Beruflich Dokumente
Kultur Dokumente
r 1
1
Compan
y
2
1. Organization Profile
For Micro - Pro, the move from Training to Total Solutions has been brisk and an
eventual one, having entered the field of computers in 1994, chiefly as a computer
training company, Micro - Pro scaled new heights by going into computer
maintenance along with Software Marketing.
1.1 MOTTO
Micro - Pro has lived up to its motto- “Leadership through customer
Satisfaction”
What renders our technical services and our training programs is the superior
dedication and expertise of our engineers who are the main strength of the
Company.
3
1.3.1 ASSEMBLING/SELLING SECTION
Matching the quality of our machines and parts is the expertise of our engineers,
whose dedications renders superior to that of the rest. We are also resellers for
IBM, HP, COMPAQ, WIPRO, EPSON & TVSE peripherals.
4
1.3.4 LIST OF OUR VALUED CUSTOMER
1. ITC LIMITED
2. ALLAHABAD BANK
3. EXIDE INDUSTRIES LIMITED
4. SCHEFIELDS LIMITED
5. C.M.C. LIMITED
6. STATE PROJECT IMPLEMENTATION UNIT
7. HINDUSTAN DEVELOPMENT CORPORATION
8. DEVELOPMENT CONSULTANT LIMITED
9. EMAMI LIMITED
10. TOTAL KOTHARI GROUP OF
11. COMPANIES WHICH INCLUDES:
a) KOTHARI MEDICAL CENTRE
b) KOTHARI & COMPANY
c) KOTHARI PLANTATIONS
d) KOTHARI HIGHTECH CONSULTANTS
e) KOTHARI GIS LTD
5
Chapt
er 2
6
Syste
m
Overv
7
2. System Overview
The term system word is derived from the “Greek” word “Systema” which means
that an organized relationship among functioning units and component. A system
exists because it is designed to achieve one or more objective. TRADE EXPRESS
is the system which is Developed for an Organization. This is the organization
which does its export.
• IMPORTER
• EXPORTER
• ADMINISTRATER
This is the system, which is developed for the candidate and company for
handling all the management function of the company. It can handle all kind of
work which are performed in the organization.
There has been a growing demand among international trading community for
computerized application which will keep track of all these international trade
aspects (products, shipment, customers etc.) involving different
exporter/importer and will ease the trading replacing any manual paper work.
To address all these problems Trade Express has been developed. It gives the
facility to keep all these international trade related details and will facilitate easy
trade flow by reducing the time, cost, probability of human-error and
communication complexity.
This is a trade and logistics application which can be hosted in Market place. It
can be run in any organisation’s intranet also. Different Exporter and
importers will use this application. They will register themselves,
keep data about their products those they will export/import, keep
8
details of clients, details of shipment etc. There will be different modules
for the application.
These modules are User Profile, User Activity report, User’s products, User’s
clients, User shipments etc. This system will have extensibility to
interface/integrate with any other application/subsystem to find out landed cost,
export control etc .
Scope
Goods imported in a vessel/aircraft attract customs duty and unless these are not
meant for customs clearance at the port/airport of arrival by particular
vessel/aircraft and are intended for transit by the same vessel/aircraft or
transhipment to another customs station or to any place outside India, detailed
customs clearance formalities of the landed goods have to be followed by the
importers. In regard to the transit goods, so long as these are mentioned in
import report/IGM for transit to any place outside India, Customs allows transit
without payment of duty. Similarly for goods brought in by particular
vessel/aircraft for transshipment to another customs station detailed customs
clearance formalities at the port/airport of landing are not prescribed and simple
9
transshipment procedure has to be followed by the carrier and the concerned
agencies. The customs clearance formalities have to be complied with by the
importer after arrival of the goods at the other customs station. There could also
be cases of transshipment of the goods after unloading to a port outside India.
Here also simpler procedure for transshipment has been prescribed by
regulations, and no duty is required to be paid.
If the goods are cleared through the EDI system no formal Bill of Entry is filed as
it is generated in the computer system, but the importer is required to file a cargo
declaration having prescribed particulars required for processing of the entry for
customs clearance.
The Bill of entry, where filed, is to be submitted in a set, different copies meant
for different purposes and also given different colour scheme, and on the body of
the bill of entry the purpose for which it will be used is generally mentioned in the
non-EDI declaration. The importer clearing the goods for domestic consumption
has to file bill of entry in four copies; original and duplicate are meant for
customs, third copy for the importer and the fourth copy is meant for the bank
for making remittances.
In the non-EDI system alongwith the bill of entry filed by the importer or his
representative the following documents are also generally required:-
• Signed invoice
• Packing list
• Bill of Lading or Delivery Order/Airway Bill
• GATT declaration form duly filled in
• Importers/CHA’s declaration
• License wherever necessary
• Letter of Credit/Bank Draft/wherever necessary
• Insurance document
• Import license
• Industrial License, if required
• Test report in case of chemicals
• Adhoc exemption order
• DEEC Book/DEPB in original
• Catalogue, Technical write up, Literature in case of machineries, spares or
chemicals as may be applicable
• Separately split up value of spares, components machineries
• Certificate of Origin, if preferential rate of duty is claimed
• No Commission declaration
10
claimed under different export promotion schemes. They have also to check
whether there are any restrictions or prohibitions on the goods imported and if
they require any permission/license/permit etc., and if so whether these are
forthcoming. Assessment of duty essentially involves proper classification of the
goods imported in the customs tariff having due regard to the rules of
interpretations, chapter and sections notes etc., and determining the duty
liability. It also involves correct determination of value where the goods are
assessable on ad valorem basis. Where the appraising officer is not very clear
about the description of the goods from the document or as some doubts about
the proper classification which may be possible only to determine after detailed
examination of the nature of the goods or testing of its samples, he may give an
examination order in advance of finalisation of assessment including order for
drawing of representative sample. This is done generally on the reverse of the
original copy of the bill of entry which is presented by the authorized agent of the
importer to the appraising staff posted in the Docks/Air Cargo Complexes where
the goods are got examined in the presence of the importer’s representative.
