Inventory Management System
INTRODUCTION Invent Inventory ory manage management ment informa informatio tion n sys system tem is high high perfor performanc mancee softwa software, re, which speeds up the business operations of the organization. Every organization, which deals with the raw materials, put its great effort in the efficient utilization of its raw materi material al accordi according ng to its need need and requir requireme ement. nt. The organiz organizati ation on has to perfor perform m number of tasks and operations in order to run its business in a manual system. For eample!
•
Estimation of new raw material required.
•
"reparation of purchase order.
•
"reparation of Inward gate pass#purchase invoice.
•
"reparation of $utward gate pass #sale invoice.
•
"reparation of %ebit note.
&dvantages if Inventory management systems are as follows!
1.
Inventory information can be handled easily.
2.
The manager can easily view when the updates are done at the point of sale devices.
'. The manag manager er can can make make deci decision sionss very very fast. fast. (. The manag manager er can can plan plan the the goods goods product production. ion. 5.
&utomatic value generation.
)
*IT&E+&T+E -+&/
0y follow following ing these these operatio operation n and tedious tedious tasks, tasks, the managem management ent faces faces follow following ing problems! problems!
•
"roduction delays due to raw1material non1availability
•
-tuck1up of investments in raw1material inventories
2
•
Ineffective control over raw material issuance and wastages.
inventory -ystem is cost1effective solution for managing raw material 3 inventory. 4anaging 4anaging the inventory inventory reduces the inventory inventory carrying cost by Inventory procurement and assisting the management management in 5ust in time decision1making. decision1making. 6licksoft 6licksoft 7ar house inventory -ystem is ideal business solution for manufacturers and "roducers who want to reduce their operational costs and become more competitive.
&ll processes mentioned above were eperienced during interaction with actual users involved in procurement and inventory management operations. This involves people ranging from 7arehouses in1charge to business general managers and 6E$s.
7arehouse -ystem provides elegant, effective, and practical solution to automate the "rocurement process and other up1stream supply chain operations. 8igh +$I 9return on Investment: is guaranteed in the form of optimized inventories.
7are 7arehou house se -yste -ystem m Inve Invento ntory ry provi provide dess a compet competit itive ive edge edge to manuf manufact acture urers rs by reducing the inventory 6arrying cost and by avoiding production delays through timely availability of raw 4aterials. &lso the cost of production goes down due to control in the raw material
7arehouse -/-TE4 optimize the raw material inventories by adopting an intelligent inventory procurement process. Inventory procurement is completely automated.
7arehouse -ystem manages the procurement of inventory on the basis of purchase orders. -ystem performs the analysis of required inventory items for manufacturing orders, and generates the demand for a particular item to the particular vendor of each of the inventory items. It then generates the purchase orders for vendors 9automated
'
procurement process:. The inventory is procured only when it;s required, and thus the total stock available in the 7arehouse is reduced and inventory1carrying cost goes down. 4anagement of large number of orders, starting in different calendar dates, involving different inventory items, become easy and effortless operation. 7are house -ystem not only informs the users about the current level of inventory available in the 7are house, but also it gives the details about the utilization of inventory items for future manufacturing orders by generating demands.
Inventory -ystem is concerned with raw material procurement 94+": and management of suppliers and vendors.
4a5or functions of 7arehouse Inventory -/-TE4 include the following!
Inventory $ptimization 9
•
&uto generated %aily %emand
•
&uto generated %aily "urchase $rder 9"$: of raw materials
•
&void production delays
Inventory "rocurement
•
4anage procurement schedule
•
=eep minimum required inventory levels
•
"urchase only when required for production > procurement automation
*6 "lan
•
+aw material is estimated through intelligent formula calculation by considering production rate of an item (
•
It is highest form of demand.
4onitor and improve endor relations
•
4onitor supplier commitments
•
4anage supplier payments
?ate "asses
•
&uto generated Inward gate pass according to purchase order
•
&uto generated $utward gate pass for re5ected item from the 7are house
?+@ 9?oods +eceive @ote:
•
?oods receive note for a particular supplier according to Inward gate pass.
