint.com
34 | P a g e
35 | P a g e

More Related Content

Similar to voice mail system final report

Senior Year Project
Senior Year ProjectSenior Year Project
Senior Year Project
Akshay Iyer
 
SECTZG629T_FR_2012HZ78512
SECTZG629T_FR_2012HZ78512SECTZG629T_FR_2012HZ78512
SECTZG629T_FR_2012HZ78512
Najeem M Illyas
 
Aisha Email System
Aisha Email SystemAisha Email System
Aisha Email System
IOSR Journals
 
ProposalRequirements document This is part 1 of the project, I .docx
ProposalRequirements document This is part 1 of the project, I .docxProposalRequirements document This is part 1 of the project, I .docx
ProposalRequirements document This is part 1 of the project, I .docx
denneymargareta
 

Similar to voice mail system final report (20)

A Project Paper On Smart Gym Management System
A Project Paper On Smart Gym Management SystemA Project Paper On Smart Gym Management System
A Project Paper On Smart Gym Management System
 
ONLINE FLAT BOOKING SERVICE MINOR PROJECT REPORT.
ONLINE FLAT BOOKING SERVICE MINOR PROJECT REPORT.ONLINE FLAT BOOKING SERVICE MINOR PROJECT REPORT.
ONLINE FLAT BOOKING SERVICE MINOR PROJECT REPORT.
 
Senior Year Project
Senior Year ProjectSenior Year Project
Senior Year Project
 
finalwithrec4
finalwithrec4finalwithrec4
finalwithrec4
 
SECTZG629T_FR_2012HZ78512
SECTZG629T_FR_2012HZ78512SECTZG629T_FR_2012HZ78512
SECTZG629T_FR_2012HZ78512
 
Mail server report
Mail server reportMail server report
Mail server report
 
Attendance management system project report.
Attendance management system project report.Attendance management system project report.
Attendance management system project report.
 
3 job adda doc 1
3 job adda doc 13 job adda doc 1
3 job adda doc 1
 
Aisha Email System
Aisha Email SystemAisha Email System
Aisha Email System
 
Voice Based E-Mail System For Blind People Using Speech Recognition Technology
Voice Based E-Mail System For Blind People Using Speech Recognition TechnologyVoice Based E-Mail System For Blind People Using Speech Recognition Technology
Voice Based E-Mail System For Blind People Using Speech Recognition Technology
 
Online Railway Reservation System
Online Railway Reservation SystemOnline Railway Reservation System
Online Railway Reservation System
 
3 job adda doc 1
3 job adda doc 13 job adda doc 1
3 job adda doc 1
 
ProposalRequirements document This is part 1 of the project, I .docx
ProposalRequirements document This is part 1 of the project, I .docxProposalRequirements document This is part 1 of the project, I .docx
ProposalRequirements document This is part 1 of the project, I .docx
 
10.project online exam system
10.project  online exam system10.project  online exam system
10.project online exam system
 
Sport.net(2).doc
Sport.net(2).docSport.net(2).doc
Sport.net(2).doc
 
Mail server_Synopsis
Mail server_SynopsisMail server_Synopsis
Mail server_Synopsis
 
Software Development
Software DevelopmentSoftware Development
Software Development
 
SRS wifistudy.com
SRS wifistudy.comSRS wifistudy.com
SRS wifistudy.com
 
Project Report
 Project Report Project Report
Project Report
 
SMART ASSIST SERVICE AT YOUR DOOR STEPS
SMART ASSIST SERVICE AT YOUR DOOR STEPSSMART ASSIST SERVICE AT YOUR DOOR STEPS
SMART ASSIST SERVICE AT YOUR DOOR STEPS
 

Recently uploaded

result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
Tonystark477637
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Christo Ananth
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
dollysharma2066
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
ankushspencer015
 
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 

Recently uploaded (20)

Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
NFPA 5000 2024 standard .
NFPA 5000 2024 standard                                  .NFPA 5000 2024 standard                                  .
NFPA 5000 2024 standard .
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
 
