DSS Courier Services - CHARAN

Download as pdf or txt
Download as pdf or txt
You are on page 1of 66

DSS Courier Services

1. INTRODUCTION

1.1 INTRODUCTION TO SYSTEM

A DSS COURIER SERVICE is a service that allows someone to send a parcel orconsignment
from one location to another. They can be booked and paid for online.

Senders have the option to have their parcels collected by a courier or drop their parcel off at a
nearby location to be picked up later by the courier. Courier services are known for their superior
speed and tracking capabilities when compared with national mailing services.

Couriers are distinguished from ordinary mail services by features such as speed, Security,
tracking, signature, specialization and individualization of express services, and Swift delivery
times, which are optional for most everyday mail services.

As a premium service, couriers are usually more expensive than standard mail services, and their
use is normally limited to packages where one or more of these features are considered important
enough to warrant the cost. Courier services operate on all scales, from within specific towns or
cities, to regional, national and global services. The recent market evolution forced
manufacturing companies to find new convenient ways to deal with their customers. In fact,
the new needs emerged in the last decade pushed companies toward the proposal of new
offerings based on bundles of products and services able to satisfy customer requirements
namely Product-Service Systems (PSS). It must be cleared that shifting from a traditional,
product centred, business model, where the relationship with customer is purely transactional,
to a new, customer-centred, PSS business model, characterized by different levels of intimacy,
is not an easy task. The provision of such complex and customer-tailored offering demands a
profound revolution in the way products and services are designed, manufactured and delivered
to customers. Researchers conducted several studies around this topic, proposing numerous
methodologies aimed at improving different aspects of the PSS life cycle – e.g.
conceptualization and design phases, while only a few authors have worked to improve PSS
delivery and operations.

BU/GIMS/BCA-VI 1
DSS Courier Services

1.2 SCOPE AND OBJECTIVES

 The objective of the project is to deliver an efficient Courier Services whose main
functionality apart from calculating the courier Bill includes predicting the time
required to reach the destination.
 As per our client requirement, our main object should be managing consignment in an
effective manner.
 The system will be used for day-to-day activities like out return, company details, hub
rates, booking, non-delivery, and pickup centers.
 It is not easy to do this process manually because it would become very hectic. Hence
it is suggested to automate the process by developing the relevant software as the world
is moving from manual working to an information and technology era where
automation becomes important in all parts of life.
 The main purpose of this system is to connect all branches to the central database so the
everywhere information is the same.
 This system increases efficiency and increases the customer satisfaction level.

BU/GIMS/BCA-VI 2
DSS Courier Services

2. SYSTEM STUDY

2.1 EXISTING SYSTEM


The authors used the DSS classification framework described in to classify DSS type and
capture trends in DSS implementation and usage for PSS decision making. Model-Driven DSS
is the most common category, followed by Document-Driven and Knowledge-Driven DSS.
While some of the DSSs have been classified as Data-Driven DSS, no Communication-Driven
DSS is present in the pool.

LIMITATIONS OF THE EXISTING SYSTEM


 Time consuming.

 Consumes large volume of paper work.

 Needs manual calculations.

 No direct role for the higher officials.

 Should have a well-designed and maintained database.

 Should have a server that handles traffic.

 Should encrypt the passwords and store in database.

PROBLEM STATEMENT
The Problem statement is to avoid all these limitations and make the working more accurately
the system needs to be computerized in a better way.

PROPOSED SYSTEM

To debug the existing system, remove procedures those cause data redundancy, make
navigational sequence proper. To provide information about audits on different level
and also to reflect the current work status depending on organization/auditor or date.
Required to build strong password mechanism.

BU/GIMS/BCA-VI 3
DSS Courier Services

ADVANTAGES OF THE PROPOSED SYSTEM.


 Manage the entire process in easy and quick way.

 All information about the individual is there detailed.

 Minimize manual data entry.

 Minimum time needed for the various processing.

 Greater efficiency.

 Better service.

 User friendliness.

 Minimum time required.

2.2. LITERATURE SURVEY

In a PSS-centred business model, services have a central role in the creation of additional
value for the company and the customers. Because of this, they must be associated with tailored
instruments, able to support the service delivery process. In this sense, I4.0 technologies could
play a significant role if well integrated into the decision-making and service delivery process
[12]. A literature review has been conducted with the aim of investigating the work done until
now on this topic and the maturity of this research field. The authors defined a set of keywords,
and related synonyms, able to delineate the research context and useful to investigate the
maturity of this field. To run the search, the authors used one of the major research database –
SCOPUS. Keywords such as “decision support system”, “product service system”, “service
delivery”, “service”, “service process”, “Industry 4.0”, “cyber-physical system”,
“manufacturing” and “life cycle” were used to construct the queries, along with the operators
“AND” and “OR”. To widen as much as possible, the initial pool of papers, the authors run
multiples searches with different combinations of the abovementioned keywords on the
“Article title, Abstract, Keywords” field. Following, search results were refined using some of
the SCOPUS filters, selected according to the authors’ research interests. The authors exported
the filtered results as separate .csv files. Once collected, the authors started reading the papers’
title, using it as a proxy to select the ones interesting for the research. Papers with title explicitly

BU/GIMS/BCA-VI 4
DSS Courier Services

not related to the research topic were discarded; papers with title interesting for the research or
in doubt were kept. Once obtained the filtered list of papers, the authors started reading their
abstract. Once again, papers with abstract not related to the scope of the research were
discarded, while papers with abstract related or partially related to the research were kept. At
this point, filtered .csv files were converted and merged in a single Excel file, and paper’s title
was used as a proxy to remove duplicates. The authors downloaded the full-text of the
remaining papers and started reading them to obtain the final pool for the detailed analysis.

BU/GIMS/BCA-VI 5
DSS Courier Services

3. SOFTWARE & HARDWARE REQUIREMENTS

3.1 HARDWARE INTERFACE


Processor : INTEL CORE i3

RAM : 4GB

Hard Disk : Minimum of 465GB

Speed : 2.50GHz

3.2 SOFTWARE INTERFACE


Operating System : Windows 10

IDE : Visual Studio

Language : C#

Framework : VB.NET

Back End : MS SQL Server

COMMUNICATION INTERFACE

The Hypertext Transfer Protocol (HTTP) is an application protocol for distributed,


collaborative, hypermedia information systems. HTTP is the foundation of data
communication for the World Wide Web. Hypertext is structured text that uses logical links
(hyperlinks) between nodes containing text. HTTP is the protocol to exchange or transfer
hypertext HTTP (Hypertext Transfer Protocol) is the set of rules for transferring files (text,
graphic images, sound, video, and other multimedia files) on the World Wide Web. As soon as
a Web user opens their Web browser, the user is indirectly making use of HTTP.

BU/GIMS/BCA-VI 6
DSS Courier Services

4. SOFTWARE REQUIREMENT ANALYSIS

SRS – SOFTWARE REQUIREMENT SPECIFICATION

Requirements analysis, also called requirements engineering, is the process of


determining user expectations for a new or modified product. These features, called
requirements, must be quantifiable, relevant and detailed. In software engineering, such
requirements are often called functional specifications. Requirements analysis is an important
aspect of project management. Requirements analysis involves frequent communication with
system users to determine specific feature expectations, resolution of conflict or ambiguity in
requirements as demanded by the various users or groups of users, avoidance of feature
creep and documentation of all aspects of the project development process from start to finish.
Energy should be directed towards ensuring that the final system or product conforms to client
needs rather than attempting to mold user expectations to fit the requirements. Requirements
analysis is a team effort that demands a combination of hardware, software and human
factors engineering expertise as well as skills in dealing with people.

