Intranet Mail System

Check out more papers on Computer Computer Networking Database



This motive of this project is to develop a Intranet web server which makes the users to use the functions such as receiving and sending mail through this server and the users are provided with the environment of GUI so it provides the users easy means of sending and receiving mail and the administrators also provided with the facility to create and delete the user account. This web server which we develop first starts with the welcome page and the page prompts the user to sign in with the pretreated username and with the authenticated password. After this the user can use the facility of sending and retrieve mails using the Intranet web server. The Intranet web server is similar to the mail system which the common people use which asks the username and a password for authentication after it verifies the user and then the user is allowed to retrieve and send mail but the only difference with this Intranet Mail server is that communicate with the people by the means of one common domain or to use internal webs for the better communication cut costs, speed up business processes and, more recently, increase revenue through e-commerce

Don't use plagiarized sources. Get your custom essay on

“Intranet Mail System”

Get custom essay



An intranet is a private computer network that uses Internet Protocol technology to securely share any part of an organization’s information or network operating system within that organization. The term is used in contrast to internet, a network between organizations, and instead refers to a network within an organization. Sometimes the term refers only to the organization’s internal website, but may be a more extensive part of the organization’s information technology infrastructure. It may host multiple private websites and constitute an important component and focal point of internal communication and collaboration. Any of the well known Internet protocols may be found in an intranet, such as HTTP (web services), SMTP (e-mail), and FTP (file transfer protocol). Internet technologies are often deployed to provide modern interfaces to legacy information systems hosting corporate data. Intranets may provide a gateway to the Internet by means of a network gateway with a firewall, shielding the intranet from unauthorized external access. The gateway often also implements user authentication, encryption of messages, and often virtual private network (VPN) connectivity for off-site employees to access company information, computing resources and internal communication.


The Intranet Mail Server is applicable in this century forwarding success and growth for persons or unemployed who are in search for job or those who work on shifts. Many of the organizations nowadays work on shift basis due to heavy work load and so to this load by shifts. So for people who work on shifts, intranet mail server proves to be more beneficial, by providing this service to the employees who work within an organization and the employees can register themselves and thereby it reduces the work load of an employee and easier transactions of information and documents. No necessity of paying money for the mailing facility (i.e. free of cost). Merits of preferring intranet mail service over other mail service so as to reduce the time usually required by our traditional mailing system ie internet mailing system. Also no internet connection is required this is main advantage of our mailing system. Intranet mailing system is used within a wide range in a organizations reaching various departments or branches and requires just a single host server. This system can be used only by the employee of an organization as it is been secured and registered by a particular employee, due to this the information or any document remain secured and confidential without the problem of insecurity. The multiple numbers of branches are linked to a host and then an employee of within organization only uses this facility. An employee or user can send particular data between branches.


The users of Intranet Mailing System are given a unique login id and must give the correct password. It gives total security for us. So unauthorized user can’t allow seeing our messages. Even if the user forgets his/her password reminding facility by which the user can recollect the password and log into the system. The main advantage of the Intra mail system is its security feature allowing only registered users to access the system and preventing any hackers, unauthorized users. As the access for the IMS is only restricted to the people registered within the organization itself and information is transferred within the organization itself, and all this transformation will be up to some limit so the data transformation will be fast



* Workforce productivity: Intranets can help users to locate and view information faster and use applications relevant to their roles and responsibilities. With the help of a web browser interface, users can access data held in any database the organization wants to make available, anytime and – subject to security provisions – from anywhere within the company workstations, increasing employees’ ability to perform their jobs faster, more accurately, and with confidence that they have the right information. It also helps to improve the services provided to the users. * Time: Intranets allow organizations to distribute information to employees on an as-needed basis; Employees may link to relevant information at their convenience, rather than being distracted indiscriminately by electronic mail. * Communication: Intranets can serve as powerful tools for communication within an organization, vertically and horizontally. From a communications standpoint, intranets are useful to communicate strategic initiatives that have a global reach throughout the organization. The type of information that can easily be conveyed is the purpose of the initiative and what the initiative is aiming to achieve, who is driving the initiative, results achieved to date, and who to speak to for more information. By providing this information on the intranet, staff have the opportunity to keep up-to-date with the strategic focus of the organization. Some examples of communication would be chat, email, and or blogs. A great real world example of where an intranet helped a company communicate is when Nestle had a number of food processing plants in Scandinavia. Their central support system had to deal with a number of queries every day. When Nestle decided to invest in an intranet, they quickly realized the savings. McGovern says the savings from the reduction in query calls was substantially greater than the investment in the intranet. * Web publishing allows cumbersome corporate knowledge to be maintained and easily accessed throughout the company using hypermedia and Web technologies. Examples include: employee manuals, benefits documents, company policies, business standards, newsfeeds, and even training, can be accessed using common Internet standards (Acrobat files, Flash files, CGI applications). Because each business unit can update the online copy of a document, the most recent version is usually available to employees using the intranet. * Business operations and management: Intranets are also being used as a platform for developing and deploying applications to support business operations and decisions across the internetworked enterprise. * Cost-effective: Users can view information and data via web-browser rather than maintaining physical documents such as procedure manuals, internal phone list and requisition forms. This can potentially save the business money on printing, duplicating documents, and the environment as well as document maintenance overhead. “In 1996, Cisco processed 54,000 reports and the amount of dollars processed was USD19 million”. * Enhance collaboration: Information is easily accessible by all authorised users, which enables teamwork. * Cross-platform capability: Standards-compliant web browsers are available for Windows, Mac, and UNIX. * Built for one audience: Many companies dictate computer specifications which, in turn, may allow Intranet developers to write applications that only have to work on one browser (no cross-browser compatibility issues). Being able to specifically address your “viewer” is a great advantage. Since Intranets are user-specific (requiring database/network authentication prior to access), you know exactly who you are interfacing with and can personalize your Intranet based on role (job title, department) or individual (“Congratulations Jane, on your 3rd year with our company!”). * Promote common corporate culture: Every user has the ability to view the same information within the Intranet. * Immediate updates: When dealing with the public in any capacity, laws, specifications, and parameters can change. Intranets make it possible to provide your audience with “live” changes so they are kept up-to-date, which can limit a company’s liability. * Supports a distributed computing architecture: The intranet can also be linked to a company’s management information system, for example a time keeping system.