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 

voice mail system final report

  • 1. Voice Mail System A Major Project Report Submitted in partial fulfillment of the requirements for the award of the Degree of Bachelor of Technology In Information Technology Submitted By: Ajeet Singh Roll No. CSJMA12001390123 Durgesh Kumar Sharma Roll No. CSJMA12001390128 DEPARTMENT OF INFORMATION TECHNOLOGY UNIVERSITY INSTITUTE AND ENGINEERING AND TECHNOLOGY CSJM UNIVERSITY, KANPUR-208024, U.P. (INDIA) 1 | P a g e
  • 2. CERTIFICATE We hereby certify that the work which is being presented in the B.Tech. Major Project Report entitled “Voice Mail System” in partial fulfillment of the requirements for the award of Bachelor of Technology in Information Technology and submitted to the Department of Information and Technology, of University Institute and Engineering and technology, done by Mr. Ajeet Singh & Mr. Durgesh Kumar Sharma Roll No. CSJMA12001390123 & CSJMA12001390128 respectively is an authentic work carried out during a period of August 2015 to April 2016 under the supervision of Mr. Shubhendra Singh, Lecturer, IT Department. The matter presented in this thesis has not been submitted by us for the award of any other degree elsewhere. Signature of Candidates Ajeet Singh CSJMA12001390123 Duegesh Kumar Sharma CSJMA12001390128 This is to certify that the above statement made by the candidates is correct to the best of my knowledge. Date: 27/04/2016 Signature of Supervisor Mr. Shubhendra Singh Signature: Head of Department Department Information Technology UIET, CSJM UNIVERSITY, Kanpur 2 | P a g e
  • 3. ACKNOWLEDGEMENT Before we get into thick of the project report we would like to add a few heartfelt words for the people who were part of this project in numerous ways, people who gave unending support right from the stage the project idea was conceived. We wish to acknowledge with a great sense of gratitude to our guide Mr. Shubhendra Singh. It gives us immense pleasure to acknowledge our indebtedness to the various faculty members of U.I.E.T. CSJM University, Kanpur for helping us to design the project work as a part of our course curriculum. Ajeet Singh Durgesh Kumar Sharma 3 | P a g e
  • 4. TABLE OF CONTENTS 1. ABSTRACT........................................................................................................................................................5 2. INTRODUCTION.............................................................................................................................................6 3. LITERATURE REVIEW...................................................................................................................................7 3.1 Front End...................................................................................................................................................7 3.1.1 Fundamental of HTML..................................................................................................................7 3.1.2 Cascading Style Sheets ................................................................................................................8 3.1.3 J2EE………………………………………………………………………………………………...9 3.2 Back End…………………………………………………………………….……………………………………………..13 3.2.1 Java Database Connectivity…………………………………………………………………...13 4. SPECIFICATION REQUIREMENT………………………………………………………………………18 4.1 Hardware Requirement……………………………………………………………………………………………..18 4.2 Software Requirement………………………………………………………………………………18 5. METHODOLOGY……………………………………………………………………………………..…….………………..19 5.3 Working Process…………………….……………………….…………………………………………………………19 5.1 Existing System…………………………………………………………………………………………..……………..21 5.2 Proposed System…………………………………………………………………………………………..…………..21 6. SCREENSHOTS……………....…………………………………………………………………………………………………22 7. REFERENCES…………………………………………………………………………………………..………………………32 4 | P a g e
  • 5. LIST OF TABLES/FIGURES 1. FIGURE 1..........................................................................................................................................................1 2. FIGURE 2..........................................................................................................................................................1 3. FIGURE 3..........................................................................................................................................................1 4. FIGURE 4..........................................................................................................................................................1 5. FIGURE 5..........................................................................................................................................................1 6. FIGURE 6..........................................................................................................................................................1 7. FIGURE 7..........................................................................................................................................................1 