Sie sind auf Seite 1von 105

Chapte

r 1

1
Compan
y

2
1. Organization Profile

MICRO PRO COMPUTER PROFESSIONALS

“75C, Park Street, 4th Floor, Kolkata- 700016 ”

For Micro - Pro, the move from Training to Total Solutions has been brisk and an
eventual one, having entered the field of computers in 1994, chiefly as a computer
training company, Micro - Pro scaled new heights by going into computer
maintenance along with Software Marketing.

Today Micro - Pro offers solutions in every field of Application. A prodigious


achievement, inspired by the company’s commitment to the customer. Backed by
technical excellence and a team of highly qualified and skilled professionals.

Micro-Pro currently straddles the Mobile Value Chain as outlined above.


Straddling this space, Micro-Pro offers its expertise in developing superior
services, solutions and software to various verticals and industries. Software that
empowers mobile operators, service providers and enterprises to gain
competitive advantages and to open new revenue streams by introducing leading
mobile technologies and new
mobile business models.

1.1 MOTTO
Micro - Pro has lived up to its motto- “Leadership through customer
Satisfaction”

1.2 WITH TOTAL SOLUTIONS


A total solution vendor, Micro - Pro provides solutions for every computer related
need, be it Hardware or Software. From system analysis to installation, to user
training and maintenance, we are with our customers all the way, assessing their
specific requirements and providing the relevant solution, which mean optimum
value for money.

What renders our technical services and our training programs is the superior
dedication and expertise of our engineers who are the main strength of the
Company.

1.3 PRIME AREAS OF OPERATIONS

HARD facts about HARDWARE.

3
1.3.1 ASSEMBLING/SELLING SECTION

Despite our many diversifications, hardware continues to be one of the main


areas of interest for us. The Micro - Pro computers are assembled using the latest
methods, and are at par with international standards. The peripherals, of which
we have a steady supply, are of the widest possible range and are pre-tested for
quality assurance.

Matching the quality of our machines and parts is the expertise of our engineers,
whose dedications renders superior to that of the rest. We are also resellers for
IBM, HP, COMPAQ, WIPRO, EPSON & TVSE peripherals.

1.3.2 BUSINESS SOLUTIONS – ERP

Micro-Pro has signed up with Microsoft as a certified Microsoft Business


Solutions Partner for their Navision & Axapta range of Integrated Business
Solutions. It covers application areas for financial management, manufacturing,
distribution, customer relationship management and e-business.

1.3.3 PARTIAL LIST OF GOVT./PSU CLIENTS

1. REGIONAL PLANNING COMMISSION, EVALUATION WING, KOLKATA


2. REGIONAL METEOROLOGICAL CENTRE, KOLKATA
3. CENTRAL NATIONAL HERBARIUM, KOLKATA
4. QUALITY CONTROL CELL, KOLKATA
5. CENTRAL WATER COMMISSION, KOLKATA
6. CENTRAL STATISTICAL ORGANIZATION, KOLKATA
7. CENTRAL EXCISE, KOLKATA
8. ALL INDIA INSTITUTE OF HYGIENE & PUBLIC HEALTH, KOLKATA
9. PAY & ACCTS. OFFICE ( MINISTRY OF FOOD), KOLKATA
10. ET&T, KOLKATA
11. NATIONAL SAMPLE SURVEY ORGANIZATION. KOLKATA
12. WEBEL, KOLKATA
13. WBEIDC, KOLKATA
14. PARADEEP PHOSPHATE ,BBSR
15. CENTRAL RICE RESEARCH INSTITUTE, CUTTACK
16. ORISSA MINING CORP.
17. ACC
18. NALCO – NAYPALLI ,SAHID NAGAR,BBSR
19. REGIONAL RESEARCH LABORATORY(C.S.I.R) ,BBSR
20. INSTITUTE OF PHYSICS (IOP)-BBSR
21. INTERIM TEST RANGE(ITR)
22. WBSE

4
1.3.4 LIST OF OUR VALUED CUSTOMER

1. ITC LIMITED
2. ALLAHABAD BANK
3. EXIDE INDUSTRIES LIMITED
4. SCHEFIELDS LIMITED
5. C.M.C. LIMITED
6. STATE PROJECT IMPLEMENTATION UNIT
7. HINDUSTAN DEVELOPMENT CORPORATION
8. DEVELOPMENT CONSULTANT LIMITED
9. EMAMI LIMITED
10. TOTAL KOTHARI GROUP OF
11. COMPANIES WHICH INCLUDES:
a) KOTHARI MEDICAL CENTRE
b) KOTHARI & COMPANY
c) KOTHARI PLANTATIONS
d) KOTHARI HIGHTECH CONSULTANTS
e) KOTHARI GIS LTD

12. PENTAFOUR COMMUNICATIONS LIMITED


13. EASTERN RAILWAYS
14. PROJECT DEVELOPMENT INDIA LIMITED
15. RAMKRISHNA MISSION
16. M.N. DASTUR AND COMPANY LIMITED
17. TATA METALLIKS LIMITED
18. TULEC COMPUTER EDUCATION CENTRE
19. THE INSTITUTE OF CHARTERED ACCOUNTANTS OF INDIA
20. WEBEL INFORMATICS LIMITED
21. RITES LIMITED
22. RDL INFOTECH LIMITED
23. ARAMBAGH HATCHERIES LIMITED
24. BANK OF BARODA
25. CALCUTTA UNIVERSITY
26. SEMA GROUP
27. ALBERT DAVID LIMITED
28. KANKARIA GROUP OF INDUSTRIES INCLUDES:
a) BALLY JUTE COMPANY LIMITED
b) AMBICA MULTIFIBRES LIMITED
c) SCORE INFORMATION TECHNOLOGY
29. RUNGAMATTEE TEA & INDUSTRIES LIMITED
30. INFOUNIV COMPUTER TRAINING INSTITUTE
31. SIMPLEX CONCRETE PILES (INDIA) LIMITED
32. SEMA SOFTWARE.
33. WEST BENGAL POWER DEVELOPMENT CORP. LIMITED

and many more and more…….

5
Chapt
er 2

6
Syste
m
Overv

7
2. System Overview
The term system word is derived from the “Greek” word “Systema” which means
that an organized relationship among functioning units and component. A system
exists because it is designed to achieve one or more objective. TRADE EXPRESS
is the system which is Developed for an Organization. This is the organization
which does its export.

Candidates of this system are

• IMPORTER
• EXPORTER
• ADMINISTRATER

This is the system, which is developed for the candidate and company for
handling all the management function of the company. It can handle all kind of
work which are performed in the organization.

2.1 PROBLEM DISCRIPTION


In this world of globalization international trade has increased significantly.
Export/Import of different goods take place in a large volume across the
countries. It is difficult, cumbersome, time consuming, costly, error prone to
keep track of such a huge transaction involving different parties with manual
process where Tariff, Export, Import rules varies from country to country for
each and every types of products/items. There are lots of rules and regulations
involved in between, different currency conversion rate is also come in place.

There has been a growing demand among international trading community for
computerized application which will keep track of all these international trade
aspects (products, shipment, customers etc.) involving different
exporter/importer and will ease the trading replacing any manual paper work.

2.2 SYSTEM SOLUTION

To address all these problems Trade Express has been developed. It gives the
facility to keep all these international trade related details and will facilitate easy
trade flow by reducing the time, cost, probability of human-error and
communication complexity.

This is a trade and logistics application which can be hosted in Market place. It
can be run in any organisation’s intranet also. Different Exporter and
importers will use this application. They will register themselves,
keep data about their products those they will export/import, keep

8
details of clients, details of shipment etc. There will be different modules
for the application.

These modules are User Profile, User Activity report, User’s products, User’s
clients, User shipments etc. This system will have extensibility to
interface/integrate with any other application/subsystem to find out landed cost,
export control etc .

2.3 SOFTWARE REQUIREMENT SPECIFICATION


The Software Requirement Specification is based on the Software
Definition. High-level requirements specified during initial planning are
elaborated and made more specific in order to characterize the features hat the
software product will incorporate. The Requirement Specification states the
“what” of the software product without implying “how”. Software design is
concerned with how the product will provide the required features.

Scope

The format for the SRS can be tabularized as below:

Section 1. Product Overview and Summary


Section 2. Developing, Operating and Maintenance Environments
Section 3. External Interfaces and Data Flow
Section 4. Functional Requirements
Section 5. Performance Requirements
Section 6. Exception Handling
Section 7 . Early subsets and implementation priorities
Section 8. Foreseeable Modifications and Enhancements
Section 9. Acceptance Criteria
Section 10. Design Hints and Guidelines
Section 12. Glossary of Terms

SECTION - 1 PRODUCT OVERVIEW

Import – Bill Of Entry and Cargo Declarations

Goods imported in a vessel/aircraft attract customs duty and unless these are not
meant for customs clearance at the port/airport of arrival by particular
vessel/aircraft and are intended for transit by the same vessel/aircraft or
transhipment to another customs station or to any place outside India, detailed
customs clearance formalities of the landed goods have to be followed by the
importers. In regard to the transit goods, so long as these are mentioned in
import report/IGM for transit to any place outside India, Customs allows transit
without payment of duty. Similarly for goods brought in by particular
vessel/aircraft for transshipment to another customs station detailed customs
clearance formalities at the port/airport of landing are not prescribed and simple

9
transshipment procedure has to be followed by the carrier and the concerned
agencies. The customs clearance formalities have to be complied with by the
importer after arrival of the goods at the other customs station. There could also
be cases of transshipment of the goods after unloading to a port outside India.
Here also simpler procedure for transshipment has been prescribed by
regulations, and no duty is required to be paid.

If the goods are cleared through the EDI system no formal Bill of Entry is filed as
it is generated in the computer system, but the importer is required to file a cargo
declaration having prescribed particulars required for processing of the entry for
customs clearance.

The Bill of entry, where filed, is to be submitted in a set, different copies meant
for different purposes and also given different colour scheme, and on the body of
the bill of entry the purpose for which it will be used is generally mentioned in the
non-EDI declaration. The importer clearing the goods for domestic consumption
has to file bill of entry in four copies; original and duplicate are meant for
customs, third copy for the importer and the fourth copy is meant for the bank
for making remittances.