On receipt of the examination report the appraising officers in the group assesses
the bill of entry. He indicates the final classification and valuation in the bill of
entry indicating separately the various duties such as basic, countervailing, anti-
dumping, safeguard duties etc., that may be leviable. Thereafter the bill of entry
goes to Assistant Commissioner/Deputy Commissioner for confirmation
depending upon certain value limits and sent to comptist who calculates the duty
amount taking into account the rate of exchange at the relevant date.
After the assessment and calculation of the duty liability the importer’s
representative has to deposit the duty calculated with the treasury or the
nominated banks, whereafter he can go and seek delivery of the goods from the
custodians. Where the goods have already been examined for finalization of
classification or valuation no further examination/checking by the dock
appraising staff is required at the time of giving delivery and the goods can be
taken delivery after taking appropriate orders and payment of dues to the
custodians, if any.
In most cases, the appraising officer assessees the goods on the basis of
information and details furnished to the importer in the bill of entry, invoice and
other related documents including catalogue, write-up etc. He also determines
whether the goods are permissible for import or there are any
restriction/prohibition. He may allow payment of duty and delivery of the goods
on what is called second check/appraising basis in case there are no
restriction/prohibition.
In this method, the duties as determined and calculated are paid in the Custom
House and appropriate order is given on the reverse of the duplicate copy of the
bill of entry and the importer or his agent after paying the duty submits the goods
for examination in the import sheds in the docks etc., to the examining staff. If
the goods are found to be as declared and no other discrepancies/mis-
11
declarations etc., are detected, the importer or his agent can clear the goods after
the shed appraiser gives out of charge order.
12
records his findings. In case group has called for samples, he forwards sealed
samples to the group. The importer is to bring back the said bill of entry to the
assessing officer for assessing the duty. Appraiser assesses the bill of entry. It is
countersigned by Assistant/Deputy Commissioner if the value is more than Rs. 1
lakh.
SECTION - 6 EXCEPTION HANDLING
While filing applications and making payments online, it has been observed that
exporters/ importers face technical problems on account of non-availability of
relevant documents, malfunctioning of system etc. For attending to these
technical problems, a Helpdesk is set up. The trading community can access the
Help Desk by dialing the toll free number …………..or by e-mail at abc@xyz.com.
The help desk will be available between 10.00 AM to 7.00 PM on all working
days. A complaint number may be provided by helpdesk if issues remain
unresolved. The complaint number may be quoted for all future reference. For e-
mails complaint Numbers may be conveyed on next working day if complaint is
unresolved.
Execution of Bonds:
Payment of Duty:
The duty can be paid in the designated banks or through TR-6 challans. Different
Custom Houses have authorised different banks for payment of duty. It is
necessary to check the name of the bank and the branch before depositing the
duty. Bank endorses the payment particulars in challan which is submitted to the
Customs.
13
SECTION - 8 MODIFICATIONS & ENHANCEMENTS
For faster clearance of the goods, provision has been made, to allow filing of bill
of entry prior to arrival of goods. This bill of entry is valid if vessel/aircraft
carrying the goods arrive within 30 days from the date of presentation of bill of
entry.
The importer is to file 5 copies of the bill of entry and the fifth copy is called
Advance Noting copy. The importer has to declare that the vessel/aircraft is due
within 30 days and they have to present the bill of entry for final noting as soon
as the IGM is filed. Advance noting is available to all imports except for into bond
bill of entry and also during the special period.
Specialized Schemes:
The import of goods are made under specialized schemes. The importer in such
cases is required to execute bonds with the Customs authorities for fulfillment of
conditions of respective notifications. If the importer fails to fulfill the conditions,
he has to pay the duty livable on those goods. The amount of bond would be equal
to the amount of duty livable on the imported goods. The bank guarantee is also
required along with the bond. However, the amount of bank guarantee depends
upon the status of the importer like Super Star Trading House/Trading House
etc.
A separate form of bill of entry is used for clearance of goods for warehousing.
All documents as required to be attached with a Bill of Entry for home
consumption are also required to be filed with bill of entry for warehousing. The
bill of entry is assessed in the same manner and duty payable is determined.
However, since duty is not required to be paid at the time of warehousing of the
goods, the purpose of assessing the goods at this stage is to secure the duty in
case the goods do not reach the warehouse. The duty is paid at the time of ex-
bond clearance of goods for which an ex-bond bill of entry is filed. The rate of
14
duty applicable to imported goods cleared from a warehouse is the rate in-force
on the date on which the goods are actually removed from the warehouse.
Export – Registration
Whenever a new Airline, Shipping Line, Steamer Agent, port or airport comes
into operation, they are required to be registered into the Customs System.
Whenever, electronic processing of shipping bill etc. is held up on account of non-
registration of these entities, the same is to be brought to the notice of
Assistant/Deputy Commissioner in-charge of EDI System for registering the new
entity in the system.
Once, the shipping bill is passed by the Export Department, the exporter or his
agent present the goods to the shed appraiser (export) in docks for examination.
The shed appraiser may mark the document to a Custom officer (usually an
examiner) for examining the goods. The examination is carried out under the
supervision of the shed appraiser (export). If the description and other
particulars of the goods are found to be as declared, the shed appraiser gives a ‘let
export’ order, after which the exporter may contact the preventive superintendent
for supervising the loading of goods on to the vessel. In case the examining staff
in the docks finds some discrepancy in the goods, they may mark the shipping bill
back to export department group with their observations as well as sample of
goods, if needed. The export department re-considers the case and decide
whether export can be allowed, or amendment in description, value etc. is
required before export.
