Вы находитесь на странице: 1из 62

Our grateful thanks go to our Dept.

, which provides us an opportunity as a project subject in 6th Semester to develop a report work skill in this System analyzing. e would like to thank our parents ! friends for giving us full feedback when we are in trouble. Our special thanks go to "s. #injal $adav to give their e%pert guidance to us whenever necessary. &ast but not the least' ( heartily thank our ).O.D. "r. "ahesh *anchal.

*+,-./,
/ase study 0Software ,ngineering1 is a long establishment method of organizing, learning, so as to encourage coordination of Subject areas, it aims at closer integration of theory and practical give fundamental basic for student learning and produce, more practical techni2ues. *roject method in common with other students centered techni2ue help to develop market survey, planning decision making on for e%ample and identifying the critical integrated industrial process for producing e2uipment, a component or a model of process.

345/,567 345/,568

/omputer ,ngineering

.9S:+./:
:his report attempts to understand the design of an .utomated :eller "achine 0.:"1 system, a device used by bank customers to process account transactions. :ypically, a user inserts into the .:" a special plastic card that is encoded with information on a magnetic strip. :he strip contains an identification code that is transmitted to the bank;s central computer by modem. :o prevent unauthorized transactions, a personal identification number 0*(<1 must also be entered by the user using a keypad. :he computer then permits the .:" to complete the transaction' most machines can dispense cash, accept deposits, transfer funds, and provide information on account balances. 9anks
345/,567 345/,568

/omputer ,ngineering

have formed cooperative, nationwide networks so that a customer of one bank can use an .:" of another for cash access. Some .:"s will also accept credit cards for cash advances. :he first .:" was installed in 6=6= by /hemical 9ank at its branch in +ockville /entre, <ew >ork. . customer using a coded card was dispensed a package containing a set sum of money.

*roject *rofile
*roject :itle -ront ,nd :ool 9ack ,nd :ool *roject *latform *roject Cuide Developed 9y Submitted :o ? .:" Sytem ? "icrosoft @isual Studio 7334 ? "icrosoft SA& Server 733B ? .S*.<,: ?"s. #injal #. $adav ?"r. #amlesh #orat0345/,5681 "r. /hirag #orat0345/,5671 ? Department of /omputer ,ngineering, #alol (nstitute Of :echnology 345/,567 345/,568

/omputer ,ngineering

D,:.(& O- /).*:,+S
6.3 (ntroduction
6.6 *roject Summary 6.7 *urpose 6.8 Scope

7.3 *roject "anagement


7.6 *roject *lanning and scheduling 7.6.6 *roject Development .pproach 7.6.7 *roject *lan 7.6.8 Schedule +epresentation 7.7 +isk "anagement 7.7.6 +isk (dentification 7.7.7 +isk .nalysis 7.7.8 +isk *lanning 7.8 ,stimation 7.8.6 ,ffort ,stimation

8.3 System +e2uirements Study


8.6 Eser /haracteristics 8.7 )ardware and Software +e2uirements 8.8 /onstraints 345/,567 345/,568 B /omputer ,ngineering

D.3 System .nalysis


D.6 Study of /urrent System D.7 *roblem and eaknesses of /urrent System D.8 +e2uirements of <ew System D.D -easibility Study D.B +e2uirements @alidation D.6 -unctions Of System D.6.6 Ese /ases, event trace or scenario D.F Data "odeling D.F.6 -low chart or activity design D.F.7 /lass DiagramG ,5+ diagrams D.F.8 System .ctivity or Object interaction Diagram D.F.D Data Dictionary D.4 -unctional and 9ehavioral "odeling D.4.6 /onte%t Diagram D.4.7 Data -low Diagram 03 and 6 level1 D.4.8 *rocess Specification and Decision :able D.4.D /ontrol flow diagram B.6 :esting *lan B.7 :esting Strategy B.8 :esting "ethods B.D :est /ases

B.3 :esting

6.3 &imitation and -uture ,nhancement F.3 /onclusion and Discussion

345/,567 345/,568

/omputer ,ngineering

6.3 (ntroduction

6.6 *roject Summary

.n automated teller machine 0.:"1 or automatic banking machine 0.9"1 is a computerised telecommunications device that provides the clients of a financial institution with access to financial transactions in a public space without the need for a cashier, human clerk or bank teller. On most modern .:"s, the customer is identified by inserting a plastic .:" card with a magnetic stripe or a plastic smart card with a chip, that contains a uni2ue card number and some security information such as an e%piration date or /@@/ 0/@@1. .uthentication is provided by the customer entering a personal identification number 0*(<1. 345/,567 345/,568

/omputer ,ngineering

6.7 *urpose

Esing an .:", customers can access their bank accounts in order to make cash withdrawals 0or credit card cash advances1 and check their account balances as well as purchase cellphone prepaid credit. (f the currency being withdrawn from the .:" is different from that which the bank account is denominated in 0eg? ithdrawing $apanese >en from a bank account containing ES Dollars1, the money will be converted at a wholesale e%change rate. :hus, .:"s often provide the best possible e%change rate for foreign travelers and are heavily used for this purpose as well. .:"s are known by various other names including .utomated :ransaction "achine, automated banking machine, cashpoint 0in 9ritain1,money machine, bank machine, cash machine, hole5in5the5wall, 9ancomat 0in various countries in ,urope and +ussia1, "ultibanco 0after a registered trade mark, in *ortugal1, and .ny :ime "oney 0in (ndia1