In the non-EDI system alongwith the bill of entry filed by the importer or his
representative the following documents are also generally required:-

• Signed invoice
• Packing list
• Bill of Lading or Delivery Order/Airway Bill
• GATT declaration form duly filled in
• Importers/CHA’s declaration
• License wherever necessary
• Letter of Credit/Bank Draft/wherever necessary
• Insurance document
• Import license
• Industrial License, if required
• Test report in case of chemicals
• Adhoc exemption order
• DEEC Book/DEPB in original
• Catalogue, Technical write up, Literature in case of machineries, spares or
chemicals as may be applicable
• Separately split up value of spares, components machineries
• Certificate of Origin, if preferential rate of duty is claimed
• No Commission declaration

SECTION - 2 DEVELOPMENT, OPERATING & MAINTENANCE


ENVIRONMENTS

The basic function of the assessing officer in the appraising groups is to


determine the duty liability taking due note of any exemptions or benefits

10
claimed under different export promotion schemes. They have also to check
whether there are any restrictions or prohibitions on the goods imported and if
they require any permission/license/permit etc., and if so whether these are
forthcoming. Assessment of duty essentially involves proper classification of the
goods imported in the customs tariff having due regard to the rules of
interpretations, chapter and sections notes etc., and determining the duty
liability. It also involves correct determination of value where the goods are
assessable on ad valorem basis. Where the appraising officer is not very clear
about the description of the goods from the document or as some doubts about
the proper classification which may be possible only to determine after detailed
examination of the nature of the goods or testing of its samples, he may give an
examination order in advance of finalisation of assessment including order for
drawing of representative sample. This is done generally on the reverse of the
original copy of the bill of entry which is presented by the authorized agent of the
importer to the appraising staff posted in the Docks/Air Cargo Complexes where
the goods are got examined in the presence of the importer’s representative.
On receipt of the examination report the appraising officers in the group assesses
the bill of entry. He indicates the final classification and valuation in the bill of
entry indicating separately the various duties such as basic, countervailing, anti-
dumping, safeguard duties etc., that may be leviable. Thereafter the bill of entry
goes to Assistant Commissioner/Deputy Commissioner for confirmation
depending upon certain value limits and sent to comptist who calculates the duty
amount taking into account the rate of exchange at the relevant date.

SECTION -3 EXTERNAL INTERFACES

After the assessment and calculation of the duty liability the importer’s
representative has to deposit the duty calculated with the treasury or the
nominated banks, whereafter he can go and seek delivery of the goods from the
custodians. Where the goods have already been examined for finalization of
classification or valuation no further examination/checking by the dock
appraising staff is required at the time of giving delivery and the goods can be
taken delivery after taking appropriate orders and payment of dues to the
custodians, if any.
In most cases, the appraising officer assessees the goods on the basis of
information and details furnished to the importer in the bill of entry, invoice and
other related documents including catalogue, write-up etc. He also determines
whether the goods are permissible for import or there are any
restriction/prohibition. He may allow payment of duty and delivery of the goods
on what is called second check/appraising basis in case there are no
restriction/prohibition.
In this method, the duties as determined and calculated are paid in the Custom
House and appropriate order is given on the reverse of the duplicate copy of the
bill of entry and the importer or his agent after paying the duty submits the goods
for examination in the import sheds in the docks etc., to the examining staff. If
the goods are found to be as declared and no other discrepancies/mis-

11
declarations etc., are detected, the importer or his agent can clear the goods after
the shed appraiser gives out of charge order.

SECTION - 4 FUNCTIONAL REQUIREMENTS

In the EDI system of handling of the documents/declarations for taking import


clearances as mentioned earlier the cargo declaration is transferred to the
assessing officer in the groups electronically.
The assessing officer processes the cargo declaration on screen with regard to all
the parameters as given above for manual process. However in EDI system, all
the calculations are done by the system itself. In addition, the system also
supplies useful information for calculation of duty, for example, when a
particular exemption notification is accepted, the system itself gives the extent of
exemption under that notification and calculates the duty accordingly. Similarly,
it automatically applies relevant rate of exchange in force while calculating. Thus
no comptist is required in EDI system. If assessing officer needs any clarification
from the importer, he may raise a query. The query is printed at the service
centre and the party replies to the query through the service centre.
After assessment, a copy of the assessed bill of entry is printed in the service
centre. Under EDI, documents are normally examined at the time of examination
of the goods. Final bill of entry is printed after ‘out of charge’ is given by the
Custom Officer.
In EDI system, in certain cases, the facility of system appraisal is available.
Under this process, the declaration of importer is taken as correct and the system
itself calculates duty which is paid by the importer. In such case, no assessing
officer is involved.
Also, a facility of tele-enquiry is provided in certain major Customs stations
through which the status of documents filed through EDI systems could be
ascertained through the telephone. If nay query is raised, the same may be got
printed through fax in the office of importer/exporter/CHA.

SECTION - 5 PERFORMANCE REQUIREMENTS

All imported goods are required to be examined for verification of correctness of


description given in the bill of entry. However, a part of the consignment is
selected on random selection basis and is examined. In case the importer does
not have complete information with him at the time of import, he may request for
examination of the goods before assessing the duty liability or, if the Customs
Appraiser/Assistant Commissioner feels the goods are required to be examined
before assessment, the goods are examined prior to assessment. This is called
First Appraisement. The importer has to request for first check examination at
the time of filing the bill of entry or at data entry stage. The reason for seeking
First Appraisement is also required to be given. On original copy of the bill of
entry, the Customs Appraiser records the examination order and returns the bill
of entry to the importer/CHA with the direction for examination, who is to take it
to the import shed for examination of the goods in the shed. Shed
Appraiser/Dock examiner examines the goods as per examination order and

12
records his findings. In case group has called for samples, he forwards sealed
samples to the group. The importer is to bring back the said bill of entry to the
assessing officer for assessing the duty. Appraiser assesses the bill of entry. It is
countersigned by Assistant/Deputy Commissioner if the value is more than Rs. 1
lakh.
SECTION - 6 EXCEPTION HANDLING

While filing applications and making payments online, it has been observed that
exporters/ importers face technical problems on account of non-availability of
relevant documents, malfunctioning of system etc. For attending to these
technical problems, a Helpdesk is set up. The trading community can access the
Help Desk by dialing the toll free number …………..or by e-mail at abc@xyz.com.
The help desk will be available between 10.00 AM to 7.00 PM on all working
days. A complaint number may be provided by helpdesk if issues remain
unresolved. The complaint number may be quoted for all future reference. For e-
mails complaint Numbers may be conveyed on next working day if complaint is
unresolved.

SECTION – 7 IMPLEMENTATION PRIORITIES

Execution of Bonds:

Wherever necessary, for availing duty free assessment or concessional


assessment under different schemes and notifications, execution of end use
bonds with Bank Guarantee or other surety is required to be furnished. These
have to be executed in prescribed forms before the assessing Appraiser.

Payment of Duty:

The duty can be paid in the designated banks or through TR-6 challans. Different
Custom Houses have authorised different banks for payment of duty. It is
necessary to check the name of the bank and the branch before depositing the
duty. Bank endorses the payment particulars in challan which is submitted to the
Customs.

Amendment of Bill of Entry:

Whenever mistakes are noticed after submission of documents, amendments to


the of entry is carried out with the approval of Deputy/Assistant Commissioner.
The request for amendment may be submitted with the supporting documents.
For example, if the amendment of container number is required, a letter from
shipping agent is required. Amendment in document may be permitted after the
goods have been given out of charge i.e. goods have been cleared on sufficient
proof being shown to the Deputy/Assistant Commissioner.

13
SECTION - 8 MODIFICATIONS & ENHANCEMENTS

Prior Entry for Bill of Entry:

For faster clearance of the goods, provision has been made, to allow filing of bill
of entry prior to arrival of goods. This bill of entry is valid if vessel/aircraft
carrying the goods arrive within 30 days from the date of presentation of bill of
entry.

The importer is to file 5 copies of the bill of entry and the fifth copy is called
Advance Noting copy. The importer has to declare that the vessel/aircraft is due
within 30 days and they have to present the bill of entry for final noting as soon
as the IGM is filed. Advance noting is available to all imports except for into bond
bill of entry and also during the special period.

Mother Vessel/Feeder vessel:

Often in case of goods coming by container ships they are transferred at an


intermediate ports from mother vessel to smaller vessels called feeder vessels. At
the time of filing of advance noting B/E, the importer does not know as to which
vessel will finally bring the goods to Indian port. In such cases, the name of
mother vessel may be filled in on the basis of the bill of lading. On arrival of the
feeder vessel, the bill of entry may be amended to mention names of both mother
vessel and feeder vessel.

Specialized Schemes:

The import of goods are made under specialized schemes. The importer in such
cases is required to execute bonds with the Customs authorities for fulfillment of
conditions of respective notifications. If the importer fails to fulfill the conditions,
he has to pay the duty livable on those goods. The amount of bond would be equal
to the amount of duty livable on the imported goods. The bank guarantee is also
required along with the bond. However, the amount of bank guarantee depends
upon the status of the importer like Super Star Trading House/Trading House
etc.

Bill of Entry for Bond/Warehousing:

A separate form of bill of entry is used for clearance of goods for warehousing.
All documents as required to be attached with a Bill of Entry for home
consumption are also required to be filed with bill of entry for warehousing. The
bill of entry is assessed in the same manner and duty payable is determined.
However, since duty is not required to be paid at the time of warehousing of the
goods, the purpose of assessing the goods at this stage is to secure the duty in
case the goods do not reach the warehouse. The duty is paid at the time of ex-
bond clearance of goods for which an ex-bond bill of entry is filed. The rate of

14
duty applicable to imported goods cleared from a warehouse is the rate in-force
on the date on which the goods are actually removed from the warehouse.

SECTION – 9 ACCEPTANCE CRITERIA

Export – Registration

The exporters have to obtain PAN based Business Identification Number(BIN)


from the Directorate General of Foreign Trade prior to filing of shipping bill for
clearance of export goods. Under the EDI System, PAN based BIN is received by
the Customs System. The exporters are also required to register authorised
foreign exchange dealer code (through which export proceeds are expected to be
realised) and open a current account in the designated bank for credit of any
drawback incentive.