15
Case Diagram can be made as complicated as needed, it really has only two major
parts: the Actor and the Use Case. An Actor represents an entity that
will interact with the system. An example of an entity can be a “Customer” or
“Exporter” that interacts with the program. (The actor could even be a third-party
trader or a piece of hardware.) The main idea of the Use Case diagram is to
show these actors can interact with my program. For example, a
Customer/Importer might “Order Shipment”. In this case, the “Order Shipment”
is Use Case. No code is directly related to the Actor or Use Cases, but these
interactions expose the need for certain components in the project.
Creating a Use Case diagram might well expose any overlooked points. The
diagram can't keep me from adding features that are unnecessary, but it at least
tells me that they are not needed.
So, the first step is to perform a use case analysis and create Use Case
diagrams. Completion of the use case analysis and diagrams leads naturally to
sketching out the components of my system. Whether in the mind, or with a
UML tool, this step has never been skipped in the development of a successful
system. The benefit of formally creating a Component diagram is that it can help
me define the classes and interfaces that will make up my components. The
components are: A Customer component, an Exporter component, a
Accounts component, an User component, Product component and
Shipment component. The interactions between components can be further
defined with Collaboration and Sequence diagrams. These components represent
the deliverable pieces of my system. After the components are set, fine-grain
structural work began.
Using the NetBeans UML tool adds another great dimension to the Class
Diagram, namely design patterns. If one knows that a certain component of her
system will utilize a design pattern or set of patterns, simply dragging and
dropping the pattern onto the canvas creates the basic component for her. Better
yet, the tool creates it correctly. The NetBeans UML feature provides the Gang
of Four (GoF) and Enterprise Java Beans (EJB) design patterns ready for
use.
The best thing is that none of this work will be wasted. If I am using the
NetBeans UML feature, a Class diagram can be turned into Java source
code with the click of a button. I can even set the options for how the code is to be
generated: headers, comments, variable placement, and other formatting. These
settings would even include adding copyright information to all the generated
16
files. The code generation alone should make this step worth doing during the
development cycle. Therefore, it was worth my time to create the model first and
let the tool generate all the basic code.
Everyone diagrams in one form or another. The difference is that those who
diagram by using a UML tool have something to show for their planning effort
when the diagrams are completed. Every project that is well thought out will have
some form of Use Case diagrams, Component diagrams, and Class diagrams that
can live long after “Imagineering” at the mind or with pencil and paper .
The Letter Of Credit is issued by the banker of the importer whereby the Bank
guarantees the payment tothe foreign dealer the amount of the bill drawn by the
exporter on importer.
Invoice
17
The exporter prepares the invoice in triplicate according to the agreed price
quotations. When the import duties are charged on the basis of value of goods,
the custom authorities will have to open the packages to calculate duties. To
avoid this problem, the exporter procures a Consular Invoice and sends it to the
importer. The value of the goods and other particulars are stated in this invoice.
It is signed by the Consul of the importer's country stationed in the exporter's
country.
The exporter fills in a special invoice form available from the Consul, affirms the
accuracy of the goods shipped, and gets it sealed.
The custom authorities generally accept such invoice as a true statement of the
value of the goods and assess the import duties on this basis. The Consular
Invoice is repared in triplicate, two copies are preserved in the Consulate and one
copy is issued to the exporter.
Certificate of Origin
According to the condition of payment, the exporter prepares D/A or D/P bills.
The foreign bill of exchange is prepared in triplicate.
The importer can receive the documents after accepting the bill in case of D/A bill
or after making payment of the bill in case of D/P bill.
The banker of the exporter sends all these documents to its branch or agent bank
in the importer's country.
18
Chapt
er 3
19
Technolo
gies
&
Platforms
20
3 Technologies & Platform
b) Network support: Windows allows explicit support for LAN (local area
networks) allowing network drives to be attached from file manager,
manipulation of network print queues from print manager, network
configuration from within any application, and various network related tasks
from the control panel.
21
Java has had a profound effect on the Internet. This is because, Java expands the
Universe of objects that can move about freely in Cyberspace. In a network, two
categories of objects are transmitted between the Server and the Personal
computer. They are: Passive information and Dynamic active programs. The
Dynamic, Self-executing programs cause serious problems in the areas of
Security and probability. But, Java addresses those concerns and by doing so, has
opened the door to an exciting new form of program called the Applet.
Every time you that you download a “normal” program, you are risking a viral
infection. Prior to Java, most users did not download executable programs
frequently, and those who did scanned them for viruses prior to execution. Most
users still worried about the possibility of infecting their systems with a virus. In
addition, another type of malicious program exists that must be guarded against.
This type of program can gather private information, such as credit card
numbers, bank account balances, and passwords. Java answers both of these
concerns by providing a “firewall” between a networked application and your
computer.
When you use a Java-compatible Web browser, you can safely download Java
applets without fear of virus infection or malicious intent.
Portability
The Bytecode
22
The key that allows the Java to solve the security and portability problems is that
the output of Java compiler is Byte code. Byte code is a highly optimized set of
instructions designed to be executed by the Java run-time system, which is called
the Java Virtual Machine (JVM). That is, in its standard form, the JVM is an
interpreter for byte code.
Translating a Java program into byte code helps makes it much easier to
run a program in a wide variety of environments. The reason is, Once the run-
time package exists for a given system, any Java program can run on it.
Although Java was designed for interpretation, there is technically nothing about
Java that prevents on-the-fly compilation of byte code into native code. Sun has
just completed its Just In Time (JIT) compiler for byte code. When the JIT
compiler is a part of JVM, it compiles byte code into executable code in real time,
on a piece-by-piece, demand basis. It is not possible to compile an entire Java
program into executable code all at once, because Java performs various run-
time checks that can be done only at run time. The JIT compiles code, as it is
needed, during execution.