6.8 Scope

:he main purpose of the .:" division and information service is to provide the customers financial fle%ibility, worldwide acceptance and round5the clock convenience. 9ank issues only @(S. /redit /ards, the renowned /redit /ard brand. /ardholders can purchase goodsGservices up to the credit limit and can reuse the credit facility upon repayment. /redit /ard is a safer substitute to cash and is the major mode of payment worldwide. Standard /hartered 9ank is the first to introduce the :.#. /+,D(: /.+D. :he card is issued basically to a personHs name and the specific person can use the card in anywhere in 9angladesh. :he business activity of *remier 9ank /redit /ard section is to

345/,567 345/,568

/omputer ,ngineering

keep the records of all sales and customersH re2uests, the information of cardholders and reports them to necessary documents.

7.3 *roject management


(n this chapter we will discuss about project planning and scheduling. Our goal is to establish a pragmatic strategy for controlling, tracking, and monitoring a comple% technical project. (n project management following things must be done. *roject *lanning and Scheduling +isk "anagement ,stimation (n *roject planning and scheduling, *lanning of the project is done. (n scheduling different task are schedule according to the deadline of the project.

7.6*roject *lanning and scheduling


*roject planning must deals with the following things. *roject /omple%ity? 5 *roject comple%ity has a strong effect but is heavily influenced by past practitioner e%perience. *roject Size? 5 .s size increases the interdependency of elements also grow. for scope creep. :he degree of structural uncertainty? 5 the degree to which re2uirements are solidified and the ease of functional decomposition.:he purpose of project planning is to ensure that the end result is completed on time, within budget, and e%hibits 2ualityI atch out

345/,567 345/,568

/omputer ,ngineering

7.6.6*roject development approach

:he Spiral model is an evolutionary software process model that couples the iterative nature of prototyping with the controlled and systematic aspects of the linear se2uential model. (t provides the potential for rapid development of incremental versions of the software. Esing the spiral model, software is developed in series of incremental release. . spiral model is divided into a number of framework activities, also called task regions. :here are between three and si% task regions. -igure depicts a spiral model that contains si% task regions? /ustomer communication 345/,567 345/,568 5 tasks re2uired to establish effective

communication between developer and customer. 63 /omputer ,ngineering

*lanning 5 tasks re2uired to define resources, timelines, and other project related information. +isk analysis 5 tasks re2uired to assess both technical and management risks. ,ngineering 5 tasks re2uired to build one or more representations of the application. /onstruction and release 5 tasks re2uired to construct, test, install, and provide user support. /ustomer evolution 5 tasks re2uired to obtain customer feedback based on evolution of the software representations created during the engineering stage and implemented during the installation stage. ,ach of the regions is populated by a set of work tasks, called a task set, that are adapted to the characteristics of the project to be undertaken. -or small projects, the number of work tasks and their formality is low. -or larger, more critical projects, each task region contains more work tasks that are defined to achieve a higher level of formality. (n our case, we have to provide medium level of formality for making a good project report. e will take decision about cost, schedule and number of iterations re2uired to complete the software. 7.6.7*roject *lan Stages of Software &ifecycle Software +e2uirement .nalysis :his is the first stage of the project, which involves interaction with the customer to understand hisGher needs, re2uirements, information, re2uired functions, performance and interfacing in "&" software. -or this purpose re2uirement analyst will arrange a meeting for gathering information and additional details for software development. .fter completing re2uirement 345/,567 345/,568

66

/omputer ,ngineering

gathering tasks developer team will take a look for understand how re2uirements can be computerized. :he re2uirement is documented in the form of a Software +e2uirement Specification 0S+S1 which is then presented to the customer for review. Design 9eginning once software re2uirements have been analyzed and specified, software design is the first of three technical activities 5 design, code generation, and test 5 that are re2uired to build and verify the software. Design is multi level process which defines following details? Data Design .rchitecture Design (nterface Design /omponent level Design

Development :he design must be translated into a machine5readable form. :he coding step performs this task. (n this stage, the developers will actually code the programs. :he specifications arrived at the design stage for each and every function will be converted to code using tools that are finalized for the implementation of the Software. .t this stage the testing methodology to be adopted will be finalized. -or each program test cases will be prepared and for each of these test cases, test data will also be prepared. :he actual developers will do a first cur checking at this stage to see that the programs written by them are error free. :esting 345/,567 345/,568

67

/omputer ,ngineering

(n this stages the test group of the development team, using the cases and the test data already prepared will test the programs. Only after all the functions are tested singularly, an integrated testing will be performed to see that inter5function dependability is satisfied. Separate test cases and test data will be worked out for the integrated testing. .cceptance :est :his round of testing will be performed by the test group formed by the users of "&" software. :his test group has to insure that the developed software is working as per their re2uirements. (f some problems are found then it should be immediately communicated Development group so that the problem can be looked into and hence rectified. Data /reation -or software, data is most important part. Data is information which is handled by software. So before coding software, all master table data will have to be created. (mplementation <ow the implementation of software is to be done by programmers. .ll the re2uirements and information gathered by the analyst is now take actual image in form of software. .fter making software it is uploaded in to the system so users, for whom software is developed, can use the software. Once we e%amine that the project is feasible, we undertake project planning. :he table below describes how we planned our project.