8. FIGURE 8..........................................................................................................................................................1 9. FIGURE 9..........................................................................................................................................................1 10. FIGURE 10.....................................................................................................................................................1 11. FIGURE 11.....................................................................................................................................................1 12. FIGURE 12.....................................................................................................................................................1 13. FIGURE 13.....................................................................................................................................................1 14. FIGURE 14.....................................................................................................................................................1 5 | P a g e
  • 6. ABSTRACT The Voice Mail System (VMS) will be able to send voice messages from sender to receiver. It is a simple mailing system. The software developers use Oracle Data Base Management System software to store data. The speed of sending message should be depending upon size of voice messages and server. As above description, Users communicate each other via voice messages under server. So there is a need of external data base which is managed by server. User only sends and receives messages and rest of things should perform by server i.e. authentication, data base management, creating account for user etc. There is also need of internet connection for using this Voice Mail System application .The Login option performs user authentication process to check that user is authorised or not. If user is authorised then new window will displays on the user interface. If user is not authorised and needs a user id and password then user can register to click ‘Register’ option. After clicking a new window will be opened and user can fill his/her details and gets a user id and password. This operation is performed by Registration. After this user will be an authorised user and go to Login option.After Login, User sends or receives messages. User record voice message then Voice Mail System notifies the user to click option ‘Send’. After communicate user can logout to click ‘Logout’ option, this task is performed by Logout process. All messages should be stored by Data Base in a client account. Only authenticated user can modify his inbox after clicking ‘Modify’ option. This system describe the requirements associated with any communications functions required by this product, including web browser(server), network server communications protocols, electronic forms, and so on. It also define pertinent message formatting and Identify communication standards that will be used, such as FTP and HTTP. It also specify any communication security or encryption issues, data transfer rates, and synchronization mechanisms. 6 | P a g e
  • 7. INTRODUCTION The purpose of this document is to present a description of the voice mail system, a web base- d java application project. It will explain what is the purpose of voice mail system and what are the features and interfaces of the system, what the system will does, the constraints under which it must operate and how the system will react. This document is intended for both the instructors and the developers of the system .This section gives an overview of the functional- ity of the product. It describes the informal requirements and is used to establish a context for the technical requirements. The Voice Mail System is based on communication. It needs two active users to communicate, first sender who sends the message and second receiver who re- ceives the message. Messages are in form of voice that’s why we call it voice mail system . This application is based on client server communication. Many clients can use this applicati- on at same time. Every client communicates each other with a particular server. Every client, either senders or receivers, must have unique user identification (mail id) with the help of us- er id and password they will login first and server checks whether client is authorised or not. If client is an authenticated user then they send messages and perform communication other- wise they can’t proceed further. This is a small overview of voice mail system. The purpose of this software development project is to create a new application called Voice Mail System. The client for this project wishes to enter the PC-based internet environment. The Voice Mail System will be PC-base with an internet, allowing authenticated users to communicate throu- gh their voice. The application will provide the following capabilities. The application will be access via an internet on a PC at any place. Authenticated users will be able to manage their user accounts including remove, change, and add other users. For this task user must have a voice mail account. The application will provides facility to users to communicate through recording their voice as long as sending text messages. The project's client has determined that this application will provide the following benefits: • Provide additional flexibility and convenience to the voice mail users. • Provide better reliability and security of the user information. • Provide a more productive environment for the users. • Reduce the cost of typing. 7 | P a g e