Beyond the language, there is the Java virtual machine. The Java virtual machine
is an important element of the Java technology. The virtual machine can be
embedded within a web browser or an operating system. Once a piece of Java
code is loaded onto a machine, it is verified. As part of the loading process, a class
loader is invoked and does byte code verification makes sure that the code that’s
has been generated by the compiler will not corrupt the machine that it’s loaded
on. Byte code verification takes place at the end of the compilation process to
make sure that is all accurate and correct. So byte code verification is integral to
the compiling and executing of Java code.
Java
Article II:
Java Javac byte Java
cod
Article III: e
VM
.Java .Class
Java Architecture
23
Java architecture provides a portable, robust, high performing environment for
development. Java provides portability by compiling the byte codes for the Java
Virtual Machine, which are then interpreted on each platform by the run-time
environment. Java is a dynamic system, able to load code when needed from a
machine in the same room or across the planet.
Compilation of code
When you compile the code, the Java compiler creates machine code
(called byte code) for a hypothetical machine called Java Virtual Machine (JVM).
The JVM is supposed to execute the byte code. The JVM is created for
overcoming the issue of portability. The code is written and compiled for one
machine and interpreted on all machines. This machine is called Java Virtual
Machine.
Java
Interpreter
PC (PC)
Sourc Comp Java
e iler Byte
Code code Java
………. Interpreter
Macintosh
……….. Compiler
(Macintosh)
……….. (Platform
……… indepen
… dent) Java
SPARC
Compiler Interpreter
(Sparc)
During run-time the Java interpreter tricks the byte code file into thinking that it
is running on a Java Virtual Machine. In reality this could be a Intel Pentium
Windows 95 or SunSARC station running Solaris or Apple Macintosh running
system and all could receive code from any computer through Internet and run
the Applets.
Simple
Java was designed to be easy for the Professional programmer to learn and to use
effectively. If you are an experienced C++ programmer, learning Java will be even
easier. Because Java inherits the C/C++ syntax and many of the object oriented
features of C++. Most of the confusing concepts from C++ are either left out of
Java or implemented in a cleaner, more approachable manner. In Java there are
a small number of clearly defined ways to accomplish a given task.
24
Object-Oriented
Java was not designed to be source-code compatible with any other language.
This allowed the Java team the freedom to design with a blank slate. One
outcome of this was a clean usable, pragmatic approach to objects. The object
model in Java is simple and easy to extend, while simple types, such as integers,
are kept as high-performance non-objects.
Robust
Java virtually eliminates the problems of memory management and deal location,
which is completely automatic. In a well-written Java program, all run time
errors can –and should –be managed by your program.
JavaScript statements
</SCRIPT>
25
Validate the contents of a form and make calculations.
Add scrolling or changing messages to the Browser’s status line.
Animate images or rotate images that change when we move the mouse over
them.
Detect the browser in use and display different content for different browsers.
Detect installed plug-ins and notify the user if a plug-in is required.
JavaScript Vs Java
JavaScript and Java are entirely different languages. A few of the most
glaring differences are:
Java applets are generally displayed in a box within the web document;
JavaScript can affect any part of the Web document itself.
While JavaScript is best suited to simple applications and adding interactive
features to Web pages; Java can be used for incredibly complex applications.
There are many other differences but the important thing to remember is that
JavaScript and Java are separate languages. They are both useful for different
ADVANTAGES
3.5 HTML
Hypertext Markup Language (HTML), the languages of the World
Wide Web (WWW), allows users to produces Web pages that include text,
graphics and pointer to other Web pages (Hyperlinks).
26
HTML is not a programming language but it is an application of ISO
Standard 8879, SGML (Standard Generalized Markup Language), but
specialized to hypertext and adapted to the Web. The idea behind Hypertext is
that instead of reading text in rigid linear structure, we can easily jump from one
point to another point. We can navigate through the information based on our
interest and preference. A markup language is simply a series of elements, each
delimited with special characters, that define how text or other items enclosed
within the elements should be displayed. Hyperlinks are underlined or
emphasized works that load to other documents or some portions of the same
document.
HTML can be used to display any type of document on the host computer,
which can be geographically at a different location. It is a versatile language and
can be used on any platform or desktop.
ADVANTAGES
A HTML document is small and hence easy to send over the net. It is small
because it does not include formatted information.
HTML is platform independent.
HTML tags are not case-sensitive.
3.6 SERVLETS
Introduction
The Java web server is JavaSofts own web Server. The Java web server is
just a part of a larger framework, intended to provide you not just with a web
server, but also with tools. To build customized network servers for any Internet
or Intranet client/server system. Servlets are to a web server, how applets are to
the browser.
About Servlets
Servlets are objects that conform to a specific interface that can be plugged
into a Java-based server. Servlets are to the server-side what applets are to the
client-side - object byte codes that can be dynamically loaded off the net. They
differ from applets in that they are faceless objects (without graphics or a GUI
27
component). They serve as platform independent, dynamically loadable, plug
able helper byte code objects on the server side that can be used to dynamically
extend server-side functionality.
Attractiveness of Servlets
There are many features of servlets that make them easy and attractive to use.
These include:
it's extensible - you can inherit all your functionality from the base classes
made available to you.
it's simple, small, and easy to use.
Features of Servlets
28
Servlets are persistent. Servlet are loaded only by the web server
and can maintain services between requests.
Servlets are fast. Since servlets only need to be loaded once, they
offer much better performance over their CGI counterparts.
Servlets are platform independent.
Servlets are extensible. Java is a robust, object-oriented
programming language, which easily can be extended to suit your needs
Servlets are secure.
Servlets can be used with a variety of clients.
Preprocessed
MVC Architecture Defines that The controller is separated from the system model
and View. It is composed of three different layers. Being a Web based architecture.
