Ask Software Engineering Expert

The Assignment -

In this assignment, you are to implement a 3-tier enterprise application based on the following scenario.

The application scenario

An online device sale company needs to implement an e-business system. The system is a typical 3- tier enterprise application that integrates a presentation tier, a business tier and a persistence tier. After user requirement and budget analysis, the executive of IT Department of the company has decided to use Java EE open source technology and related platforms and tools for the implementation of the system. As an officer of the IT Department of the company, you are delegated as the developer of the system core. To accomplish this task, you will need to design, implement, test and document the e-business system.

The assignment specification

1. The persistence tier

a. The company sells only 2 products, laptops and smart phones, and may extend to more products in the future through this general framework. A major assumption is that the 2 products share some common properties. For example, both laptops and smart phones have the properties of Brand, Model, Size of Display, Weight, OS, Camera and Wi-Fi etc. However, a laptop has speciality properties such as a Network Interface (e.g. 1000G Ethernet LAN), Hard Drive and Optical Drive etc.; a smart phone has speciality properties such as Cellular Connectivity (e.g. 4G 700/750/800/900/1800/2100), Location (e.g. GPS) and SIM Card (e.g. Nano or Micro).

b. The product information must be persisted into a Derby database. You are required to use Java Persistence API (JPA) to persist the product information into a Derby database. In order to reduce code redundancy, you should use inheritance mapping. That is, in your design and implementation, the Java entity classes should be at least 3 with 1 class as the super class to abstract the common properties and operations for the 2 products and the other 2 classes as the sub-class for the specialty of each product. You are required to use the JoinedSubclass Strategy (detailed from page 170 of the textbook) in your design and implementation.

c. The company needs to store customer details and customer orders. You are required to use entities to persist customer details and customer orders. The relationship between a customer and his/her orders must be one-to-many (detailed from page 156 of the textbook), i.e. a customer can have multiple orders, and each order is just for one product item only.

2. The business tier

Develop the business tier by using Enterprise Java Beans (EJB). The business tier will process the data persistence or retrieval requests from users and interact with the persistence tier for accomplishing the requests.

Note: to interact with the persistence tier, the EJBs need to use Java Persistence Query Language (JPQL) to query entities and return the processed results to the presentation tier.

3. The presentation tier

Develop the presentation tier by using JavaServer Faces (JSF). The presentation tier will provide a web-based user interface, which will allow users to enter product details, customer details and order details and retrieve these saved information later on. Presenting exception messages, e.g. a user doesn't enter data for a required text field, is necessary and required for this tier.

Note: you need to review Backing Beans (Managed Beans) as the core component of presentation tier and its functions for JSF pages' navigation (detailed from page 354 of the textbook) and do some personal research if necessary.

To demonstrate success, you are required to implement all the required entities, EJBs and JSF pages (.xhtml files) and managed beans. To submit your assignment, you need to provide:

Part 1: Documentation

The diagram of architecture: it should include major components from all 3 tiers, which are depicted by using any formal method e.g. UML.

The typical workflow: you need to use an example workflow, e.g. creating a customer's order, to describe the tier components interaction and JSF pages navigation. The end user manual and test instruction: you are required to provide detailed instructions about how a user would compile and deploy the software and use the software to persist at least 2 products, 2 customers, where each customer puts in at least 2 orders.

Part 2: Software

You will have 2 options to provide the complete implementation code of the 3 tiers, including Java source code and executable files, persistence files and JavaServer Faces xhtml pages. You can provide your implementation by either a Maven project or a NetBeans project, which must satisfy:

1. The project can be compiled directly without any further revision/re-development or debugging.

2. The generated .war application from the project can be executed on a separate/independent GlassFish server (not the NetBeans embedded one) to interact with a separate/independent Derby database (not the NetBeans embedded one).

A Demonstration of the Functionality of the e-Business System of Assignment-

1. The main JSF page of the e-business system

2. Create a product e.g. a book or a CD

3. Create a custome

4. Check the product stocks

5. List customers

6. Create an order

Note: before creating an order for a book, the number of books in the stock is 20.

Creating an order for a book

7. List of orders

8. Search for a product

9. Search for a customer

10. Search for an order

11. Delete an order

Note: before deleting the order of the CD: Take ME Home, the number of CDs is 78.

12. Page navigation

The main entry of page navigation is the main page of the e-Business system.

Attachment:- Assignment Files.rar

Software Engineering, Computer Science

  • Category:- Software Engineering
  • Reference No.:- M92453167

Have any Question?


Related Questions in Software Engineering

In this assignment you will answer the following questions

In this assignment, you will answer the following questions related to Android platform and Android security design. 1. Describe Android architecture in detail by explaining the four conceptual layers. 2. Describe Androi ...

The research paper for this course is about some of the

The research paper for this course is about some of the best sources of digital evidence for child abuse and exploitation, domestic violence, and gambling according to the National Institute of Justice. Research commerci ...

Research projectin the course we have covered various

RESEARCH PROJECT In the course, we have covered various security and privacy issues that arise in the cyberspace field. We have learned to identify these risks and have discussed the current approaches and developments f ...

Overviewyou are required to modify and logically extend

Overview You are required to modify and logically extend the functionality of a provided code base to implement a game. This requires you to modify the code base as well as create documentation and implement various user ...

Address the following integrating biblical perspectives

Address the following, integrating biblical perspectives where appropriate: Define a hate crime and describe how white supremacist groups use the Internet to spread their message of hate. Explain why hate crime legislati ...

In this assignment you will answer the following review

In this assignment, you will answer the following review questions from the reading materials of the module/week. 1. "What are the key components of a typical P2P application? Describe their functions." 2. "What are the ...

Write reply to this article with references with apa

Write reply to this article with references with APA bibliography. Hate Crimes Over the past couple of years, hate crimes have been on the rise in America's largest cities. Studies show that there were sharp spikes in th ...

Reply to this article with apa referencehate crimes

Reply to this article with APA reference. Hate crimes According to Merriam-Webster, hate crime is any of various crimes (such as assault or defacement of property) when motivated by hostility to the victim as a member of ...

Proposaldesign of an efficient gps tracking system tag for

Proposal Design of an efficient GPS Tracking System (tag) for monitoring small species IMPLEMENTING EMBEDDED SYSTEMS USING SYSML Task Using PapyrusSysML Software (Downloadable online - Evaluation Copy- Latest Version) Mo ...

Write review on this article with apa formatgovernment

Write review on this article with APA format. Government surveillance is a major issue in the United States and globally. Surveillance refers to any collection and processing of personal data, whether, identifiable or no ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As