7.6.8Schedule +epresentation

345/,567 345/,568

68

/omputer ,ngineering

J
6 7 8 D B 6 F 4

*hases
*roject Summary *roject *lan +isk .nalysis ,ffort ,stimation System +e2uirement Study -easibility Study Data and function "odeling :esting

:ime *eriod
36G37G7366 34G37G7366 6BG37G7366 6BG37G7366 36G38G7366 34G38G7366 7=G38G7366 7=G38G7366

7.7 +isk "anagement


7.7.6 +isk (dentification During the project plan we have consider all the proactive which we have think we will face during the project period. )ere ( have listed the risks which we have considered during the project plan? *ossibility that the components are not available during the project period. *ossibility that products purchased was not compatible. *ossibility that the hardware resources are not available during the project period. *ossibility that ,thernet connection between robot controller and computer may not occur, to which we have to make the connection might not available. *ossibility that software inter5compatibility may not be there. 7.7.7 +isk .nalysis +isk analysis is the important aspect of the project planning, whenever planning the software, programmer always has to consider the risks of the projects which he might face in the future during designing the software. +isks are of two types *roactive +isk. +eactive +isk. +isk (mpact +isk 345/,567 345/,568 6D ,ffect /omputer ,ngineering

*ossibility of getting illness. *ossibility of component not available. *ossibility of component not effective. *ossibilities of hardware resources are not available. *ossibility of robot controller not available. *ossibility of communication between systems might not happen on time. *roactive +isk .ssessment :able

Serious. /atastrophic Serious. /atastrophic. Serious. Serious

:his are the proactive risks which we can consider during the project plan period so we can cop up with them easily and we can find the solution easily but we can find other proactive risks which we havenHt considered in the project plan?

,ffect +isk Serious *ossibility that because of some problem we have lost the backup of some days. *ossibility that because of finance problem /atastrophic in the company we wonHt get the full resources. Serious *ossibilities that project "anager leave the project.

+eactive +isk .ssessment :able *roactive risks are most dangerous risks which we havenHt considered during the project period and to cop up with them is not easy. :hese kinds of risks are risks, so programmer must have been active to cop up with them smartly. +isk ,stimation +isk estimation attempts to rate each risk in two ways? :he likelihood or probability that risk is real and. :he conse2uences of the problems associated with the risk should it occurs. :he project planner, along with other managers and technical staff, performs four risk projection steps? 345/,567 345/,568

6B

/omputer ,ngineering

,stablish a scale rate that reflects the perceived likelihood of a risk. Delineate the conse2uences of the risk. ,stimate the impact of the risk on the project and the product. <ote the overall accuracy of the risk projection so that there will be no misunderstanding. :he intent if these steps are to consider risks in a manner that leads to prioritization. <o software team has the resources to address every possible risk with the same degree of rigor. 9y prioritizing risks, the team can allocate resources where they will have the most impact. 7.7.8 +isk *lanning .fter estimating all the risks and risk effects, we will look how to manage this kind of risks? ith the kind of proactive risks we will prepare the plan for how to manage these risks, we will think about their options, if their kinds of risks are facing and if they are reactive risks we have to manage them on the spot to avoid their dangerous effects? +isk "anagement e will provide some more time 0appro%. one week1 to prepare the software. *ossibility of getting illness. e will check for other components, which *ossibilities of the components are not have the same effect as those components. available. e will manage for the new components of that kind. *ossibility of component not effective. e will manage for optional hardware, while *ossibilities of hardware resources are not starting the project. available *ossibility of robot controller not available. e try to arrange a new controller. +isk

7.8 ,stimation
7.8.6 ,ffort ,stimation
345/,567 345/,568

66

/omputer ,ngineering

,ffort estimation methods are one of the important tools for project managers in controlling human resources of ongoing or future software projects. :he estimations re2uire historical project data including process and product metrics that characterize past projects. Software cost and effort estimation will never be an e%act science. :oo many variables human, technical, environment, political can affect the ultimate cost of software and effort applied to develop it. )owever, software project estimation can be transformed from a black art to a series of systematic steps that provide estimate with acceptable risk. :o achieve reliable cost and effort estimates, a number of options arise? Software Sizing -unction point sizing Standard component sizing

*roblem59ased ,stimation &O/ and -* data are used in two ways during software project ,stimation?5 .s an estimation variable to size each element of the software and .s baseline matrices collected from past projects and used in conjunction with estimation variables to develop cost and effort projections.

Schedules Obtain an early view of staffing re2uirements and constraints, and demonstrate the impact of changing deadlines, understaffing, and staff loading. Auality Auantify the impact on defect rates of building to deadlines or reducing staff. +isk -ine tune risk levels for all the major types of risk? size, re2uirements, technology, maintenance, systems integration, and defects.

