Professional Documents
Culture Documents
INTRODUCTION
The project Online Courier Management System delivery status and notification system is being developed for the need of company running simultaneously courier & cargo service this is specially meant for their frontline user service information. This is one of the best efforts by us to prove that how Internet can be helpful in tire service industry where inquiries are always in queue. This system however is a snap shot of the whole scenario for the booming service industry. This basically deals with the queries of user for a company simultaneously running its courier & cargo service where the users having booked some cargo or couriers or both for delivery can view the status online about where there booked courier or cargo. How much more time it will take to reach the place, and whether received it in original state. nd many other queries such as the reason of blockage, queries with the user care officers regarding handling etc. there is a user satisfaction guest book where user should put some notes about our service user complaint register. s the domain in of the system is to a bigger area so the best and convenient way is internet as this is the best way to satisfy the user queries. between the user and the company. !ith the advent of the Internet technologies wavered. "very year millions more people around are using internet interact in more ways than ever before to date the find old classmates check of medical elements and cures to react and e#press and interactive view of the news also gives live sales, H"$% &nline and ma#imum hit mostly in the service industries. This is an instance to show that how internet can be the best deal with the fast growing network of optical fiber making micro broadband and economical to access the Internet whether in the modern or Information retrieval term. The e#tract of all these whether the data access retrieval and our goal is placed in a well ordered by using it's technologies on net. !e will not loose our data whether it is user or service provider. (o comp is now helpful in many other cases too)* website can prove the best interface
+ast retrieval of information around the globe by browsing the net. "asy access by sitting home to most of the work places. "asy database access with the invaluable functions of online entertainment and jobs and placements.
Through this portal we have tried to automate the process of an instance of user care industry service a web based support for a cargo and courier to provide automates service regarding their courier ,packets and parcels- delivery status.
Improving the switches button and hyperlink so that the candidate could find all the queries they need at the first sight. 8aintaining the fast download of the page by using the flavors of cookies. (mooth transition and easy access to the pages not requiring much training to the end user.
PROJECT CATEGORY
The software which is being developed comes under both &&%( and 67:8( category. The proposed project based on 2 (harp .3"T as a front end and (0$ (erver as a back end. !hile taking 24.3et it gives the strong support of &bject &riented %rogramming (ystem technology. &n the other hand (0$ (erver gives the database consistency, reliability and strong 67:8( supports. &bject &riented %rogramming is a programming paradigm in its own right and on the other hand, it is a set of software engineering tools which can be used to build more reliable and reusable systems. t present, &bject &riented %rogramming is emerging from research laboratories and invading the field of industrial applications. &bject &riented %rogramming is at the core of 24 .3"T. In fact, all .3"T programs are to at least some e#tent object oriented. &bject &riented %rogramming is so integral to .3"T that it is best to understand its basic principles before we begin writing even simple .3"T %rogram. ;ust about everything we do in .3"T involves objects in some way*even simple variables are base on the 2 (harp object class. nd all our code hast to appear in a class of some sort, even if we are using a module or structure, which are also types of classes now, ll object oriented programming languages provide mechanisms that help us to implement the object*oriented model. It consists following supports) bstraction! The ability to create an abstract representation of a concept in code. The technique of creating new data types that are well suited to an application to be programmed is known as data abstraction. It provides ability to create user*defined data types, for modeling a real world object, having the properties of built in data types and a set of permitted operators. "ncapsulation! "ncapsulation is all about the separation between implementation and interface. In other words, when you encapsulate and object, you make its code and data internal and no longer accessible to the outside e#cept through a well* defined interface. This is also called data hiding. #olymorphism! This is all about creating procedure that can operate on object of different types. 2 (harp .3"T handles polymorphism with both late binding and multiple interfaces. $nheritance! Inheritance allows us to derive new classes from other classes. The idea here is that if we were to create, for e#ample, a class for a specific c sharp form and then derive a new type of form from that class, thee derived class will inherit all the base class's functionality, even before we start adding code or customi9ing the new form.