To send any information they have to send manually, which is very difficult to perform and it will take lot of time. In order to transfer information from one department to another they have to maintain much number of employees which is difficult. Sometimes there is a chance that workers may make mistakes such as incorrect delivery of information, loss of files, etc… This will lead to huge loss to the organization if the information is important. While information is transferring from one department to another department there is no security With the increasingly prevalent use of e-mail as a communication device, companies have opened themselves to an additional and substantial set of risks. Large companies are quickly learning the value of a serious e-mail policy. For example: Employees at Xerox were downloading such a high volume of pornography that the information system became saturated, and legitimate e-mails could not get through. As aresult of investigation, 40 employees were fired. Dow Chemical had a policy against pornographic e-mail. When they violated the policy, 64 workers were fired and 230were disciplined. More than 20 workers at the New York Times Company were fired for sending or receiving e-mails with sexual images and offensive jokes. Another 20 workers were reprimanded.9 These examples show the increasing trend of companies toward the adoption and enforcement of specific e-mail policies. As evidenced by some of the cases described here, these risks can potentially lead to significant financial losses. It is, therefore, imperative that contemporary companies assess the possibility and magnitude of these risks and accordingly design, implement and enforce comprehensive e-mail policies.


The main Aim of the project is to perform all the activities by the Intranet mail system in an organization or in a company so that this will reduce the transferring of the mail manually. We can reduce the number of workers and speed up the information transferring by providing the computer based system for their needs. We can also provide easy communication between different departments of the organization. It also provides high security for the information.


Following are the most basic steps in setting up an intranet .


Implementing an intranet must fit your organization to be effective. Before you start creating intranet mail server make sure what you want to achieve with your intranet. take the size and complexity of your organization into consideration and understand how the intranet can enhance your organization productivity


In order an intranet for your organization you first have to build a network. this usually requires a server, web server software such as Apache or Microsoft IIS and either wifi connections and cards or Ethernet cables and a NIC.

Intranet software

While you will usually have the server software on hand ,running as intranet means that individuals in your organization will access to find documents ,download drivers and updates and conduct searches for information that they are searching for. Some of the essential web features that you will want to add are: ClientManaging Function: The Client Managing function gives you the administrating control the intranet mail server, such as adding users, removing users and keeping the intranet running smoothly.

Employee Directory:

One of the most used features of any intranet mail servers is the employee directory. How many employees are always looking for contact info, whether it is a phone number , email, address ,fax ,title and some can even include an organizational chart

Project Management:

A great time saver is the ability for many people within an organization to collaborate an a project whether it is a basic as a mission statement or as a budjet. Document share: Your organization will want to make available certain information for its members when they need it. This can mean important documents such as reports or other types of documents such as health benefit materials.

Shared calendar

A great feature to have if you worek within a work group or small organization is to know others schedule so that you can know project time lines.

Company news:

One of the ways that the organization can communicate with its members is with the company news


Now you have planned about your Intranet mail server,have purchased all the necessary hardware and software now you can build up the intanet mail system.Building your intranet mail server is not putting all the hardware and software together but it also means that you make available the information and tools necessary for your organization members to use the intranet mail server effectively.


There are three ways of managing an intranet:

  1. A single, tightly managed server: only approved documents get posted, and the site has a single, well-structured information architecture and navigation system under the control of a single designer. Even though this approach maximizes usability of the information that passes the hurdles and gets posted, this is not the best way to build a corporate information infrastructure because the central choke point delays the spread of new and useful information. A totalitarian intranet will cause you to miss too many opportunities.
  2. A mini-Internet: multiple servers are online but are not coordinated, complete chaos reigns, you have to use “resource discovery” methods like spiders to find out what is on your own intranet, no consistent design (everybody does their own pages), no information architecture. This approach might seem to increase opportunities for communication across the company, but in reality does not do so since people will be incapable of finding most of the information in an anarchy.
  3. Managed diversity: many servers are in use, but pages are designed according to a single set of templates and interface standards; the entire intranet follows a well-planned (and usability-tested) information infrastructure that facilitates navigation. This is my preferred approach.