4.1 PRODUCT PERSPECTIVE

In the flexibility of the uses the interface has been developed a graphics concept in
mind, associated through a browser interface. The GUI’S at the top level have been
categorized as
1. Administrative user interface

2. The operational or generic user interface

Administrative user interface

The administrative user interface concentrates on the consistent information that is


practically, part of the organizational activities and which needs proper authentication
for the data collection. The interfaces help the administrations with all the transactional
states like Data insertion, Data deletion and Date updating along with the extensive data
search capabilities.

BU/GIMS/BCA-VI 7
DSS Courier Services

The operational or generic user interface

The operational or generic user interface helps the users upon the system in transactions
through the existing data and required services. The operational user interface also helps
the ordinary users in managing their own information helps the ordinary users in
managing their own information in a customized manner as per the assisted flexibilities.

4.2. FUNCTIONAL REQUIREMENTS

As far as the project is developed the functionality is simple, the objective of the
proposal is to strengthen the functioning of Audit Status Monitoring and make them
effective and better. The entire scope has been classified into five streams knows as
Coordinator Level, management Level, Auditor Level, User Level and State Web
Coordinator Level. The proposed software will cover the information needs with
respect to each request of the user group viz. accepting the request, providing
vulnerability document report and the current status of the audit.

NUMBER OF MODULES

The system after careful analysis has been identified to be presented with the
following modules:
This project is divided into 5 modules:

 Membership
 Plans/package
 Trainer
 Product
 Payments

BU/GIMS/BCA-VI 8
DSS Courier Services

MODULES

 Homepage : About our app


 Admin Login : Admin Logic details
 User Login : User Login details
 Booking : To book their products
 Pickup request : to view the restricted parcel
 Customer registration : registration of the customer
 About Us : Information about us
 Customer Care : To take help

4.3 NON- FUNCTIONAL REQUIREMENTS

These are constraints on the services or functions offered by the system. They are the
constraints to the system as a whole. Some of the non- functional requirements of this system
is: -

 Accurate information
 System reliability
 Usable information
 System security

4.4. TOOLS & TECHNOLOGICAL SURVEY

1. C#

It is an object-oriented programming language provided by Microsoft that runs on .Net


Framework. By the help of C# programming language, we can develop different types of
secured and robust applications: Window applications, Web applications, Distributed
applications, Web service applications, Database applications etc.

C# is approved as a standard by ECMA and ISO. C# is designed for CLI (Common


Language Infrastructure). CLI is a specification that describes executable code and runtime
environment. C# programming language is influenced by C++, Java, Eiffel, Modula-3,
Pascal etc. languages.

BU/GIMS/BCA-VI 9
DSS Courier Services

4.5. INTRODUCTION TO VB.NET

Visual Studio 2010:

Microsoft Visual Studio is an integrated development environment (IDE) from


Microsoft. It is used to develop console and graphical user interface applications.
.NET is a set of Web development tools offered by Microsoft. Programs like Visual
Studio .NET and Visual Web Developer allow Web developers to create dynamic
websites using a visual interface. Of course, programmers can write their own code and
scripts and incorporate it intoASP.NET websites as well. Though it often seen as a
successor to Microsoft's ASP programming technology, ASP.NET also supports Visual
Basic.NET, JScript .NET and open-source languages like Python and Perl.
Windows Application is built on the .NET framework, which provides an application
programming interface (API) for software programmers. The .NET development tools
can be used to create applications for both the Windows operating system and the Web.
Programs like Visual Studio .NET provide a visual interface for developers to create
their applications, which makes .NET a reasonable choice for designing Web-based
interfaces as well.
In order for an ASP.NET website to function correctly, it must be published to a Web
server that Supports ASP.NET applications.
There are some open-source options available for Linux-based systems, these
alternatives often provide less than full support for ASP.NET applications.

Language name: VISUAL BASIC


Visual Basic can serve as an ideal front-end tool for the clients to interact. It has got
connectivity mechanisms or all types of databases situated far and wide in a network and so it
can cater to the needs of large body of clients. Using the latest ActiveX technologies, it can
integrate the functionalities provided by other applications like Word, Excel and other
windows. Its internet capabilities provide easy access to documents and applications across the
internet. Above all it embodies the object oriented Technology, which is the cutting edge
technology for all the present day developments in the software world.

BU/GIMS/BCA-VI 10
DSS Courier Services

Features:

Modular programming: Visual Basic allows easy modularization via VBX added in,
user-defined subroutine and functions. The Visual environment forces a certain amount
of modularity. The VBX files provided by various vendors allows easy access to huge
pieces of functionality with very little coding

Automated Interface: Visual Basic support automated interface and argument passing,
which allow subroutines and functions to be called via another program.

Rethinking: Visual Basic makes programmer’s job less tedious. The visual
environment allows concentrating more on the program rather than user interface.

Graphical User Interface: Every computer system consists of three major elements,
the hardware, system software, application software such as word-processors, spread
sheets, database, packages, language and operating system, it is a GUI. A GUI acts as
friendly ‘front-end’ making it easier for you to interact with the computer.

4.6. INTRODUCTION TO SQL SERVER

SQL is an ANSI (American National Standards Institute) standard; there are many
different versions of the SQL language.
An RDBMS database program (i.e. MS Access, SQL Server, MySQL).
A server-side scripting language, like PHP or ASP, SQL.

WHAT CAN SQL DO?

SQL can execute queries against a database, retrieve the data, insert records and update
the records in database.
SQL can delete from a database, create new database, and create new tables, create new
procedures in a database.
SQL can create views in a database. It can set permissions on tables, procedures, and
views.

BU/GIMS/BCA-VI 11
DSS Courier Services

FEATURES OF SQL SERVER 2008

Microsoft SQL Server 2008 features include:

Internet Integration:

The SQL Server 2008 database engine includes integrated XML support. It also has the
scalability, availability, and security features required to operate as the data storage
component of the largest Web sites. The SQL Server 2008 programming model is
integrated with the Windows DNA architecture for developing Web applications, and
SQL server 2008 supports features such as English Query and the Microsoft Search
Service to incorporate user-friendly queries and powerful search capabilities in Web
application.

Scalability and Availability:

The same database engine can be used across platforms ranging from laptop, computers
running Microsoft Windows 2008 Data Center Edition. SQL Server 2008 Enterprise
Edition supports features such as federated servers, indexed views, and large memory
support that allow scaling to the performance levels required by the largest Web sites.

Enterprise-Level Database Features:

The SQL Server 208 relational database engine supports the features required to support
demanding data processing environments. The database engine protects data integrity
while minimizing the overhead of managing thousands of users concurrently modifying
the database.
SQL Server 2008 distributed queries allow you to reference data from multiple sources
as if it were a part of a SQL Server 2008 database, while at the same time, the distributed
transaction support protects they integrity of any updates of the distributed data.
Replication allows you to also maintain multiple copies of data, while ensuring that the
separate copies remains synchronized. You can replicate a set of data to multiple,
mobile, disconnected users, have them work autonomously, and then merge their
modifications back to the publisher.