S#%&"T
(%.3"T is a programming framework built on the common language runtime that can be used on a server to build powerful !eb applications. (%.3"T offers several important advantages over previous !eb development models)
"nhance' #erformance:
(%.3"T is compiled common language runtime code running on the server. 1nlike its interpreted predecessors, (%.3"T can take advantage of early binding, just*in*time compilation, native optimi9ation, and caching services right out of the bo#. This amounts to dramatically better performance before you ever write a line of code.
with your own custom*written component. Implementing custom authentication or state services has never been easier. Security: !ith built in !indows authentication and per*application configuration, you can be assured that your applications are secure.
C,
24 is 8icrosoft@s new programming language for the .3"T platform. It combines some of the best features of modern programming languages such as ;ava, 2AA or <isual :asic. 24 is an object*oriented language with single inheritance but multiple interfaces per class. It supports component*based programming by properties ,smart fields-, events and delegates ,enhanced function pointers-. 24 is fully interoperable with other .3"T languages such as <:.3"T, "iffel.3"T or &beron.3"T. 24 is designed to be a platform*independent language in the tradition of ;ava. It@s synta# is similar to 2 and 2AA synta#, and 24 is designed to be an object*oriented language. There are, for the most part, minor variations in synta# between 2AA and 24. 8ain has no return type, there are no semicolons after class names, there are some ,to 2AA programmersstrange decisions regarding capitali9ation * such as the capitali9ation of 8ain. &ther a few differences, the synta# is often the same. This decision is reasonable, in light of the fact that 2 synta# has been used with several other languages * notably ;ava. (imilar to ;ava, 24 does not support multiple inheritanceB instead it provides ;ava@s solution) interfaces. Interfaces implemented by a class specify certain functions that the class is guaranteed to implement. Interfaces avoid the messy dangers of multiple inheritance while maintaining the ability to let several classes implement the same set of methods. nother helpful feature of 24 is garbage collection. Therefore, it is unnecessary to include a destructor for each class unless a class handles unmanaged resourcesB if so, it@s necessary to release control those resources from within the class ,The +inali9e function is used to clear up these unmanaged resourcesB it can even be abbreviated with the same synta# as a 2AA destructor-. &f course, 24 also provides direct access to memory through 2AA style pointers, but these pointers are not garbage collected until specifically released by the programmer. 24, as part of the .3"T framework, is compiled to 8icrosoft Intermediate $anguage ,8(I$-, which is a language similar to ;ava@s byte code. 8(I$ allows 24 to be platform independent and runs using just in time compiling. Therefore programs running under .3"T gain speed with repeated use. +urthermore, because the other languages that make up the .3"T platform ,including <: and 2&:&$- compile to 8(I$, it is possible for classes to be inherited across languages. The 8(I$, like byte code, is what allows 24 to be platform independent.
C, 'vantages:
C8$ documentation generated from source code comments. ,This is coming in <:.3"T with !hidbey ,the code name for the ne#t version of <isual (tudio and .3"T-, and there are tools which will do it with e#isting <:.3"T code already.&perator overloading * again, coming to <:.3"T in !hidbey.
$anguage support for unsigned types ,you can use them from <:.3"T, but they aren@t in the language itself-. gain, support for these is coming to <:.3"T in !hidbey. The using statement, which makes unmanaged resource disposal simple. "#plicit interface implementation, where an interface which is already implemented in a base class can be reimplemented separately in a derived class. rguably this makes the class harder to understand, in the same way that member hiding normally does. 1nsafe code. This allows pointer arithmetic etc, and can improve performance in some situations. However, it is not to be used lightly, as a lot of the normal safety of 24 is lost ,as the name implies-. 3ote that unsafe code is still managed code, i.e. it is compiled to I$, ;ITted, and run within the 2$6.