8.3 System +e2uirements Study


8.6 Eser /haracteristics
345/,567 345/,568

6F

/omputer ,ngineering

:here are D types of user dealing with the system. Eser .K .dministrator .dministrator? .dmin is having all the rights on the application. Eser 9K ,mployee ,mployee? ,mployee of the company is one of the D users of this project Eser /K .nonymous Eser .nonymous Eser? .nyone who visits website. .nd any person applying for the posted job on the website. Eser DK /lient /lient? :his is the registered user. ho come to know about hisGher projectHs progress

8.7 )ardware and Software +e2uirement? )ardware Specification? *rocessor *rocessor Speed +." )ard Disk #eyboard Software Specification? &anguage Database Operating System +." ? (ntel Dual based system ? 6C)z to 7 C)z ? 7B6"9 to B67 "9 ? D C9 to 83 C9 ? 63D keys ? $D# 6.6 ? Oracle =i ? indows <:GL*G@ista ? B67 "9

8.8 /onstraints?
Ceneral /onstraints 345/,567 345/,568

64

/omputer ,ngineering

61 :his system will not take care of any virus problem that might occur on the computer with which it is installed. .voiding the use of piratedGillegal software and ensuring that floppies and other removable media are scanned for viruses before use could minimize the possibility of viral infection. 71 +ecovery of data after a system crash will be possible only if backups are taken at regular intervals. 81 "anual interfaces cannot be fully avoided. Documented proofs like dates etc. will have to be verified by the concerned staff before entering it into the computerized system )ardware /onstraints :he performance of the system will be dependent on the machine conditions. :he primary memory 0+."1 and the secondary memory 0)ard Disk Space1 re2uirement of the system will be the same as that re2uired by the normal application and the operating system. .nd the space re2uired storing the data. :he space re2uired to store the data would increase as more and more records are added to the system. .ssumptions and Dependencies a. (t is assumed that the user is familiar with the basic computer fundamentals. b. :imely backup of data should be taken to avoid data loss in case of system crash. c. -loppies and other removable media should be scanned for viruses before use. d. (t is assumed that the maintenance of the database will be assigned to the authorized person only. e. Only authorized persons will be allowed inside the system

D.3 System .nalysis


D.6 Study of /urrent System
345/,567 345/,568

6=

/omputer ,ngineering

:he O9S .dministration falls short of controlling the employeeHs activities in analyzing hisGher strengths and weakness. :he decision for appraisal of assigning ne%t project to the employee or to train himGher to enhance the skills 5 where lies with proper projection. )e is not provided with the detailed project information done or to be assigned based on .pplication G @erticals.

D.7 *roblem and

eaknesses of /urrent System

<eed of e%tra manual effort. (t used to take much time to find any employee <ot very much accurate. Danger of losing the files in some cases.

D.8 +e2uirements of <ew System


Decision in assigning proper skillful hands for the project is an important issue in O9S "odule. :he O9S .dministrator should report with the personal holding the necessary skills re2uired for the project assignment. :he decision in making analysis about the employeeHs skills is a prime important before booting in. :he proposed system of O9S "odule is the right software to be incorporated into the .utomation of O9S Software for helping the organization needs with respect to skilful )uman +esource. :he proposed system provides detail general information about the employee along with ,ducational, /ertification, Skill and *roject details. (t enhances the O9S "anagement in adding, viewing and updating employeesH details and generates various reports regarding employeeHs skill and e%perience. Suggestions and Crievances posted by the employees are upheld for taking care of the necessary steps in forwarding companyHs obligation. .D@.<:.C,S O- *+O*OS,D S>S:,"? @ery fast and accurate. <o need of any e%tra manual effort. <o fever of data loss. $ust need a little knowledge to operate the system. DoesnHt re2uire any e%tra hardware device. .t last very easy to find the employees.

D.D -,.S(9(&(:> S:ED>?


345/,567 345/,568 73 /omputer ,ngineering

Once the problem is clearly understood, the ne%t step is to conduct feasibility study, which is high5level capsule version of the entered systems and design process. :he objective is to determine whether or not the proposed system is feasible. :he tO9See tests of feasibility have been carried out. :echnical -easibility ,conomical -easibility Operational -easibility

:,/)<(/.& -,.S(9(&(:>
(n :echnical -easibility study, one has to test whether the proposed system can be developed using e%isting technology or not. (t is planned to implement the proposed system using java technology. (t is evident that the necessary hardware and software are available for development and implementation of the proposed system. )ence, the solution is technically feasible.

,/O<O"(/.& -,.S(9(&(:>
.s part of this, the costs and benefits associated with the proposed system compared and the project is economically feasible only if tangible or intangible benefits outweigh costs. :he system development costs will be significant. So the proposed system is economically feasible. O*,+.:(O<.& -,.S(9(&(:> (t is a standard that ensures interoperability without stifling competition and innovation among users, to the benefit of the public both in terms of cost and service 2uality. :he proposed system is acceptable to users. So the proposed system is operationally feasible.

D.B +e2uirements @alidation?