Whenever a new Airline, Shipping Line, Steamer Agent, port or airport comes
into operation, they are required to be registered into the Customs System.
Whenever, electronic processing of shipping bill etc. is held up on account of non-
registration of these entities, the same is to be brought to the notice of
Assistant/Deputy Commissioner in-charge of EDI System for registering the new
entity in the system.

Once, the shipping bill is passed by the Export Department, the exporter or his
agent present the goods to the shed appraiser (export) in docks for examination.
The shed appraiser may mark the document to a Custom officer (usually an
examiner) for examining the goods. The examination is carried out under the
supervision of the shed appraiser (export). If the description and other
particulars of the goods are found to be as declared, the shed appraiser gives a ‘let
export’ order, after which the exporter may contact the preventive superintendent
for supervising the loading of goods on to the vessel. In case the examining staff
in the docks finds some discrepancy in the goods, they may mark the shipping bill
back to export department group with their observations as well as sample of
goods, if needed. The export department re-considers the case and decide
whether export can be allowed, or amendment in description, value etc. is
required before export.

SECTION - 10 DESIGNING OF SUCH A SYSTEM

Though a model is simply a collection of model elements and their relationships,


these elements can be grouped to form diagrams. These diagrams are greater
than the sum of the elements as they provide various views of our model. The
different views can be used to tell a story about how the application is structured.
The type of diagrams used to visualize the model depends on the problem. As I
get started, I chose to create a Use Case Diagram. This is a good overview
diagram that identifies the major components of my project. Though the Use

15
Case Diagram can be made as complicated as needed, it really has only two major
parts: the Actor and the Use Case. An Actor represents an entity that
will interact with the system. An example of an entity can be a “Customer” or
“Exporter” that interacts with the program. (The actor could even be a third-party
trader or a piece of hardware.) The main idea of the Use Case diagram is to
show these actors can interact with my program. For example, a
Customer/Importer might “Order Shipment”. In this case, the “Order Shipment”
is Use Case. No code is directly related to the Actor or Use Cases, but these
interactions expose the need for certain components in the project.

Creating a Use Case diagram might well expose any overlooked points. The
diagram can't keep me from adding features that are unnecessary, but it at least
tells me that they are not needed.

So, the first step is to perform a use case analysis and create Use Case
diagrams. Completion of the use case analysis and diagrams leads naturally to
sketching out the components of my system. Whether in the mind, or with a
UML tool, this step has never been skipped in the development of a successful
system. The benefit of formally creating a Component diagram is that it can help
me define the classes and interfaces that will make up my components. The
components are: A Customer component, an Exporter component, a
Accounts component, an User component, Product component and
Shipment component. The interactions between components can be further
defined with Collaboration and Sequence diagrams. These components represent
the deliverable pieces of my system. After the components are set, fine-grain
structural work began.

This fine-grain design is started by creating the Class Diagram. As I created


Class diagram, I was forced to make all the pieces fit together, reflecting on
where I need interfaces, superclasses, and even entire design patterns. So,
the benefit to these diagrams is that they expose structures of inheritance before
one writes several classes and see that she is writing the same methods
repeatedly.

Using the NetBeans UML tool adds another great dimension to the Class
Diagram, namely design patterns. If one knows that a certain component of her
system will utilize a design pattern or set of patterns, simply dragging and
dropping the pattern onto the canvas creates the basic component for her. Better
yet, the tool creates it correctly. The NetBeans UML feature provides the Gang
of Four (GoF) and Enterprise Java Beans (EJB) design patterns ready for
use.

The best thing is that none of this work will be wasted. If I am using the
NetBeans UML feature, a Class diagram can be turned into Java source
code with the click of a button. I can even set the options for how the code is to be
generated: headers, comments, variable placement, and other formatting. These
settings would even include adding copyright information to all the generated

16
files. The code generation alone should make this step worth doing during the
development cycle. Therefore, it was worth my time to create the model first and
let the tool generate all the basic code.

Everyone diagrams in one form or another. The difference is that those who
diagram by using a UML tool have something to show for their planning effort
when the diagrams are completed. Every project that is well thought out will have
some form of Use Case diagrams, Component diagrams, and Class diagrams that
can live long after “Imagineering” at the mind or with pencil and paper .

UML is simply a modeling language and is independent of any coding language.


Therefore, just as UML can be translated into a coding language, so can a coding
language be translated into UML. This process is known as “reverse
engineering”. There are numerous uses for this process, but the most common
is to simply get a view of how code is structured: What are the objects and how
are they related? Seeing diagrams of the code can expose design patterns and
other complexities that might not be obvious while reading the code.

Though reverse engineering is a tremendously useful tool to help us understand


legacy code, it does not provide answers to all the questions. For instance, use
cases cannot be drawn from a model that has been created by reverse
engineering. We would not expect this outcome, as the code contains a different
level of information than that required by the use cases. Other diagrams that do
not make sense to create from reverse engineered model are Component,
Activity, Collaboration, State, and Deployment. But, because the class elements
and relationships are all known, any of these diagrams can be quickly created and
we can then deduce the answers to the questions that naturally follow:

 What are the use cases?


 What is the deployment structure?
 What are the major components?

We only need to supply the missing information pertinent to that diagram to


have a fully developed model.

SECTION – 11 CROSS REFERENCE DOCUMENTS & INDEX

Letter Of Credit (LOC):

The Letter Of Credit is issued by the banker of the importer whereby the Bank
guarantees the payment tothe foreign dealer the amount of the bill drawn by the
exporter on importer.

Invoice

17
The exporter prepares the invoice in triplicate according to the agreed price
quotations. When the import duties are charged on the basis of value of goods,
the custom authorities will have to open the packages to calculate duties. To
avoid this problem, the exporter procures a Consular Invoice and sends it to the
importer. The value of the goods and other particulars are stated in this invoice.
It is signed by the Consul of the importer's country stationed in the exporter's
country.

The exporter fills in a special invoice form available from the Consul, affirms the
accuracy of the goods shipped, and gets it sealed.
The custom authorities generally accept such invoice as a true statement of the
value of the goods and assess the import duties on this basis. The Consular
Invoice is repared in triplicate, two copies are preserved in the Consulate and one
copy is issued to the exporter.

Certificate of Origin

Certificate of Origin is a document issued as a proof of the genuine origin of the


goods. Generally, there are trade agreements between certain countries under
which they agree to levy lower rates of import duties on the goods produced by
them. Therefore, the exporter prepares a Certificate Of Origin. It is signed by the
exporter and counter signed by a magistrate, an oath commissioner or an official
of a chamber of commerce. With the help of this document, the importer gets
preferential treatment in the matter of import duties.

Foreign Bill Of Exchange

According to the condition of payment, the exporter prepares D/A or D/P bills.
The foreign bill of exchange is prepared in triplicate.
The importer can receive the documents after accepting the bill in case of D/A bill
or after making payment of the bill in case of D/P bill.
The banker of the exporter sends all these documents to its branch or agent bank
in the importer's country.

18
Chapt
er 3

19
Technolo
gies
&
Platforms

20
3 Technologies & Platform

3.1 WINDOWS XP Professional

Windows XP Professional is Microsoft’s GUI based operating system. This


environment is extremely user friendly, easy to use and quick to deploy software
applications. It provides multitasking, multiprogramming, multithreading and
event handling features. It also provides standard graphic functions.
Features:

a) Multitasking: Windows allows simultaneous execution of multiple


applications. Windows make use of virtual memory using hard disk as a RAM
overflow to simulate which more memory than installed. This allows windows to
run multiple applications smoothly.

b) Network support: Windows allows explicit support for LAN (local area
networks) allowing network drives to be attached from file manager,
manipulation of network print queues from print manager, network
configuration from within any application, and various network related tasks
from the control panel.

c) Standardized help: In windows, developers can take advantage of a


standard help accessory that make it easy to setup a partially context sensitive,
online help facility with features like book mark to remember rather position
reference, a topic index and a search facility that searches for a set of predefined
keywords.

3.2 About java


In my project, I have chosen Java language for developing the code.
Initially the language was called as “oak” but it was renamed as “Java” in 1995.
The primary motivation of this language was the need for a platform-
independent (i.e., architecture neutral) language that could be used to create
software to be embedded in various consumer electronic devices.

• Java is a programmer’s language.


• Java is cohesive and consistent.
• Except for those constraints imposed by the internet environment, Java
gives the programmer, full control.

Finally, Java is to Internet programming where C was to system programming.

Importance of Java to the Internet

21
Java has had a profound effect on the Internet. This is because, Java expands the
Universe of objects that can move about freely in Cyberspace. In a network, two
categories of objects are transmitted between the Server and the Personal
computer. They are: Passive information and Dynamic active programs. The
Dynamic, Self-executing programs cause serious problems in the areas of
Security and probability. But, Java addresses those concerns and by doing so, has
opened the door to an exciting new form of program called the Applet.

Java can be used to create two types of programs:

Applications and Applets:

An application is a program that runs on our Computer under the


operating system of that computer. It is more or less like one creating using C or
C++. Java’s ability to create Applets makes it important. An Applet is an
application designed to be transmitted over the Internet and executed by a Java –
compatible web browser. An applet is actually a tiny Java program, dynamically
downloaded across the network, just like an image. But the difference is, it is an
intelligent program, not just a media file. It can react to the user input and
dynamically change.

3.3 Features of java


Security

Every time you that you download a “normal” program, you are risking a viral
infection. Prior to Java, most users did not download executable programs
frequently, and those who did scanned them for viruses prior to execution. Most
users still worried about the possibility of infecting their systems with a virus. In
addition, another type of malicious program exists that must be guarded against.
This type of program can gather private information, such as credit card
numbers, bank account balances, and passwords. Java answers both of these
concerns by providing a “firewall” between a networked application and your
computer.
When you use a Java-compatible Web browser, you can safely download Java
applets without fear of virus infection or malicious intent.

Portability

For programs to be dynamically downloaded to all the various types of platforms


connected to the Internet, some means of generating portable executable code is
needed .As you will see, the same mechanism that helps ensure security also
helps create portability. Indeed, Java’s solution to these two problems is both
elegant and efficient.