S-. Server provides a suite of tools for managing all aspects of (0$ (erver development, querying, tuning, and administration. !hile designing a database, the database administrator creates database objects such as tables, columns, keys, indices, relationships, constraints, and views. To help create these objects, the (0$ (erver 8anagement (tudio provides access to visual database tools. These tools provide three mechanisms to aid in database design) the 7atabase 7esigner, the Table 7esigner, and the view designer The integrated 0uery "ditor provides a simple graphical user interface for running (0$ queries and viewing the results. The 0uery "ditor also provides a graphical representation of show plan, the steps chosen by the optimi9er for query e#ecution. (0$ (erver supports the hosting of the .3"T 2ommon $anguage 6untime ,2$6- inside the (0$ (erver process to enable database programmers to write business logic as functions, stored procedures, triggers, data types, and aggregates. The ability to run pplication code inside the database adds fle#ibility to the design of application architectures that requires business logic to e#ecute close to the data and cannot afford the cost of shipping data to middle*tier process to perform computation outside the database. pplication code is deployed inside the database by using assemblies, which are the units of packaging, deployment, and versioning of application code in .3"T. 7eployment of application code inside the database provides uniform way to administer, :ack up, and restore complete database applications.
TOOLS/PLATFORM
)or the un'ergoing project/ following tools are use': #latform Operating System )ramewor1 )ront!"n' Tool Scripting .anguage $nterface Server ;ac1!"n' Tool Technology (in'ows (in'ows 0# professional with Service #ac1 2 %&et )3 M"(O34 2%5 6isual Stu'io 7889 C,/ :TM. :TM./ 6isual Stu'io $nternet $nformation Server S-. Server 7885 S#%&"T
HARDWARE : #rocessor Memory &etwor1 'apter Mo'em Secon'ary Storage $ntel #entium 7%< =:> 75? M%;%/ @%@%3% 3 M "thernet 'apter 5?1pbs 6oice )a* @ata SamsungASeagate :ar' 'is1 B<8 =%;C
Software reDuirement:
The minimum requirement for the application to run is given below)
Front End : (%.3"T 24 Back End : (0$ (erver DJJJ Operating System : !I37&! C% with (%D, !I37&! DJJJ
SYSTEM DESIGN
(ystem design phase starts after the software requirements have been analy9ed and specified. (ystem design is the first of the three technical activities) Design, code and test required to build and verify the software. design methodology is a systematic approach to create a design by application of a set techniques and guidelines. (ome desirable properties for a software system design are as follows) 6erifiability Completeness Consistency "fficiency Traceability SimplicityAEn'erstan'ability that is
There are three metho'ologies for 'esigning which are as follows: B$C Top F 'own:
The top L down approach starts from the highest*level component of the hierarchy and proceeds through to lower levels. It starts by identifying the major components of the system, decomposing them into lower level components and iterating until desired level of details is achieved.
This approach of designing the system might be best if the designer has detail idea about the whole Courier Management System project to be developed. In this methodology designer start with a front or top form, often called 8 I3 % >", for the project and work branching off from there. The advantage of the top*down approach is that form can be changed to affect the look and feel of the whole project because all forms are designed according to the top form look and feel.
B$$C ;ottom!up:
bottom*up approach starts from the lowest level of component hierarchy and proceeds through progressively higher levels to top levels components. This design approach starts with designing the most basic or primitive components and proceed to higher*level components that use this lower level components. This approach is adopted when the designer hasn't a good idea about the layout of final project, but know how specific forms look and work. It might be that working from these specific forms to the top forms is the way to proceed. This is particularly true if there are, already, e#isting forms as a result of development of some other project made by some one having the same concept. If there are no forms from which the designer has to start, then he can begin by designing leave forms that accomplish specific objectives and then linking them together through intermediate forms to the top forms. The advantage of this design is that the designer is not constrained by the style of top forms in the leaf form.
domain model created during analysis phase is transformed into the data structure. In the architectural design the relationship among major structural components of the Courier Management System %roject are defined. In the procedural design major structural components transformed into a procedural description of the software.