The User Interface is completely separated from the entire Business Logic Layer. The
database and business logic are bounded to gather. The Database Layer and Business
Logic Layer runs on the server Machine and the User Interface Layer will run under
the Client Machine. For developing the User Interface we are having HTML and Java
Script. For Business Login and Database Connectivity Servlets and JSP are used. In
the Backed the servlets and Jsp’s are connected to Database through JDBC API. The
29
web server plays a major role in connecting the client user interface and the servlets
and JSP.
User Interface
(HTML / Java Script)
httpResponse
httpRequest
Web Server
Servlets/JSP’
s
JDBC
Oracle
JDBC is a Java API for executing SQL statements. (As a point of interest,
JDBC is a trademarked name and is not an acronym; nevertheless, JDBC is often
thought of as standing for Java Database Connectivity. It consists of a set of
classes and interfaces written in the Java programming language. JDBC provides
a standard API for tool/database developers and makes it possible to write
database applications using a pure Java API.
The combinations of Java and JDBC lets a programmer write it once and
run it anywhere.
30
3.9.2 What Does JDBC Do?
So why not just use ODBC from Java? The answer is that you can use
ODBC from Java, but this is best done with the help of JDBC in the form of the
JDBC-ODBC Bridge, which we will cover shortly. The question now becomes
"Why do you need JDBC?" There are several answers to this question:
1. ODBC is not appropriate for direct use from Java because it uses a C
interface. Calls from Java to native C code have a number of drawbacks in
the security, implementation, robustness, and automatic portability of
applications.
2. A literal translation of the ODBC C API into a Java API would not be
desirable. For example, Java has no pointers, and ODBC makes copious
use of them, including the notoriously error-prone generic pointer
"void *". You can think of JDBC as ODBC translated into an object-oriented
interface that is natural for Java programmers.
31
3.10 ORACLE 9I:
Introduction to SQL:
Reduction of code.
Simplicity in writing code.
Ease of maintenance.
DML: Data Manipulation Language is used for querying, inserting, deleting and
updating of information stored in the database.
DCL: Data Control Language is used to control data and access to the database
in the multi-user environment for security purpose. The DCL is used for giving
access rights to different users.
32
Chapt
er 4
33
System
Environm
ent
34
4 System Environment
4.1 SOFTWARE REQUIREMENTS
Language J2EE
Specification
Databases Oracle9i
35
Chapte
r 5
36
S0f
D eve
37
The methodology used to develop this project is object-oriented
methodology is based on function and procedures. It can be said as the
development of software by building self-contained modules as objects that can
be easily replaced, modified and reused. In this environment software is a
collection of discrete objects that encapsulate their data as well as the
functionality to model real world “objects”. Each object has attribute and
methods. Objects are grouped into classes. Here each object is responsible for
itself.
This environment emphasizes its cooperative philosophy by
allocating tasks among the objects of the applications. Instead of writing a lot of
code we can create a lot of code we can create a lot of helps to take in an active
role.
Object oriented methodology involves mainly
1. Analysis
2. Feasibility study
3. Design
4. Prototyping and testing.
38
Chapte
r S6y s t e m
Analysis
39
40
6 System Analysis
6.1 Introduction
A system is a set or arrangement of functionality dependent components
interactivity t working together to attain a predefine goal by processing
information. Analysis is used to gain an understanding of the existing system
what is required for it. At the conclusion f the system analysis there is a system
description and as set of requirements. The new system may be build a fresh or
by changing the existing system. In short system analysis specifies what the
system should do.
We analyze the entire modules ad drawn some conclusion. N the basis of analysis
and information we decide the information flow in our project we design the
process chart of the system. It helps to understand the working of the project.
Then we design the flow chart of the system. It shows the clear view of the system
ad help for further processing. For further working we have designed the DFD.
Through the DFD we describe the working of system and their dependency of the
module. DFD do not supply detail description of the module but graphically
describe the data flow of the system. In contrast to our project DFD we describe
all three modules ad their ad their sub working. It is helpful I design of database,
after the context level DFD we design the zero level and one level DFD by using
database design. After DFD design we prepare system layout architecture it
shows how our system works.
41
As analysis is the activity that feeds information to the specification
activity; it is essential that during analysis a complete and consistent set of
specifications emerge for the system. For achieving this, the first major problem
is to obtain the necessary information. People and existing documents are a
major source of information.
The current system is totally manual. All the information related to the
distributors are stored in the file called distributors file. All the entries in the file
are made manually and also the incentives and discounts are calculated manually
on the last day of the month. Therefore there is a lot of chance for errors to creep
in. The registration is also done manually in the current system. The new
customer gives his details and DD no. to the company and if all the details are
found valid then the details of the customer are stored in the files. The same
information of the distributor is stored in different files. Therefore the data
redundancy occurs.
Because the current working system is totally manual many problems exist with
the system such as:
Time delay:
In the existing systems all the information related to the transactions are stored
in the registers, so it takes a lot of efforts and time to generate the reports,
monitor promotion, calculate incentives on sales and purchases etc.
Redundancy:
No Accuracy:
42
Because of redundancy, the threat to accuracy arises. Because the same data is
maintained at different registers there may be a possibility of tabulating the data
wrongly.
No Security:
There is no security in the current system, i.e. any unauthorized persons can
change the data manually.
As the system is totally automated the operator can simply type the track id of the
distributor and get the total information about that particular distributor.
Accuracy increases:
Because all the information is stored only in a centralized database the accuracy
increases and there is a feeble chance of errors being crept in the data.
We can easily generate the reports as and when required by the management. We
have to simply enter the track id of the distributor in order to generate the
reports of that particular distributor.
Security increases:
The administrator can only modify the data in the database; therefore no other
person can modify the data hence the security of the data increases.