BU/GIMS/BCA-VI 12
DSS Courier Services

Ease of installation, deployment, and us:

SQL Server 2008 includes a set of administrative and development tools that improve
upon the process of installing, deploying, managing, and using SQL Server across
several sites. SQL Server 2008 also supports a standards-based programming model
integrated with the Windows DNA, making the use of SQL Server databases and data
warehouses a seamless part of building powerful and scalable systems.
Data Warehousing:

SQL Server 2008 includes tools for extracting and analysing summary data for online
analytical processing. SQL also includes tools for visually designing databases and
analysing data using English-based questions.

INTERNET INFORMATION SERVER (IIS)

IIS server includes a broad range of administrative features for managing web sites
and the web server.
The features include HTTP support and standard internet services such as:

 World Wide Web (WWW): It supports HTTP allowing users to publish content to the
internet. Files can be placed in folders in our websites so the users can view with a
web browser. We can install business applications and publish in HTML.
 File Transfer Protocol: It is an industry standard protocol used for transferring files
between computers on a TCP/IP network. FTP enables to use one computer to host
multiple domain names.
 Simple Mail Transfer Protocol (SMTP): It is a standards-based, secure and scalable
email server. It supports a distributed email server using SMTP and Post Office
Protocol (POP3).

BU/GIMS/BCA-VI 13
DSS Courier Services

4.7. APPROACH ADAPTED

INTRODUCTION

After analysing the requirements of the task to be performed, the next step is to analyse
the problem and understand its context. The first activity in the phase is studying the
existing system and other is to understand the requirements and domain of the new
system. Both the activities are equally important, but the first activity serves as a basis
of giving the functional specifications and then successful design of the proposed
system. Understanding the properties and requirements of a new system is more
difficult and requires creative thinking and understanding of existing running system is
also difficult, improper understanding of present system can lead diversion from
solution.

ANALYSIS MODEL

The model that is basically being followed is the WATER FALL MODEL, which states
that the phases are organized in a linear order. First of all, the feasibility study is done.
Once that part is over the requirement analysis and project planning begins. If system
exists one and modification and addition of new module is needed, analysis of present
system can be used as basic model.
Here the linear ordering of these activities is critical. End of the phase and the output
of one phase is the input of other phase. The output of each phase is to be consistent
with the overall requirement of the system. Some of the qualities of spiral model are
also incorporated like after the people concerned with the project review completion of
each of the phase the work done.

WATER FALL MODEL


Water fall model was being chosen because all requirements were known beforehand and the
objective of our software development is the computerization/automation of an already
existing manual working system.

BU/GIMS/BCA-VI 14
DSS Courier Services

FIG:4.1
The design starts after the requirement analysis is complete and the coding begins after
the design is complete. Once the programming is completed, the testing is done. In this
model the sequence of activities performed in a software development project are: -
• Requirement Analysis
• Project Planning
• System design
• Detail design
• Coding
• Unit testing
• System integration & testing

BU/GIMS/BCA-VI 15
DSS Courier Services

SDLC Waterfall model is used when

 Requirements are stable and not changed frequently.


 Application is small.
 There is no requirement which is not understood or not very clear.
 The environment is stable
 The tools and technology used is stable and is not dynamic
 Resources are well trained and are available.

BU/GIMS/BCA-VI 16
DSS Courier Services

5. SYSTEM DESIGN

Systems design is the process of defining the architecture, components, modules,


interfaces, and data for a system to satisfy specified requirements. Systems design could be
seen as the application of systems theory to product development. There is some overlap with
the disciplines of systems analysis, systems architecture and systems engineering. The
architectural design of a system emphasizes on the design of the systems architecture which
describes the structure, behaviour, and more views of that system.

The design activity often results in three separate outputs –

 Architecture design.
 High level design.
 Detailed design.

5.1 ARCHITECTURAL DESIGN

Architectural design, is a set of principles- a coarse grained pattern that provides an


abstract framework for a family of systems. An architectural style improves partitioning and
promotes design reuse by providing solutions to frequently recurring problems. You can think
of architecture styles and patterns as sets of principles that shape an application.

THREE TIER ARCHITECTURE

Three tier architecture having three layers. They are

1. Client layer
2. Business layer
3. Data layer

BU/GIMS/BCA-VI 17
DSS Courier Services

Client layer:
Here we design the form using textbox, label etc.

Business layer: It is the intermediate layer which has the functions for client layer and it is
used to make communication faster between client and data layer. It provides the business
processes logic and the data access.

Data layer: it has the database.

Fig 5.1: Three tier architecture

Advantages

1. Easy to modify without affecting other modules


2. Fast communication
3. Performance will be good in three tier architecture.

HIGH LEVEL DESIGN

A high-level design provides an overview of a solution, platform, system, product,


service, or process. Such an overview is important in a multi-project development to make sure
that each supporting component design will be compatible with its neighboring designs and
with the big picture. A high-level design document will usually include a high-level
architecture diagram depicting the components, interfaces and networks that need to be further

BU/GIMS/BCA-VI 18
DSS Courier Services

specified or developed. The document may also depict or otherwise refer to work flows and/or
data flows between component systems.

5.2 DATA FLOW DIAGRAMS

A data flow diagram is graphical tool used to describe and analyse movement of data through
a system. These are the central tool and the basis from which the other components are
developed. The transformation of data from input to output, through processed, may be
described logically and independently of physical components associated with the system.
These are known as the logical data flow diagrams. The physical data flow diagrams show the
actual implements and movement of data between people, departments and workstations. A
full description of a system actually consists of a set of data flow diagrams. Using two familiar
notations Yourdon, Gane and Sarson notation develops the data flow diagrams. Each
component in a DFD is labelled with a descriptive name. Process is further identified with a
number that will be used for identification purpose. The development of DFD’S is done in
several levels. Each process in lower level diagrams can be broken down into a more detailed
DFD in the next level. The lop-level diagram is often called context diagram. It consists a
single process bit, which plays vital role in studying the current system. The process in the
context level diagram is exploded into other process at the first level DFD.

The idea behind the explosion of a process into more process is that understanding at
one level of detail is exploded into greater detail at the next level. This is done until
further explosion is necessary and an adequate amount of detail is described for analyst
to understand the process. Larry Constantine first developed the DFD as a way of
expressing system requirements in a graphical from, this lead to the modular design.
A DFD is also known as a “bubble Chart” has the purpose of clarifying system
requirements and identifying major transformations that will become programs in
system design. So it is the starting point of the design to the lowest level of detail. A
DFD consists of a series of bubbles joined by data flows in the system.

BU/GIMS/BCA-VI 19
DSS Courier Services

DFD SYMBOLS:

In the DFD, there are four symbols

1. A square defines a source(originator) or destination of system data

2. An arrow identifies data flow. It is the pipeline through which the


information flows

3. A circle or a bubble represents a process that transforms incoming data flow


into outgoing data flows.
4. An open rectangle is a data store, data at rest or a temporary repository of
data

Process that transform data flow

Source or destination of data

Data flow

Data Store

BU/GIMS/BCA-VI 20
DSS Courier Services

CONSTRUCTING A DFD:

Several rules of thumb are used in drawing DFD’S:

1. Process should be named and numbered for an easy reference. Each name
should be representative of the process.
2. The direction of flow is from top to bottom and from left to right. Data
traditionally flow from source to the destination although they may flow
back to the source. One way to indicate this is to draw long flow line back
to a source. An alternative way is to repeat the source symbol as a
destination. Since it is used more than once in the DFD it is marked with a
short diagonal.
3. When a process is exploded into lower level details, they are numbered.

4. The names of data stores and destinations are written in capital letters.
Process and dataflow names have the first letter of each work capitalized
A DFD typically shows the minimum contents of data store. Each data store
should contain all the data elements that flow in and out.
Questionnaires should contain all the data elements that flow in and out. Missing
interfaces redundancies and like is then accounted for often through interviews.