+e2uirement @alidation e%amines the specification to ensure that all system re2uirements have been stated unambiguously' those inconsistencies, errors have been detected and corrected and the work products conform to the standard. :here are many re2uirements from user perspective and taken care while designing a system, are as follows? Dynamic nature of system. i.e. System change its working depending on situation. /omponent based definition of system. i.e. System is divided into smaller components which will work independently also there combined affort is result into output of system. 345/,567 345/,568 76 /omputer ,ngineering

-le%ibility of system. i.e. System should work with great ease with different types of documents. -le%ible Database design should be done to accommodate information about new input. -le%ible front5end design so that it can support functionality of all types of input. 9ack5end should not affect front5end or vice versa. .ll Database changes should be done by front5end only. Simplicity should be there in system design. Eser friendliness should be achieved. System should be easily "aintainable and .daptive. Design for such system is created in such a way that related information is kept in same tables. Different information related to different component is stored in different tables. :o make the task of data entry easy various combo bo%es and list :he Database design should support the accommodation of new component information in a way, such that it should allow to continue the e%isting relationship with the other components and other parts of system. bo%es are designed so that user can have to just select the values from the given options.

D.6 -unctions of System? Ese /ase?


Ese case is a description of a set of se2uence of actions that a system performs that yields an observable result of value to a particular thing in a model. Craphically, Ese /ase is rendered as an ellipse with dashed lines, usually including only its name as shown below.

*lace Order

USE CASE DIAGRAM:-

345/,567 345/,568

77

/omputer ,ngineering

D.F Data "odeling?

345/,567 345/,568

78

/omputer ,ngineering

D.F.6 -low chart or activity design? ./:(@(:> D(.C+."? .n .ctivity Diagram is essentially a flow chart showing flow of control from activity to activity. :hey are used to model the dynamic aspects of as system. :hey can also be used to model the flow of an object as it moves from state to state at different points in the flow of control. /ontent? .ctivity diagrams commonly contain? -ork, Start ! ,nd Symbol

ACTIVITY DIAGRAM:-

D.F.7 /lass DiagramG ,5+ diagrams? 345/,567 345/,568

7D

/omputer ,ngineering

/lass diagrams are the most common diagrams found in modeling object5oriented systems. . class diagram shows a set of classes, interfaces, and collaborations and their relationships. Craphically, a class diagram is a collection of vertices and arcs.

CLASS DIAGRAM:-

345/,567 345/,568

7B

/omputer ,ngineering

/lass Diagram is a graph that represents the relationship between the classes and represents their semantics. )ere .:" works as main class. .ll other classes are related with this class. .:" does following operations? 5 @erifyMpin01 5 /heckMbalance01 5 /ashMwithdrawal01 5 "inistatement01 5 *rintMreceipt01 5 .notherMtransaction01

.:" card related with .:" through many to many relationship. (t does following operations? 5 (nsertMcardMintoM.:"01 5 (nsertM*inMcode01 5 +emoveMcardMafterMtransaction01

.ccount holder related with .:" through many to many relationship. (t performs following operations? 5 ithdrawal01 5 :ransfer01 5 9alanceMin2uiry01

345/,567 345/,568

76

/omputer ,ngineering

.:" server related with .:" by one or many to one or many relationship. (t also performs some task shown as below? 5 EpdatingMafterMeachMtransaction01 5 /hangingMtheMpinMcode01 5 ShowingMe%actMbalanceMafterMeachMtransaction01

9ank "anager associated with .:" through one or many to one relationship. .:" is not related with this class, but dependent on this class. So there is a dependent relationship assigned to them. 9ank "anager does following tasks? 5 "anagingMdifferentMaccounts01 5 "aintainingMsufficientMbalanceMinM.:"01 5 .ccessMtoMtheM.:"Mserver01

)ere, a class 9ank not related to any of the class, but some classes are dependent on these classes which are shown as dependent relationship with it. <ormally this class performs following operations? 5 /reateM.ccount01 5 .ccessingM.ccount01 5 *rovidingM.:"Mcard01

345/,567 345/,568

7F

/omputer ,ngineering

D.F.8 System .ctivity or Object interaction Diagram? .n (nteraction diagram shows an interaction, consisting of a set of objects and their relationships, including the messages that may be dispatched among them. (nteraction diagrams are used for modeling the dynamic aspects of the system.

INTERACTION DIAGRAM:-

345/,567 345/,568

74

/omputer ,ngineering

D.F.D Data Dictionary? . Data Dictionary is a /atalogue 5 a repository of element in a system. .s the name suggest, these elements center around data and the way these are structured to meet the user re2uirement and system needs. (n Data Dictionary we find list of all the elements are data flows, data stores, and process. :he Data Dictionary stores details and description of these elements.

345/,567 345/,568

7=

/omputer ,ngineering

(f anybody wants to know how many characters are in a data item, by what other names it is referenced in the system, or where it is used in the system, they should be able to find the answer in a property developed data dictionary. :he Data Dictionary is developed during data flow analysis and assists the system development in determining the user re2uirement.

(mportance of Data Dictionary?5 .nalysis use data dictionary for five important reasons? 6. :o manage the detail in large system. 7. :o communicate a common meaning for all system elements. 8. :o Document the feature of the system. D. :o -acilitates analysis of the details in order to evaluate characteristics and determine where system changes should be made. B. :o &ocate error and omissions in the system.

:he -ollowing :ables are used within the system?