Data validation:
Procedures are designed to detect the errors in the data while entering into the
database, therefore the incorrect data will not be accepted by the system and
hence the efficiency of the system increases.
GUI:
43
The proposed system is totally a Graphical User Interface, which makes it easier
for the officials to manage the transactions in an easy manner.
1. Registration of Exporters
2. Registration of Customers
3. Managing Customers
4. Registration of Product
5. Placing Order of Shipment
6. Shipment Against Order
7. Invoice Generation
8. Payment
9. Accounting.
44
Chapte
r 7
45
Feasibil
ity
Study
46
6 Feasibility Study
Feasibility Study is the process by which the feasibility is measured and assessed.
Where as feasibility is the measure of how beneficial or practical the development
of information will be to an organization. Feasibility should be measured
throughout the life cycle.
Taking into the consideration these facts, the feasibility study of the system has
been done under the following heads:
We have done this study along with the management and employees. The
following topic was discussed in detail to check for the operational feasibility:
a) Is the problem worth solving or will the solution to the problem work?
While going through this topic we found that the management was supportive
to the system. There was no sign of the resist by end-users or managers.
So the system was found operationally feasible.
It was found that the technology required for developing the system is
available so there was no constraint regarding the presence of the technology.
47
After finding that the required technology is feasible, the next thing was
the availability in the system environment. We found the technology is easily
available in the market.
While going through this test it was found that the system has average
level of expertise in the technical expertise like Domain experts, Database
Administrators etc. So the technical expertise is present which requires some
training to make it successful.
48
Chapte
r 8
49
i
Architectural
System
Design
50
8 Architectural Design
8.1 Introduction
Architectural Design represents the structure of data and program
components that are required to build a computer-based system. It considers the
architectural style that the system will take, the structures and properties of the
components of the system , and the interrelationships that occur between all
architectural components of the system.
Architectural Design begins with the data design and then proceeds to the
derivation of one or more representations of the architectural structure of the
system. Alternative architectural styles or patterns are analyzed to derive the
structure that is best suited to customer requirements and quality attributes.
Once an alternative has been selected, the architecture is elaborated using an
architectural design method.
At each stage, software design work products are reviewed for clarity,
correctness and completeness, and consistency with requirements and with one
another. The architecture is not the operational software. Rather, it is
representation that enables a software engineer to analyze the effectiveness of the
design in meeting its stated requirements. Consider architectural alternatives at a
stage when making design changes is still relatively easy and Reducing the risks
associated with the construction of the software
• User Module
• Customer Module
• Shipment Module
51
• Product Module
• Accounts Module
The Users are the system Administrator and the Exporter whereas
Customer refers to the Importer. The System Administrator has the exclusive
privilege of adding any user to the database. The user is someone who has access
to this trade and logistics application that is implemented in the organization’s
intranet.
Both the Administrator, Exporter can look into their respective activities
while logged-in on the site. The User Profile view menu can be accessed by the
Customer too who can also edit her profile on the site. Thus, both the Exporter
and the Customer can edit their profile and update related issues.
The Customer views her shipment status by feeding in the Shipment Order
ID on the related page. Payments view can also be accessed by the respective
importer/customer. The Bill for Payment is generated for the customer once her
goods are dispatched and properly delivered to receiving port. When the payment
is done it is done with DD/Cheque or through credit card which may bounce on
certain exceptional circumstances. When the Cheque bounces it has to be
repayed again through the system. The Forwarding Agent is responsible for
forwarding the goods from the exporter to appropriate port from where it is
shipped to the importer’s destination. The Forwarding Agent receives certain
commission from the Exporter. Similarly the Clearing Agent is appointed by the
importer and acts as his representative at the importer’s port of destination. She
also receives commission from the importer. The goods are cleared by the
Clearing Agent at the receiving port by paying import duty, taxes.
The Letter Of Credit Concept comes into play when the importer is unable
to pay his dues on the time of transaction and the Bank on her behalf pays to the
concerned exporter; thus clears the Bill Of Payment. Both the exporter and
importer needs to have an authenticated Trade License but for certain goods the
existence of License may not matter.
The Exporter when logged on can view any new shipment order that has
been generated in the system and needs to be dispatched to the concerned
importer. Thus, the importer(customer in the Trade Express Project) can do the
Ship-order for which the exporter carries out the order. Shipment status details
are also viewed by the exporter to keep track of the delivery and their status
52
Analysis Design Construction
1. Plan and Elaborate –Planning and defining requirement along with building
prototypes.
2. Build - The construction of the system.
3. Deploy – The implementation of the system in use.
53
A database model is a collection of logical constructs used to represent
the data in data structures and data relationships with in the database. Basically,
the database models may be grouped into two categories: conceptual model and
implementation models. The conceptual model focuses on the logical nature of
that data presentation. Therefore the conceptual model is concerned with what is
representing in the database and the implementation model is concerned with
how it is represented.
1. Conceptual Model:
The conceptual model represents data present in the entities as well the
relations present is the entities. All the strong entities and weak entities are
identified here and it mainly focuses on the logical nature of that data
presentation.
General access model is used to convert the ER model into the relation model.
Here we can identify the references to the other entities and the nature of the
each attribute. But, A network model’s record can have more then one parent.
3. Relation Model:
The relational model is represented as tables. The columns of each table are
attributes that define the data or value domain for entities in that column. The
rows of each table are tuples representing individual data objects being
stored. A relational table should have only one primary key. A primary key is a
combination of one or more attributes whose value unambiguously locates
each row in the table.