SAILENT FEATURES OF DFD’S:

1. The DFD shows flow of data, not of control loops and decision are controlled
considerations do not appear on a DFD.
2. The DFD does not indicate the time factor involved in any process whether
the dataflow take place daily, weekly, monthly or yearly.
3. The sequence of events is not brought out on the DFD.

BU/GIMS/BCA-VI 21
DSS Courier Services

RULES GOVERNING THE DFD’S:

PROCESS
No process can have only outputs.
1) No process can have only inputs. If an object has only inputs than it must
be a sink.
2) A process has a verb phrase label.

DATA STORE
1) Data cannot move directly from one data store to another data store, a
process must move data.
2) Data cannot move directly from an outside source to a data store, a process,
which receives, must move data from the source and place the data into data
store
3) A data store has a noun phrase label.

SOURCE OR SINK
The origin and /or destination of data.
1) Data cannot move direly from a source to sink it must be moved by
a process

2) A source and /or sink has a noun phrase land

DATA FLOW:

1) A Data Flow has only one direction of flow between symbols. It may flow
in both directions between a process and a data store to show a read before
an update. The latter is usually indicated however by two separate arrows
since these happen at different type.
2) A join in DFD means that exactly the same data comes from any of two or
more different processes data store or sink to a common location.

BU/GIMS/BCA-VI 22
DSS Courier Services

3) A data flow cannot go directly back to the same process it leads. There must
be at least one other process that handles the data flow produce some other
data flow returns the original data into the beginning process.
4) A Data flow to a data store means update (delete or change).
5) A data Flow from a data store means retrieve or use.

A data flow has a noun phrase label more than one data flow noun phrase can appear
on a single arrow as long as all of the flows on the same arrow move together as one
package.

BU/GIMS/BCA-VI 23
DSS Courier Services

LEVEL:0

COURIER User
Admin SERVICE

Figure 5.2

LEVEL: 1

COURIER SERVICE

ADMIN USER

CUST REGISTRATION

COUNTRY DETAILS

DISTRIBUTION

DISTRRICT NAME

EMPLOYEE DETAILS

ITEM DETAILS

STATES NAMES

USER TAB

Figure 5.3

BU/GIMS/BCA-VI 24
DSS Courier Services

LEVEL: 2

COURIER SERVICE

LOGIN

ADMIN USER

BOOKING
CUST REGISTRATION

BILLING TYPE
ABOUT US

BOOKING TAB
PICKUP REQUEST

COUNTRY TAB
REGISTER A COMPLIANT

DISTRIBUTION TAB

PROFILE

DISTRICT NAMES

ITEM DETAILS

REGISTER COMPLIANTS

STATE NAMES

USER TAB

Figure: 5.4

BU/GIMS/BCA-VI 25
DSS Courier Services

5.3 USE CASE DIAGRAM

Use case diagrams are considered for high level requirement analysis of a system. Use
case diagrams are used to gather the requirements of a system including internal and external
influences. These requirements are mostly design requirements. So when a system is analysed
to gather its functionalities use cases are prepared and actors are identified. Now when the
initial task is complete use case diagrams are modelled to present the outside view.

Use case: Use case diagrams are considered for high level requirement analysis of a system.
So when the requirements of a system are analysed the functionalities are captured in use cases.
So we can say that uses cases are nothing but the system functionalities written in an organized
manner.

Actor: Now the second things which are relevant to the use cases are the actors. Actors can be
defined as something that interacts with the system. The actors can be human user, some
internal applications or may be some external applications.

Relationship: Relationships exist among the use cases and actors. Show relationships and
dependencies clearly in the diagram. Do not try to include all types of relationships. Because
the main purpose of the diagram is to identify requirements.

BU/GIMS/BCA-VI 26
DSS Courier Services

FIG 5.5

BU/GIMS/BCA-VI 27
DSS Courier Services

FIG 5.6

BU/GIMS/BCA-VI 28
DSS Courier Services

5.4 SEQUENCE DIAGRAM

The Sequence Diagram models the collaboration of objects based on a time sequence.
It shows how the objects interact with others in a particular scenario of a use case. With the
advanced visual modeling capability, you can create complex sequence diagram in few clicks.
Besides, Visual Paradigm can generate sequence diagram from the flow of events which you
have defined in the use case description. The sequence diagram models the collaboration of
objects based on a time sequence. It shows how the objects interact with others in a particular
scenario of a use case. It depicts the objects and classes involved in the scenario and the
sequence of messages exchanged between the objects needed to carry out the functionality of
the scenario.

Lifelines:

A sequence diagram shows, as parallel vertical lines (lifelines), which indicates


different processes or objects that live simultaneously.

Message:

Messages, written with horizontal arrows with the message name written above them,
display interaction. The messages are written in the order in which they occur. This allows the
specification of simple runtime scenarios in a graphical manner.

Object/Activation Box/Process:

Activation boxes, or method-call boxes, are opaque rectangles drawn on top of lifelines
to represent that processes are being performed in response to the message.

BU/GIMS/BCA-VI 29
DSS Courier Services

FIG: 5.7

FIG: 5.8

BU/GIMS/BCA-VI 30
DSS Courier Services

5.5 ENTITY RELATIONSHIP DIAGRAM:

Entity-relationship (ER) diagram is a graphical representation of entities and their relationships


to each other, typically used in computing in regard to the organization of data within
databases or information systems. An entity is a piece of data-an object or concept about which
data is stored. A relationship is how the data is shared between entities. There are three types
of relationships between entities.

1. One-to-one
One instance of an entity (A) is associated with one other instance of another entity (B). For
example, in a database of employees, each employee name (A) is associated with only one
social security number (B).

2. One-to-Many
One instance of an entity (A) is associated with zero, one or many instances of another entity
(B), but for one instance of entity B there is only one instance of entity A. For example, for a
company with all employees working in one building, the building name (A) is associated with
many different employees (B), but those employees all share the same singular association with
entity A.

3. Many-to-Many
One instance of an entity (A) is associated with one, zero or many instances of another entity
(B), and one instance of entity B is associated with one, zero or many instances of entity A.
For example, for a company in which all of its employees work on multiple projects, each
instance of an employee (A) is associated with many instances of a project (B), and at the same
time, each instance of a project (B) has multiple employees (A) associated with it.

BU/GIMS/BCA-VI 31
DSS Courier Services

ER DIAGRAM
COURIER SERVICE
USER NAME
REGISTRATION

ADMIN USER LOGIN


HAS
LOGIN
PASSWORD

HOME
HOME

BOOKING

MASTER ENTRIES

ABOUT US

EMP DETAILS

PICKUP REQUEST

BOOKING

REGISTER COMPLIANT

DISTRIBUTION

PROFILE

REPORT

COMPLIANTS

ITEM DETAILS

FIG: 5.9

BU/GIMS/BCA-VI 32
DSS Courier Services

5.6. RELATIONS ESTABLISHED IN DATABASE

Tab 5.1: Database tables of the Project

BU/GIMS/BCA-VI 33
DSS Courier Services

6. IMPLEMENTATION

6.1 INTRODUCTION
This web application is implemented using object oriented programming language.
Object oriented programming is an approach that provides a way of modularizing programs by
creating partitioned memory area for both data and functions that can be used as templates for
creating copies of such modules on demand.

Features of Object Oriented paradigm:


 Emphasis is on data rather than procedure.