The Bytecode

22
The key that allows the Java to solve the security and portability problems is that
the output of Java compiler is Byte code. Byte code is a highly optimized set of
instructions designed to be executed by the Java run-time system, which is called
the Java Virtual Machine (JVM). That is, in its standard form, the JVM is an
interpreter for byte code.
Translating a Java program into byte code helps makes it much easier to
run a program in a wide variety of environments. The reason is, Once the run-
time package exists for a given system, any Java program can run on it.
Although Java was designed for interpretation, there is technically nothing about
Java that prevents on-the-fly compilation of byte code into native code. Sun has
just completed its Just In Time (JIT) compiler for byte code. When the JIT
compiler is a part of JVM, it compiles byte code into executable code in real time,
on a piece-by-piece, demand basis. It is not possible to compile an entire Java
program into executable code all at once, because Java performs various run-
time checks that can be done only at run time. The JIT compiles code, as it is
needed, during execution.

Java, Virtual Machine (JVM)

Beyond the language, there is the Java virtual machine. The Java virtual machine
is an important element of the Java technology. The virtual machine can be
embedded within a web browser or an operating system. Once a piece of Java
code is loaded onto a machine, it is verified. As part of the loading process, a class
loader is invoked and does byte code verification makes sure that the code that’s
has been generated by the compiler will not corrupt the machine that it’s loaded
on. Byte code verification takes place at the end of the compilation process to
make sure that is all accurate and correct. So byte code verification is integral to
the compiling and executing of Java code.

Java
Article II:
Java Javac byte Java
cod
Article III: e
VM
.Java .Class

The above picture shows the development process a typical Java


programming uses to produce byte codes and execute them. The first box
indicates that the Java source code is located in a .Java file which is processed
with a Java compiler called javac. The Java compiler produces a file called a .class
file, which contains the byte code. The .class file is then loaded across the network
or loaded locally on your machine into the execution environment is the Java
virtual machine, which interprets and executes the byte code.

Java Architecture

23
Java architecture provides a portable, robust, high performing environment for
development. Java provides portability by compiling the byte codes for the Java
Virtual Machine, which are then interpreted on each platform by the run-time
environment. Java is a dynamic system, able to load code when needed from a
machine in the same room or across the planet.

Compilation of code

When you compile the code, the Java compiler creates machine code
(called byte code) for a hypothetical machine called Java Virtual Machine (JVM).
The JVM is supposed to execute the byte code. The JVM is created for
overcoming the issue of portability. The code is written and compiled for one
machine and interpreted on all machines. This machine is called Java Virtual
Machine.

Java
Interpreter
PC (PC)
Sourc Comp Java
e iler Byte
Code code Java
………. Interpreter
Macintosh
……….. Compiler
(Macintosh)
……….. (Platform
……… indepen
… dent) Java
SPARC
Compiler Interpreter
(Sparc)

Compiling and interpreting Java Source Code

During run-time the Java interpreter tricks the byte code file into thinking that it
is running on a Java Virtual Machine. In reality this could be a Intel Pentium
Windows 95 or SunSARC station running Solaris or Apple Macintosh running
system and all could receive code from any computer through Internet and run
the Applets.

Simple
Java was designed to be easy for the Professional programmer to learn and to use
effectively. If you are an experienced C++ programmer, learning Java will be even
easier. Because Java inherits the C/C++ syntax and many of the object oriented
features of C++. Most of the confusing concepts from C++ are either left out of
Java or implemented in a cleaner, more approachable manner. In Java there are
a small number of clearly defined ways to accomplish a given task.

24
Object-Oriented

Java was not designed to be source-code compatible with any other language.
This allowed the Java team the freedom to design with a blank slate. One
outcome of this was a clean usable, pragmatic approach to objects. The object
model in Java is simple and easy to extend, while simple types, such as integers,
are kept as high-performance non-objects.

Robust

The multi-platform environment of the Web places extraordinary demands on a


program, because the program must execute reliably in a variety of systems. The
ability to create robust programs was given a high priority in the design of Java.
Java is strictly typed language, it checks your code at compile time and run time.

Java virtually eliminates the problems of memory management and deal location,
which is completely automatic. In a well-written Java program, all run time
errors can –and should –be managed by your program.

3.4 JAVA SCRIPT


JavaScript is a script-based programming language which was developed
by Netscape Communication Corporation. JavaScript was originally called Live
Script and renamed as JavaScript to indicate its relationship with Java.

JavaScript supports the development of both client and server


components of Web-based applications. On the client side, it can be used to write
programs that are executed by a Web browser within the context of a Web page.
On the server side, it can be used to write Web server programs that can process
information submitted by a Web browser and then updates the browser’s display
accordingly

Even though JavaScript supports both client and server Web


programming, we prefer JavaScript at Client side programming since most of the
browsers supports it.

JavaScript is almost as easy to learn as HTML, and JavaScript statements


can be included in HTML documents by enclosing the statements between a pair
of scripting tags <SCRIPTS>..</SCRIPT>.

<SCRIPT LANGUAGE = “JavaScript”>

JavaScript statements

</SCRIPT>

Here are a few things we can do with JavaScript :

25
 Validate the contents of a form and make calculations.
 Add scrolling or changing messages to the Browser’s status line.
 Animate images or rotate images that change when we move the mouse over
them.
 Detect the browser in use and display different content for different browsers.
 Detect installed plug-ins and notify the user if a plug-in is required.

We can do much more with JavaScript, including creating entire application.

JavaScript Vs Java

JavaScript and Java are entirely different languages. A few of the most
glaring differences are:

 Java applets are generally displayed in a box within the web document;
JavaScript can affect any part of the Web document itself.
 While JavaScript is best suited to simple applications and adding interactive
features to Web pages; Java can be used for incredibly complex applications.

There are many other differences but the important thing to remember is that

JavaScript and Java are separate languages. They are both useful for different

things; in fact they can be used together to combine their advantages.

ADVANTAGES

 JavaScript can be used for Sever-side and Client-side scripting.

It is more flexible than VBScript.

 JavaScript is the default scripting languages at Client-side since all the


browsers supports it.

3.5 HTML
Hypertext Markup Language (HTML), the languages of the World
Wide Web (WWW), allows users to produces Web pages that include text,
graphics and pointer to other Web pages (Hyperlinks).

26
HTML is not a programming language but it is an application of ISO
Standard 8879, SGML (Standard Generalized Markup Language), but
specialized to hypertext and adapted to the Web. The idea behind Hypertext is
that instead of reading text in rigid linear structure, we can easily jump from one
point to another point. We can navigate through the information based on our
interest and preference. A markup language is simply a series of elements, each
delimited with special characters, that define how text or other items enclosed
within the elements should be displayed. Hyperlinks are underlined or
emphasized works that load to other documents or some portions of the same
document.

HTML can be used to display any type of document on the host computer,
which can be geographically at a different location. It is a versatile language and
can be used on any platform or desktop.

HTML provides tags (special codes) to make the document look


attractive. HTML tags are not case-sensitive. Using graphics, fonts, different
sizes, color, etc., can enhance the presentation of the document. Anything that is
not a tag is part of the document itself.

ADVANTAGES

 A HTML document is small and hence easy to send over the net. It is small
because it does not include formatted information.
 HTML is platform independent.
 HTML tags are not case-sensitive.

3.6 SERVLETS
Introduction

The Java web server is JavaSofts own web Server. The Java web server is
just a part of a larger framework, intended to provide you not just with a web
server, but also with tools. To build customized network servers for any Internet
or Intranet client/server system. Servlets are to a web server, how applets are to
the browser.

About Servlets

Servlets provide a Java-based solution used to address the problems


currently associated with doing server-side programming, including inextensible
scripting solutions, platform-specific APIs, and incomplete interfaces.

Servlets are objects that conform to a specific interface that can be plugged
into a Java-based server. Servlets are to the server-side what applets are to the
client-side - object byte codes that can be dynamically loaded off the net. They
differ from applets in that they are faceless objects (without graphics or a GUI

27
component). They serve as platform independent, dynamically loadable, plug
able helper byte code objects on the server side that can be used to dynamically
extend server-side functionality.

For example, an HTTP Servlet can be used to generate dynamic HTML


content. When you use servlets to do dynamic content you get the following
advantages:

 they're faster and cleaner than CGI scripts


 they use a standard API (the Servlet API)
 they provide all the advantages of Java (run on a variety of servers
without needing to be rewritten).

Attractiveness of Servlets

There are many features of servlets that make them easy and attractive to use.
These include:

 easily configured using the GUI-based Admin tool


 can be loaded and invoked from a local disk or remotely across the network.
 can be linked together, or chained, so that one servlet can call another servlet,
or several servlets in sequence.
 can be called dynamically from within HTML pages, using server-side include
tags.
 are secure - even when downloading across the network, the servlet security
model and servlet sandbox protect your system from unfriendly behavior.

Advantages of the Servlet API

One of the great advantages of the Servlet API is protocol independence. It


assumes nothing about:

 the protocol being used to transmit on the net


 how it is loaded
 the server environment it will be running in

These qualities are important, because it allows the Servlet API to be


embedded in many different kinds of servers. There are other advantages to the
Servlet API as well. These include:

 it's extensible - you can inherit all your functionality from the base classes
made available to you.
 it's simple, small, and easy to use.

Features of Servlets

28
 Servlets are persistent. Servlet are loaded only by the web server
and can maintain services between requests.
 Servlets are fast. Since servlets only need to be loaded once, they
offer much better performance over their CGI counterparts.
 Servlets are platform independent.
 Servlets are extensible. Java is a robust, object-oriented
programming language, which easily can be extended to suit your needs
 Servlets are secure.
 Servlets can be used with a variety of clients.

3.7: JAVA SERVER PAGES

Java Server Pages is an evolutionary and natural extension of the Java


Servlet technology. This technology allows Web developers and designers to
develop and maintain platform-independent, information rich, dynamic web-
pages that help to achieve the design objective of separating view and content.

In a simple implementation, the browser directly invokes a JSP page,


which then generates the requested content. The JSP page can call JDBC
components to generate results, and creates standard HTML that it sends back to
the browser as result.