54
8.4.3 Tables Used in This Project
55
ORDER_ID NOT NULL VARCHAR2(15)
PRODUCT_ID VARCHAR2(15)
PROD_NAME VARCHAR2(25)
QTTY NUMBER
ORDER_DATE DATE
SHIP_DATE DATE
EXP_ID VARCHAR2(15)
EXP_NAME VARCHAR2(25)
ORDER_STATUS VARCHAR2(50)
CUST_ID VARCHAR2(15)
SHIP_TO_COUNTRY VARCHAR2(25)
SHIP_TO_CITY VARCHAR2(25)
VALID_DATE NUMBER(2)
56
Table Name: PRODUCT_CHART
57
CUSTPOSITION VARCHAR2(15)
CUSTADDR1 VARCHAR2(100)
CUSTADDR2 VARCHAR2(30)
CUSTCITY VARCHAR2(15)
CUSTCID VARCHAR2(15)
CUSTCOUNTRY VARCHAR2(15)
SALUTATION VARCHAR2(15)
CUSTOMERHOMEPHONE VARCHAR2(15)
CUSTWORKPHONE VARCHAR2(15)
CUSTTITLE VARCHAR2(15)
CUSTFAX VARCHAR2(15)
CUSTEMAIL VARCHAR2(30)
LOC_REQUIRED VARCHAR2(15)
CUSTCODE VARCHAR2(15)
ACCOUNT_NO VARCHAR2(15)
NOTES VARCHAR2(100)
CREBY VARCHAR2(15)
CRE_DATE DATE
REMARKS VARCHAR2(100)
CUSTOMER_TYPE VARCHAR2(15)
URL VARCHAR2(30)
ZIP NUMBER(6)
58
When we talk about a database, we must differentiate the database schema
which s the logical design of the database and the database instance which is
the snapshot of the database at a given instant of time.
59
CONTEXT LEVEL:
60
TOP LEVEL DFD:
61
DETAILED LEVEL DFD :
Product Registration
62
VIEW PRODUCT:
63
DELETE PRODUT
64
SHIPMENT ORDER
65
VIEW SHIPMENT ORDER
66
CANCEL SHIPMENT ORDER
67
8.6 Entity-relationship diagram
Databases are used to store structured data. The structure of this data, together
with other constraints, can be designed using a variety of techniques, one of
which is called entity-relationship modeling or ERM. The end-product of the
ERM process is an entity-relationship diagram or ERD. Data modeling
requires a graphical notation for representing such data models. An ERD is a type
of conceptual data model or semantic data model.
Common symbols
Primary Key
68
Entity Relation Product Model
69
Fig 8.9: Entity - Relationship diagram
A UML system is represented using five different views that describe the system
from distinctly different perspective. Each view is defined by a set of diagram,
which is as follows.
In this model the data and functionality are arrived from inside the
system.
70
In this the structural and behavioral aspects of the environment in which the
system is to be implemented are represented.
Use case Diagrams represent the functionality of the system from a user’s point of
view. Use cases are used during requirements elicitation and analysis to represent
the functionality of the system. Use cases focus on the behavior of the system
from external point of view.
Actors are external entities that interact with the system. Examples of actors
include users like administrator, bank customer …etc., or another system like
central database.
SYSTEM NAME
Use case 1
Use case 2
Actor
Actor
Use case n
71
8.7.1 Use case Model
72
8.7.2 sequence diagrams
Sequence Diagrams Represent the objects participating the interaction
horizontally and time vertically.
Sequence Diagram 1
73
Sequence Diagram 2
74
8.8 SNAPSHOT FOR PRODUCT MODULE
75
Fig 8.14: TRADE EXPRESS [Product Registration]
76
Fig 8.14: TRADE EXPRESS [Product Created]
77
Fig 8.14: TRADE EXPRESS [View Product Detail]
78
Fig 8.14: TRADE EXPRESS [View Product Detail]
79
Fig 8.14: TRADE EXPRESS [View All Product Detail]
80
Fig 8.14: TRADE EXPRESS [View Product Detail By Category]
81
Fig 8.14: TRADE EXPRESS [Update Product]
82
Fig 8.14: TRADE EXPRESS [Update Product]
83
Fig 8.14: TRADE EXPRESS [Product Updated]
84
Fig 8.14: TRADE EXPRESS [Delete Product]
85
Fig 8.14: TRADE EXPRESS [Product Deleted]
86
Fig 8.14: TRADE EXPRESS [Shipment Order]
87
Fig 8.14: TRADE EXPRESS [Shipment Order]
88
Fig 8.14: TRADE EXPRESS [Shipment Order]
89
Chapt
er 9
90
Syste
m
9. System Testing
91
9.1 Introduction
“Testing” is one of the modules of the system analysis and design, which has
great importance. After system is ready, it should go for testing. Testing is a set of
activities that can be planned in advance. The system developer has to undergo
with testing and that should not be avoided before the final system
implementation. System testing is one of the steps in the software engineering
process, which can be viewed as destructive rather than constructive. In the
testing phase actual performance of the system can be assessed. It can be used
while system development and it provide the actual results by which the system
can be compared.
Testing is bound to get errors, which is the main reason for putting system
under test. This immediately helps because one can detect the errors at an early
stage before the final system implementation. This procedure further enhances
smooth implementation and proper functioning of the system.
• TOP-DOWN
• BOTTOM-UP
92
Top- Down
Bottom-Up
The bottom-up approach starts from the bottom of the hierarchy. First the
modules at the very bottom, which have no subordinates, are tested. Then these
modules are combined with higher-level modules for testing. At any stage of
testing all the subordinate modules exist and have been tested earlier. To perform
bottom-up testing, drivers are needed to set up the appropriate environment and
invoke the module. It is the job of the driver to invoke the module under testing
with the different set of test cases.
93
• Comparison of different data types
• Incorrect logical operators or precedence
• Incorrect comparison of variables
• Improper or nonexistent loop termination
• Improperly modified loop variables
One of the biggest problems in unit testing is how to determine test cases.