 Programs are divided into what are known as objects.

 Data structures are designed such that they characterize the objects.

 Methods that operate on the data of an object are tied together in the data structure.

 Objects may communicate with each other through methods.

 New data and methods can be easily added whenever necessary.

 Follows bottom-up approach in program design.

 Data is hidden and cannot be accessed by external functions.

6.2 MODULES USED IN THE PROJECT

NUMBER OF MODULES

The system after careful analysis has been identified to be presented with the
following modules:
This project is divided into 5 modules:

 Membership
 Plans/package
 Trainer
 Product
 Payments

BU/GIMS/BCA-VI 34
DSS Courier Services

MODULES

 Homepage : About our app


 Admin Login : Admin Logic details
 User Login : User Login details
 Booking : To book their products
 Pickup request : to view the restricted parcel
 Customer registration : registration of the customer
 About Us : Information about us
 Customer Care : To take help

BU/GIMS/BCA-VI 35
DSS Courier Services

7. SOURCE CODE

LOGIN:
Imports System.Data.SqlClient

Public Class Adminlogin

Private Sub Button1_Click(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles


Button1.Click

If TextBox1.Text = " " Or TextBox2.Text = " " Then

MsgBox("please eneter the adminname/password", vbCritical, "SUCCESSFULLY LOGIN")

ElseIf TextBox1.Text = "admin" And TextBox2.Text = "admin" Then

MDIParent1.Show()

Else

MsgBox("INVALID LOGIN PLEASE ENTER CORRECT ADINNAME/PASSWORD", vbCritical,


"ADMIN LOGIN")

End If

End Sub

Private Sub Button2_Click(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles


Button2.Click

TextBox1.Text = " "

TextBox2.Text = " "

End SuB

End Class

BOOKING TAB:
Imports System.Data.SqlClient

Public Class BookingTab

Dim pkVar As String

Dim b1, b2 As Long

BU/GIMS/BCA-VI 36
DSS Courier Services

Private Sub EmpDetForm_Load(ByVal sender As Object, ByVal e As System.EventArgs) Handles


Me.Load

Me.WindowState = FormWindowState.Maximized

butNew.Enabled = True

butSave.Enabled = False

butModify.Enabled = False

ButDelete.Enabled = False

butClose.Enabled = True

butList.Enabled = True

If Conn.State = ConnectionState.Open Then

Conn.Close()

End If

Conn.Open()

Dim cmd As New SqlCommand("select distinct weight from itemdetails order by weight", Conn)

Dim d4 As SqlDataReader = cmd.ExecuteReader()

While d4.Read

ComboBox5.Items.Add(d4(0).ToString)

End While

jDate.Value = Now.Date

auto()

If Conn.State = ConnectionState.Open Then Conn.Close()

Conn.Open()

Dim Cmd0 As New SqlCommand("select BillingType from BillingTypeTab order by BillingType",


Conn)

Dim D1 As SqlDataReader = Cmd0.ExecuteReader()

While D1.Read

ComboBox1.Items.Add(D1(0))

BU/GIMS/BCA-VI 37
DSS Courier Services

End While

If Conn.State = ConnectionState.Open Then Conn.Close()

Conn.Open()

Dim Cmd2 As New SqlCommand("select countryName from CountryTab order by


countryName", Conn)

Dim D2 As SqlDataReader = Cmd2.ExecuteReader()

While D2.Read

ComboBox2.Items.Add(D2(0))

End While

If Conn.State = ConnectionState.Open Then Conn.Close()

Conn.Open()

Dim Cmd3 As New SqlCommand("select StateName from StateNameTab order by StateName",


Conn)

Dim D3 As SqlDataReader = Cmd3.ExecuteReader()

While D3.Read

ComboBox3.Items.Add(D3(0))

End While

End Sub

Private Sub butSave_Click(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles


butSave.Click

SaveRecord()

butNew.Enabled = True

butSave.Enabled = True

butModify.Enabled = False

ButDelete.Enabled = False

butClose.Enabled = True

butList.Enabled = True

End Sub

BU/GIMS/BCA-VI 38
DSS Courier Services

Sub SaveRecord()

If TextBox1.Text = "" Then

MsgBox("Please enter the necessary details")

Exit Sub

End If

If Conn.State = ConnectionState.Open Then Conn.Close()

Conn.Open()

Dim Cmd0 As New SqlCommand("select DocketNo from BookingTab where DocketNo='" &
UCase(TextBox1.Text) & "'", Conn)

Dim D1 As SqlDataReader = Cmd0.ExecuteReader()

If D1.HasRows Then

MsgBox("This record is allready present in the database")

If Conn.State = ConnectionState.Open Then Conn.Close()

Conn.Open()

Exit Sub

End If

If Conn.State = ConnectionState.Open Then Conn.Close()

Conn.Open()

q1Var = "insert into BookingTab values("

q1Var = q1Var & "'" & TextBox1.Text & "',"

q1Var = q1Var & "'" & Format(jDate.Value, "dd/MMM/yyyy") & "',"

q1Var = q1Var & "'" & ComboBox1.Text & "',"

q1Var = q1Var & "'" & TextBox3.Text & "',"

q1Var = q1Var & "'" & TextBox4.Text & "',"

q1Var = q1Var & "'" & TextBox5.Text & "',"

q1Var = q1Var & "'" & ComboBox2.Text & "',"

q1Var = q1Var & "'" & ComboBox3.Text & "',"

BU/GIMS/BCA-VI 39
DSS Courier Services

q1Var = q1Var & "'" & ComboBox4.Text & "',"

q1Var = q1Var & "'" & ComboBox5.Text & "')"

Dim cmd1 As New SqlCommand(q1Var, Conn)

cmd1.ExecuteNonQuery()

If Conn.State = ConnectionState.Open Then Conn.Close()

disRecords()

End Sub

Sub disRecords()

If Conn.State = ConnectionState.Open Then Conn.Close()

Conn.Open()

Dim DS1 As New DataSet

Dim adp As New SqlDataAdapter("Select * from bookingtab order by DocketNo", Conn)

adp.Fill(DS1)

DG1.DataSource = DS1.Tables(0)

If Conn.State = ConnectionState.Open Then Conn.Close()

End Sub

Private Sub DG1_CellContentClick(ByVal sender As System.Object, ByVal e As


System.Windows.Forms.DataGridViewCellEventArgs) Handles DG1.CellContentClick

pkVar = DG1.CurrentRow.Cells(0).Value

If Conn.State = ConnectionState.Open Then Conn.Close()

Conn.Open()

Dim Cmd0 As New SqlCommand("select * from BookingTab where DocketNo='" & pkVar & "'",
Conn)

Dim D1 As SqlDataReader = Cmd0.ExecuteReader()

If D1.HasRows Then

D1.Read()

TextBox1.Text = D1(0).ToString

BU/GIMS/BCA-VI 40
DSS Courier Services

jDate.Value = D1(1).ToString

ComboBox1.Text = D1(2).ToString

ComboBox5.Text = D1(9).ToString

TextBox3.Text = D1(3).ToString

TextBox4.Text = D1(4).ToString

TextBox5.Text = D1(5).ToString

ComboBox2.Text = D1(6).ToString

ComboBox3.Text = D1(7).ToString

ComboBox4.Text = D1(8).ToString

Else

TextBox1.Text = ""

ComboBox5.Text = "

End If

butNew.Enabled = True

butSave.Enabled = False

butModify.Enabled = True

ButDelete.Enabled = True

butClose.Enabled = True

butList.Enabled = True

If Conn.State = ConnectionState.Open Then Conn.Close()