•
7arehouse issues stock on the average to the different department.
•
%ebit note for a suppliers is automatically generated during the entry of
%ebit @ote
the ?+@ and *ine +eturn
*ine +eturn
•
+e5ected Items are returned to 7are house. $utward ?ate "ass is issued
•
%ebit @ote for endor is issued
"ayments
A
•
"ayments into#from "urchase $rders are recorded providing "urchase $rders 0alances
6ustomizability and Fleibility
•
ser defined attributes for inventory items
•
%efinition of inventory items, their vendors, vendor prices
•
%efinition of customers and their relevant information
•
%efinition of departments and their employees
-ecurity Features
•
6onfiguration of user groups of users and their privileges for the -ystem
•
*ogging of all actions of the users for future reference
Inventory 4ovement
•
Inventory receipts and returns from the vendors
•
Inventory issues and returns to departments
-ystem -ecurity
•
-ystem tracks all the actions "erformed by the users
•
&ction log is maintained along with user reference and the time of action.
Inventory +e1$rder *evels
B
ser can set three types of reorder *evels! •
4inimum
•
$ptimal
•
4aimum.
%ata recovery %ata is quite important for organizations so efficient data recovery and back up procedures are embedded into the -/-TE4 to enhance its security features.
The -ystem performs following important tasks!
-etting up the Environment In the initiation process of a -/-TE4, data is feed into the master files of •
%epartments
•
sers
•
endors
•
6ustomers
•
Finished ?oods
•
+aw Inventory Items
•
"rices
•
4inimum $rder *evel
&uto ?enerated %emand %ept 7ise -oftware generates demand for a particular raw material item according to the average quantity of raw material needed, if the quantity of a raw material item is less than to the 4$* 9minimum order level:. The demand can be generated on the daily basis. This auto1generated demand has full detailed information about item as well as vendors.
C
The -ystem generated demand can be customized manually
&uto ?enerated "urchase $rder %ept 7ise "urchase order for raw material is suggested by the -ystem, automatically, according to future manufacturing orders 9procurement automation:. 4inimum required inventory levels are maintained by the -ystem. In this way, organizations get benefits like!
•
"roduction delays are avoided through timely availability
•
$ver stocking is avoided by the -ystem
Inward ?ate "ass $n receiving inventory items, inward gate pass is generated by software according to the purchase order.
?oods +eceive @ote This is the most important phase when the 7arehouse receives the inventory items. The items are entered into stock and maintain the stock quantity by decrementing or incrementing stock. 8ere the -/-TE4 performs two important steps
•
-oftware generates %ebit @ote to the concerning vendor for a re5ected items
•
-oftware generates $ut 7ard gate "ass for a re5ected items
-o in this way organization can get following benefits
•
-ystem allows the user to re5ect the below standard items
•
-ystem allows the user to return defective inventory items
D
Inventory Issuance#7are house +equisition &fter receiving items into the 7arehouse the inventory materials are issued according to requisitions. In this way inventory shortage 3 available quantities information is available.
4onitor and 6ontrol The -/-TE4 performs following monitoring tasks!
•
"erform physical audits and match available quantities with required ones
•
6heck material wastage trends > "rocess wastage 3 "hysical audit wastage
•
6heck planned material quantity 3 actual issued material quantity
•
6heck material availability against particular manufacturing order
The 0enefits! 0etter Inventory 4anagement, 4arketing, and 6ustomer -ervice ).-avings in inventory management. 4icrosoft %ynamics +4- allows 7ood to keep an ever1present eye on inventory levels and place necessary orders quickly and efficiently. 8e estimates he saves about 2( hours a weekor roughly )G,GGG - a yearbecause
of
the
systemHs
efficiency
and
reliability.
$ur inventory problems were instantly solved, he says. 7e order what we need quickly, and the items arrive priced and ready to go on the shelves. 8e adds that he loves the color1coding system that identifies eceptions. That way, weHre able to instantly
identify
when
we
receive
an
incorrect
quantity.