The tester has to ensure that there are enough tests to do thorough testing, but
not so many tests that all of the limited testing time is used up. There are several
different techniques to pick test cases including using boundary cases, dataflow
testing and branch testing. No single technique can supply sufficient test cases, so
usually combinations of techniques are used. A basis set is a set of linearly
independent paths that can be used to construct any path through the program
flow graph.
Testing techniques can be divided into various categories. Black box
testing ignores the internals of the software unit. Structured testing is, on the
other hand, "Testing that takes into account the internal mechanism of a system
or component". This can be further subdivided into different types including path
testing, "Testing designed to execute all or selected paths through a computer
program and branch testing, "Testing designed to execute each outcome of each
decision point in a computer program. Basis testing, also known as Structured
94
Testing, is a hybrid between these two techniques. The test paths in a basis set
fulfill the requirements of branch testing and also test all of the paths that could
be used to construct any arbitrary path through the graph.
Any function in a program can be represented as a control flow graph. The
nodes in this graph are program statements, while the directed edges are flow of
control. Two nodes can be unconnected, connected by an edge in either direction
or connected by an edge in each direction. When tracing a path from the source
to the sink, a back edge is a edge that leads back to a node that has already been
visited. A flow graph contains one source node and one sink. A source node is a
node, which has no incoming edges, while a sink node is a node with no outgoing
edges. A program function may have more than one sink, but this graph can be
converted into a graph with only one sink. Some languages also allow more than
one source. This construct is very rare and not used in Structured Programming.
a c
9.3.3 Data Flow Testing
Data flow testing mainly focuses on testing the value assignment of each
variable in a program by executing sub paths from the assignment (definition) to
some program points in which the variable is used (use). The use of a variable can
be classified as either a computation use or a predicate use. If the value of a
variable is used in computing a value for defining other variables or as an output
value in an output statement, the use is called computation use, denoted as c-use.
Otherwise, if the value of a variable is used to decide the result of a predicate
statement for selecting, execution paths, the use is called predicate use, denoted
as p-use. A defuse pair of a variable is an order pair such that is a statement
having a definition of and is a statement having a use of, or some memory
location bound to, that can be reached by over some path in the program.
Data flow testing criteria are used to select particular defuse associations
to test. A test satisfies a def-use pair if the execution of the program with the test
leads to traversal of a sub path from the definition to the use without any
95
intervening redefinition of that memory location. For causes, tests must travel
from the statement containing the definition to the statement containing the
computation use. For puses, tests must travel from a statement containing the
definition to both executional successors of the statement containing the
predicate use. Many types of data flow testing criteria have been defined. Among
them, the “all definitions” criterion requires that a test should cover a path from
each definition to a use, while the “alluses” criterion requires that one sub path
from every definition to each of its uses is tested.
An acceptance test is a test carried out by the customer or end user rather
than the developer in order to enable the customer to validate all requirements.
Alpha testing and Beta testing are two types of acceptance tests that were
conducted
96
Alpha test is conducted in a controlled environment. As a matter of fact,
the end user conducts alpha test at the developer’s site. But since I’m the
developer and this system has been developed at the company’s site itself, it is
assumed that alpha test has been conducted at the company’s site. During the
course of the system development, the end user was operating the software in my
presence and I was recording the errors that were occurring and other problems
that were coming up. Rectification was made accordingly.
Beta testing was also conducted at the company site by the end user, but in my
absence. Here, the end user himself recorded all the problems that he had
encountered during testing the system and then reported these to me at regular
intervals. As a result of problems reported during beta testing, modifications
were made to overcome the problems.
The black box testing attempts to find out errors like interface errors,
incorrect functions, errors in structures or externals database errors.
Software is only the part of the large computer based system. Ultimately
software is incorporated with other elements of the system and a series of
integration and validation tests are conducted. These tests fall outside the scope
of the software processes. The various types of tests conducted under system
testing:
• Recovery Testing.
• Security Testing
• Stress Testing
• Performance Testing.
97
Chapte
r 10
98
Syste
m
Securi
99
10.1 Introduction
Once the computerized system has been implemented, the system would
need physical security firstly because it would contain all business transactions
and hence it need to be well protected against loss or damages.
Unauthorized intruders, disasters, fire, and voltage fluctuations can
threaten the overall system security.
10.1.1 Security from unauthorized intruders
100
leave the installation immediately; others may require that a few personnel
remain for a short period of time to sound alarms or to shut down the system and
other equipment.
The back-up plan specifies the location of back-up resources and where
these resources can be assembled and operations restarted. Back-ups of the
system and related data can be kept at distant sites other than the company site
and far away from it also. In case a disaster occurs, the management can still have
the back-up copy and start operating the system without interruption.
This means that the company assumes the worst and decides in advance
what can be done about the disaster when it really happens. The first step in any
recovery plan is to know that the system has failed. Accordingly, the type of
failure has to be determined. The extent of damage to data, software and
hardware has to be discovered and analyzed. Then necessary steps have to be
followed to rectify the faults, correct the damages and restore the system to give
normal service.
By following all these implementation criteria, the company will absolutely
benefit a lot from the new system and will always ready for any type of
mishap at any time.
101
Chapte
r 11
102
Discus
sion
103
10. CONCLUSION
The system’s capability is to keep track of all the on-line information in its main
feature, which helps the management to know the current position of the
organization activities by just glancing through system, generated details.
The system has been developed considering every single quality factor. Due to
this reason the system is highly secure from the crash down problem. Moreover,
the system is highly reliable and due to the security and integrity features,
provides for the system, unauthorized users cannot access the system.
104
BIBLIOGRAPHY
- Awad
2. core java
- Complete Reference
3. Software Engineering
- Roger. S. Pressman
- Pankaj Jalote
- A. Nawathe
5. JSP/Servlet
- Head First
6. HTML:
- Complete Reference
Internet Research:
• www.javaworld.com
• www.javaguru.com
105