End Sub

Private Sub butClose_Click(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles


butClose.Click

Me.Close()

End Sub

Private Sub butModify_Click(ByVal sender As Object, ByVal e As System.EventArgs) Handles


butModify.Click

BU/GIMS/BCA-VI 41
DSS Courier Services

If vbNo = MsgBox("Are you sure you want modify this record", MsgBoxStyle.YesNo, "Delete")
Then Exit Sub

If Conn.State = ConnectionState.Open Then Conn.Close()

Conn.Open()

Dim cmd1 As New SqlCommand("Delete from BookingTab where DocketNo='" & pkVar & "'",
Conn)

cmd1.ExecuteNonQuery()

If Conn.State = ConnectionState.Open Then Conn.Close()

SaveRecord()

butNew.Enabled = True

butSave.Enabled = False

butModify.Enabled = False

ButDelete.Enabled = False

butClose.Enabled = True

butList.Enabled = True

End Sub

Private Sub ButDelete_Click(ByVal sender As Object, ByVal e As System.EventArgs) Handles


ButDelete.Click

If vbNo = MsgBox("Are you sure you want delete this record", MsgBoxStyle.YesNo, "Delete")
Then Exit Sub

If Conn.State = ConnectionState.Open Then Conn.Close()

Conn.Open()

Dim cmd1 As New SqlCommand("Delete from BookingTab where DocketNo='" & pkVar & "'",
Conn)

cmd1.ExecuteNonQuery()

If Conn.State = ConnectionState.Open Then Conn.Close()

disRecords()

butNew.Enabled = True

BU/GIMS/BCA-VI 42
DSS Courier Services

butSave.Enabled = False

butModify.Enabled = False

ButDelete.Enabled = False

butClose.Enabled = True

butList.Enabled = True

End Sub

Private Sub butNew_Click1(ByVal sender As Object, ByVal e As System.EventArgs) Handles


butNew.Click

ClearTxtControls(Me, 1)

TextBox1.Focus()

butNew.Enabled = False

butSave.Enabled = True

butModify.Enabled = False

ButDelete.Enabled = False

butList.Enabled = True

butClose.Enabled = True

auto()

End Sub

Private Sub butList_Click(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles


butList.Click

butNew.Enabled = True

butSave.Enabled = False

butModify.Enabled = True

ButDelete.Enabled = True

butClose.Enabled = True

butList.Enabled = True

disRecords()

BU/GIMS/BCA-VI 43
DSS Courier Services

End Sub

Private Sub TextBox1_LostFocus(ByVal sender As Object, ByVal e As System.EventArgs) Handles


TextBox1.LostFocus

TextBox1.Text = UCase(TextBox1.Text)

End Sub

Private Sub ComboBox3_LostFocus(ByVal sender As Object, ByVal e As System.EventArgs) Handles


ComboBox3.LostFocus

If Conn.State = ConnectionState.Open Then Conn.Close()

Conn.Open()

Dim Cmd3 As New SqlCommand("select DistrictName from DistrictNameTab order by


DistrictName", Conn)

Dim D3 As SqlDataReader = Cmd3.ExecuteReader()

While D3.Read

ComboBox4.Items.Add(D3(0))

End While

End Sub

Private Sub ComboBox3_SelectedIndexChanged(ByVal sender As System.Object, ByVal e As


System.EventArgs) Handles ComboBox3.SelectedIndexChanged

End Sub

Private Sub ComboBox1_LostFocus(ByVal sender As Object, ByVal e As System.EventArgs) Handles


ComboBox1.LostFocus

If Conn.State = ConnectionState.Open Then Conn.Close()

Conn.Open()

Dim Cmd0 As New SqlCommand("select baseprice from BillingTypeTab where BillingType='" &
ComboBox1.Text & "'", Conn)

Dim D1 As SqlDataReader = Cmd0.ExecuteReader()

While D1.Read

b1 = If(IsDBNull(D1(0)), 0, D1(0))

BU/GIMS/BCA-VI 44
DSS Courier Services

End While

TextBox3.Text = b1 + b2

End Sub

Private Sub TextBox2_LostFocus(ByVal sender As Object, ByVal e As System.EventArgs)

If Val(ComboBox5.Text) < 100 Then

b2 = 0

ElseIf Val(ComboBox5.Text) > 500 Then

b2 = 100

ElseIf Val(ComboBox5.Text) > 300 Then

b2 = 50

ElseIf Val(ComboBox5.Text) > 100 Then

b2 = 10

End If

TextBox3.Text = b1 + b2

End Sub

Private Sub TextBox2_TextChanged(ByVal sender As System.Object, ByVal e As System.EventArgs)

TextBox3.Text = Val(ComboBox5.Text * 500)

End Sub

Dim s1var As String

Sub auto()

'ClearTxtcontrols(Me,1)

If Conn.State = ConnectionState.Open Then Conn.Close()

Conn.Open()

Dim cmd0 As New SqlCommand("select max(DocketNo)from BookingTab ", Conn)

Dim d1 As SqlDataReader = cmd0.ExecuteReader()

If d1.HasRows Then

BU/GIMS/BCA-VI 45
DSS Courier Services

d1.Read()

s1var = If(IsDBNull(d1(0)), 100, d1(0) + 1)

Else

TextBox1.Text = "301"

End If

TextBox1.Enabled = False

TextBox1.Text = s1var

End Sub

Private Sub ComboBox5_SelectedIndexChanged(ByVal sender As System.Object, ByVal e As


System.EventArgs) Handles ComboBox5.SelectedIndexChanged

If Conn.State = ConnectionState.Open Then Conn.Close()

Conn.Open()

Dim cmd2 As New SqlCommand("select * from Itemdetails where weight ='" & ComboBox5.Text
& "'", Conn)

Dim d1 As SqlDataReader = cmd2.executereader

If d1.HasRows Then

d1.Read()

TextBox3.Text = d1(1).ToString

End If

End Sub

End Class

Custreg form

Imports System.Data.SqlClient

Imports System.Text.RegularExpressions

Public Class Custreg

Private Sub Button1_Click(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles


Button1.Click

TextBox1.Text = " "

BU/GIMS/BCA-VI 46
DSS Courier Services

TextBox2.Text = " "

TextBox3.Text = " "

TextBox4.Text = " "

TextBox5.Text = " "

End Sub

Sub SaveRecord()

If TextBox1.Text = " " Then

MsgBox("please enter the necessary details")

Exit Sub

End If

If Conn.State = ConnectionState.Open Then Conn.Close()

Conn.Open()

Dim cmd0 As New SqlCommand("select Custpswd from Custreg where Custname='" &
TextBox1.Text & "'", Conn)

Dim d1 As SqlDataReader = cmd0.ExecuteReader()

If d1.HasRows Then

MsgBox("This record is already present in the database")

If Conn.State = ConnectionState.Open Then Conn.Close()

Conn.Open()

End If

If Conn.State = ConnectionState.Open Then

Conn.Close()

End If

Conn.Open()

Dim q1var, q2var As String

q1var = "insert into Custreg(CustName,Custpswd,Mobileno,Email,Address)"

BU/GIMS/BCA-VI 47
DSS Courier Services

q2var = "values('" & TextBox1.Text & "','" & TextBox2.Text & "','" & TextBox3.Text & "','" &
TextBox4.Text & "','" & TextBox5.Text & "')"

MsgBox(q1var & q2var)