A JSP page is executed by a JSP engine, which is installed in a web server4


or a JSP enabled application server such as Web logic or Silver stream. The JSP
engine receives requests made by a client. Normally, JSP pages are compiled into
Java Servlets, a standard Java extension. If the servlet does not exist when it is
initially called, the JSP page will be compiled into Java Servlet class and stored in
server cache thus increasing speed of response to ensuing calls to that page.

JSP file .java file .class file


Servlet code servlet

Preprocessed

3.8 Model View Controller Architecture:

MVC Architecture Defines that The controller is separated from the system model
and View. It is composed of three different layers. Being a Web based architecture.
The User Interface is completely separated from the entire Business Logic Layer. The
database and business logic are bounded to gather. The Database Layer and Business
Logic Layer runs on the server Machine and the User Interface Layer will run under
the Client Machine. For developing the User Interface we are having HTML and Java
Script. For Business Login and Database Connectivity Servlets and JSP are used. In
the Backed the servlets and Jsp’s are connected to Database through JDBC API. The

29
web server plays a major role in connecting the client user interface and the servlets
and JSP.

The Block Diagram of the Architecture is as follows.

User Interface
(HTML / Java Script)

httpResponse
httpRequest

Web Server
Servlets/JSP’
s
JDBC
Oracle

3.9 Java Databases Connectivity

3.9.1 What Is JDBC?

JDBC is a Java API for executing SQL statements. (As a point of interest,
JDBC is a trademarked name and is not an acronym; nevertheless, JDBC is often
thought of as standing for Java Database Connectivity. It consists of a set of
classes and interfaces written in the Java programming language. JDBC provides
a standard API for tool/database developers and makes it possible to write
database applications using a pure Java API.

Using JDBC, it is easy to send SQL statements to virtually any relational


database. One can write a single program using the JDBC API, and the program
will be able to send SQL statements to the appropriate database.

The combinations of Java and JDBC lets a programmer write it once and
run it anywhere.

30
3.9.2 What Does JDBC Do?

Simply put, JDBC makes it possible to do three things:

 establish a connection with a database


 send SQL statements
 Process the results.

3.9.3 JDBC versus ODBC and other APIs

At this point, Microsoft's ODBC (Open Database Connectivity) API is that


probably the most widely used programming interface for accessing relational
databases. It offers the ability to connect to almost all databases on almost all
platforms.

So why not just use ODBC from Java? The answer is that you can use
ODBC from Java, but this is best done with the help of JDBC in the form of the
JDBC-ODBC Bridge, which we will cover shortly. The question now becomes
"Why do you need JDBC?" There are several answers to this question:

1. ODBC is not appropriate for direct use from Java because it uses a C
interface. Calls from Java to native C code have a number of drawbacks in
the security, implementation, robustness, and automatic portability of
applications.
2. A literal translation of the ODBC C API into a Java API would not be
desirable. For example, Java has no pointers, and ODBC makes copious
use of them, including the notoriously error-prone generic pointer

"void *". You can think of JDBC as ODBC translated into an object-oriented
interface that is natural for Java programmers.

3. ODBC is hard to learn. It mixes simple and advanced features together,


and it has complex options even for simple queries. JDBC, on the other
hand, was designed to keep simple things simple while allowing more
advanced capabilities where required.
4. A Java API like JDBC is needed in order to enable a "pure Java" solution.
When ODBC is used, the ODBC driver manager and drivers must be
manually installed on every client machine. When the JDBC driver is
written completely in Java, however, JDBC code is automatically
installable, portable, and secure on all Java platforms from network
computers to mainframes.

31
3.10 ORACLE 9I:

Oracle is a relational database. The language used to access relational


database is Structured Query language, SQL is flexible, efficient language, with
features designed to manipulate and examine relational data.
SQL is a fourth generation language. This means that the language
describes what should be done, but not how to do it. Fourth generation languages
are fairly simple and have fewer commands, 4GL’s also insulate the user from
underlying data structures and algorithms.

WHY CHOOSE ORACLE:

Oracle is popular relational database. Software is available on a wide


number of platforms. Oracle provides complete control organizing the date
storage to obtain good performance using indexing, clustering.

Introduction to SQL:

STRUCTURED QUERY LANGUAGE is a tool of communication between


a user and RDBMS. SQL is a simple and powerful language in the sense that
most of the operations in RDBMS can be done using SQL. It is a 4GL. The
important feature is that it is not procedural, advantages of using a non-
procedural language are:

 Reduction of code.
 Simplicity in writing code.
 Ease of maintenance.

SQL is made of 3 sub languages:

DDL: Data Definition Language consists of commands to create the objects,


such as tables, views, indexes etc.,

DML: Data Manipulation Language is used for querying, inserting, deleting and
updating of information stored in the database.

DCL: Data Control Language is used to control data and access to the database
in the multi-user environment for security purpose. The DCL is used for giving
access rights to different users.

32
Chapt
er 4

33
System
Environm
ent

34
4 System Environment
4.1 SOFTWARE REQUIREMENTS

Presentation Layer HTML, JavaScript

Network Layer TCP/IP

Web Server Layer Tomcat, Servlets, JDBC, JSP,

Language J2EE
Specification
Databases Oracle9i

Operating Systems Windows 2000, Windows NT 4.0, Windows 9x

4.2. HARDWARE REQUIRMENTS

1. Pentium with 233MHz or better


2. 64MB RAM minimum (128MB RAM) recommended
3. 800*600 resolution; 16 bit color (1024*768, 24 bit is recommended)
4. For offline message audio is preferred, but no need.
15” monitor (17” monitor recommended for best results)

35
Chapte
r 5

36
S0f
D eve
37
The methodology used to develop this project is object-oriented
methodology is based on function and procedures. It can be said as the
development of software by building self-contained modules as objects that can
be easily replaced, modified and reused. In this environment software is a
collection of discrete objects that encapsulate their data as well as the
functionality to model real world “objects”. Each object has attribute and
methods. Objects are grouped into classes. Here each object is responsible for
itself.
This environment emphasizes its cooperative philosophy by
allocating tasks among the objects of the applications. Instead of writing a lot of
code we can create a lot of code we can create a lot of helps to take in an active
role.
Object oriented methodology involves mainly

1. Analysis
2. Feasibility study
3. Design
4. Prototyping and testing.

38
Chapte
r S6y s t e m
Analysis

39
40
6 System Analysis
6.1 Introduction
A system is a set or arrangement of functionality dependent components
interactivity t working together to attain a predefine goal by processing
information. Analysis is used to gain an understanding of the existing system
what is required for it. At the conclusion f the system analysis there is a system
description and as set of requirements. The new system may be build a fresh or
by changing the existing system. In short system analysis specifies what the
system should do.

After making initial investigation we move a step forward toward the


analysis of system. For deep analysis we collect necessary information and
organized all the information for drawing the conclusion:-

1. We analyze all the related system.


2. Studies about the nature and behavior of the system.
3. We study all the aspects of the system and collect all the
provided facilities.
4. We analyze the common features offered by the system and we
adopt these features for analysis.
5. We also study the drawbacks available In the Existing system
and try to find out their solution and how to implement in our
project.

We analyze the entire modules ad drawn some conclusion. N the basis of analysis
and information we decide the information flow in our project we design the
process chart of the system. It helps to understand the working of the project.
Then we design the flow chart of the system. It shows the clear view of the system
ad help for further processing. For further working we have designed the DFD.
Through the DFD we describe the working of system and their dependency of the
module. DFD do not supply detail description of the module but graphically
describe the data flow of the system. In contrast to our project DFD we describe
all three modules ad their ad their sub working. It is helpful I design of database,
after the context level DFD we design the zero level and one level DFD by using
database design. After DFD design we prepare system layout architecture it
shows how our system works.

To create a soft ware application, a description of the problem and


requirements is required viz what the problem is about and what a system must
do etc. Analysis emphasis an investigation of problem rather than how a solution
is defined.

41
As analysis is the activity that feeds information to the specification
activity; it is essential that during analysis a complete and consistent set of
specifications emerge for the system. For achieving this, the first major problem
is to obtain the necessary information. People and existing documents are a
major source of information.

6.2 limitations of the existing system

The current system is totally manual. All the information related to the
distributors are stored in the file called distributors file. All the entries in the file
are made manually and also the incentives and discounts are calculated manually
on the last day of the month. Therefore there is a lot of chance for errors to creep
in. The registration is also done manually in the current system. The new
customer gives his details and DD no. to the company and if all the details are
found valid then the details of the customer are stored in the files. The same
information of the distributor is stored in different files. Therefore the data
redundancy occurs.

In the current system if customer wants to become a distributor he has to visit


the company and find one introducer for him. There he has to submit all his
details and the DD number. And if they are found valid then the data entry
operator of the Parivar consumer’s pvt ltd. will give a unique track id to the
customer.

LIMITATIONS OF CURRENT SYSTEM:

Because the current working system is totally manual many problems exist with
the system such as:

Time delay:

In the existing systems all the information related to the transactions are stored
in the registers, so it takes a lot of efforts and time to generate the reports,
monitor promotion, calculate incentives on sales and purchases etc.

Redundancy:

As the information passed through different registers, each register is


consolidated and sent to next register, so the same information is being tabulated
at each register.

No Accuracy:

42
Because of redundancy, the threat to accuracy arises. Because the same data is
maintained at different registers there may be a possibility of tabulating the data
wrongly.

Information retrieval is a tedious process:

When we want to see some old transactions it becomes a very cumbersome


process because the old registers have to be taken out and the transactions have
to be searched manually.

No Security:

There is no security in the current system, i.e. any unauthorized persons can
change the data manually.

6.3 Advantages of the proposed system


Time delay decreases:

As the system is totally automated the operator can simply type the track id of the
distributor and get the total information about that particular distributor.

Accuracy increases:

Because all the information is stored only in a centralized database the accuracy
increases and there is a feeble chance of errors being crept in the data.

Easy report generation:

We can easily generate the reports as and when required by the management. We
have to simply enter the track id of the distributor in order to generate the
reports of that particular distributor.

Security increases:

The administrator can only modify the data in the database; therefore no other
person can modify the data hence the security of the data increases.

Data validation:

Procedures are designed to detect the errors in the data while entering into the
database, therefore the incorrect data will not be accepted by the system and
hence the efficiency of the system increases.