Literature Review of Subject

For any organization to reach great heights and success can be obtained only by good corporation of employee between themselves and cooperation of head of organization with the employees so as to get the feedback from them and do necessary needs requires, this is nothing but a theoretical concept for intranet mailing system called as Corporate communication. In their early stages, when there was no such system people lacked knowledge about various design standards, definite structure of an information, support from other organizations so the employees lacked adequate information that they were looking into and therefore they couldn’t reach their aim for a particular information. In recent years, the organization has seen tremendous development due to Intranets to solve not only existing collaborative efforts and put all the online potential. To interpret the capability and efficiency of Intranet Mail Server, interviews, periodicals, previously accomplished case studies and past personal experience, adopting these techniques this research shows that the corporate world is seeing Intranets as an important contributor towards reaching their corporate vision. This system not only reduces the cost of the computer mailing system but also provides information with greater speed and efficiency. In the last few years Internet turn into complex part of everyday experience. It serves as a line of approach for personal or private communication worldwide. After the internet and world wide web arrives this field has been back into existence. Initially software makers concentrated on web browsers. The internet knowledge is shared among the people later. Then the software makers got an opportunity to involve corporate customer to design intranets. Then the storage of employee data on paper are reduced and also no need to go to the human resource office to update the personnel information. Then there is a cut down in cost to afford the employees of an organization for the corporate meetings. Instead of that they have their meeting at their desks. In this process intranets are saving a number of hours and money and also improving corporate communication. If the communication is forever good then there is a growth in corporate culture. Intranets provide users to have quick access to resources in an organization. The corporations should be aware of success when they setup and intranet.


The rapid growth of the Internet and World-Wide Web(WWW) has allowed more people access to global computer network and network applications. Internet Service Providers (ISP) profit by offering many kinds of Internet services such as electronic mail, WWW, FTP, and others. Some closed computer user groups such as companies, research centers, or a universities, have opted for smaller, Internet-like network environments called ‘Intranets’. Intranets provide integrated network services using Internet technologies that are, technically, the same as Internet’s. Intranet services, however, are more integrated and task specific services with consistent user interfaces. Intranet is gradually replacing old proprietary messaging systems such as Bulletin Board Systems (BBS) and document processing systems. Electronic mail service is one of the most popular and essential services in both Internet and Intranet. There could be no Internet/Intranet services without the electronic mail service. Mail server is a computer system that sends and receives electronic messages for a number of users in a certain management domain. Mail servers are connected to networks and should reliably process incoming and outgoing mail messages. Sending and receiving tasks are actually processed by a special software called mail server program running in the mail server. The most widely-used Internet mail server program is send mail, which was first developed in 1982 for 4.1 BSD UNIX system Since electronic mail service is booming, mail servers are handling more and more user messages. The mail server’s and reliability do not always satisfy user requirements. Even when the mail server runs normally, the administrator of mail server need to know the current status of servers. They need to know how many mail messages their system processes, how many errors occur when the system handles messages, how much hardware resources their system needs, and more. Systematic management of electronic mail servers naturally has evolved so mail server administrations may satisfy expanding market demands. Systems and services management has become very important area of research and development, coinciding with the need and establishment of international standards. For example, ISO/ITU-T has developed the OSI management framework . The managing complexity of the OSI model, for Internet-based systems and services, motivated Internet Engineering Task Force (IETF), to create a simple and light management framework called Simple Network Management Protocol (SNMP) . For our research, we have chosen SNMP as the mail server management framework. There is another big trend in the systems and services management. As WWW technologies are rapidly evolving, those technologies such as Java and Common Gateway Interface (CGI) are applied to many computing areas. Systems and services management is one of such areas that WWW technologies can be adopted to increase the efficiency and usability of management systems. Web-based management has a lot of benefits . It is hardware independent. Web technologies are general enough to be applied in any hardware platforms. It is a cheap and ubiquitous solution in most computing areas. Users access management systems using Web browsers. No other additional investment is needed. Using Web browser is trivial and very easy to learn. It is also location independent. Wherever you are, you can connect to the management server and check the current system status anytime. In this paper, we present the design and implementation of an Internet/Intranet mail server management system. The system integrates two different technologies – the SNMP and the Web. Our system combines advantages from both technologies so people may remotely manage their mail server systems easily and effectively. We have made our design general enough to be extended to manage any Internet/Intranet service such as WWW, FTP, or gopher. Intranet is the generic term for a collection of private computer networks within an organization. An intranet uses network technologies as a tool to facilitate communication between people or workgroups to improve the data sharing capability and overall knowledge base of an organization’s employees. An intranet is a private computer network that uses Internet Protocol technology to securely share any part of an organization’s information or network operating system within that organization. The term is used in contrast to internet, a network between organizations, and instead refers to a network within an organization. Sometimes the term refers only to the organization’s internal website, but may be a more extensive part of the organization’s information technology infrastructure. It may host multiple private websites and constitute an important component and focal point of internal communication and collaboration. Any of the well known Internet protocols may be found in an intranet, such as HTTP (web services), SMTP (e-mail), and FTP (file transfer protocol). Internet technologies are often deployed to provide modern interfaces to legacy information systems hosting corporate data. Intranets may provide a gateway to the Internet by means of a network gateway with a firewall, shielding the intranet from unauthorized external access. The gateway often also implements user authentication, encryption of messages, and often virtual private network (VPN) connectivity for off-site employees to access company information, computing resources and internal communication. It’s a confusion with many people that intranet is wrongly spelled for internet. Intranet is the generic term for a collection of private computer networks within an organization. An intranet uses network technologies as a tool to facilitate communication between people or workgroups to improve the data sharing capability and overall knowledge base of an organization’s employees. Intranets utilize standard network hardware and software technologies like Ethernet, WiFi, TCP/IP, Web browsers and Web servers. An organization’s intranet typically includes Internet access but is firewalled so that its computers cannot be reached directly from the outside. Intranet Mail Server is mainly designed to cater the need for communication between the employees of an organization in an intranet. The branches of the organization may be located in locally distant places where there is always a need for interchanging information. This system helps in inter-message communication between employees of such an organization. The employees of the organization under this intranet can only make use of the features embedded in it. The system is capable of performing all the things which a mail server can do. It keeps track of the mails sent and received to and from various employees of the organization, wherever they are. Other sections included in the system are to view and edit account, keep track of contacts details, use a calendar to notify the user about events and a notepad to save personal notes for future use etc. The organization may be having any number of branches in various locations and each one will be having an administrator to manage that particular firm. Each administrator is given the right to handle all official details of the employees under his branch only. He could view and edit the account details of employees of the firm for which he is the Admin. Each employee can request anything regarding official matters through his corresponding administrator. The system has provisions which enable each administrator to block mails for some employees of his branch under certain conditions. An acknowledgement mechanism for very important messages is also included in the system. The entire system is controlled by the main Administrator who has the only right to create users who are the administrators of various branches. These users have somewhat power of admin as they can create employees within their branch and manage them. Each and every user of the system, be the Administrator or admin power users or the normal users, is able to perform the following things within the system. The main things which are handled in this system are as follows.