Dim cmd3 As New SqlCommand(q1var & q2var, Conn)

cmd3.ExecuteNonQuery()

If Conn.State = ConnectionState.Open Then

Conn.Close()

End I

Conn.Open()

End Sub

Private Sub Button2_Click(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles


Button2.Click

SaveRecord()

End Sub

Private Sub Button5_Click(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles


Button5.Click

Me.Close()

End Sub

Private Sub TextBox3_Leave(ByVal sender As Object, ByVal e As System.EventArgs) Handles


TextBox3.Leave

Dim Mobileno As New Regex("^\(?([0-9]{3})\)?[-. ]?([0-9]{3})[-. ]?([0-9]{4})$")

TextBox3.MaxLength = 10

If Mobileno.IsMatch(TextBox3.Text) Then

TextBox4.Focus()

Else

MsgBox("Not Valid Phone Number")

TextBox3.Text = ""

TextBox3.Focus()

BU/GIMS/BCA-VI 48
DSS Courier Services

End If

End Sub

Private Sub TextBox4_Leave(ByVal sender As Object, ByVal e As System.EventArgs) Handles


TextBox4.Leave

Dim regex As Regex = New Regex("^([\w-\.]+)@((\[[0-9]{1,3}\.[0-9]{1,3}\.[0-9]{1,3}\.)|(([\w-


]+\.)+))([a-zA-Z]{2,4}|[0-9]{1,3})(\]?)$")

Dim isValid As Boolean = regex.IsMatch(TextBox4.Text.Trim)

If Not isValid Then

MessageBox.Show("Invalid Email.")

End If

End Sub

Private Sub TextBox1_Leave(ByVal sender As Object, ByVal e As System.EventArgs) Handles


TextBox1.Leave

If Not Regex.Match(TextBox1.Text, "^[a-z. ]*$", RegexOptions.IgnoreCase).Success Then

MsgBox("please enter alpha text only!")

TextBox1.Focus()

TextBox1.Clear()

End If

End Sub

Private Sub Label1_Click(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles


Label1.Click

End Sub

Private Sub Custreg_Load(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles


MyBase.Load

End Sub

End Class

BU/GIMS/BCA-VI 49
DSS Courier Services

8. SCREEN SHOTS

FLASH SCREEN:

FIG: 8.1

ADMIN LOGIN:

FIG:8.2

BU/GIMS/BCA-VI 50
DSS Courier Services

USER LOGIN:

FIG 8.3

CONTACT US:

FIG 8.4

BU/GIMS/BCA-VI 51
DSS Courier Services

COUNTRY NAMES:

FIG 8.5

STATE NAMES ENTRY:

FIG 8.6

BU/GIMS/BCA-VI 52
DSS Courier Services

DISTRICT NAMES ENTRY:

FIG 8.7

EMPLOYEE DETAILS:

FIG 8.8

BU/GIMS/BCA-VI 53
DSS Courier Services

EMPLOYEE LIST REPORT:

FIG 8.9

COURIER BOOKING:

FIG 8.10

BU/GIMS/BCA-VI 54
DSS Courier Services

9. SOFTWARE TESTING

Testing the software is the process of validating and verifying of a software program. The errors
are to be identified in order to fix those errors. Thus the main objective of software testing is
to maintain and deliver a quality product to the client. Every software is expected to meet
certain needs. So when software is developed it is required to check whether it fulfills those
needs. A banking software is entirely different from a software required in a shop. The needs
and requirements of both that software are different. Hence it is important to check its potential.
The main goal of software testing is to know the errors of the software before the user finds
them. Software testing is the operating of software under controlled conditions to check
whether the software works well and to rectify the errors, and also to make sure that we are
delivering the correct software what the user intends.

Objective of Testing:

 Software testing helps to make sure that it meets all the requirement it was supposed to
meet.

 It will bring out all the errors, if any, while using the software.

 Software testing helps to understand that the software that is being tested is a complete
success Software testing helps to give a quality certification that the software can be
used by the client immediately.

 It ensures quality of the product.

BU/GIMS/BCA-VI 55
DSS Courier Services

9.1 TYPES OF TESTING:

The two major approaches of software testing are


 White Box Testing
 Black Box Testing

White Box Testing:

White box software testing is the testing of the working of the software and its internal
structures. It can detect errors of the implemented parts, but the unimplemented parts go
undetected. In order to implement white box testing, the tester has to deal with the code and
hence is needed to possess knowledge of coding and logic i.e. internal working of the code.
White box test also needs the tester to look into the code and find out which
unit/statement/chunk of the code is malfunctioning. For white box testing, the test cases cannot
be determined until the code has actually been written. Test data are derived from direct
examination of the code to be tested.

Black Box Testing:

Black box testing is the testing of the functionality of the software as opposed to its internal
structure. It can be done at all levels of software testing. Black Box Testing is testing without
knowledge of the internal workings of the item being tested. For example, when black box
testing is applied to software engineering, the tester would only know the “legal” inputs and
what the expected outputs should be, but not how the program actually arrives at those outputs.

In black box testing, the test planning can begin as soon as the specifications are written. The
opposite of this would be glass box testing, where test data are derived from direct examination
of the code to be tested. Both of these testing techniques have advantages and disadvantages,
but when combined, they help to ensure thorough testing of the product.

BU/GIMS/BCA-VI 56
DSS Courier Services

LEVELS OF TESTING:

There are four levels of software testing:

 Unit Testing
 Integration Testing
 System Testing
 Acceptance Testing

1. Unit Testing

Unit Testing is a level of the software testing process where individual units/components of a
software/system are tested. The purpose is to validate that each unit of the software performs
as designed.

2. Integration Testing

Integration Testing is a level of the software testing process where individual units are
combined and tested as a group. The purpose of this level of testing is to expose faults in the
interaction between integrated units.

3. System Testing

System Testing is a level of the software testing process where a complete, integrated
system/software is tested. The purpose of this test is to evaluate the system’s compliance with
the specified requirements.

4. Acceptance Testing

Acceptance Testing is a level of the software testing process where a system is tested for
acceptability. The purpose of this test is to evaluate the system’s compliance with the business
requirements and assess whether it is acceptable for delivery.

BU/GIMS/BCA-VI 57
DSS Courier Services

REGRESSION TESTING:

Regression testing is a type of software testing that seeks to uncover new software
bugs, or regressions, in existing functional and non-functional areas of a system after changes
such as enhancements, patches or configuration changes, have been made to them. The intent
of regression testing is to ensure that changes such as those mentioned above have not
introduced new faults. One of the main reasons for regression testing is to determine whether
a change in one part of the software affects other parts of the software.

Common methods of regression testing include rerunning previously completed tests and
checking whether program behavior has changed and whether previously fixed faults have re-
emerged. Regression testing can be performed to test a system efficiently by systematically
selecting the appropriate minimum set of tests needed to adequately cover a particular change.

This testing is done to make sure that new code changes should not have side effects on the
existing functionalities. It ensures that old code still works once the new code changes are done.