1. ATM ::
(t provides information about .:"Hs 9ank, 9ranch and /ompany. .:"

345/,567 345/,568

83

/omputer ,ngineering

9ranchM/ode .:"M/ode /ompany

(nteger (nteger String

/ode of particular 9ranch /ode of particular .:" <ame of "anufacturer of .:"

2. ATM_Card ::
(t provides information about .:" card, its holder and 9ank. .:"M/ard /ardM<o *(<M/ode /ustomerM<ame 9ankM<ame (nteger (nteger String String <o. of particular /ard Secrete code of card <ame of /ard )older <ame of 9ank

3. Accoun _!o"d#r ::
(t has all the details about .:" /ard holder. .ccountMholder <ame 345/,567 345/,568 String <ame of .ccount owner

86

/omputer ,ngineering

.ddress .ccountM<o *honeM<o

String (nteger (nteger

.ddress of .ccount owner .ccount no. of card holder *hone no. of .ccount owner

$. ATM_%#r&#r ::
(t has detail of .:". .s well as it provides interface between 9ank and .ccount holder. .:"Mserver "anufacturerM/ompany String <ame of "anufacturer /ompany Server name to identify it /onfiguration set by 9ank "anager

<ameMofMServer /onfiguration

String String

'. (an)_Mana*#r ::
(t contains data of managers who set and manage the server of .:".

9ankM"anager

345/,567 345/,568

87

/omputer ,ngineering

<ame 9ranch

String String

<ame of "anager 9ranch name manager do work where

+. (an) ::
(t provides detail of 9ank to get information about .ccount of a user.

9ank 9ankM<ame &ocation 9ankM/ode String String (nteger <ame of 9ank &ocation of 9ank /ode of 9ank to identify it

D.4.6 /onte%t Diagram


:he top5level diagram is often called a Nconte%t diagramO. (t contains a single process, but it plays a very important role in studying the current system. :he conte%t diagram defines the system that will be studied in the sense that it determines the boundaries. .nything that is not inside the process identified in the conte%t diagram will not be part of the system study. 345/,567 345/,568

88

/omputer ,ngineering

D.4.7 Data -low Diagram 03 and 6 level1


. graphical tool used to describe and analyze the moment of data tO9Sough a system manual or automated including the process, stores of data, and delays in the system. Data -low Diagrams are the central tool and the basis from which other components are developed. :he transformation of data from input to output, tO9Sough processes, may be described logically and independently of the physical components associated with the system. :he D-D is also known as a data flow graph or a bubble chart. . graphical tool used to describe and analyze the moment of data through a system manual or automated including the process, stores of data, and delays in the system. Data -low Diagrams are the central tool and the basis from which other components are developed. :he transformation of data from input to output, through processes, may be described logically and independently of the physical components associated with the system. :he D-D is also known as a data flow graph or a bubble chart. :>*,S O- D.:. -&O D(.C+."S?

Data -low Diagrams are of two types as follows? 0a1 *hysical D-D 0b1 &ogical D-D 6. *)>S(/.& D-D? Structured analysis states that the current system should be first understand correctly. :he physical D-D is the model of the current system and is used to ensure that the current system has been clearly understood. *hysical D-Ds shows actual devices, departments, and people etc., involved in the current system.

7. &OC(/.& D-D? &ogical D-Ds are the model of the proposed system. :hey clearly should show the re2uirements on which the new system should be built. &ater during design activity this is taken as the basis for drawing the systemHs structure charts.

Da a ,"o- D.a*ra/0L#&#"-12:-

345/,567 345/,568

8D

/omputer ,ngineering

:his diagram shows the .utomatic :eller System Software and the hardware that it interacts with. :he arrows show the direction and type of data flowing between the software and each hardware element.

,%ternal ,ntities?5
/O<:+O& S>S:," :his system enables and disables the customer interface and receives customer re2uests and system reports. . suitable /ontrol System would be a personal computer linked to a central computer system with access to the .ccounts Database. :he customer interface 0keypad, display, 345/,567 345/,568 8B /omputer ,ngineering

etc1 is controlled by enabling and disabling the /ard +eader, which is the customer;s entry5point to the system. +e2uests for statements and che2uebooks are posted to the /ontrol System. (t also receives status reports for low printer5paper and cash levels. .//OE<:S D.:.9.S, :his is a database containing account numbers, balances and other account information. Data is retrieved from the database when a customer re2uests a balance report or a cash withdrawal. :he database is updated after a withdrawal. /.+D +,.D,+ :he /ard +eader receives the customer;s card and retrieves the *(< and account number stored on it. :his information is transmitted to the software system which enables the /ustomer #eypad and initiates the *(< verification procedure. hen business is completed the /ard +eader is instructed to return the card. (f the customer enters an incorrect *(<, a fi%ed number of retries is permitted, after which the /ard +eader is instructed to confiscate the card. /ES:O",+ #,>*.D :he /ustomer #eypad allows a customer to enter a *(< number, select options and enter cash values. :he keypad is only enabled when a card is detected in the /ard +eader. /ES:O",+ D(S*&.> :he /ustomer Display presents messages, options and reports to the customer. :he display is active at all times. *+(<:OE: D(S*,<S,+ :his provides the customer with a printed balance or receipt. :he *rintout Dispenser reports to the system if the paper level is low. /.S) D(S*,<S,+

345/,567 345/,568

86

/omputer ,ngineering

:his assembles and delivers cash to the customer. :he dispenser receives information about the values and 2uantities of notes to dispense 06 % P73, 7 % PB, etc1. :he /ash Dispenser reports to the system if the cash levels are low.

