Professional Documents
Culture Documents
Service 5
Contents
Acknowledgement...........................................................................................................................4
Definitions....................................................................................................................................5
1. INTRODUCTION................................................................................................................7
1.4 Purpose..............................................................................................................................9
1.6 Methodology...................................................................................................................11
a. Data gathering.....................................................................................................................11
b. Approach.........................................................................................................................11
c. Testing Methodology......................................................................................................13
d. Implementation Methodology.........................................................................................13
1.8 List out Team members and their modules (part of works) on the project.........................15
v. Forming of DV lottery....................................................................................................18
3. Specific requirements.............................................................................................................22
4. System modeling................................................................................................................24
6.9 References...........................................................................................................................69
Abstract
Postal service system is one of the widely used communication media in the world.
Now a day’s technology is highly accelerating throughout the world. .Due to this reason
computerizing the postal service system has a lot of advantages.
This project is aimed to automate Ethiopian postal service system. The proposed system
will have the capabilities to store information about airmail transaction, update information,
search information, store information about material that stored in store room and store
contact information of renting post box.
Acknowledgement
First of all we would like to thanks our God (Allah) because helps us in every
success of our work. Next to this we would like to express deepest gratitude to our
advisor instructor Addisalem.A for her excellent advice and passionate guidance
throughout this project.
Moreover, we would like to forward our heart –felt appreciation to W/r Aselefech
Arega and Ato Yigeremu Safisa for their cooperation and giving of required
information about Dilla postal service system branch.
Finally we would also like to thanks our team members for our contribution and
shared ideas for the successful completion of the project.
Definitions
SIM card: - it is a prepaid card used in mobile phones.
Registered letter 1st advice form: - is a form used to distribute a single registered air mail.
Collective 1st advice form: - is a form used to distribute more than one received registered
airmail.
PIN code: - it is numeric code used to unlock the phone and/or complete a call or data
transmission.
PUK code: - is a code required to unlock SIM card that has disabled itself after an incorrect
PIN code was entered 3-5 times.
GPO: - General Post Office (in United Kingdom) or Government Printing Office (in United
States)
ID: - Identification
1. INTRODUCTION
Prior to the establishment of the postal service in Ethiopia on March 9, 1894 following
an imperial edict, correspondence was conducted through messengers known as ‘melektegnas
or postegnas’. These tough individuals travelled great distances, often on foot, overcoming
rough landscape and weathering hostile climate. They endured the pangs of hunger and thirst
and carried their letters over their heads, on cleft sticks (which later became the symbol of the
post office still today) until they reached their destination. Ethiopian Postal Service was
established nearly two decades after the birth of UPU. The second half of the 19th century in
Ethiopia was characterized by the establishment and consolidation of the empire state under
the protection of Emperor Menelik. Menelik found in the postal service, like the telephone
and the telegraph, a vital means of exchanging information, first for political and
administrative purposes and later on for public correspondence.
The construction of the Djibouti - Addis Ababa train made it possible for letters,
parcels and merchandise, which were previously transported on camel back. This was a
crucial factor that greatly improved the pace and efficiency of the postal service while it laid
the basis for the international exchange of mail. Then Ethiopia became a member of the
Universal Postal Union in 1908.
Ethiopia has at present 1139 post offices. Out of this 746 Permanent post offices,130
Departmental sub-post offices, 261 Sub-post offices and 2 Visiting postmen in rural areas
In the result of opportunities and challenges, Ethiopian postal service establishes EMS
(express mail service) in 1989. The introduction of EMS has made the Ethiopian Postal
Service competitive in the express delivery market. Today Ethiopian postal service is under
the implementation of business process reengineering (BPR), which had been study for 18
months. Due to this the structure become process and customer oriented. The managers and
the employees are doing their best to accomplish the needs of their customers.
Moreover, the following are problems that are present in the current system of postal
service system in general. Because of this reason the organization faced to many problems.
The problems are
Work load of the Employers is very high means takes much time to perform simple
tasks,
Takes time to retrieve data,
Wastage of resources,
Loss of data and poor organized and unsecured data. This also leads to Security
problem not protect the data from an unauthorized person and doesn’t keep the
organizations’ safety.
Date or time limitation problem in which the system doesn’t keep track of sending
and receiving different materials deliver in the customers’ expected time and date.
Example, postponing the expected time or date.