  • Mail Messaging.
  • Managing Account Details
  • Managing Contacts.
  • Calendar Events
  • Notepad.

The project is developed with a front end of JSP and JAVA SERVLETS and Oracle as let us see in detail of the development of the project.


Web applications along with java can be created by core system called servlet. Server which uses servelt technology is java server pages which can further be extended by HTML content. JSP does not replace the servlet but only accompanies it to build on servlet and can also overcome any demerits obtained by servlet technology alone. There are 2 demerits that fall under two broad areas: Creating a “separation of concerns”: Parts of a particular code packed separately and are given a standard protocol so as to communicate these particular codes within themselves An infrastructure for webapps: This includes things like to update registered member input so as to check proper information is submitted by the user, in order to avoid handling and reporting errors. If shortcomings are addressed, the very practical problems of building webapps (Robustness, maintainability, localization, etc) Become easier to answer. One model which can be addressed in resolving these demerits is an organizing Principle called Model-View-Controller (MVC) design pattern.

Struts and MVC

In Struts, Model code consists of plain old Java objects (POJOs). A struts place is very simple and applicable directly with the model code on the webapp. It is not necessary to put forward the data access into model so as to achieve MVC nirvana within a short period of time and with proper efficiency. There is no need of any help to separate Model from View and Controller. View code mainly consists of two parts:

  1. JSPs
  2. Set of custom tags along with Struts.

Custom tags within the view code helps to make apart view from controller so as to avoid the issues which were obtained with MVC when it was apparently applied to registration Webapp. Controller code with struts falls into three distinguishable parts:


Action form which enables to be a subclass of Struts helps to obtain simple validations. Examples: length of password must be strong as per needed i.e. nothing but password validation or email address format.


Action which enables to be a subclass of Struts which accompanies Complex validations and business logic are Example:The check for the duplicate user ID for the Registration so ad to avoid any crime or leak out of any confidential information webapp is an example of complex validation. Example for business logic: calculating the total amount due after a purchase in a shopping cart webapp. Flow control is also decided by your Action subclasses, restricted to paths declared In the Struts configuration file called struts-config.xml


Servlets are modules of Java code that run in a server application (hence the name “Servlets”, similar to “Applets” on the client side) to respond to users doubts and give them desired solution. Servlets are usually not in combination with a unique user-server procedure but they can be usually used in combination with HTTP. Servlets acts by providing java based solution in order to avoid or execute the errors when done with server side programming, including in extensible scripting solutions, platform specific API’s and incomplete interfaces. Servlets provide a unique barrier to be plugged up with java based server. Advantages of using servlet in server application is to reduce the user incompatibility by performing independently on its own, extensively loadable, acts as a pluggable helper byte code objects. For example, a HTTP servlet can be used to generate HTML content. When we use servlets to do dynamic content, we get the following advantages:

  1. They are faster and clearer than CGI scripts.
  2. They use a standard API (servlets API).
  3. They provide all the advantages of Java.

The attractiveness of servlets: There are many features of servlets that make easy and attractive to use, these include:

  1. Easily configured using the GUI based Admin Tool.
  2. Can be loaded, invoked from a local disk or remotely across the network.
  3. Can be linked together or chained, so that one servlet can call another or several servlets in a sequence.
  4. Can be called dynamically from HTML pages.
  5. Are secure even when downloading across the network.

Java standards extension classes are used by servlets in the form of javax servlet which is known to be the basic framework for servlet and also uses javax servlet http acts as extensions for servlet framework usually used to respond the HTTP requests. As servlets consists of a portable java language due to which server extensions are very complex and operating system works on its own ability without any help. Typical uses for HTTP Servlets include: Working on a particular data for its improvement and keeping it confidential which is submitted by an HTML form. Any database problem provided by user returns with desired solutions with extensive content. ¨It acts by processing a request by client with the help of environment variable,here a standard input is provided about the issues and output is obtained in desired format with the help of standard output stream. CGI programme or CGI script helps to provide ouput in form of separate instance.


A servlet particularly designs javax.servlet.servlet interface. Most servlets, however, extend one of the standard implementations of that interface, namely javax.servlet.GenericServlet and javax. servlet. http .HttpServlet .