  • 8. LITERATURE REVIEW The literature is divided into two sections. Section 3.1 contains Fundamental of HTML, CSS ,J2EE and section 3.2 contains Fundamentals of Orcale Database. 3.1 FRONT END: 3.1.1. FUNDAMENTAL OF HTML: HTML stands for Hyper Text MarkUp Language and it is most widely used langu- age to write Web Pages . • Hypertext refers to the way in which Web pages (HTML documents) are link- ed together. Thus the link available on a web page are called Hypertext. • As its name suggests, HTML is a Markup Language which means you use HTML to simply "mark up" a text document with tags that tell a Web browser how to structure it to display.Originally, HTML was developed with the intent of defining the structure of documents like headings, paragraphs, lists, and so forth to facilitate the sharing of scientific information between researchers. As told earlier, HTML is a markup language and makes use of various tags to format the content. These tags are enclosed within angle braces <Tag Name>.Except few tags, most of the tags have their corresponding closing tags. For example <html> has its closing tag </html> and <body> tag has its closing tag </body> tag etc. Tag Description <! DOCTYPE...> This tag defines the document type and HTML version. <html> This tag encloses the complete HTML document and mainly comprises of document header which is represented by <head>...</head> and document body which is represented by <body>...</body> tags. <head> This tag represents the document's header which can keep other HTML tags like <title>, <link> etc. <title> The <title> tag is used inside the <head> tag to mention the document title. 8 | P a g e
  • 9. <body> This tag represents the document's body which keeps other HTML tags like <h1>, <div>, <p> etc. Table:1 html tags 3.1.2. CASCADING STYLE SHEETS: Cascading Style Sheets, fondly referred to as CSS, is a simple design language intended to simplify the process of making web pages presentable. CSS handles the look and feel part of a web page. Using CSS, you can control the color of the text, the style of fonts, the spacing between paragraphs, how columns are sized and laid out, what background images or colors are used, layout designs ,variations in display for different devices and screen sizes as well as a variety of other effects. CSS is easy to learn and understa- nd but it provides powerful control over the presentation of an HTML document. Most commonly, CSS is combined with the markup languages HTML or XHTML. Styling can be added to HTML elements in 3 ways: • Inline - using a style attribute in HTML elements. • Internal - using a <style> element in the HTML <head> section. • External - using one or more external CSS files. Inline css: Inline styling is used to apply a unique style to a single HTML element: Inline styling uses the style attribute .This example changes the text color of the <h1> element to blue: <h1 style="color:blue;">This is a Blue Heading</h1> Internal css: Internal styling is used to define a style for one HTML page.Internal styling is defined in the <head> section of an HTML page, within a <style> element: <!DOCTYPE html> <html> <head> <style> body {background-color:lightgrey;} h1 {color: blue;} p {color: green;} </style> 9 | P a g e
  • 10. </head> <body> <h1>This is a heading</h1> <p>This is a paragraph.</p> </body></html> External css: An external style sheet is used to define the style for many pages. With an external style sheet, you can change the look of an entire web site by changing one file .To use an external style sheet, add a link to it in the <head> section of the HTML. EXAMPLE:- <!DOCTYPE html> <html> <head> <link rel="stylesheet" href="styles.css"> </head> <body> <h1>This is a heading</h1> <p>This is a paragraph.</p> </body> </html> An external style sheet can be written in any text editor. The file should not contain a- ny html tags. The style sheet file must be saved with a .css extension. Here is how the "styles.css" looks: body { background-color: lightgrey; } h1 { color: blue; } p { color:green; } 10 | P a g e