ANALYSIS
@)@ of the #roject
t 9ero and one level the border scenario of the whole portal is considered and at second level an instance of this project is shown. "ach break*up has been numbered as per the rule of 7+7. Here we attempted to incorporate all the details of the system.
8 .evel @)@:
This is the conte#t level 7+7 of the proposed system. The whole system has been depicted in the way so that the information flow continuity should not be lost in the ne#t level. The purposed system is shown as a whole process and the inputs and outputs are shown with incoming and outgoing arrow from the system.
8 .evel @)@
6egistration display
(taff $ogin
1ser id & pwd %rocess status search 2alculate distance &time %rocess query
&nline courier & cargo booking delivery status information & notification system
%rocess 2omplaint
$ogin 7isplay
%rocess action
2ustomer query
2ustomer 2omplaints
."6". 1 @%)%@
The 2ompany 7atabase 7ata upload !eb %anel 1pdating 1pdate &ffice 6eg. (taff $ogin 1ser id and pwd (tatus search Input :ooking Id %rocess (earch id 6oute 7ata %rocess 6oute 7istance & 7ate %rocess 7istance & time 7elay reasons 7elay 2ustomer query 1pdating 1pdate new query 6esponse update 1pdate reasons 7ata 6esponse Handler 6esponse 2ustomer 2omplaints 1pdating 1pdate new query 0uery 1pdate 6esponse handler 6esponse display %rocess user id & pwd 2heck &ffice status %rocess current office 2heck administor %rocess &ffice 6eg. <alid id msg. 2heck 2andidate !eb panel display
6eg. 7isplay
7elay
"!3 @iagram
dminNid
%assword
1serNid
%assword
dministrator
1ser
:ooke d
&ffice
2ontainer
2argo
3ame
ddress
7istance &fficeN bearer 7elivery Nstatus 7estinationNc ityNid 7etailesNofNcargo 7etailsNofNc ourier
2ityNid 2ontainerNat
)low @iagram
dmin
$oadingMunloading truck
&ffice 6eg. &ther 3etwork $ot 3etwork Transfer 6oute 7etail 6oute 8ap (tatus Information 2ity Truck 6oute Truck Truck 6oute D
(tate
(ourceM7estination
1% .O=$& M ST"3:
$ogin master is the specific module, which only has to deal with the updating of the database. Two types of user can login administrator and the employee. It checks for a valid candidate when the user enters his user id password and link to the correct page and link to the registration page. It is divided into following functions.
5%
Here in some pages 2(( is being used and for some common C($ will be used for the generation of fully formatted and fully validated web pages.
?%
BaC
BbC
BcC
@"."6"3"@ ST TES:
It checks the current status if the current status of the courier gives the destination address and after taking the received detail. It display whether the courier is on its way or delivered successfully.
H%
iiiiiiiv-
2ountry in which true courier & cargo service is &ther network collaboration for cargo &ther network collaboration for courier &ther network services country
available,only administrator-
BbC
ST T" "&T3G:
The state in which the courier service is available ,only administrator-
B'CO))$C" "&T3G:
&ffices, their address and other credentials ,only administrator-.
9%
BaC
COE3$"3 ST TES :
This specially deals with the updating at intermediate office about the truck number that passed through office.
I%
2argo booked, source office, destination office, container, truck detail, date dispatched etc regarding booking of new courier with a unique id. It includes the following sub modules*
BbC
BaC
BbC
finally deal with the any wrong entries being done by the user . it validates as well Is suggests for correct input. This module has the different sub modules depending upon the above modules find forms.
i% C 3=O E#@ T" 6 .$@ T$O& M ST"3 : 7eal with the validation regarding the updating of product. ii% 3"=$ST3 T$O& 6 .$@ T$O& M ST"3 : 7eals with the discrepancies in registration process etc. iii% COE3$"3 E#@ T" 6 .$@ T$O& M ST"3 : 7eals with the validation regarding the updating of courier and its status.