Initialization of servlet:

A server user uploads servlet therby creating a desing or instance by calling the no-args contructor and then later it calls the servlets init method. Here servlet must make an onetime protocols and preserve the ServletConfig so that it can be used in future whenever required this can be done by calling the Servlet’s getServletConfig () method. Retriving of data is handled by GenericServlet. Servlet which extend Generic Servlet (or its subclass HttpServlet) should call super. At the beginning of the init method it makes use of this feature. The ServletConfig object mainly has Servlet parameters and a reference to the Servlet’s ServletContext. The init method is guaranteed to be called only once during the Servlet’s lifecycle. It does not need to be thread-safe because the service method will not be called until the call to init returns. Whenever Servlet is started the service method is called for each and every issue or request raised by user to the servlet. The method is called concurrently as many users can indulge at the same time. When servlet is needed to be uninstalled whenever an improved version of the existing is obtained or when unexpected shut down has occurred then here the destroy method is called. There may still be threads that execute the service method when destroy is called, so destroy has to be thread- safe. All resources which were allocated in init should be released in destroy. This method is guaranteed to be called only once during the Servlet’s lifecycle. Time Thread1 Thread2 Thread3

Figure 6.2.1 A Typical servlet life cycle

Form Processing Servlet:

This section shows how to Processing of the form data Management of persistent data Use of init parameters. The Servlet program written provides a user interface to a mailing list through HTML forms. User enters an email address in text field and then user subscribes itself to the list. Servlet contains two parts: * Proper management of data obtained. * Interaction with user or client. Data Management: Java programmer can easily tackle with maintaining the data. Servlet can have data which persists between requests we load the address list only once, when the Servlet is initialized, and save it every time it has been changed by a request. An alternative approach would be keeping the list in memory while the Servlet is active and writing it to disk in the destroy method. This would avoid the overhead of saving the address list after every change but is less fail-safe. If for some reason the address file can’t be written to disk or the server crashes and cannot destroy the Servlet, all changes to the list will be lost even though the users who submitted the requests to change the list received positive responses.

Client interaction:

The client interaction is handled by two of the standard HttpServlet methods, doGet and doPost.

  • The doGet method replies to GET requests by sending an HTML page which contains the list of the currently subscribed addresses and the form that is used to subscribe or unsubscribe an address.
  • The response content type is again set to text/html and the response is marked as not cacheable to proxy servers and clients (because it is dynamically created) by setting an HTTP header “pragma: no-cache”. The form asks the client to use the POST method for submitting form data.
  • The doPost method receives the submitted form data, updates the address List and sends back a confirmation page.
  • First the form parameters “email” and “action” are retrieved with the

GetParameter method of HttpServletRequest. GetParameter (and also getParameters and getParameterValues) can be used to retrieve form data from both POST and GET requests. As an alternative we can use getQueryString for a GET request and getInputStream for a POST request and parse the application. We cannot use both ways of getting the request data together in one request.

User Authentication via Sessions:

Sessions can be used for authentication. In contrast to HTTP Basic Authentication a session can be invalidated which enables users to log out without quitting the Web Browser (which is required with Basic Authentication because there is no way to force a browser to delete the authentication credentials). HTTP: HTTP (“Hypertext Transfer Protocol”) protocol is usually used by any user or client who needs to surf for information also know as WWW browser. HTTP responds only any request is forwarded by a client or user which is called as request-response oriented protocol. An HTTP request consists of a request method, a URL header fields and a body. An HTTP response obtained after entering the query contains a result code and again header fields as in request and a body. The service method of HttpServlet sends request so as to obtain HTTP request methods using different java methods. The methods are GET, HEAD, PUT, POST, DELETE, OPTIONS and TRACE apart from these methods also a response is obtained for a particular request known as Bad Request HTTP error. An HTTP method XXX is dispatched to a Java method doXXX, e.g. GET-> doGet. All these methods expect the parameters “(HttpServletRequest req, HttpServletResponse res)”. The methods do Options and do Trace have suitable default implementations and are usually not overridden. The HEAD method (which is supposed to return the same header lines at a GET method would return, but doesn’t include a body) is performed by calling doGet and ignoring any output that is written by this method. That leaves us with the methods doGet, doPost, doPut and doDelete whose default implementations in HttpServlet return a Bad Request HTTP error. The request data is passed to all methods through the first argument of type HttpServletRequest (which is a subclass of the more general ServletRequest class). The response can be created with methods of the second argument of type HttpServletResponse (a subclass of ServletResponse). GET method is used in order to fulfill the clients request whenever an URL is entered in WWW browser,this GET request doesn’t have any text and so it is empty.The response should contain a body with the response data and header fields, which describe the body (especially content-Type and content-Encoding). Whenever HTML form is incorporated by the client POST and GET both these methods are used. GET request enables URL to encode different parameters while the POST request these parameters are transmitted in the body.HTML editors and upload tools use PUT requests to upload resources to a Web Server and DELETE requests to delete resources.