GUI:

43
The proposed system is totally a Graphical User Interface, which makes it easier
for the officials to manage the transactions in an easy manner.

6.4 Automated Processes:


The proposed system consists of the processes such as

1. Registration of Exporters
2. Registration of Customers
3. Managing Customers
4. Registration of Product
5. Placing Order of Shipment
6. Shipment Against Order
7. Invoice Generation
8. Payment
9. Accounting.

All the above mentioned processes are automated.

44
Chapte
r 7

45
Feasibil
ity
Study

46
6 Feasibility Study
Feasibility Study is the process by which the feasibility is measured and assessed.
Where as feasibility is the measure of how beneficial or practical the development
of information will be to an organization. Feasibility should be measured
throughout the life cycle.

Taking into the consideration these facts, the feasibility study of the system has
been done under the following heads:

7.1 Operational Feasibility


Operational feasibility is a measure of how well the solution will work in
the organization. It is also measure of how people feel about the system or
project.

We have done this study along with the management and employees. The
following topic was discussed in detail to check for the operational feasibility:

a) Is the problem worth solving or will the solution to the problem work?

This topic we discussed in detail along with the Management and


employees. It was found that it is feasible for the system to work to solve
problem.

b) How do end-users and management feel about the problem?

While going through this topic we found that the management was supportive
to the system. There was no sign of the resist by end-users or managers.
So the system was found operationally feasible.

7.2 Technical Feasibility


Technical feasibility is a measure of the practicality of a specific solution
and the availability of the technical resources and expertise.
Today very little is technically impossible. Technical feasibility looks at what is
practical and reasonable. The following are the topics discussed:

a) Is the proposed technology or solution practical?

It was found that the technology required for developing the system is
available so there was no constraint regarding the presence of the technology.

b) Do we currently possess the necessary technology?

47
After finding that the required technology is feasible, the next thing was
the availability in the system environment. We found the technology is easily
available in the market.

c) Do we currently possess the Technical Expertise?

While going through this test it was found that the system has average
level of expertise in the technical expertise like Domain experts, Database
Administrators etc. So the technical expertise is present which requires some
training to make it successful.

7.3 Schedule Feasibility


The system is checked for the schedule of activities to perform to
accomplish the task. The feasibility of the system was checked in term of
scheduling of the task. It is measure of how reasonable the project timetable is.

7.4 Economic Feasibility


The bottom line of al the projects is economic feasibility. It is the measure
of cost effectiveness of the project .It is also called as cost-benefit analysis. It
deals with the costs and benefits of the information system. The various costs
found for the system are given as under:

a) Computer usage costs.


b) Personnel costs including the salaries of the programmers, computer
operators etc.
c) Cost of new computer equipment and software.

Where the benefits of the system are given as under:

a) Fewer Processing errors.


b) Elimination of tedious manual steps.
c) Quick Response time.
d) Reduced expenses like paper expenses, less man working hours.
e) Increased throughput.
f) Improved Employee Morale.
g) Better Service.

48
Chapte
r 8

49
i

Architectural
System
Design

50
8 Architectural Design

8.1 Introduction
Architectural Design represents the structure of data and program
components that are required to build a computer-based system. It considers the
architectural style that the system will take, the structures and properties of the
components of the system , and the interrelationships that occur between all
architectural components of the system.

Architectural Design begins with the data design and then proceeds to the
derivation of one or more representations of the architectural structure of the
system. Alternative architectural styles or patterns are analyzed to derive the
structure that is best suited to customer requirements and quality attributes.
Once an alternative has been selected, the architecture is elaborated using an
architectural design method.

8.2 Work Product


An architectural model encompassing data architecture and program
structure is created during architectural design. In addition, component
properties nd relationships are described.

At each stage, software design work products are reviewed for clarity,
correctness and completeness, and consistency with requirements and with one
another. The architecture is not the operational software. Rather, it is
representation that enables a software engineer to analyze the effectiveness of the
design in meeting its stated requirements. Consider architectural alternatives at a
stage when making design changes is still relatively easy and Reducing the risks
associated with the construction of the software

Detailed Function Description

The modules in the Trade Express Project are

• User Module
• Customer Module
• Shipment Module

51
• Product Module
• Accounts Module

The Users are the system Administrator and the Exporter whereas
Customer refers to the Importer. The System Administrator has the exclusive
privilege of adding any user to the database. The user is someone who has access
to this trade and logistics application that is implemented in the organization’s
intranet.

Both the Administrator, Exporter can look into their respective activities
while logged-in on the site. The User Profile view menu can be accessed by the
Customer too who can also edit her profile on the site. Thus, both the Exporter
and the Customer can edit their profile and update related issues.

The Customer views her shipment status by feeding in the Shipment Order
ID on the related page. Payments view can also be accessed by the respective
importer/customer. The Bill for Payment is generated for the customer once her
goods are dispatched and properly delivered to receiving port. When the payment
is done it is done with DD/Cheque or through credit card which may bounce on
certain exceptional circumstances. When the Cheque bounces it has to be
repayed again through the system. The Forwarding Agent is responsible for
forwarding the goods from the exporter to appropriate port from where it is
shipped to the importer’s destination. The Forwarding Agent receives certain
commission from the Exporter. Similarly the Clearing Agent is appointed by the
importer and acts as his representative at the importer’s port of destination. She
also receives commission from the importer. The goods are cleared by the
Clearing Agent at the receiving port by paying import duty, taxes.

The Letter Of Credit Concept comes into play when the importer is unable
to pay his dues on the time of transaction and the Bank on her behalf pays to the
concerned exporter; thus clears the Bill Of Payment. Both the exporter and
importer needs to have an authenticated Trade License but for certain goods the
existence of License may not matter.

The Exporter when logged on can view any new shipment order that has
been generated in the system and needs to be dispatched to the concerned
importer. Thus, the importer(customer in the Trade Express Project) can do the
Ship-order for which the exporter carries out the order. Shipment status details
are also viewed by the exporter to keep track of the delivery and their status

What is object oriented analysis and design?

The essence of object oriented analysis and design is emphasizes


considering a problem domain and logical solution from the prospective of
objects (things, concept and entities) as shown in figure:

52
Analysis Design Construction

Investigation of Logical Solution Code


The Problem
Fig: Steps in object-oriented approach for software engineering

During object-oriented analysis, there is an emphasis on finding and


describing the object and concept in the problem domain.

During Object Oriented Analysis and Design there is an emphasis on defining


logical software objects that will ultimately be implemented in an object oriented
programming language. These software objects have attributes and methods.

8.3 Software development process


In the light of Object Oriented Analysis and Designing, a Software
development process id a method to organize the activities related to creation,
delivery and maintenance of software system.

Macro –Level Step:

At a high level major steps in developing an application include the


following:

1. Plan and Elaborate –Planning and defining requirement along with building
prototypes.
2. Build - The construction of the system.
3. Deploy – The implementation of the system in use.

Plan and Build Deploy


Elaborate

8.4 DATA BASE DESIGN


8.4.1 INTRODUCTION

53
A database model is a collection of logical constructs used to represent
the data in data structures and data relationships with in the database. Basically,
the database models may be grouped into two categories: conceptual model and
implementation models. The conceptual model focuses on the logical nature of
that data presentation. Therefore the conceptual model is concerned with what is
representing in the database and the implementation model is concerned with
how it is represented.

1. Conceptual Model:

The conceptual model represents data present in the entities as well the
relations present is the entities. All the strong entities and weak entities are
identified here and it mainly focuses on the logical nature of that data
presentation.

2. General Access Model:

General access model is used to convert the ER model into the relation model.
Here we can identify the references to the other entities and the nature of the
each attribute. But, A network model’s record can have more then one parent.

3. Relation Model:

The relational model is represented as tables. The columns of each table are
attributes that define the data or value domain for entities in that column. The
rows of each table are tuples representing individual data objects being
stored. A relational table should have only one primary key. A primary key is a
combination of one or more attributes whose value unambiguously locates
each row in the table.

8.4.2 Database normalization:

It is a design technique by which relational database tables are


structured in such a way as to make them invulnerable to certain types of
logical inconsistencies and anomalies. Tables can be normalized to varying
degrees: relational database theory defines "normal forms" of successively
higher degrees of stringency, so, for example, a table in third normal form is
less open to logical inconsistencies and anomalies than a table that is only in
second normal form. Although the normal forms are often defined
(informally) in terms of the characteristics of tables, rigorous definitions of
the normal forms are concerned with the characteristics of mathematical
constructs known as relations. Whenever information is represented
relationally—that is, roughly speaking, as values within rows beneath fixed
column headings—it makes sense to ask to what extent the representation is
normalized.

54
8.4.3 Tables Used in This Project

Table Name: FWA_USERS

Name Null? Type


USER_ID NOT NULL VARCHAR2(15)
COMPANY_ID VARCHAR2(15)
PASSWORD VARCHAR2(15)
HOME_SITE VARCHAR2(200)
USER_NAME VARCHAR2(15)
USER_TITLE VARCHAR2(15)
USER_FAX VARCHAR2(15)
COMPANY_TYPE VARCHAR2(15)
USER_DEPT VARCHAR2(15)
USER_PHONE VARCHAR2(15)
USER_EMAIL VARCHAR2(50)
CREATED_BY VARCHAR2(15)
EXPIRY_DATE DATE
CREATED_DATE DATE
USER_LNAME VARCHAR2(15)
COMP_URL VARCHAR2(50)
CITY VARCHAR2(15)
COUNTRY VARCHAR2(15)
ZIP NUMBER(6)
USER_TYPE VARCHAR2(15)
LICENSE_NO VARCHAR2(15)
ISSUED_BY VARCHAR2(100)
LIC_ISSUE_DATE DATE
LIC_EXPIRY_DATE DATE
ACNO VARCHAR2(15)
ACNAME VARCHAR2(50)
BANKNAME VARCHAR2(50)

Table Name: SHIPMENT_ORDER

Name Null? Type

55
ORDER_ID NOT NULL VARCHAR2(15)
PRODUCT_ID VARCHAR2(15)
PROD_NAME VARCHAR2(25)
QTTY NUMBER
ORDER_DATE DATE
SHIP_DATE DATE
EXP_ID VARCHAR2(15)
EXP_NAME VARCHAR2(25)
ORDER_STATUS VARCHAR2(50)
CUST_ID VARCHAR2(15)
SHIP_TO_COUNTRY VARCHAR2(25)
SHIP_TO_CITY VARCHAR2(25)
VALID_DATE NUMBER(2)

Table Name: TA_SHIP_LINE

Name Null? Type


SHIP_ID NOT NULL VARCHAR2(15)
ORDER_NO VARCHAR2(15)
ORDER_DATE DATE
IMP_NAME VARCHAR2(25)
SHIP_DATE DATE
S_DESC VARCHAR2(100)
PID VARCHAR2(15)
QUANT NUMBER
PRICE NUMBER(10,2)
INSURE NUMBER(10,2)
FRIEG NUMBER(10,2)
PACKEG_TYPE VARCHAR2(25)
MOT VARCHAR2(25)
INSURE_ID VARCHAR2(15)
SHIP_TO_CITY VARCHAR2(25)
SHIP_TO_COUNTRY VARCHAR2(25)
IMP_ID VARCHAR2(15)
STATUS VARCHAR2(50)
EXP_ID VARCHAR2(30)

56
Table Name: PRODUCT_CHART

Name Null? Type


TAX_ID NOT NULL VARCHAR2(15)
PROD_TYPE VARCHAR2(50)
TAX_PER NUMBER(5,2)

Table Name: PRODUCT_CATELOG

Name Null? Type


PROD_ID NOT NULL VARCHAR2(15)
PROD_DESC VARCHAR2(200)
WIDTH NUMBER
LENGTH NUMBER
HEIGHT NUMBER
VOLUME NUMBER
UOM VARCHAR2(15)
CREATED_BY VARCHAR2(15)
CREATED_DATE DATE
COMPANY_ID VARCHAR2(15)
DUTY_RATE VARCHAR2(25)
IMP_COUNTRY VARCHAR2(15)
UNIT_PRICE NUMBER(10,2)
PRODUCT_NAME VARCHAR2(25)
PROD_CAT VARCHAR2(30)

Table Name: TA_CUSTOMER

Name Null? Type


CUSTID NOT NULL VARCHAR2(15)
CUSTFIRSTNAME VARCHAR2(15)
CUSTLASTNAME VARCHAR2(15)
CUSTSUFFIX VARCHAR2(5)
CUSTCOMPANY VARCHAR2(15)
COMPANY_ID VARCHAR2(15)

57
CUSTPOSITION VARCHAR2(15)
CUSTADDR1 VARCHAR2(100)
CUSTADDR2 VARCHAR2(30)
CUSTCITY VARCHAR2(15)
CUSTCID VARCHAR2(15)
CUSTCOUNTRY VARCHAR2(15)
SALUTATION VARCHAR2(15)
CUSTOMERHOMEPHONE VARCHAR2(15)
CUSTWORKPHONE VARCHAR2(15)
CUSTTITLE VARCHAR2(15)
CUSTFAX VARCHAR2(15)
CUSTEMAIL VARCHAR2(30)
LOC_REQUIRED VARCHAR2(15)
CUSTCODE VARCHAR2(15)
ACCOUNT_NO VARCHAR2(15)
NOTES VARCHAR2(100)
CREBY VARCHAR2(15)
CRE_DATE DATE
REMARKS VARCHAR2(100)
CUSTOMER_TYPE VARCHAR2(15)
URL VARCHAR2(30)
ZIP NUMBER(6)

Table Name: INSURANCE

Name Null? Type


INS_ID NOT NULL VARCHAR2(15)
INS_AMT NUMBER(10,2)
INS_TYPE VARCHAR2(15)
INS_DATE DATE
INS_COMPANY VARCHAR2(50)
INS_RENEW_DATE DATE

58
When we talk about a database, we must differentiate the database schema
which s the logical design of the database and the database instance which is
the snapshot of the database at a given instant of time.

8.5 Data Flow Diagram

Data flow diagrams illustrate how data is processed by a system in


terms of inputs and outputs.

Data Flow Diagram Notations:

1. Process Notations Process


A process transforms incoming data
1 flow into outgoing data flow
Process
Process

2. Data store Notations Data store

Data stores are repositories of


data in the system. They are
sometimes also referred to as
files

4. Dataflow Notations Dataflow

Dataflow are pipeline through


which packets of information
flow. Label the arrows with the
name of the data that moves
through it.
5. External Entity Notations External Entity

External entities are object


outside the system, with which
the system communicates.

59
CONTEXT LEVEL:

Fig 8.1: Context Level Dataflow diagram

60
TOP LEVEL DFD:

Fig 8.2: Top level Dataflow diagram

61
DETAILED LEVEL DFD :
Product Registration

Fig 8.3: DFD for Product Registration

62
VIEW PRODUCT:

Fig 8.4: DFD for view product detail

63
DELETE PRODUT

Fig 8.5: DFD for Update or Delete Product

64
SHIPMENT ORDER

Fig 8.6: DFD for Shipment Order

65
VIEW SHIPMENT ORDER

Fig 8.7: DFD for View Shipment Order Detail

66
CANCEL SHIPMENT ORDER

Fig 8.8: DFD for Cancel Shipment Order

67
8.6 Entity-relationship diagram
Databases are used to store structured data. The structure of this data, together
with other constraints, can be designed using a variety of techniques, one of
which is called entity-relationship modeling or ERM. The end-product of the
ERM process is an entity-relationship diagram or ERD. Data modeling
requires a graphical notation for representing such data models. An ERD is a type
of conceptual data model or semantic data model.

There are a number of conventions for entity-relationship diagrams (ERDs). The


classical notation is described in the remainder of this article, and mainly relates
to conceptual modelling. There are a range of notations more typically employed
in logical and physical database design, including information engineering,
IDEF1x (ICAM Definition Language) and dimensional modeling.

Common symbols

Two related entities

An entity with an attribute

A relationship with an attribute

Primary Key

68
Entity Relation Product Model

69
Fig 8.9: Entity - Relationship diagram

8.7 UNIFIED MODELING LANGUAGE DIAGRAMS


The unified modeling language allows the software engineer to express an
analysis model using the modeling notation that is governed by a set of syntactic
semantic and pragmatic rules.

A UML system is represented using five different views that describe the system
from distinctly different perspective. Each view is defined by a set of diagram,
which is as follows.

i. This view represents the system from the users perspective.


The analysis representation describes a usage scenario from the end-users
perspective.

Structural model view

 In this model the data and functionality are arrived from inside the
system.

 This model view models the static structures.

Behavioral Model View

 It represents the dynamic of behavioral as parts of the system,


depicting the interactions of collection between various
structural elements described in the user model and structural
model view.

Implementation Model View

 In this the structural and behavioral as parts of the system are


represented as they are to be built.

Environmental Model View

70
In this the structural and behavioral aspects of the environment in which the
system is to be implemented are represented.

UML is specifically constructed through two different domains they are

 UML Analysis modeling, which focuses on the user model and


structural model views of the system.

 UML design modeling, which focuses on the behavioral


modeling, implementation modeling and environmental model
views.

Use case Diagrams represent the functionality of the system from a user’s point of
view. Use cases are used during requirements elicitation and analysis to represent
the functionality of the system. Use cases focus on the behavior of the system
from external point of view.
Actors are external entities that interact with the system. Examples of actors
include users like administrator, bank customer …etc., or another system like
central database.
SYSTEM NAME

Use case 1

Use case 2

Actor
Actor

Use case n

71
8.7.1 Use case Model

Fig 8.10: Use Case diagram for Product module

72
8.7.2 sequence diagrams
Sequence Diagrams Represent the objects participating the interaction
horizontally and time vertically.

Sequence Diagram 1

Fig 8.11: Sequence diagram for Product Module

73
Sequence Diagram 2

Fig 8.12: Sequence diagram for Shipment Order

74
8.8 SNAPSHOT FOR PRODUCT MODULE

Fig 8.14: TRADE EXPRESS [Product Registration 1]

75
Fig 8.14: TRADE EXPRESS [Product Registration]

76
Fig 8.14: TRADE EXPRESS [Product Created]

77
Fig 8.14: TRADE EXPRESS [View Product Detail]

78
Fig 8.14: TRADE EXPRESS [View Product Detail]

79
Fig 8.14: TRADE EXPRESS [View All Product Detail]

80
Fig 8.14: TRADE EXPRESS [View Product Detail By Category]

81
Fig 8.14: TRADE EXPRESS [Update Product]

82
Fig 8.14: TRADE EXPRESS [Update Product]

83
Fig 8.14: TRADE EXPRESS [Product Updated]

84
Fig 8.14: TRADE EXPRESS [Delete Product]

85
Fig 8.14: TRADE EXPRESS [Product Deleted]

86
Fig 8.14: TRADE EXPRESS [Shipment Order]

87
Fig 8.14: TRADE EXPRESS [Shipment Order]

88
Fig 8.14: TRADE EXPRESS [Shipment Order]

89
Chapt
er 9

90
Syste
m

9. System Testing

91
9.1 Introduction

“Testing” is one of the modules of the system analysis and design, which has
great importance. After system is ready, it should go for testing. Testing is a set of
activities that can be planned in advance. The system developer has to undergo
with testing and that should not be avoided before the final system
implementation. System testing is one of the steps in the software engineering
process, which can be viewed as destructive rather than constructive. In the
testing phase actual performance of the system can be assessed. It can be used
while system development and it provide the actual results by which the system
can be compared.

Testing is bound to get errors, which is the main reason for putting system
under test. This immediately helps because one can detect the errors at an early
stage before the final system implementation. This procedure further enhances
smooth implementation and proper functioning of the system.

9.2 Strategic Approach to Software Testing


Parts of the program are tested before testing the entire program. Besides
partitioning the problem of testing, another reason for testing parts separately is
that if a test case detects an error in a large program, it will be extremely difficult
to pinpoint the source of the error. That is, if a huge program does not work,
determining which module has errors can be formidable task. Furthermore it will
be extremely difficult to construct test cases so that we can feel fairly confident
about them. Hence it is clear that for a large system, we should first test different
parts of the system independently, before testing the entire system.
We assume that a system is a hierarchy of modules. For such systems,
there are two common ways modules can be combined, as they are tested, to form
a working program:

• TOP-DOWN
• BOTTOM-UP

92
Top- Down

In a top-down strategy, we start by testing the top of the hierarchy, and we


incrementally add modules that it calls and then test the new combined system.
This approach of testing requires stubs to be written. A stub is a dummy routine
that simulates a module. In the top-down approach, module cannot be tested in
isolation because they invoke some other modules. To allow the modules to be
tested before their subordinates have been coded, stubs simulate the behavior of
the subordinates.

Bottom-Up

The bottom-up approach starts from the bottom of the hierarchy. First the
modules at the very bottom, which have no subordinates, are tested. Then these
modules are combined with higher-level modules for testing. At any stage of
testing all the subordinate modules exist and have been tested earlier. To perform
bottom-up testing, drivers are needed to set up the appropriate environment and
invoke the module. It is the job of the driver to invoke the module under testing
with the different set of test cases.

9.3 Unit Testing

Unit testing is normally considered as an adjunct to the coding step. It


focuses verification effort on the smallest unit of software design. It has been
conducted within the programming area. The individual units have been tested in
isolation and written to meet the specification of requirements, including any
requirement to interact with other units in the system.
Unit testing is the test for the small units of code, e.g. programs, modules
or functions, in order to ensure that they perform their intended functions. All
possible paths through the control structure were exercised to ensure that all
statements in a program were executed at least once. Unit testing was also done
to test the data flow across a module interface. The following errors were
uncovered during unit testing:

93
• Comparison of different data types
• Incorrect logical operators or precedence
• Incorrect comparison of variables
• Improper or nonexistent loop termination
• Improperly modified loop variables

9.3.1 White box Testing

White box testing is concerned with implementation of program .The


purpose is to exercise different data structures used in program. The testing
concentrates on examination of code rather than specification.
Normal path processing tends to be well understood.
Exception handling is less well scrutinized or specified in requirements and when
coded is there for more susceptible to errors.
.

9.3.2 Basis Path Testing

One of the biggest problems in unit testing is how to determine test cases.
The tester has to ensure that there are enough tests to do thorough testing, but
not so many tests that all of the limited testing time is used up. There are several
different techniques to pick test cases including using boundary cases, dataflow
testing and branch testing. No single technique can supply sufficient test cases, so
usually combinations of techniques are used. A basis set is a set of linearly
independent paths that can be used to construct any path through the program
flow graph.
Testing techniques can be divided into various categories. Black box
testing ignores the internals of the software unit. Structured testing is, on the
other hand, "Testing that takes into account the internal mechanism of a system
or component". This can be further subdivided into different types including path
testing, "Testing designed to execute all or selected paths through a computer
program and branch testing, "Testing designed to execute each outcome of each
decision point in a computer program. Basis testing, also known as Structured

94
Testing, is a hybrid between these two techniques. The test paths in a basis set
fulfill the requirements of branch testing and also test all of the paths that could
be used to construct any arbitrary path through the graph.
Any function in a program can be represented as a control flow graph. The
nodes in this graph are program statements, while the directed edges are flow of
control. Two nodes can be unconnected, connected by an edge in either direction
or connected by an edge in each direction. When tracing a path from the source
to the sink, a back edge is a edge that leads back to a node that has already been
visited. A flow graph contains one source node and one sink. A source node is a
node, which has no incoming edges, while a sink node is a node with no outgoing
edges. A program function may have more than one sink, but this graph can be
converted into a graph with only one sink. Some languages also allow more than
one source. This construct is very rare and not used in Structured Programming.

a c
9.3.3 Data Flow Testing

Data flow testing mainly focuses on testing the value assignment of each
variable in a program by executing sub paths from the assignment (definition) to
some program points in which the variable is used (use). The use of a variable can
be classified as either a computation use or a predicate use. If the value of a
variable is used in computing a value for defining other variables or as an output
value in an output statement, the use is called computation use, denoted as c-use.
Otherwise, if the value of a variable is used to decide the result of a predicate
statement for selecting, execution paths, the use is called predicate use, denoted
as p-use. A defuse pair of a variable is an order pair such that is a statement
having a definition of and is a statement having a use of, or some memory
location bound to, that can be reached by over some path in the program.

Data flow testing criteria are used to select particular defuse associations
to test. A test satisfies a def-use pair if the execution of the program with the test
leads to traversal of a sub path from the definition to the use without any

95
intervening redefinition of that memory location. For causes, tests must travel
from the statement containing the definition to the statement containing the
computation use. For puses, tests must travel from a statement containing the
definition to both executional successors of the statement containing the
predicate use. Many types of data flow testing criteria have been defined. Among
them, the “all definitions” criterion requires that a test should cover a path from
each definition to a use, while the “alluses” criterion requires that one sub path
from every definition to each of its uses is tested.

9.4 Integration Testing

Integration testing is a systematic technique for constructing the program


structure while at the same time conducting tests to uncover errors associated
with interfacing. During this activity, it Module tested components were taken
and a program structure was built as per the design. Then incremental
integration was performed on the system. This means that programs were
constructed and tested in small increments instead of testing the entire program
as a whole. This was done because correction of errors becomes difficult in case of
whole program testing as many errors were detected and it is not easy to correct
them at one go. Thus, through incremental integration testing, any error
uncovered could be easily noted and corrected and interfaces were tested
completely.

9.5 Acceptance Testing

An acceptance test is a test carried out by the customer or end user rather
than the developer in order to enable the customer to validate all requirements.
Alpha testing and Beta testing are two types of acceptance tests that were
conducted

9.5.1 Alpha Testing

96
Alpha test is conducted in a controlled environment. As a matter of fact,
the end user conducts alpha test at the developer’s site. But since I’m the
developer and this system has been developed at the company’s site itself, it is
assumed that alpha test has been conducted at the company’s site. During the
course of the system development, the end user was operating the software in my
presence and I was recording the errors that were occurring and other problems
that were coming up. Rectification was made accordingly.

9.5.2 Beta Testing

Beta testing was also conducted at the company site by the end user, but in my
absence. Here, the end user himself recorded all the problems that he had
encountered during testing the system and then reported these to me at regular
intervals. As a result of problems reported during beta testing, modifications
were made to overcome the problems.

9.6 Validation Testing

9.6.1 Black Box Testing

The black box testing attempts to find out errors like interface errors,
incorrect functions, errors in structures or externals database errors.

9.7 System Testing

Software is only the part of the large computer based system. Ultimately
software is incorporated with other elements of the system and a series of
integration and validation tests are conducted. These tests fall outside the scope
of the software processes. The various types of tests conducted under system
testing:
• Recovery Testing.
• Security Testing
• Stress Testing
• Performance Testing.

97
Chapte
r 10

98
Syste
m
Securi

10. System Security

99
10.1 Introduction

Once the computerized system has been implemented, the system would
need physical security firstly because it would contain all business transactions
and hence it need to be well protected against loss or damages.
Unauthorized intruders, disasters, fire, and voltage fluctuations can
threaten the overall system security.
10.1.1 Security from unauthorized intruders

Unauthorized intruders have two main objectives. Firstly, an intruder may


physically enter the installation to steal assets or carry out sabotage actions.
Secondly, an intruder may enter an electronic bug or introduce viruses into the
system so as to destroy all the information of the company. So proper username
and password should be provided to the users over local area network.
10.1.2 Security from voltage fluctuation

The damage caused to the system by voltage fluctuation can be overcome by


using voltage regulators to protect it against temporary fluctuation in power
supply and also by using uninterruptible power supply (UPS), which will provide
power whenever a temporary loss of power occurs.

10.1.3 Security from disasters

In spite, of all the safeguards mentioned above, a computer installation


might still suffer from a disaster. Examples of disasters are fire outbreak,
Earthquake, etc. Loss from fire or an earthquake can be disastrous for the
business. A threat may occur which management may not have considered.
Therefore, a disaster recovery plans must be set in advance to enable the
computer installation to restore operations without interruption.

10.1.3.1 The Emergency plan

This plan specifies the actions to be undertaken immediately after a


disaster has occurred. For example, some disaster may require that all personnel

100
leave the installation immediately; others may require that a few personnel
remain for a short period of time to sound alarms or to shut down the system and
other equipment.

10.1.3.2 The Back-up plan

The back-up plan specifies the location of back-up resources and where
these resources can be assembled and operations restarted. Back-ups of the
system and related data can be kept at distant sites other than the company site
and far away from it also. In case a disaster occurs, the management can still have
the back-up copy and start operating the system without interruption.

10.1.3.3 The Back-Up plan

This means that the company assumes the worst and decides in advance
what can be done about the disaster when it really happens. The first step in any
recovery plan is to know that the system has failed. Accordingly, the type of
failure has to be determined. The extent of damage to data, software and
hardware has to be discovered and analyzed. Then necessary steps have to be
followed to rectify the faults, correct the damages and restore the system to give
normal service.
By following all these implementation criteria, the company will absolutely
benefit a lot from the new system and will always ready for any type of
mishap at any time.

101
Chapte
r 11

102
Discus
sion

103
10. CONCLUSION

The system’s capability is to keep track of all the on-line information in its main
feature, which helps the management to know the current position of the
organization activities by just glancing through system, generated details.

The system has been developed considering every single quality factor. Due to
this reason the system is highly secure from the crash down problem. Moreover,
the system is highly reliable and due to the security and integrity features,
provides for the system, unauthorized users cannot access the system.

11. SCOPE FOR FUTURE WORK

This system is ever ready to attend the following needs of future:

- Interaction with external software.

- Cross platform functionality.

- Facility to send any report by E-mail.

- Web enabling of information, so that clients can retrieve the


information on web.

- Any other feature that client needs.

104
BIBLIOGRAPHY

1. System Analysis And Design

- Awad

2. core java

- Complete Reference

3. Software Engineering

- Roger. S. Pressman
- Pankaj Jalote

4. Database Management System

- A. Nawathe

5. JSP/Servlet

- Head First

6. HTML:

- Complete Reference

Internet Research:

• www.javaworld.com
• www.javaguru.com

105

Das könnte Ihnen auch gefallen