  • 11. 3.1 J2EE: Using the Java 2 Platform, Standard Edition (J2SE) as a basis, Java 2 Platform, Enterprise Edition (J2EE) builds on top of this to provide the types of services that are necessary to build large scale, distributed, component based, multi-tier applications. Essentially, J2EE is a collection of APIs that can be used to build such systems, although this is only half of the picture. J2EE is also a standard for building and deploying enterprise applications, held together by the specifications of the APIs that it defines and the services that J2EE provides. In other words, this means that the "write once, run anywhere" promises of Java apply for enterprise applications too: • Enterprise applications can be run on different platforms supporting the Java 2 plateform. • Enterprise applications are portable between application servers supporting the J2EE. J2EE is comprised of many APIs that can be used to build enterprise applications. Although the total list of APIs initially seems overwhelming, it is worth bearing in mind that some are primarily used by the J2EE environment in which your application executes, while some provide services that your specific application may not require. Therefore, it is worth remembering that you don't have to use all of them in order to build J2EE applications. For completeness, however, the full list of technologies that make up J2EE is as follows: • Java Servlet • Java Server Pages (JSP) • Java Database Connectivity (JDBC) Java Servlet: Servlet Technology is used to create web applications. Servlet technology uses java language to create applications. Web applications are helper applications that reside at web server and build dynamic web pages. A dynamic page could be anything like a page that randomly chooses picture to display or even a page that displays the cu- rrent time. As Servlet Technology uses Java, web applications made using Servlet are Secured, Scalable and Robust. 11 | P a g e
  • 12. Fig.1 client-server model Advantages of using Servlets • Less response time because each request runs in a separate thread. • Servlets are scalable. • Servlets are robust and object oriented. • Servlets are platform independent. Servlet Architecture:- Following diagram shows the position of Servlets in a Web application. Fig.2 Servlet Architecture Servlet Life Cycle :A servlet life cycle can be defined as the entire process from its creation till the destruction. The following are the paths followed by a servlet. • The servlet is initialized by calling the init () method. • The servlet calls service() method to process a client's request. • The servlet is terminated by calling the destroy() method. • Finally, servlet is garbage collected by the garbage collector of the JVM. 12 | P a g e
  • 13. Fig.3 Servlet life cycle Java Server Pages (JSP) :- Java Server Pages (JSP) is a technology for developing web pages that support dynamic content which helps developers insert java code in HTML pages by making use of special JSP tags, most of which start with <% and end with %>. A Java Server Pages component is a type of Java servlet that is designed to fulfill the role of a user interface for a Java web application. Web developers write JSPs as text files that combine HTML or XHTML code, XML elements, and embedded JSP actions and commands. Using JSP, you can collect input from users through web page forms, present records from a database or another source, and create web pages dynamically. JSP tags can be used for a variety of purposes, such as retrieving information from a database or registering user preferences, accessing JavaBeans components, passing control between pages and sharing information between requests, pages etc. Java Server Pages often serve the same purpose as programs implemented using the Common Gateway Interface (CGI). But JSP offer several advantages in comparison with the CGI. •Performance is significantly better because JSP allows embedding Dynamic Elements in HTML Pages itself instead of having a separate CGI files. •JSP are always compiled before it's processed by the server unlike CGI/Perl which requires the server to load an interpreter and the target script each time the page is requested. •Java Server Pages are built on top of the Java Servlets API, so like Servlets, JSP also has access to all the powerful Enterprise Java APIs, including JDBC, JNDI, EJB, JAXP etc. 13 | P a g e
  • 14. • JSP pages can be used in combination with servlets that handle the business logic, the model supported by Java servlet template engines. Finally, JSP is an integral part of Java EE, a complete platform for enterprise class applications. This means that JSP can play a part in the simplest applications to the most complex and demanding. A JSP life cycle can be defined as the entire process from its creation till the destruction which is similar to a servlet life cycle with an additional step which is required to compile a JSP into servlet. The following are the paths followed by a JSP •Compilation •Initialization •Execution •Cleanup Fig.3 JSP Life Cycle 3.2 Back End 3.2.1 Java Database Connectivity (JDBC) :- JDBC stands for Java Database Connectivity, which is a standard Java API for database-independent connectivity between the Java programming language and a 14 | P a g e
  • 15. wide range of databases. The JDBC library includes APIs for each of the tasks mentioned below that are commonly associated with database usage. • Making a connection to a database. • Creating SQL or MySQL statements. • Executing SQL or MySQL queries in the database. • Viewing & Modifying the resulting records. Fundamentally, JDBC is a specification that provides a complete set of interfaces that allows for portable access to an underlying database. Java can be used to write different types of executables, such as – • Java Applications • Java Applets • Java Servlets • Java Server Pages (JSPs) • Enterprise JavaBeans (EJBs) JDBCArchitecture:- The JDBC API supports both two-tier and three-tier processing models for database access but in general, JDBC Architecture consists of two layers − • JDBC API: This provides the application-to-JDBC Manager connection. • JDBC Driver API: This supports the JDBC Manager-to-Driver Connection. The JDBC API uses a driver manager and database-specific drivers to provide transparent connectivity to heterogeneous databases. The JDBC driver manager ensures that the correct driver is used to access each data source. The driver manager is capable of supporting multiple concurrent drivers connected to multiple heterogeneous databases. Following is the architectural diagram, which shows the location of the driver manager with respect to the JDBC drivers and the Java application − 15 | P a g e
  • 17. SQL:- SQL (pronounced "ess-que-el") stands for Structured Query Language. SQL is used to communicate with a database. According to ANSI (American National Standards Institute), it is the standard language for relational database management systems. SQL statements are used to perform tasks such as update data on a database, or retrieve data from a database. Some common relational database management systems that use SQL are: Oracle, Sybase, Microsoft SQL Server, Access, Ingres, etc. Although most database systems use SQL, most of them also have their own additional proprietary extensions that are usually only used on their system. However, the standard SQL commands such as "Select", "Insert", "Update", "Delete", "Create", and "Drop" can be used to accomplish almost everything that one needs to do with a database. This tutorial will provide you with the instruction on the basics of each of these commands as well as allow you to put them to practice using the SQL Interpreter Using SQL in Your Web Site To build a web site that shows data from a database, you will need: • An RDBMS database program (i.e. MS Access, SQL Server, MySQL) • To use a server-side scripting language, like PHP or ASP • To use SQL to get the data you want • To use HTML / CSS RDBMS:- • RDBMS stands for Relational Database Management System. • RDBMS is the basis for SQL, and for all modern database systems such as MS SQL Server, IBM DB2, Oracle, MySQL, and Microsoft Access. • The data in RDBMS is stored in database objects called tables. • A table is a collection of related data entries and it consists of columns and rows. Database Tables:- A database most often contains one or more tables. Each table is identified by a name (e.g. "Customers" or "Orders"). Tables contain records (rows) with data. In this tutorial we will use the well-known Northwind sample database (included in MS Access and MS SQL Server). Below is a selection from the "Customers" table: 17 | P a g e
  • 18. Tab. 2 Some of The Most Important SQL Commands • SELECT - extracts data from a database • UPDATE - updates data in a database • DELETE - deletes data from a database • INSERT INTO - inserts new data into a database • CREATE DATABASE - creates a new database • ALTER DATABASE - modifies a database • CREATE TABLE - creates a new table • ALTER TABLE - modifies a table • DROP TABLE - deletes a table • CREATE INDEX - creates an index (search key) • DROP INDEX - deletes an index 18 | P a g e
  • 19. REQUIREMENT SPECIFICATIONS 4.1 Hardware Requirement The minimum hardware requirements for developing the project are as follows: Processor Standard 32-bit/64-bit processor with a speed of 1.6 GHz+ RAM 2GB RAM or more Hard Disk 20GB or more Monitor Standard Colored monitor 4.2 Software Requirement The minimum software requirements for developing this project are as follows: Operating System Windows 7/8.0/8.1/10 /Linux Server Apache Tomcat 19 | P a g e
  • 20. METHODOLOGY The underlying project deals with basic layout of Voice Mial System with simple methodology. It starts with login by entering a valid username and password. And user can communicate with another people through a voice messages , text message as well as attachment. The Login option performs user authentication process to check that user is authorised or not. If user is authorised then new window will displays on the user interface. If user is not authorised and needs a user id and password then user can register to click ‘Register’ option. After clicking a new window will be opened and user can fill his/her details and gets a user id and password. This operation is performed by Registration. After this user will be an authorised user and go to Login option. After Login, User sends or receives messages. User record voice message then Voice Mail System notifies the user to click option ‘Send’. After communicate user can logout to click ‘Logout’ option, this task is performed by Logout process. All messages should be stored by Data Base in a client account. Only authenticated user can modify his inbox after clicking ‘Modify’ option. This system describe the requirements associated with any communications functions required by this product, including web browser(server). It uses some basic concepts. Basic Concept:- The following project “Voice Mail System” is based on following concept:- 1. Sign Up:- Signup is a process to register a user with some essential information. In my project , It contains some fields such as name ,username, password, re-enter password, mobile nu- mber, date of birth , gender. Username should be unique and password should be atleast 8 character and mobile no should be also unique. 2. Log in:- It starts with login by entering a valid username and password. And user can communicate with another people through a voice messages, text message as well as attachment. After login, user moves to profile page. Login page has two “link need an 20 | P a g e
  • 21. account” and “Forget Password” . 3. User Profile:- After Login, user moves to his profile . And profile page contains a inbox, sent mailbox, Setting, logout ,current date of the system, Details about user and compose option .Inbo- x contains some attribute such as “From”, “Subject”, “Date” , “Message”, “Attechments” User can see his inbox, sentmail , Date of message received , attachment and compose a message and can logout. 4. Sent Mail:- In my project, sent mail contains some attribute such as “To”, “Subject”, “Date” ,mes- sage, Attachment which user can view . 5. Inbox Mail:- In my project, Inbo-x contains some attribute such as “From”, “Subject”, “Date” , “Mes- sage”, “Attechments”. User can see his inbox. 6. Setting:- Controls of a computer hardware or software (or of a device, equipment, or machine) as p- reset by its manufacturer. Some types of default settings may be altered or customized by the user. In my project, User can change password, update his profile picture and cover photo and l- ogout. 7. Recover password:- If you have forgotten your password and you previously entered when signing up for the account or in your Preferences, and you still have access to that account, then this special page can help you recover access to your account .Go to Password Reset. You can enter your username and your mobile number . The system will set a new password to your saved account that will allow you to retrieve your account. You can also change the password after you log in. 7. compose mail:- 21 | P a g e
  • 22. In my project, User can send a text message , voice message, attachment to another regis- tered user . Text message has two field, first one is subject and second is text message area . And then user can send an attachment after that user can sent recorded voice messge. 8. About Us:- In my project ,About us page has details about “Voice Mail System” , developers as well guider . 9. Help Desk:- A service providing information and support to computer users, especially within a comp- any. In my Project , Help desk has essential information which tells about “help for login” , ”help for sign up” , “help user’s profile” and “help for sending voice” . 10. Contact Us:- Answer Desk is ready to help you with whatever you need: Get help with developers .It Contains details about developers which help to user’s question Answering 5.1 Existing system:- The most common mail services that we use in our day today life cat be used by visually challenged people.This is because they provide any facility so that the person in front can hear out the content of the screen. Aslo they can visualize what is already present on screen they can make out where to click in order to perform the required operations. For a visually challenged person using a computer ,it is for a normal user even though it is user friendly. 5.2 Proposed model:- The proposed system is based on a completely novel ideaand is nowhere like the existing mail systems. The most important aspect that has been kept in mind while developing the proposed system is accessibility. A web system is said to be perfectly accessible only if it can be used efficiently by all types of people . 22 | P a g e
  • 23. 5.3 Figures/Tables Fig.5 HOME PAGE 23 | P a g e
  • 24. Fig.6 LOGIN PAGE Fig.7 USER PROFILE PAGE 24 | P a g e
  • 25. Fig.8 SIGN UP Fig.9 SETTING PAGE 25 | P a g e
  • 26. Fig.10 UPDATE COVER PHOTO PAGE 26 | P a g e
  • 27. Fig.11 UPDATE PROFILE PHOTO PAGE Fig.12 HELP DESK PAGE 27 | P a g e
  • 28. Fig.13 COMPOSE MAIL PAGE Fig.14 TEXT MAIL PAGE 28 | P a g e
  • 29. Fig.15 ATTACHMENT MAIL PAGE 29 | P a g e
  • 30. Fig.16 VOICE MAIL PAGE Fig.17 WELCOME PAGE 30 | P a g e
  • 31. Fig.18 UPLOAD COVER PAGE Fig.19 UPLOAD PROFILE PAGE 31 | P a g e
  • 32. Fig.20 VMAIL TABLE Fig.21 MESSAGE TABLE 32 | P a g e
  • 33. Fig.22 RECOVER PASSWORD PAGE Fig.23 CONTACT PAGE 33 | P a g e
  • 34. REFERENCES [1] Wikipedia [2] Rajib Mall, “Software Engineering Book” [3] www.google.com [4]W3school.com [5]tutorialpoint.com 34 | P a g e
  • 35. 35 | P a g e