JSP stands for ‘Java Server Pages’. These are pages, which provide dynamic content required by the user using logic and data (XML, Database etc) on the server side. Sun Microsystems introduces JSP as an alternative to Microsofts active server page (ASP) technology. Similarity between ASP and JSP is that both are complied on a server instead on Web Browser that is prominently used by client. However, JSP is Java-based, whereas ASP is Visual Basic-based. JSP pages helps to bukit up web sites and gathering database information. JSEE or Java Server Pages is an extension of the Java Servlet technology. XML tags and scriptlets uses JSP pages which are being written in the Java programming language in order to get logic that develops the content for the page. It passes any formatting (HTML or XML) tags directly back to the response page. In this way, JSP pages separate the page logic from its design and display . Java Server Pages (JSP) are normal HTML with Java code pieces embedded in them. A JSP compiler is used to generate a Servlet from the JSP page. Appearance and to maintain order of the content on Web pages JSP are used it is helped with servlets small programs use to modify web pages which are done in order to fulfill the request of the user Java servlet that links to HTML page this file name is given the suffix as java server pages. JSP works in similar fashion as other servlets it first transforms to java servlet and processes users requests known as HTTP request. JSP technology translates into java servlet in a more convenient way than any other servlet as soon as the application is started; this translation is triggered by .jsp file name extension in a URL. JSPs are going together diverse system in one unique compact form with servlets. We can include output from a servlet or forward the output to a servlet, and a servlet can include output from a JSP or forward output to a JSP.


Web it is an server where a particular kind of specific information is published on intranet or internet, this web server is used by clients or users so to obtain required information. Hypertext transfer protocol helps web server to transmit information. We can also set up the Web server so at to provide file transfer protocol ie FTP and also with gopher services. The FTP service can help user to send information from website and receive the same. The gopher services provides the user menu driven protocols to find the users requests for obtaining a particular document, the protocol used is supported by HTTP protocol. Web server enables us to: It acts by providing information to the user about their business, university or any organization to let people know about their firm and get adequate knowledge. EXAMPLES Publish a brochure so that it may be helpful to the customers Publish about any seminars, programs etc. Publish of any remote sales.


The application which we run over the internet or intranet is with the help of java script. It is a object based programming language. This is used to run the application in client and the server. We can also create Hyper text markup language (HTML) pages using java script and also organizes the data using particular objects. HTML pages are engrafted with the java script programming. The effects of mouse clicks make out and answer due to these statements. When a user enters the information on the web page it can be checked by using the java script function. The engrafted java script of a html page can translate the text which is entered and tells the user whether the data base is valid or not. Advanced programs can access the database. The huge amount of data or information which is stored in database systems is used by application. The user information is stored on the data base of the online employees. A group of data is a data base which is maintained to explore, alter and update RELATIONAL DATABASES: A most frequent method to organize data is relational model .The databases that are bonded to relational model are called relational databases. During the years 1970 and 1980 the IBM grew SQL (STRUCTURE QUERY LANGUAGE) to interact with the relational databases. Which is used in many ways.SQL is a data defined language to create, design and organize a database. We can update the data nothing but data manipulation language. Queries are also used to get the data from the data base.


Java Database Connectivity, commonly referred to as JDBC, is an API for the Java programming language that defines how a client may access a database. It provides methods for querying and updating data in a database. JDBC is oriented towards relational databases. A JDBC-to-ODBC bridge enables connections to any ODBC-accessible data source in the JVM host environment.. Before the release of the Java 1.1 API, database support in java was extremely weak. Instead of releasing a halfway solution in the original releases, Java soft took the time to develop a set of keys API’s centered on enterprise systems development. Among these API’s Java 1.1 includes JDBC (Java database connectivity), a unified API for accessing relational databases. The issues surrounding database access are often very difficult; other languages use either proprietary API’s specific to individual database or complex universal API’s such as ODBC. JAVA DATABASE CONNECTIVITY OBJECT MODEL: The general idea where it goes around is Java.sql.Driver Manager java database connectivity model object is portrayed by the picture below The above picture shows that how the Java Data Base Connectivity works and

Basic steps to use a database in Java

  1. Establish a connection
  2. Create JDBC Statements
  3. Execute SQL Statements
  4. GET ResultSet
  5. Close connection

1. Establish a connection

import java.sql.*; Load the vendor specific driver Class.forName(“oracle.jdbc.driver.OracleDriver”); What do you think this statement does, and how? Dynamically loads a driver class, for Oracle database Make the connection Connection con = DriverManager.getConnection( “jdbc:oracle:thin:@oracle-prod:1521:OPROD”, username, passwd); What do you think this statement does? Establishes connection to database by obtaining a Connection object

2.Create JDBC statement(s)

l Statement stmt = con.createStatement() ;

l Creates a Statement object for sending SQL statements to the database

3.Execute SQL Statements String createLehigh = “Create table Lehigh ” + “(SSN Integer not null, Name VARCHAR(32), ” + “Marks Integer)”; stmt.executeUpdate(createLehigh); //What does this statement do? String insertLehigh = “Insert into Lehigh values“ + “(123456789,abc,100)”; stmt.executeUpdate(insertLehigh); 4.GET ResultSet String queryLehigh = “select * from Lehigh”; ResultSet rs = Stmt.executeQuery(queryLehigh); //What does this statement do? while ( { int ssn = rs.getInt(“SSN”); String name = rs.getString(“NAME”); int marks = rs.getInt(“MARKS”); }

5.Close connection

stmt.close(); con.close();


Our project website should provide easy access between user and the other section. It notices the possible users who are also contributing their in testing. User’s aims and destinations are fulfilled describing the administration and user requirements. Measuring the design in oppose of needs. Produce design resolution. Obtaining design resolution using these method.

Template employing.

A outline for a website is with the huge organizations which we call templates. In these situations it is better to follow these organizations outline. A uniform outline gives comfort of use and also standard of the intranet in corporation. Maximum number of web site architect are not interested to follow this standard.

Prepare web site construction.