The systemHs capacity to automatically identify the lowest1cost suppliers has also slashed 7oodHs purchasing costs by about )G percent. @ow, he adds, we have vendors fighting against each other for our business. 2.&n advantage in customer service. &ny business the size of &"et needs to latch onto every advantage it can get in order to hold its own against better1financed competitors.
J
In &"etHs case, that means customer serviceyet another area where 4icrosoft %ynamics +4- comes to the fore. 7hen a customer buys an item, the system flashes a note to the cashier allowing him or her to pass along specific, hands1on advice that has
been
entered
into
the
network.
6ase in point! The system warns cashiers that certain aquarium heaters shatter if plugged in outside of water. If a heater is on the sales ticket, the cashier gets a message on the screen to tell the customer not to plug the heater in unless itHs immersed in water, says 7ood. & lot of these get returned because people donHt know this. $ur customers do. '.4ore focused marketing. *ike many other retailers, &"et offers customers discounts in return for personal information about themselves and their buying habits. sing the detailed customer information capability in 4icrosoft %ynamics +4-, 7ood can tailor highly focused marketing and advertising campaigns that aim at specific consumers.
ItHs really reduced our costs and increased our returns from things such as direct mail campaigns. 0efore, we used to get a one percent return. @ow we get anywhere from )2 to )A percent. ThatHs 5ust huge. That sort of return is particularly important to &"et. -ince both stores are stand1alone operations located away from malls, itHs essential to target those customers who will take the time to make a special trip. (.?reater internal security. Thanks to the systemHs capacity to show inventory irregularities, 7ood has reduced employee theft. For instance, the system quickly identified an aberration when an employee was misidentifying returns and pocketing the cash. @otes 7ood with a laugh, The police were dumbfounded by my etensive forms of proof. A.-tandout customer service. 7ood says he values the reliability and integrity that 4icrosoft places on service after the sale. /ou 5ust canHt do any better than 4icrosoft for supportalthough I must say that IHve had to use them infrequently. The system takes care of itself. B.The intangibles. -ays 7ood! I know that my employees count on 4icrosoft +etail 4anagement -ystem to work. 7e hire a lot of teenagers and theyHre all very
)G
comfortable with it. "lus, he now gladly takes his work homeand away from the office. I have high speed internet connections at home and the stores, he says. It allows me to spend time at home with work, write sales reports, and look at progress at the stores and the problems.
Introduction to <&&
The
0ack in )JJG, a gentleman by the name of
Introducing
0y now, everyone may be curious why
))
&ccording to -un 4icrosystems,
-imple.
•
$b5ect1oriented.
•
-tatically typed. &ll ob5ects used in a program must be declared before they are used. This enables the
)2
•
6ompiled. 0efore user can run a program written in the
•
4ulti1threaded.
•
?arbage collected.
•
+obust. 0ecause the
•
-ecure. The
•
Etensible.
)'
programL that is, they are associated with the program at runtime. &s the
7ell1understood. The
&s one can tell from the preceding list of features, a great deal of thought went into creating a language that would be fairly easy to use but still provide the most powerful features of a modern language like 6KK. Thanks to features such as automatic garbage collection, programmers can spend more time developing their programs rather than wasting valuable man1hours hunting for hard1to1find memory1allocation bugs. 8owever, features such as
The
)(
translation.
<%=
includes
the
following
packages!