N.B: The problems that raised in the above limit the organization not to give reliable and fast
service to its customers.
So our project also has a great goal for customers throughout the world. It is mainly
focuses on how can customers send and receive their materials through postal system
throughout the world and they can easily check their materials online in the tracking system.
1.4 Purpose
Since our project is the Ethiopian Postal service and it is the most crucial service for the
people, it has a basic purpose that communicating the customers throughout the world giving
service by considering the following things.
b. Limitation
There are many factors that limited us to minimize our scope, such as time limitation,
resource, place, and complexity of the system. In general our proposed system is limited to
perform the following tasks because of the above mentioned factors.
Paying pension
Forming DV lottery
Selling SIM cards, CDMA/WCDMA, mobile cards
Western Union services
1.6 Methodology
a. Data gathering
To gather the requirement of the system we use different types of fact finding methods
those are:-
i. Interview
To know how the postal service system is work, we prepared questions concerning on
postal service and interviewed the counter and manager of dilla town post office. The
counter is person who performs managing the all transactions inside the post office, as well
as the manager is a person who controls and manages the overall system. He also called
postmaster. So from the manager we gained the overall description of the system, and from
the counter we gained how the postal service transactions are going on.
ii. Observation
By observing the current working environment of dilla post office, we collect data which
necessary for automating of Dilla postal service system. In our observation we have tried to
observe things mentioned below
b. Approach
We have selected an Object Oriented Approach. Because of Object-oriented
Approach takes pride in its suitability for sustaining huge software and web
development projects. This is a far better option than using structured Approach when
you have massive code bases. The nature of object-oriented programs allows the
developer to save a lot of time and energy when developing programs as the
components of the programs are in the form of objects which can be plugged into the
program wherever they are needed. And it minimizes the risk throughout the project
and we are interested to apply this approach to do so.
Reduced maintenance
code reusability
real-world modeling
High Code Reusability: When a new object is created, it will automatically inherit the
data attributes and characteristics of the class from which it was produce. The new object
will also inherit the data and behaviors from all super classes in which it participates.
When a user creates a new type of a stand-alone application, the new object behaves
“stand-alone application ", while having new behaviors which are defined to the system.
Analysis: - requirement engineering like use case model object model etc.
Design: - physical data base design like physical data base design, design
elements, design system architectures, design component.
c. Testing Methodology
Testing methodologies are approaches to testing, from unit testing through system testing
and beyond. There is no formally recognized body of testing methodologies, and very rarely
will you ever find a unified set of definitions. But here are some common methodologies:
Dilla University ----Department of Computer Science Page 12
Online Automated Ethiopian Postal 201
Service 5
Unit testing: The act of testing software at the most basic (object) level. Generally performed
by developers, run in "friend classes" with code-level access to read and manipulate objects.
Acceptance testing: Also known as acceptance tests, build verification tests, basic
verification tests, these are rudimentary tests which prove whether or not a given build is
worth deeper testing. The term "smoke test" is a colloquial term -- when machines are built,
engineers will power them up and just let them run, looking for smoke as a sign of serious
problems.
Functional testing: Functional testing takes a user story or a product feature and tests all of
the functionality contained within that feature. For example, in a photo application like
Photoshop, functional testing would cover all the functionality contained within a feature like
opening files (resolving file paths, determining appropriate format filters, passing the file path
off to the filter) as well as handling errors within that functionality.
System testing: Testing the project as a collective system. System testing generally combines
multiple features into an end-to-end process or scenario.
d. Implementation Methodology
Implementation is a realization of a technical specification or algorithm as a program,
software component through programming. there are different types of tools available to
implement the system from those tools we select php to develop front end of the system,
Wamp2.5 server to develop back end of the system ,UML editor to sketch different UML
diagrams and Microsoft word 2010 to prepare the documentation part of the project .
e. Development Methodology
Waterfall Methodology: All projects can be managed better when segmented into a
hierarchy of chunks such as phases, stages, activities, tasks and steps.
The tools that we are going to use throughout our project are listed in the following table
as grouped into hardware tools & software tools.
Tools
Hardware Software
Processor: Intel(R) core(TM).i3- Microsoft 2010 :to write the entire documents
2120cpu@3.30GHZ Power point 2010 :for presentation for both
Flash Disk : at minimum 8GB phase1 and phase 2
RAM : to the maximum of 1.90GB Wamp server 2.5 :To run the site on the tool
Hard Disk: to the maximum of bar
464.6GB npp.6.5.5.Installer : To edit the entire
CD-R : to the maximum of 700MB implementation code
Sql database server: To store data
Visual paradigm for UML 10.2 : to draw
UML diagrams
It also viewed as how to create a system as problem solver to the customers and employers of
the organizations.
To minimize resources
To minimize the time consumption and work load for both the organization
and customers
To minimize the data storage space
To encourage data security
To design central and well-structured database management system
To eliminate redundancy of data
To make online with web based application through an internet connection.
To keep truck mails.
Communicating branch organizations each other internationally.
a. Sending airmail
On the process of sending airmail if a customer want to send an airmail, first she/he contact
the counter, then he/she must select the types of airmail, the counter receives the airmail to
check whether the address of both sender and receiver are valid or not .Second, the counter
measures the weight of the airmail, attach postage stamp and record the information available
on airmail (date of sending, registration no, sender address, receiver address, weight, barcode
b. Receiving airmail
Every day the messenger/postman brings the packed airmails from the bus station and gives
to the counter. The counter registers all received airmails. Then, if the airmail is ordinary or
first order airmail the counter distribute it to the post box of a customer .But type of airmail is
either registered or parcel, the counter distribute registered letter 1st advice form (if the
customer received a single airmail) or collective 1st advice form (if the customer has more
than one received letter).
For EMS the messenger/postman directly contact the customer and gives the airmail.
v. Forming of DV lottery
The customers who want to apply DV lottery of a year through postal system fill the
form by fulfilling all requirements. The counter collects and registers all DV lottery forms.
F Use more human power: - since the system is not some more computerized it
use more human power to give service.
working overtime
Loyal able to the customers.
Punctual to the society.
Honesty to the users
Responsible and transparent for their actions.
The Online Ethiopian Postal Service automates each and every activity of the current
manual system and increases its throughput. It will try to eliminate the drawbacks of the
existing system by improving:
Time accuracy
By reducing system complexity
Improving security issue
Improving efficiency
By designing new model
Make transaction very easy and fast
Simplifying manipulation of data.
User requirement users can be access the system as they want and can access all
expected requirements also can manage their account easily through the system.
a. Constraints
There are many constraints that we would face to do this project. Those are:-
It is very far from DU to Addis Ababa. Due to this reason we will not go to Addis Ababa for
observation instead we make observation on Dilla postal service office.
II. Financial
Because we are dependent on our family, we in face lack of money to pay for taxi
services and other different material used to do this project well.
III. Laboratory
We could not get enough laboratories and internet access as we need i.e. there is no fixed
laboratory and internet access because of power off and connection interruption
b. Assumptions
After we have finished our project, the installed database should be duplicated for all
Ethiopian Postal Service branches and throughout the world.
3. Specific requirements
4. System modeling
The system model of Ethiopian postal service system is composed of the functional model
represented by Use cases, the dynamic model represented by the sequence diagram and object
model represented by class diagram.
Use cases
Login
Register user
Renting post box
Register material
Counter: is a person who register, update and delete sent and received airmails and rent post
box information.
Postman: is a person who sends and receives airmails as well as materials to and from
customers respectively. Also who can register, update, search and delete materials in the
system.
Table1. The scenario or use case description of the Login use case
UC Name Login
Table2. The scenario or use case description of the user registration use case
message
6. The system saves the registered user account of the
Users.
7. Use case ends.
Post condition The account of the users registered (created).
Alternative course A1: Wrong data Entry Message
of action 1.The system displays “Wrong data Entry!” message.
2.The system resumes at step 3.
A2: Missing of Required Information Message
1.The system displays “Fill all information!”
massage.
2.The system resumes at step 3.
Table3. The scenario or use case description of the rent post box use case
Table4. The scenario or use case description of the material registration use case.
[A1:A2]
4. The system displays “material information
recorded” message
5. Use case ends
Post condition Material information is registered.
Alternative course A1: Wrong data Entry Message
of action 1. The system displays “Wrong data Entry!”
message.
2. The system resumes at step 2.
A2: Missing of Required Information Message
3.The system displays “Fill all information!”
Dilla University ----Department of Computer Science Page 33
Online Automated Ethiopian Postal 201
Service 5
massage.
3. The system resumes at step 2.
Table5. The scenario or use case description of the sent airmails registration use case.
Table6. The scenario or use case description of the received airmails registration use
case.
C
-
0
6
Table7. The scenario or use case description of the search user use case.
Table8. The scenario or use case description of the update user use case
Table9. The scenario or use case description of the delete user use case
Table10. The scenario or use case description of the Search airmail use case
U registration number[A1].
Table11. The scenario or use case description of the update airmail use case
U registration number.
Table12. The scenario or use case description of the delete airmail use case
U number.
Table13. The scenario or use case description of the search materials use case
Table14. The scenario or use case description of the update materials use case
Table15. The scenario or use case description of the delete materials use case
U
C Flow of event 1. The store keeper enters registration number.
2. The store keeper click “Search” button.
-
3. The system checks and validates the registration
1
number.
5 4. The system displays the searched information.
5. The store keeper click “clear” button.
6. The store keeper enters post box number.
7. The store keeper click “Delete” button.
8. The system displays “Data is deleted” message.
9. Use case ends.
Post condition Postman will have deleted the material.
Alternative A1: Warning!
course of action 1. System displays “Are you sure to delete this
data?”
2. User click either “yes” button or “no”
button.
3. Use case resume at step 3.
A2: Invalid registration number
1. System displays” please the correct
registration number!”
2. Use case resume at step 3
Table16. The scenario or use case description of the search post box use case
Table17. The scenario or use case description of the updated post box use case
UC Description Allow counter to update or change post box data from the
database.
Actor Counter
Precondition The Counter should have logged in to the system.
Flow of event 1. The counter selects the “update” button.
2. The system requests the user to enter correct
registration number.
3. The system checks post box number. [A1]
4. The system display and view the searched
information.
UC-17
Table18. The scenario or use case description of the delete post box use case
UC Description Allow counter to delete or remove post box data from the database.
Actor Counter
Precondition The Counter should have logged in to the system.
Flow of event 1. The counter enters post box number.
2. The administrator click “Search” button.
3. The system checks and validates the post box number.
4. The system displays the searched information.
5. The counter click “clear” button.
6. The counter enters post box number.
UC-18
Table19. The scenario or use case description of the Check_Track use case
UC Name Check_Track
5. The system displays access page for the respective user and
shows information.
6. Use case ends.
Post condition The user entered to the system and can check the material
where it reaches through tracking the system.
Alternative course A1: Information Not Filled Message
of action 3. The system displays “Please enter your user name and
password!” message.
4. The system resumes at step 3.
A2: Invalid Entry Message
3. The system displays “Incorrect User Name or Password!”
massage.
4. The system resumes at step 3.
UC Name Create_account
UC Description Enables all customers to create their account and then they can have
full information about their materials and airmails through tracking
with which where it reach. Generally, they will be a user member of
post office of Ethiopia.
Actor Customers
Precondition The users shouldn’t have an account before.
Flow of event 1. The user activates the system page.
2. The system displays the main window.
3. Then displays Create_account page
4. The system displays Create_account interface for the respective
user.
UC-19
5. Then the user fulfills the entire provided space and click “Signup
“button.
6. The system checks and validates the entered information. [A1:A2].
7. The system displays “you have successfully created your account”.
8. Use case ends.
Post condition The customers successfully create their account.
Alternative course A1: Information Not Filled Message
of action 5. The system displays “Please fulfill the entire information!”
message.
6. The system resumes at step 5.
A2: Invalid Entry Message
The system displays “Incorrect data entry!” massage.
6. The system resumes at step 5.
Fig.11 Sequence diagram for searching material information from the database
Fig.12 Sequence diagram for searching airmail information from the data base
Fig.13 Sequence diagram for searching post box information from the data base
Fig.14 Sequence diagram for updating post box information to the database
Fig.15 Sequence diagram for deleting post box from the database
Administrator
Invalid Valid
Select Action
update user
Manage system
Manage users
Register user
Control airmails
Delete user
Search user
Counter
Login/system login
Check UN and PW
Invalid Valid
Select Action
update airmails
Manage post box
Rent post box
Register Airmails
Control airmails
Delete airmails
Search airmails
Postman
Login/system login
Check UN and PW
Invalid Valid
Select Action
Update material
Register materials
Delete materials
Search material
Customers
Login/system login
Check UN and PW
Invalid Valid
Select Action
Create account
Check track
6.9 References
We are referring to do our project, the bellow material that guides us to perform our tasks
well.