The booking id is first searched in to the cargo booked table. "ach booking id has unique number associated with the different offices and also with the cargo. &n the basis that booking id, matched with the container, and then with the truck, and after that true halted at which station. The status is shown.
BbC
BcC
@"."6"3"@ ST TES:
It checks the current status if the current status of the cargo gives the destination address and after taking the received detail. It displays whether the cargo is delivered successfully or not.
DATA STRUCTURE
The normali9ed form of the table with their structure is describe as under*
Table 1: .ogin
)iel' &ame 1serNid &fficeNid %assword @ata Type <archar Integer <archar @escription 1serid,unique&fficeid %assword 4ey Constraint %rimary key +oreign Key *
2ustomerNname ddress 2omplaintNagainst 2omplaintNregarding 2omplaintNdetail 7ate ctionNtaken :y gainst ctionNdetails 7ateNaction
<archar <archar <archar <archar <archar 7atetime <archar <archar <archar <archar 7atetime
* * * * * * * dministrator id &ffice id * *
PROCESS LOGIC
Online Courier J Cargo System #rocesses in the following manner:
This website contains information about user function such as :ooking the couriers and cargo, $oading the collection of lots in the selected truck or container ,in case of cargo-, $oading the container,s- in the truck ,in case of cargo- etc. as well as administrator function such as &ffice 6egistration, 2reating 1ser, <iewing suggestions and complaints of user, dding new 2ities, (tate and 2ountries, <iew the (tatus of 2ontainer and Truck etc. The project Online Courier J Cargo System delivery status and notification system is being developed for the need of company running simultaneously courier & cargo service this is specially meant for their frontline customer service information. This is one of the best efforts by us to prove that how Internet can be helpful in tire service industry.
REPORTS
Eser:
(tatus of 2ourier & 2argo. (tatus of $ot. (tatus of Trucks.
'ministrator:
(earch the status of 2ourier & 2argo. <iew complaints and suggestions of 1ser and &ffices.
SECURITY
#hysical Security
The 7ivisionalM2entral (ecurity of the system Their responsibilities shall include 8aintenance of security of 7atabase (ervers by keeping it locked and prohibiting entry of any unauthori9ed person to prevent thefts and other untoward incidents ccess to the database server shall be protected by password and only the (ystem dministrator shall be aware of the same. dministrator shall be responsible for the physical security
@atabase Security
S-. Server uthentication) In this case, (0$ (erver requires that a user specifies a name and password at the time when connection is attempted. The login name and one*way hash of the password need to match one of entries in the sys login table for the login attempt to be successful. (in'ows uthentication: !ith built in !indows authentication and per* application configuration, you can be assured that your applications are secure.
SCREENSHOTS
:ome #age
Create Container
Create Truc1
Create &etwor1
;oo1ing )orm
FUTURE SCOPE
It is highly likely that the scope will change as the web application moves forward the web process model should be incremental. This allows development team to free9e the scope for one increment so that an operation web application of the preceding increment but once the second increment commence, scope is again fro9en temporarily. This approach enables the web application team to work with having to accommodate continual stream of change be still recogni9ed. The continuous evolutions characteristics of most web application. :eside that the following basic quality in the software always safeguards the future scope of the software.
BIBLIOGRAPHY
!e referred some books which had provided us with much of guidance to develop the code for the website. There are a few good books and websites that we referred to develop (%, 2((, ;ava(cript and HT8$ codes. part from codes these books and websites had provides us with few good techniques and methodologies to develop the website. There are a list of few books and websites that we referred are) ;OO4S: 24 %rofessional :y (ro* #ublication (%.3et :y (ro* #ublication (0$ ("6<"6 DJJG $n Techme'ia/ 71 @ays