5ava.applet,
5ava.awt,
5ava.awt.image, 5ava.awt.peer, 5ava.io, 5ava.lang, 5ava.net, and 5ava.util. These packages provide everything to start creating powerful
. "ackage
"ackage @ame
%escription
5ava.applet
&pplet
& set of classes that relate to the applet environment and are
generally
used
when
)A
viewing applets & set of classes that provide 5ava.awt
&bstract
graphical interface tools such
7indowing Toolkit as
buttons,
controls,
scrollbars, and windows 5ava.awt.image
&7T Image
5ava.awt.peer
&7T "eer
& set of classes related to using images & set of classes for &7T peer classes and methods & set of classes that enable
5ava.sql
%atabase
developers
connectivity
applications
to
write that
databases & set of classes that provide 5ava.io
I#$
standard input#output and file I#$ utilities The core set of classes for the
5ava.lang
*anguage
5ava.net
@etwork
tools for accessing networks by protocols, such as FT", Telnet, and 8TT" & set of classes that provide
5ava.util
tility
core utility functions such as encoding#decoding,
hash
tables, and stacks sun.tools.debug
%ebug
& set of classes that provide debugging functions and tools
)B
*ocal and +emote &pplets
$ne of
)C
*ocal &pplets!1& local applet is one that is stored on own computer system .7hen 7eb page must must find a local applet, applet, it doesnHt doesnHt need to to retrieve retrieve information information from from the Internet Internet1in 1in fact, browser doesnHt even need to be connected to the Internet at that time.
Figure > &pplets#&pplication programs operate on
+emote &pplets!1
& remot remotee apple applett is one that that is locat located ed on anothe anotherr compu compute terr syst system em.. Th This is computer system may be located in the building net door or it may be on the other side of the world1it makes no difference to
)D
remote applet is located, itHs downloaded onto computer via the Internet. 0rowser must, of course, be connected to the Internet at the time it needs to display the remote applet. To reference a remote applet in 7eb page, users must know the appletHs +* 9where itHs located on the 7eb: and any attributes and parameters that users need to supply in order to display the applet correctly. If users didnHt write the applet, they;ll need to find the document that describes the appletHs attributes and parameters. The applet;s author usually writes this document. It composes an 8T4* MappletN tag that accesses a remote applet.
The "rimary 6haracteristics of
The ease with which one can transition to
&rchitecture1neutral
%istributed
%ynamic
Interpreted and compiled
4ultithreaded
@etwork1ready @etwork1ready and compatible compatible
$b5ect1oriented
"ortable
+obust
-ecure
These characteristics are the source of
)J
%istributed networked environments
8igh performance
Easy reuse of code
-ecurity
$b5ect1$riented "rogramming
$b5ect1oriented programming enables to think of program elements as ob5ects. In the case of a window ob5ect, users donHt need to know the details of how it works, nor do users need to know about the windowHs private data fields. sers need to know only how to call the various functions 9called methods in
$b5ects
The fundamental unit in ob5ect1oriented programming is the ob5ect. *anguages that follow ob5ect1oriented concepts describe the interaction among ob5ects. &ll ob5ects have a state and a behavior. The state of an ob5ect pertains to data elements and their associated values. Everything the ob5ect knows about these elements and values describes the state of the ob5ect. %ata elements associated with ob5ects are called instance variables. The behavior of an ob5ect depends on the actions the ob5ect can perform on the instance variables defined within the ob5ect. In procedural programming, such a construct would
2G
be called a function. In ob5ect1oriented terminology, this construct is called a method. & method belongs to the class it is a member of, and one can use a method when he need to perform a specific action more than once. Thus, the state of an ob5ect depends on the things the ob5ect knows, and the behavior of the ob5ect depends on the actions the ob5ect can perform. If user creates a software ob5ect that models the television, the ob5ect would have variables describing the televisionHs current state, such as it is on, the current channel setting is D, the current volume setting is 2', and there is no input coming from the remote control. The ob5ect would also have methods that describe the permissible actions, such as turn the television on or off, change the channel, change the volume, and accept input from the remote control.
Encapsulation
$ne ma5or difference between conventional structured programming and ob5ect1oriented programming is a handy thing called encapsulation. Encapsulation enables to hide, inside the ob5ect, both the data fields and the methods that act on that data. 9In fact, data fields and methods are the two main elements of an ob5ect in the
2)
6lasses as %ata Types
&n ob5ect is 5ust an instance of a data type. For eample, when you declare a variable of type int, youHre creating an instance of the int data type. & class is like a data type in that it is the blueprint upon which an ob5ect is based. 7hen users need a new ob5ect in a program, one can create a class, which is a kind of template for the ob5ect. Then, in program, users create an instance of the class. This instance is called an ob5ect. 6lasses are really nothing more than user1defined data types. &s with any data type, users can have as many instances of the class as users want. For eample, users can have more than one window in a 7indows application, each with its own contents. 6lasses encapsulate ob5ects. & single class can be used to instantiate multiple ob5ects. This means that one can have many active ob5ects or instances of a class. The ob5ect describing the functions of television is an instance of a class of ob5ects called television. Each ob5ect within a class retains its own states and behaviors. 0y encapsulating ob5ects within a class structure, one can group sets of ob5ects by type. The
Inheritance
Inheritance enables to create a class that is similar to a previously defined class, but one that still has some of its own properties. 6onsider a car1simulation program. -uppose that anyone have a class for a regular car, but now users want to create a car
22
that has a high1speed passing gear. In a traditional program, users might have to modify the eisting code etensively and might introduce bugs into code that worked fine before changes. To avoid these hassles, one can use the ob5ect1oriented approach! 6reate a new class by inheritance. This new class inherits all the data and methods from the tested base class. sers can control the level of inheritance with the public, private, and protected keywords.
*ibraries
In 6KK and other programming languages, a collection of related classes or functions is called a library.
"olymorphism
The last ma5or feature of ob5ect1oriented programming is polymorphism. 0y using polymorphism, one can create new ob5ects that perform the same functions as the base ob5ect but which perform one or more of these functions in a different way. For eample, user may have a shape ob5ect that draws a circle on the screen. 0y using polymorphism, one can create a shape ob5ect that draws a rectangle instead. ser does this by creating a new version of the method that draws the shape on the screen. 0oth the old circle drawing and the new rectangle1drawing method have the same name but accomplish the drawing in a different way. Introduction to oracle
7hat is itO •
6ommand line -P* and "*Q-P* language interface to the database
•
It can be used as an interactive interface or it can be driven from scripts.
2'
•
Its equivalents in other databases are as! o
Ingres! -P*
o
-ybase and -P*-erver! isql
o
I04 %02!db2
o
"ostgresP*! psql
o
4y-P*!mysql
7hat is it forO •
6onnect to $racle
•
6reate, change, delete database ob5ects and data
•
&d hoc query data ob5ects and data
•
erify the functioning of your applications
$verview of &pplication &rchitecture There are two common ways to architect a database! client#server or multitier. &s internet computing becomes more prevalent in computing environments, many database management systems are moving to a multitier environment. 6lient#-erver &rchitecture 4ultiprocessing uses more than one processor for a set of related 5obs. %istributed processing reduces the load on a single processor by allowing different processors to concentrate on a subset of related tasks, thus improving the performance and capabilities of the system as a whole. &n $racle database system can easily take advantage of distributed processing by using its client#server architecture. In this architecture, the database system is divided into two parts! a front1end or a client, and a back1end or a server. The 6lient
2(
The client is a database application that initiates a request for an operation to be performed on the database server. It requests, processes, and presents data managed by the server. The client workstation can be optimized for its 5ob. For eample, it might not need large disk capacity, or it might benefit from graphic capabilities. $ften, the client runs on a different computer than the database server, generally on a "6. 4any clients can simultaneously run against one server. The -erver The server runs $racle software and handles the functions required for concurrent, shared data access. The server receives and processes the -P* and "*#-P* statements that originate from client applications. The computer that manages the server can be optimized for its duties. For eample, it can have large disk capacity and fast processors. 4ultitier &rchitecture! &pplication -ervers & multitier architecture has the following components! •
& client or initiator process that starts an operation
•
$ne or more application servers that perform parts of the operation. &n application server provides access to the data for the client and performs some of the query processing, thus removing some of the load from the database server. It can serve as an interface between clients and multiple database servers, including providing an additional level of security.
•
&n end or database server that stores most of the data used in the operation
This architecture enables use of an application server to do the following! •
alidate the credentials of a client, such as a 7eb browser
•
6onnect to an $racle database server
•
"erform the requested operation on behalf of the client
2A
If proy authentication is being used, then the identity of the client is maintained throughout all tiers of the connection. $verview of "hysical %atabase -tructures The following sections eplain the physical database structures of an $racle database, including datafiles, redo log files, and control files. %ata files Every $racle database has one or more physical datafiles. The datafiles contain all the database data. The data of logical database structures, such as tables and indees, is physically stored in the datafiles allocated for a database. The characteristics of data files are! •
& data files can be associated with only one database.
•
%atafiles can have certain characteristics set to let them automatically etend when the database runs out of space.
•
$ne or more data files form a logical unit of database storage called a table space.
%ata in a data files is read, as needed, during normal database operation and stored in the memory cache of $racle. For eample, assume that a user wants to access some data in a table of a database. If the requested information is not already in the memory cache for the database, then it is read from the appropriate datafiles and stored in memory. 4odified or new data is not necessarily written to a data file immediately. To reduce the amount of disk access and to increase performance, data is pooled in memory and written to the appropriate data files all at once, as determined by the database writer process 9%07n: background process.
2B
-un developed a single &"I for data base access1<%06. They kept three main goals in mind! ).
<%06 should be a -P*1*evel &"I.
2.
<%06 should capitalize on the eperience of eisting database &"I;s.
'.
<%06 should be simple.
<%06 is a -P* level &"I that allows you to embed -P* statements as arguments to the methods in <%06 interface. To enable you to do this in a database independent fashion, <%06 requires database venders to furnish a runtime implementation of its interface. These implementations route your -P* calls to the database in the proprietary fashion it recognizes.
2C
<%06 %+IE+ 4&@&?E+ @&TIE "+$T$6$* <%06 %+IE+ <%06 $%06 %+IE+ $%06 1N&ppln <%06 <%061$%06 %river $%061N%atabase
<%06 %river4anager! Function of the driver manager is to find out available drivers in the system and connect the application to the appropriate database, whenever a connection is requested. 8owever, to help the driver manager identify different types of drivers, each driver should be registered with the driver manager. <%06 %river! Function of the <%06 %river is to accept the -P* calls from the application and convert them into native calls to the database. 8owever, in this process it may take help from some other drivers or even servers, which depends on the type of <%06 %river. It also is possible that the total functionality of the database server could be built into the driver itself. <%061$%06 0ridge! -un soft provides a special <%06 %river called <%061$%06 0ridge driver, which can be used to connect to any eisting database, that is $%06 complaint. &pplication! &pplication is a 5ava program that needs the information to be modified in some database or wants to retrieve the information. 6+E&TI@? & 6$@@E6TI$@ and 6$@@E6TI@? & %&T&0&-E!
2D
logical database
connection. In other words we use the connection class for sending a series of sql statement to the database and managing the committing or aborting of those statements. "repared-tatement! The prepared -tatement enables sql statements to contain the parameters like a function definition and can eecute a single statement repeatedly with different values for those parameters. The act of assigning values to parameters is called binding parameters. /ou might want to use a prepared statement in updating a group of ob5ects stored on same table. This interface is used to retrieve the data from the database in second form. This interface will prepare a -=E*T$@ statement at compile time.
To eecute the
-=E*T$@ we have to set the values for the statement and eecute it at run time.
REQUIREMENT SPECIFICATIONS Interface Requrements!
The interface for this system will be a window based software and a database system which can handle huge amount of data as records. ser Interface! The user interface for this 4aterials +esource "lanning -ystem will be forms that can be generated by isual 0asic, 8T4*, 5ava1awt, etc. 8ardware Interface!
2J
The minimum hardware required in the making of the software is network based system with "entium "rocessor, )2D 40 +&4, A)2 =0 6ache 4emory,A ?0 %isk -pace, basic input, output devices. -oftware Interface! The software, obviously relates to the various kinds of software required in the successful completion of the pro5ect. The software required for the completion of this pro5ect are $racle 9+%04-: $racle is used as backend for the pro5ect and visual basic as the front end. "erformance +equirements! The 4aterials +esource 4anagement -ystem requires a high speed "rocessor and error free software for fast and accurate processing of the system. *ogical %atabase +equirements! & good %atabase must be installed which has the capacity of storing the large number of records and high accessibility.
-oftware -ystem &ttributes! -ome of the &ttributes of the system includes! •
+eliability
•
"ortability
•
-ecurity
•
8igh availability
'G
•
4aintainability
SPECIFIC REQUIREMENTS! Interface Requrements!
The interfaces for this system will interactive software,
The user interface for this ++$ -ystem will be a
The minimum hardware required is "entium )''48R "rocessor, B(40 +&4, 2G?0 %isk -pace, basic input, output devices. %&'&(&)&( Soft$are Interface!
The software interface for this system will be any 7indows $perating -ystem,
DFDS
')
VIEW STOCK 4.1
ITEMS ITEMS DATA 4.1.1
VIEW STOCK
ITEM INFO
'2
REPORTS 5.2
5.2.1 ITEM WISE
REQUEST SALES
5.2.2 PERIODIC WISE
''
VIEW ADD ITEMS REQUESTED 5.3
5.3.1
REQUESTED ITEMS
REQ IINFO
5.3.2 SELECT RID
5.3.4 UPDATE
5.3.3 SET STATUS
'(
VIEW REMOVAL ITEMS REQUESTED 5.4
5.4.1
REMOVAL ITEMS
REQ IINFO
5.4.2 SELECT RID
5.4.4 UPDATE
5.4.3 SET STATUS
DESI*N Unfe# Mo#e+ng ,anguage !
The nified 4odeling *anguage allows the software engineer to epress an analysis model using the modeling notation that is governed by a set of syntactic semantic and pragmatic rules.
& 4* system is represented using five different views that describe the system from distinctly different perspective. Each view is defined by a set of diagram, which is as follows.
User Mo#e+ -e$
'A
This view represents the system from the users perspective.
The analysis representation describes a usage scenario from the end1users perspective.
Structura+ mo#e+ ve$
In this model the data and functionality are arrived from inside the system.
This model view models the static structures.
.e/avora+ Mo#e+ -e$
It represents the dynamic of behavioral as parts of the system, depicting the interactions of collection between various structural elements described in the user model and structural model view.
Im0+ementaton Mo#e+ -e$
In this the structural and behavioral as parts of the system are represented as they are to be built.
Envronmenta+ Mo#e+ -e$
In this the structural and behavioral aspects of the environment in which the system is to be implemented are represented.
4* is specifically constructed through two different domains they are!
UM, Ana+yss mo#e+ng1 this focuses on the user model and structural model
views of the system.
'B
UM, #esgn mo#e+ng1
which focuses on the behavioral modeling,
implementation modeling and environmental model views.
USE2Case Dagram!
se case %iagrams represent the functionality of the system from a user;s point of view. se cases are used during requirements elicitation and analysis to represent the functionality of the system. se cases focus on the behavior of the system from eternal point of view.
&ctors are eternal entities that interact with the system. Eamples of actors include users like administrator, bank customer Setc., or another system like central database.
UM, DIA*RAM
C,ASS DIA*RAM
'C
M A N A G E R v arca r! "#rID v arca r$a ""% &r' $ ! ()*c)&+ *,-. $ ! ()*cv# r/0-. $ ! ()*cc#c-.
IN T E R F A C E 4# 64( & 641 4# 64( & 642 (! 44& , 1 3 a , a +# r3 1 )&+ *, c# c-. c&,, #c4 D -.
A C K L O G IC 3 a , a +# r3 1 *,4# r/ac#I1 c&, , #c4-. "#, ' 5*, /&-.
'D
SEQUENCE DIA*RAM
'J
CO,,A.ORATION DIA*RAM
(G
IMP,EMENTATION
The pro5ect is implemented using the <&& programming language. The implementation details of the pro5ect are as follows The methods that we have used are as follows! ). *ogin 2. &ction performed '. -how message (. ?ettet A. -ettet B. 7indowadpter C. &dd D. -etfont J. -etlayout )G. ?etsource )). ?etstring )2. ?etconnection )'. Eecutequery )(. Forname )A. ?etruntime )B. eec
()
SCREEN S"OTS
(2
('
((
(A
(B
(C
(D
(J
AG
A)
A2
A'
TESTIN*
TESTIN* MET"ODS USED
The development of software involves a series of production activities where opportunities for in5ecting of human fallibility are enormous. 0ecause of human inability to perform and communicate with the perfection, software development is accompanied by a quality assurance activity.
A(
"erformance testing was not taken for consideration as the available hardware is of minimum required configuration.
Soft$are Testng Tec/nques
The Test 6ase design methods used are! ). 78ITE 0$ TE-TI@? 2. 0*&6= 0$ TE-TI@?
)3 4"ITE .O5 TESTIN*
sing this testing method it was assured that all the independent paths were eercised atlas once.
&ll the logical decisions on their True and False sides were eecuted.
-tatement 6overage 6riteria was taken into accounts and was ensured that every statement was eecuted atlas once.
%3 .A,C6 .O5 TESTIN*
sing this technique incorrect and missing functions were identified and corrected.
Interfacing errors, initialization errors and termination errors were also found using this technique.
The errors uncovered during the testing were analyzed and fied and documented for the future use.
DIFFERENT ,E-E,S OF TESTIN*
& strategy for the software testing integrates test case design techniques into a well1 planned series of steps that results in the successful construction of software. &ny testing strategy must incorporate test planning, test eecution and resultant data collection and evaluation. nit testing and integration testing were the performance of the system and the output was a epected and consistent.
nit Testing nit testing focuses verification efforts on the smallest unit of software AA
design. Each of the modules was verified individually for errors.
Integration Testing Integration testing is a systematic technique for constructing the program structure while at same time conducting tests to uncover errors associated with interfacing. 8ere unit1testing modules were taken and the program structure that was specified in the design was built and then testing was carried out.
USER INTERFACE TESTIN*
ser interface design plays a ma5or part in the success of the pro5ect. =eeping in mind the system was developed and ease1of1use aspect was maintained in the design of system. &ll the modules were tested ehaustively and the encountered errors were rectified. The form design was on par with the eisting form design and hence the reduction of strain results. The validation error messages were simple and unambiguous. &ll internal data structures are assured their validity.
.+ac7 8o9 testng
0lack bo testing method focuses on functional requirements of the software to enable the software engineer to derive sets of input conditions that will fully eercise all function requirements of a program.
•
sing this technique incorrect and missing functions were identified and corrected.
•
Errors in %ata -tructures or eternal database access were also corrected.
•
Interfacing errors, initialization errors and termination errors were also found using this technique.
The errors uncovered during the testing were analyzed and fied and documented for the future use.
AB
%IFFE+E@T *EE*- $F TE-TI@? & strategy for software testing integrates software test case design techniques into a well1planned series of steps that results in the successful construction of software. &ny testing strategy must incorporate test1planning, test case %esign, test eecution and the resultant data collection and evaluation.
nit testing and integration testing were the performed of the system and the outputs were epected and consistent.
a: @IT TE-TI@? sing testing focuses on verification effort on the smallest unit of software design. The unit test considerations that were taken are!
Integrity of local data structures.
Interface
0oundary conditions
Independent paths
Error handling paths
nreachable codes
b: I@TE?+&TI$@ TE-TI@? Integration testing is a systematic technique for constructing the program structure while at the same time conducting tests to uncover errors associated with interfacing.
8ere unit tested modules were taken and the program structure that was specified in the design was built and then testing was carried out. The bottom up approach was applied and the stubs were created wherever necessary.
ser interface design plays a ma5or part in the success of the pro5ect. =eeping in mind the system was developed and ease1of1use aspect was maintained in the design forms. &ll the forms were tested ehaustively and the encountered were rectified. The form
AC
design was on par with the eisting form design hence reduction in the strain caused. The validation error messages were simple and unambiguous.
AD
+EFE+E@6E-
+eferences for the "ro5ect %evelopment 7ere Taken From the following 0ooks and 7eb -ites.
:A-A Tec/no+oges!
AJ