9.2 TEST CASES

Test Expected Actual


Description Required Input Status
cases Output Output

Adminid=admin@gmail. Login should Login


1 Admin login Pass
com Password=12345 be successful successful

Userid=user13@gm Login should Login


2 User login be successful Pass
ail.com Password=a12 successful

Add
Add booking suit Successfully Succesfully
3 booking Pass
booked Booked

Registration Register a Complaint Complaint


4 Pass
complaint complaint registered registered
successfully successfully

9.1: Test case

BU/GIMS/BCA-VI 58
DSS Courier Services

10. CONCLUSION
The DSS Courier service system is a company which does work to pick up, deliver, packages
and mail. This company is doing work of couriers which is like mail services, speed, security,
signature, individualization of services, but this courier is less costly than other services as it is
user friendly.
By giving the benefits like pick up from door services it will not only save money and time it
will even reduce the stress of the customer by picking from the door.
This software will give you ultimately better delivery service and improve customer
satisfaction.
We started this project with intension of giving our best and doing something interesting and
we have successfully achieved it.
If we were able to complete this project, this is largely due to the collective effort.
This DBMS package is very efficient and user friendly and way to store the details that comes
to existence. Although all features are not provided the important ones need to make this
software self-sufficient are present. The project has been successful in that manner.
The tables that are created for this software have been designed in such a way that completed
information is given in a concise manner. Few of the functions provided by this software are
records, saved and modified.
The software is portable and flexible for future enhancements. Thus this project helps in
retrieving the details as single go using data base concept.
It is concluded that the objective of the project work entitled “DSS courier service” filled and
desired result has been obtained. Each program in the project are functioning normally and
reliable to user as well as admin.

BU/GIMS/BCA-VI 59
DSS Courier Services

11.FUTURE ENHANCEMENT

As the days goes the software can be developed to give the services for the other remote places
and even it can be delivered for the restricted areas as there is no service due to covid and
tracking of the parcel can be done as the usage of the app goes high.
We all know the importance of computerization. The world is moving ahead at
lightning speed and everyone is running short of time. One always wants to get the
information and perform a task he/she/they desire(s) within a short period of time and
too with amount of efficiency and accuracy. The application areas for the
computerization have been selected on the basis of following factors:
• Minimizing the manual records kept at different locations.
• There will be more data integrity.
• Facilitating desired information display, very quickly, by retrieving
information from users.
• Facilitating various statistical information which helps in decision-making?
• To reduce manual efforts in activities that involved repetitive work.
• Updating and deletion of such a huge amount of data will become easier.

BU/GIMS/BCA-VI 60
DSS Courier Services

BIBLIOGRAPGHY

REFERRED BOOKS

 Visual Basic Windows Programming.


AUTHORS :( Chitra Ravi , Charles Hampfed , Herbert)
 .net vb Programming.
 AUTHORS :( Anderson.R, Francis.B, Howard.R)
NET.Wrox Press Ltd.
 Software Engineering.
AUTHORS:(Ian Somerville,Rajeev Mall,John Jaworsky)

REFERRED WEBSITES

 http://www.tutorialspoint.com

 W3SCHOOLS

 Geeks for Geeks

BU/GIMS/BCA-VI 61
DSS Courier Services

ANNEXURE

SYNOPSIS

TITLE: DSS Courier Services

INTRODUCTION

A DSS COURIER SERVICE is a service that allows someone to send a parcel orconsignment
from one location to another. They can be booked and paid for online.

Senders have the option to have their parcels collected by a courier or drop their parcel off at a
nearby location to be picked up later by the courier. Courier services are known for their superior
speed and tracking capabilities when compared with national mailing services.

Couriers are distinguished from ordinary mail services by features such as speed, Security,
tracking, signature, specialization and individualization of express services, and Swift delivery
times, which are optional for most everyday mail services.

As a premium service, couriers are usually more expensive than standard mail services, and their
use is normally limited to packages where one or more of these features are considered important
enough to warrant the cost. Courier services operate on all scales, from within specific towns or
cities, to regional, national and global services. The recent market evolution forced
manufacturing companies to find new convenient ways to deal with their customers. In fact,
the new needs emerged in the last decade pushed companies toward the proposal of new
offerings based on bundles of products and services able to satisfy customer requirements
namely Product-Service Systems (PSS). It must be cleared that shifting from a traditional,
product centred, business model, where the relationship with customer is purely transactional,
to a new, customer-centred, PSS business model, characterized by different levels of intimacy,
is not an easy task. The provision of such complex and customer-tailored offering demands a
profound revolution in the way products and services are designed, manufactured and delivered
to customers. Researchers conducted several studies around this topic, proposing numerous
methodologies aimed at improving different aspects of the PSS life cycle – e.g.
conceptualization and design phases, while only a few authors have worked to improve PSS
delivery and operations.

BU/GIMS/BCA-VI 62
DSS Courier Services

SCOPE AND OBJECTIVES

 The objective of the project is to deliver an efficient Courier Services whose main
functionality apart from calculating the courier Bill includes predicting the time
required to reach the destination.
 As per our client requirement, our main object should be managing consignment in an
effective manner.
 The system will be used for day-to-day activities like out return, company details, hub
rates, booking, non-delivery, and pickup centers.
 It is not easy to do this process manually because it would become very hectic. Hence
it is suggested to automate the process by developing the relevant software as the world
is moving from manual working to an information and technology era where
automation becomes important in all parts of life.
 The main purpose of this system is to connect all branches to the central database so the
everywhere information is the same.
 This system increases efficiency and increases the customer satisfaction level.

EXISTING SYSTEM
The authors used the DSS classification framework described in [14] to classify DSS type and
capture trends in DSS implementation and usage for PSS decision making. Model-Driven DSS
is the most common category, followed by Document-Driven and Knowledge-Driven DSS.
While some of the DSSs have been classified as Data-Driven DSS, no Communication-Driven
DSS is present in the pool.

LIMITATIONS OF THE EXISTING SYSTEM


 Time consuming.

 Consumes large volume of paper work.

 Needs manual calculations.

 No direct role for the higher officials.

 Should have a well-designed and maintained database.

BU/GIMS/BCA-VI 63
DSS Courier Services

 Should have a server that handles traffic.

 Should encrypt the passwords and store in database.

PROBLEM STATEMENT
The Problem statement is to avoid all these limitations and make the working more accurately
the system needs to be computerized in a better way.

PROPOSED SYSTEM

To debug the existing system, remove procedures those cause data redundancy, make
navigational sequence proper. To provide information about audits on different level
and also to reflect the current work status depending on organization/auditor or date.
Required to build strong password mechanism.

ADVANTAGES OF THE PROPOSED SYSTEM.


 Manage the entire process in easy and quick way.

 All information about the individual is there detailed.

 Minimize manual data entry.

 Minimum time needed for the various processing.

 Greater efficiency.

 Better service.

 User friendliness.

 Minimum time required.

BU/GIMS/BCA-VI 64
DSS Courier Services

MODULES USED IN THE PROJECT

NUMBER OF MODULES

The system after careful analysis has been identified to be presented with the
following modules:
This project is divided into 5 modules:

 Membership
 Plans/package
 Trainer
 Product
 Payments
MODULES

 Homepage : About our app


 Admin Login : Admin Logic details
 User Login : User Login details
 Booking : To book their products
 Pickup request : to view the restricted parcel
 Customer registration : registration of the customer
 About Us : Information about us
 Customer Care : To take help

BU/GIMS/BCA-VI 65
DSS Courier Services

SYSTEM SOFTWARE & HARDWARE REQUIREMENTS

HARDWARE INTERFACE
Processor : INTEL CORE i3

RAM : 4GB

Hard Disk : Minimum of 465GB

Speed : 2.50GHz

SOFTWARE INTERFACE
Operating System : Windows 10

IDE : Visual Studio

Language : JavaScript CSS, HTML, AJAX, JQuery, Bootstrap

Framework : VB.NET

Back End : MS SQL Server

BU/GIMS/BCA-VI 66

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy