You are on page 1of 57

Courier Management System

SYNOPSIS

Introduction:
The Courier Management Systemsoftware package is basically designed to make the work of CourierManagementdepartmentvery.

Problem Definition:
The Organization was holding the system where the records in the database were not completely secure. In the current system, where whole records were handled by various employees and the data were stored in registers and excel sheets. This results in data redundancy . The general requirements of this project are as follows: 1. Reliable 2. Error free 3. User friendly 4. Secure 5. Low maintenance

Solution of the problem:


Considering all these aspects we have tried to develop a system that will help the Courier department a much better way to approach at there work ,save lots of valuable time and benefit a lot from this system. The proposed system is so designed that it can be used by multiple users at a time with different access right granted to them by the administrator. The software completely eliminates the threat of information leakage, saves a lot of time and also successfully estimates the working hours of the employees. You dont have to do different posting for the same in generating reports. Using this systemyou can provide security to your database, save your valuable time, and also estimate the hours worked.

Process Involved: The proposed system as the following modules:1. Login 2. Administrator
3.

Customer Information Consignment Details Delivery Boy Details Reports

4.

5.

6.

Objective of the Project


1. To provide security to the records in the database 2. To estimate the working hours of the employee 3. To generate the multiple reports form the information provided as per requirement.

Hardware and software used: Hardware:


Processor Ram Utility : : : Intel Pentium D 1GB Printer

Software:
Operating System Front end Back end : : : Microsoft WindowsXP2

Microsoft visual studio 2005 Microsoft sql server 2005

Index:
TOPIC 1. Objective and Scope of the Project 2. Theoretical Background 3. Definition of Problem 4. System Analysis and Design 5. Detailed Lifecycle of the Project i. Tree Diagram, FDD, ERD, CLD, DFD ii. iii. iv. Event Table Table Structure Input and Output Screen Design PAGE NO 10-11

OBJECTIVE AND SCOPE OF PROJECT

Object and Scope


The software aims at making the work of the entire staff of the Courier Department very easy, to save their time.To maintain their documents, to maintain their tasks performed in timely manner. The system saves your time and gives out the accurate documentation. To generate various reports for their documentation. The proposed system has been designed in such a way that can be operated by various kinds of users. The working of software is very easy to understand it is very graphical and it is user friendly.

THEORITICAL BACKGROUND

10

THEORITICAL BACKGROUND

The system prevailing in the organization was manually based The work was done using Excel Sheets. The Excel Sheets was used to maintain customersand Delivery Boys monthlyrecords and different individuals were working on the same data to produce various.

11

DEFINITION OF PROBLEM

12

Definition of Problem:
The organization presently holds a manual system, which is unable to cope with the monthly and yearly transaction of the organization; hence with the implementation of this system, the management becomes very efficient.

Time consuming :Since the work was carried and maintained on the excel sheets it was very time consuming whenever one wanted to retrieve data or wanted to go through the earlier transactions. This made the process tedious.

Complex Infrastructure: Since the work was carried on excel sheets it was very difficult to carry the transactions.

Person engaged: - Since the system was manually handled a person is continuously engaged in entering the data and updating its data.

13

SYSTEM ANALYSIS AND DESIGN

14

SYSTEM ANALYSIS:
In system analysis we have found number of fact finding techniques about the system, which is under study. These facts helped us to understand what the existing system is, the flow of the existing system and what the problems are in the existing system. I. Fact finding by observation By observing the activities of the Courier Department. The system flow of the departments is examined. All the details of the department process are given to the administrator. This report has to be maintained properly. Fact finding by document analysis. This method involves the collecting of desired documents. These documents were analyzed. This method was use to calculate the actual data element required in the system.

II.

15

DETAILED LIFECYCLE OF PROJECT

16

Functional Decomposition Diagram:

Courier Management System

Login

Customer

Consignment

Reports

Add User Delete User

Regular

Consignment

General Customers Consignment Regular Customers Consignment Regular Customers Undeliverd consignment Regular Customer General Customer

Information ` Change Password View General

Consignment Information Regular Customer General Customer

17

Context Level Diagram:

Customer

Regular Customers Info General Customer Info

Consignment Details

Consignment

Regular Customers View General Customer View

Courier Regular Customers Info Management System General Customer Info

Delivery Boy Details

Delivery Boy Report

Delivery Boy

18

Data Flow Diagram:

Add User Admin

Login

Delete User Change Password

19

Admin

Admin

Login

20

Add User Admin Delete User Change Password Admin

21

Regular Customers Info Admin Regular Customers View customers

22

General Customers Info Admin General Customers View


gcustomer

23

Consignment Consignment General Customers View Consignment Regular Customers View

Admin

Consignment

24

Admin

Delivery Doy

dbdetails

25

Entity Relationship Diagram

Admin

Manages

Manages

Manages

Consignment Details

Customers Information

Delivery Boy Details

Manages

26

SCREENSHOTS

27

MDICourier:

28

frmLogin:

29

frmRegCustIno:

30

frmRegCustView:

31

Frmgencustview:

32

frmGencustinfo:

33

frmConsignment:

34

frmDelboy:

35

Frmgencustconsignrpt:

36

Table structure:
Table name: Admin
Table name Fields Name Type Description

admin

Username

varchar(30)

Describes Admin name

Password

varchar(8)

Gives password

Table name: dbdetails


Table Fields Name Type Description

dbdetails

Delid

varchar(40)

Delivery Boys ID

Delname

varchar(20)

Delivery Boys name

City

varchar(20)

City

Address

varchar(30)

Address

Mobileno

varchar(50)

Mobile Number

Table name: enquiry


Table name Field name Type Description

enquiry

Cityname

nvarchar(50)

City Name

approximatecharges

nvarchar(50)

Approximate charges

branches

nvarchar(50)

Branch Name.

37

Table name: gcustomer


Table name Field name Type Description

gcustomer

Id

varchar(50)

Customer ID

Name

Varchar(50)

Customer Name

Address

Varchar(50)

Customer Address

Tel

Varchar(50)

Telephome Number

mob

Varchar(50)

Mobile Number

date

smalldatetime

Date

month

Varchar(50)

Month

consignment

Varchar(50)

Consignment

weight

Varchar(50)

Weight

destination

Varchar(50)

Destination

city

Varchar(50)

City

amount

Varchar(50)

Amount

status

Varchar(255)

Status

38

Table name: rconsignment


Table name Field name Type Description

rconsignment

Custid

Varchar(300)

Customer ID

accno

nvarchar(50)

Account Number

cname

nvarchar(50)

Customer Name

destination

nvarchar(50)

Destination

city

nvarchar(50)

City

date

Datetime

Daet

month

nvarchar(50)

Month

consignment

nvarchar(50)

Consignment

weight

nvarchar(50)

Weight

amount

nvarchar(50)

Amount

status

nvarchar(50)

Styatus

39

Tablename:rcustomer
Table name Field name Type Description

rcustomer

accno name address tel mob

nvarchar(50) nvarchar(50) nvarchar(50) nvarchar(50) nvarchar(50)

Accoumt Number Name Address Telephone Mobile Number

40

CODE

41

Feasibility Study

42

Feasibility Study For System Implementation


Before the system was designed the feasibility study is carried out.

1. Operational Feasibility:
The Admin was finding it difficult to keep track of the performance of the HR department with the manual system, and insurance department were not comfortable with their manual system and data redundancy .As the new system will decrease workload, strain, work time, redundancy of data, and proper view of each user efficiency by each process. The user of two departments has welcomed new system and is ready to switch over with new implementation. The management is willing to switch over because of individual. Moreover, the will receive timely and accurate reports which indeed helpful for the company. So the system is operational feasible.

2. Technical Feasibility:
Technical feasibility center around the existing computer system and what extent it can support the proposed additions. This involves no financial considerations to accommodate enhancement. Since, the entire required technical platform available, organization were technical sound to execute the project.

3. Economically feasibility:
The system is economically feasible due to the following reasons. The user is already having the required hardware and software, so major cost will be in terms of development of the new system.

43

System Implementation Hardware And Software Used

44

Fourth Generation Techniques


Fourth Generation Technique means the use of software tool to define or specify among some of the characteristics of the software of the higher level. The tool to define or generates source code as to the developer specifications. Software development environment that supports 4GT includes the following tool: Procedural language for database query. Report Generation. Data manipulation. Code Generation. High-level graphic ability. Spread sheet capability.

These tools are used for specific application domain and it cannot be applied to all types of software.

4GT passes through following phases: Requirement Gathering. Design strategy Implementation Testing

45

Advantages:
Dramatic reduction in software development time. Improves productivity of software developers. Coding is reduced or eliminated. More satisfied users. Higher quality software with less error. Improves communication between different users. 4GT can be used for small and medium sized projects. Reduced Testing time. Improved organizational effectiveness.

46

Fourth Generation Techniques

Requirement Gathering System Design Implementation Using 4Gt Testing Final Product

47

Requirement Gathering:
At this stage, the documents involved for the system development were collected. Requirement gathering includes detail study of inadequacies in the legacy systems and it involves the determination of things that are required to overcome the adequacies.

System Design:
During the phase, we identify data dictionaries to visualize database structure or database design. Process involved in the legacy system or the current systems are identified. These are the process, which manipulates the data, and the F.D.D. (Functional Decomposition Diagram) is drawn. And after determining the process involved, the D.F.D. (Data Flow Diagram) is prepared. By considering data dictionary list of processes and data flow entities involved, of the process and flow entities involved are short-listed and E.R.D. (Entity Relationship Diagram) is prepared.

Implement Using 4GT:


Implement stage involves preparing the source code to carry out processes that manipulates the data. The source code is prepared by keeping in mind the list of possible errors. Source code deploys the mechanism to avoid these types of errors.

Testing:
For testing purpose we have used Whit-box method-a widely used technique in which paths of the logic are tested to determine how well they produce predictable results. With this commonly used testing technique, we have examined the internal structure of the object.

Final Product:
After applying 4GT techniques successfully and effectively, we get robust application software, which satisfies the objectives, which are determined at designing phase i.e. it takes proper input &produce desired output.

48

Hardware and software used:


Hardware:
Processor Ram Utility : : : Intel Pentium D 1GB Printer

Software:
Operating System Front end Back end : : : Windows Vista Home Premium Microsoft visual studio 2008

Microsoft sql server 2005

49

System Maintenance & Evaluation

50

System Maintenance & Evaluation


Authentication: User Management: In this mode user add user profile i.e. Username &Password as well as User mode (Administrator \ Normal). Administrator user has only access to master database. Normal User can do other transaction except master maintenance. User can change password also so as to secure its profile.

Log off:
By using this user can logoff from the application and can log on as a different user.

51

TESTING METHODOLOGY

52

Testing Methodology
For testing purpose we have used White box method a widely used technique in which path of logic are tested to determine how well they produce predictable results. With this commonly used tested technique, we have examined the internal structure of the object. With the help of White box testing we have tested the source code without taking into account the external description for that source code. Because of the use of this testing method we came to know about the unintentional items such as infinite loops, paths through the code which should be allowed but which cannot be executed and dead(unreachable) code.

The key points that we have considered in White box technique are as follows
Path Testing: In this we have tested every possible path in the code i.e. all conditions to assure that every line of code is working properly. Condition Testing: In this we have tested for errors in condition (Boolean, Arithmetic / Relational errors). Data Flow Testing: In this we have tested paths according to location of definitions and their users. Loop Testing: In this we have checked the validity of the loop constructs. Data validationTesting: Here we have implemented the code that validates the input data before storing it in that database. This prevents duplication of data.

53

Reports

54

Annexure

55

Organization Profile
The World of Willis We are one of the world's No.3 risk management and insurance intermediaries. We're in the business of identifying, analyzing and managing risk. We deliver professional risk transfer, risk management, loss management and actuarial services to companies, as well as financial and employee benefits consulting. What makes us different is our entrepreneurial approach and commitment to the delivery of customized solutions. We concentrate on what we do best - broking, risk management and consulting. We provide clients with excellent local service, while enabling them to access our extensive network of global resources. We constantly strive to improve our offerings - from state-ofthe-art product solutions to excellent claims processing.

56

BIBLOGRAPHY
Visual Basic .Net Programming [Black book] Steven Holzner

Programming in Visual Basic 6.0 Julia Bradley Anta Millspaugh The Complete Reference SQL James R. Groff & Paul N. Weinberg

Web sites:
www.CodeGuru.com www.planetsource.com www.MSDN.com www.microsoft.com

57

You might also like