The best way to organize the site is according to how users see it. To achieve this goal, you can either follow the recommended guidelines (style guide) or (in the absence of guidelines) proceed according to the results of usability testing. Site structure should reflect the tasks users want to perform and information (chunks) they want to see.

Examine design options.

The design of the site should conform to recommended guidelines. In the absence of guidelines, the Web site should satisfy accessibility requirements.

Evaluate Designs against Requirements

The prototype should reflect the initial design of the Web site. Usability testing will identify design issues that will need to be corrected before the site is made available to the user community. When you have completed the prototype, invite members of your organization, department, and division for a “test drive.” Give testers tasks to accomplish and information to find. With the lessons learned, improve the design and retest it until you have resolved the design issues. When you are confident that the design satisfies user and organizational requirements, publish your Web site on the corporate intranet Web server and advertise it on the corporate intranet’s homepage. Contact the corporate webmaster for assistance to load the files to the server. Finished! What’s next? Keep the site up to date with the latest news and information. Investigate the number of visitors to your site and the pages they visit. In this way, you’ll identify popular and unpopular pages (information) and tools. If you identify an increase in the number of visitors to a particular site or tool, then redesign the homepage to simplify access to the popular site. If pages have no visitors, either they are of no interest and should be removed, or visitors don’t know the pages exist. Conduct a survey to identify their value to the user community before you make your decision. Redesign the site to improve productivity and efficiency, especially for forms and tools. Regular visitors will always welcome a “face-lift” if it helps to improve navigation. Post contact information and link to your e-mail address so that visitors can provide feedback. Praise builds confidence— and criticism provides suggestions for design improvements. Just like an Internet site, an intranet site is a living document. But with regular updates, you’ll help fulfill the purpose of your corporate intranet: improving both the quality and the speed of the company’s internal communication.


External Design:

External Design of any software development involves conceiving planning out and specifying the externally observable characteristics of any software product. These characteristics include user displays and report formats external data sources and data sinks and the functional characteristics. Performance requirements and high level process structure for the product.

Internal Design (Architectural and Detailed Design):

Internal Design involves conceiving, planning, specifying the internal structure and processing details in order to record the design decisions and to be able to indicates why certain alternatives were chosen in preference to others. This phase also includes elaboration of the test plans and provides a blue print of implementation, testing and maintenance activities. The work products of Internal Design are architectural structure specification; the details of algorithms and data structure and the test plan. In architectural design the conceptual view is refined. Internal processing functions are identified, high level functions are decomposed into sub functions, internal data sources and a data structure are defined and interconnections among functions , data streams and data stores are established.





1. users_table;

Field Name Field Type Description
USER_ID VARCHAR ID of the user
PWD VARCHAR Password of the user

2. user_biodata_table;

Field Name Field Type Description

3. Message_table:

Field Name Field Type Description

4. Message_bulk_table;

Field Name Field Type Description

5. Drafts_table;

Field Name Field Type Description

6. Trash_table;

Field Name Field Type Description

7. Folders_table;

Field Name Field Type Description

8. Contacts_table;

Field Name Field Type Description

9. Sent_table;

Field Name Field Type Description

Overview of Modules:

This project is having different modules like new User creation form named it as a SignUp form and already existing user can logged into the Mailing System named it as a SignIn form. Intranet Mail Server which has been privatized and exists in different forms like Hotmail. Free mail. Cybermail, Maicity The project will give the easy way to create a new account and sending mails with free of cost. This was submitted with two modules given below

  1. SignUp Option
  2. SignIn Option

1. SignUp Option: This module deals with the sign up process. This module is having the facilities for creating new account. In Intranet mailing system this feature is provided by clicking SignUp option and it displays fill up form. In Fill up form the new user can fill all the details of the new user. This form will take all the details about the user. This will loads the information like Username, User Password. Confirms Password, the Age of the user, Sex, in which city user is living, the state belongs to the user, City, Pin code, Nation. This form contains some optional fields and some or compulsory fields. After entering the details in to the form the user can select the option provided on the fill up form. The option is Register. If we want to register to register, whenever the user click the button it verifies whether the user exists or not. If the user name is already present in the database system the corresponding dialog box will be given to the user and this process will be repeated until the user is entered new username which does not exist on the database. If not? it will checks further fields. If any one or more than one compulsory field is empty it gives the message to the user that the corresponding field is empty. If he enters values in all compulsory fields then the mailing system checks whether the user is entered the same values in the fields User Password and Confirm Password. If he entered same values the form will be submitted otherwise the system will gives the corresponding alert message to the user. 2. Sign In Option: If the user is already contains an account in this system, this form permit to enter in to this mailing system. Now he can use all the facilities provided by this Mailing System. A valid accountant can access these facilities by entering the two options provided by the logging screen, if not he can create the new* user account by using the facility of the Sign In form. By entering the Username and Password of the user presses the Sign in button. If the username & password are correct then system gives the permission to logon in to the Mailing system. This checking at the database side is compulsory for the purpose of authentication. Only a valid user can access the facilities provided by this present Intranet Mailing System. In this fashion this form is providing some sort of security. If the Username & Password are valid, now the user is successful enough to logging on to the system, two frames are displayed. Left-hand side frame displays the user menu and the right hand side menu displays the information about how many mails he received. By clicking this user Inbox will be displayed.

Functional Description

User Menu: Provides a way to give any commands to the mail server the options include in the menu are

  1. Compose
  2. Inbox
  3. Sent Messages
  4. Addresses
  5. Options
  6. Logout

1. Compose Screen: This screen is obtained when the user selects the compose option from the mail folder. The fields in this screen are: To: Here the primary receiver’s address is to be entered Subject: Here the primary receiver’s address is to be entered. CC: Here the address of the receiver is typed where the same copy of the mail has to be sending. BCC: Here the address of the receiver is typed where the same copy of the mail has to be sending and receiver can receive only one copy separately it won’t show all the different addresses Mail text to be Sent: This is the text area where the actual mail data has to be sent. Send: This is a button, used to send the mail 2. Inbox: If the user selects this option on the user menu the corresponding inbox of the user will be displayed. To read the different mails one option is provided as a subject by clicking on the subject place the corresponding mail will be displayed. 3. Sent Messages: Using these options the user can selects different messages, which are all ready sanded earlier. This is for the purpose of to know which message is sanded to whom. 4. Addresses: By clicking this option one more screen will be displayed on the right hand side of the frame that screen This screen is employed to create and to append new addresses to the database system. Here various listings of addresses with the name and there nick name. Here we have various options. Delete: Can be selected to delete the current address. Add:It will generate a new form to add a new address to the list with name of the address holder and the nickname. After clicking this Add option provided on the Address Screen one more form will be displayed having following options Name: Here name of the address holder is to be entered. Nick Name: Here nickname of the address holder is to be entered. MailId: Here MailId of the address holder is to be entered. Address: Here the actual address that is to be stored is entered. Add: When clicked add button this address adds to the current screen. 5. Options: By selecting options menu one more screen will be displayed, the screen in Change Password Screen. It contains following providers’ Old Password Here the old password has to be typed; it is useful to check whether the user is an authenticated user to change the password. Change Password: Here the new password that is to be replaced with the old password is entered. Confirm: Here the users uses the same password to enter in the new field to confirm the change of password. Change: This button is to be clicked to actually change the old password to the new password. 6.Logout: By clicking this option the login session of the user will expire. If u wants to reenter in to the site one more option is to be provided, if u want sign out completely one more option is provided to sign out completely that is to logout the use completely from the site



The Analysis of the implementation alters formers system to modern. The former system lies in manually providing services to the employees of different of an organization. Employees have to go departments to know some particular information. Sometimes information is passed by manually between departments. This manual system will take more time and there may e loss of information. A wrong installation of the project leads to failure of the new intranet mailing system. The effectuation of the intranet mail server will improve the efficiency of the entire system. Implementation is actually installing the system on the user’s computer systems and testing it. This project is mainly developed to communicate within the organization. For this, the system has to load on the server and the permission should be given to the users. First the class file should be created for the system. After database administrator creates the users, permission should be given to run the system. The permission is given to the users using login scripts. Whenever they log on to the system, all the files allocated to them come. Once the implementation reaches to its final stage, system conversation is the crucial stage of the implementation. There is several conversion strategies in which we must select anyone, which is applicable to our system. The current system is converted under the parallel conversion since the organization is large, the manual work and the computerized work are carried for some days until the developed system is well set for entire organization. Once the computerization is working well the manual work has been stopped in step-by-step manner.



System testing is probably the most important phase of complete testing cycle. This phase is started after the completion of other phases like Unit, Component and Integration testing. During the System Testing phase, non functional testing also comes in to picture and performance, load, stress, scalability all these types of testing are performed in this phase. By Definition, System Testing is conducted on the complete integrated system and on a replicated production environment. System Testing also evaluates that system compliance with specific functional and non functional requirements both. It is very important to understand that not many test cases are written for the system testing. Test cases for the system testing are derived from the architecture/design of the system, from input of the end user and by user stories. It does not make sense to exercise extensive testing in the System Testing phase, as most of the functional defects should have been caught and corrected during earlier testing phase.Utmost care is exercised for the defects uncovered during System Testing phase and proper impact analysis should be done before fixing the defect. Some times, if business permits defects are just documented and mentioned as the known limitation instead of fixing it.Progress of the System Testing also instills and build confidence in the product teams as this is the first phase in which product is tested with production environment. System Testing phase also prepares team for more user centric testing i.e User Acceptance Testing.


Test case 1:

Test case for Login Screen When the user tries to login by submitting an incorrect id or an incorrect password, then this results in displaying a screen with the message as “login failed”.

Test case 2 :

Test case for compose Screen: When any field in the compose screen is failed to enter, then this results in displaying a screen with the message as “enter all the fields”.

Test case 3 :

Test case for change password screen: When the confirm password doest not match with the new password, then this results in displaying a screen with the message as “confirm password doesn’t match with new password”

Test case 4:

Test Case for New user screen: When the user enters a user-id to register and the id entered already exists, then this results in displaying a screen with the message as “user-id already exists, choose a different id”.

Test case 5:

Test case for Add TO Address Book : When the user enters an invalid user-id the message is displayed as “the id you entered is not a valid one”

Did you like this example?

Cite this page

Intranet mail system. (2017, Jun 26). Retrieved February 4, 2023 , from

Save time with Studydriver!

Get in touch with our top writers for a non-plagiarized essays written to satisfy your needs

Get custom essay

Stuck on ideas? Struggling with a concept?

A professional writer will make a clear, mistake-free paper for you!

Get help with your assigment
Leave your email and we will send a sample to you.
Stop wasting your time searching for samples!
You can find a skilled professional who can write any paper for you.
Get unique paper

I'm Chatbot Amy :)

I can help you save hours on your homework. Let's start by finding a writer.

Find Writer