Da a ,"o- D.a*ra/0L#&#"-12:-

345/,567 345/,568

8F

/omputer ,ngineering

:his diagram shows data entering and leaving the system. (nput data is received from the hardware elements on the left. @arious types of data are processed by different parts of the software system. Output data is sent to the elements of hardware on the right. D-D &evel 6 *rocesses?5 (nteract 345/,567 345/,568 ith Operator

84

/omputer ,ngineering

:his process deals with commands from the system operator. :hese are the commands which enable or disable the customer interface by controlling the /ard +eader. :he operator may issue these commands from another computer system or by using a switch on a control panel. (nteract ith /ustomer :his process handles all interactions with the customer and operates only when a card is detected in the /ard +eader. (nput is received initially from the /ard +eader and then directly from the customer via the /ustomer #eypad. :he customer receives output from the /ustomer Display, the *rintout Dispenser and the /ash Dispenser. /ustomer interactions may also involve sending reports to the /ontrol System. :he initial step of all customer interactions is to verify the customer;s *(< number. .fter this a menu of options is presented on the display which the customer selects by pressing appropriate keys on the keypad. :hese options lead to other displays and re2uests for further input. Some options re2uire account details which are retrieved from the .ccounts Database and may also involve updating the database. During the final stage of all customer interactions the /ard +eader is instructed to either return or confiscate the card. *repare /ommand :his process handles communication with the /ard +eader hardware. :he system re2uires that the /ard +eader is able to receive the following commands? ,<.9&, D(S.9&, +,:E+< +,:.(< "akes the /ard +eader ready to receive a card *revents the /ard +eader from accepting a card ,jects a card from the /ard +eader /onfiscates an unauthorized card

:he /ard +eader is enabled and disabled by commands from the system operator. . card is returned or retained in response to interactions with the customer. Epdate Display :his process deals with the /ustomer Display screen. hen no card is in the /ard +eader, the /ustomer Display shows general information 0such as ;(nsert /ard;1. hen a card is detected the display is updated in response to customer interactions. (f the system is disabled by the system operator, the display is updated to indicate the system status. :he following is a list of screens which are shown on the /ustomer Display. Ceneral (nformation *(< @erification "ain Options 5(nsert /ard and other messages 5 ,nter *(< message 5 Some or all of the following' Display 9alance,

345/,567 345/,568

8=

/omputer ,ngineering

/urrent 9alance 9alance *rinted ithdrawal Options /ash .mount /ash Dispensed +eceipt *rinted Statement Ordered /he2uebook Ordered /ard +eturned /ard +etained

*rint 9alance, /ash ith +eceipt, /ash ithout Order Statement, Order /he2uebook, +eturn /ard 5/ustomer;s account balance and cleared funds 5:ake >our 9alance message 5*re5defined cash amounts and Other .mount 5,nter .mount for cash withdrawal 5:ake >our /ash message 5:ake >our +eceipt message 5Statement Ordered message 5 /he2uebook Ordered message 5:ake >our /ard message 5/ard +etained message 0for failed *(< @erification1

eceipt,

*repare "essage :his process prepares and transmits messages to the /ontrol System. :hese messages can be re2uests from customers for statements and che2uebooks or reports concerning the levels of printer5paper and cash. *repare *rintout :his process prepares and controls the use of the *rintout Dispenser to produce balance reports and receipts. :he customer;s balance is retrieved from the .ccounts Database 0if re2uired1. (f the printer5 paper level becomes low options which involve printouts are disabled and a warning message is sent to the /ontrol System. "anage ithdrawal :his process receives re2uests for withdrawals of specific amounts from a certain account and operates the /ash Dispenser. 9efore proceeding, the customer;s details in the .ccounts Database are checked. (f the re2uest e%ceeds the customer;s balance 0or agreed overdraft1 the withdrawal is denied. :he system uses a denomination selection algorithm based on the notes available and the amount re2uired. :he .ccounts Database is updated after each withdrawal. (f the cash level becomes low, options providing cash withdrawals are disabled and a warning message is sent to the /ontrol System.

D.4.8 *rocess Specification and Decision :able

345/,567 345/,568

D3

/omputer ,ngineering

6. .dmin &ogin (f adminMloginQtrue :hen give rights to access the application as well as admin functionalities ,lse Show error message ,nd if 7. Eser login (f userMloginQtrue :hen give rights to access the application ,lse Show error message ,nd if 8. ,ntry of details of respective forms to save in database (f information entered Q valid :hen save ,lse Show error message ,nd if D. ,ntry of details to update the records in database (f information updated Q valid :hen do update in database ,lse Show error message ,nd if B. Cenerate reports (f parameter for report Q valid :hen view the records ,lse Show error message ,nd if

$.3.$ Con ro" ,"o- D.a*ra/:345/,567 345/,568

D6

/omputer ,ngineering

B.3 :esting
345/,567 345/,568 D7 /omputer ,ngineering

B.6 :esting *lan?


.ny system, to be successful, must be thoroughly tested, and well managed test plan should be prepared before actual testing is being performed. N"odulesO have been developed and need to be tested in a manner that can reduce occurring of defects as low as possible. -ollowing are the activities we planned to test the system. 6. :his system is indeed an evolutionary system so every unit of the system is continuously under testing phase. 7. One test activity N9asis *ath :estingO that will try to cover all paths in the system. :his activity identifies all paths that provide different functionality of the system, and also other paths to reach at that functionality. 8. Other testing activity is O/ontrol Structure :estingO, which will test each and every condition with positive and negative data combination. D. :his testing activity will also perform NData -loe :estingO in which it will be tested how the data re following the system. .nd will also check whether the data entered from one procedure, is reflected whenever it re2uires or not.

B. .ll conditions will be tested with N9oundary @alue .nalysisO where different input will be given to test whether the system is functioning with boundary values or not.

6. .long with the boundary value analysis, the system is also tested with N+ange @alue :estedO where editable values will be tested with ranges of values. F. :he system is being tested in NEnit :estingO manner where at the completion of one unit that is tested thoroughly with above mentioned testing activities.

4. :he integration testing will also be performed to ensure that the integrated unit is working properly with other units or not.

345/,567 345/,568

D8

/omputer ,ngineering

B.7 :esting Strategy?


/O<:,<: :,S:(<C? ,rrors in *roject content can be as trivial as minor typographical error as incorrect information, improper organization or validation of intellectual property laws. /ontent :esting attempt to uncover this and many other problems before the user encounter them. /ontent :esting Objectives? :here are three types of objectives. 61 :o uncover syntactic errors in te%t5based documents, graphical representation and other media. 71 :o uncover semantic errors in any content object represented as navigation error. 81 :o find errors in organization or structure of content that is presented to the end5user (<:,+-./, :,S:(<C (nterface design model is reviewed to ensure that generic 2uality criteria established for all user interfaces have been achieved and that application specific interface design issue has been properly addressed. (nterface testing strategy? :he overall strategy for interface testing is to 061 Encover error related to specific (nterface mechanisms 071 uncover errors in the way the interface implements the semantics of navigation, eb.pp functionality, or content display. :o accomplish this strategy, a number of objectives must be achieved?

(nterface futures are tested to ensure that design rules, aesthetics and related visual content are available for the user without error.

(ndividual interface mechanisms are tested in a manner that is analogous to unit testing -or e%ample' tests are designed to e%ercise all forms, client5side scripting, dynamic L"&.

:esting (nterface "echanisms?5

345/,567 345/,568

DD

/omputer ,ngineering

hen a user interacts with a system, the interaction occurs through one or interface mechanisms. -orms? 5 .t a microscopic level, tests are performed to ensure that

more

6. &abels correctly identified fields within the form and that mandatory fields are identified visually for the user. 7. :he server receives all information content within the form and their no data are lost in the transmission between client and server. 8. .ppropriate defaults are used when the user does not select from a pull down menu or set of buttons. D. 9rowsing functions donHt corrupt data entered in the form. B. Scripts that perform error checking on data entered work. 6. *roperly and provide meaningful error message. /lient side scripting?5 9lack bo% tests are conducted to uncover any error in processing as :he script is e%ecuted. :hese tests are coupled with forms testing because script input is often derived from data provided as part of forms processing Dynamic L"&?5 )ere the data transfer between the systems occurs in the form of %ml file. :he formatting of the L"& file should remain unaltered. /hanges in the internal attribute structure can also lead to an error. )ence for this L"& parsing functionalities are provided on the client side. .pplication specific interface mechanisms?5 :est conforms to a checklist of functionality and features that are defined by the interface mechanism.

9oundary test minimum and ma%imum number of item that can be placed in to shopping chart. :est to determine persistence of image capture contents.

345/,567 345/,568

DB

/omputer ,ngineering

:est to determine whether the system can be record co5ordinate content at some future date.

ES.9&(:> :,S:(<C?5 Esability test may be designed by *roject engineering team. 6. Define a set of usability testing categories and identify goal for each. 7. Design test that will enable each goal to be evaluated. 8. Select participants who will conduct test. D. (nstrument participantHs interaction with system while testing is conducted. B. Develop a mechanism for assessing the usability of the system.

:he following test categories and objective illustrate establish testing? (nteractivity5 .re interaction mechanism easy to understand and useK &ayout5 .re navigation mechanism, content and function place in a manner that allows the user to find them 2uicklyK +eadability5 (s the te%t well written and clearK .esthetics5 Do layout color, typeface, and related characteristics lead to ease of useK Display /haracteristics5 Does the system make optimal use of screen size and resolutionK :ime Sensitivity5 /an important features, functions and content be used in a timely mannerK .ccessibility5 (s the system accessible to people who have DisabilitiesK

/O"*.:(9(&(:> :,S:(<C?5 345/,567 345/,568

D6

/omputer ,ngineering

*roject must operate within environment that differs from one another. Different computer, display device, OS, browser and network connection speed can have significant on system operation.:he *roject team derives a series of compatibility, validation tests, derived from e%isting interface tests, navigation tests, performance tests and security tests. B.8 :esting "ethods? .nalyze and check system representation such as the re2uirement document, design diagrams and the program source code. :hey may be applied at all stages of the process.

Unit Testing

Module Testing

Sub-system Testing System Testing

Acceptance Testing

:here are different "odels of testing. On the basis of testing methods there are two types of testing? 345/,567 345/,568

DF

/omputer ,ngineering

6.

hite5bo% testing.

7. 9lack5bo% testing

61. )(:,59OL :,S:(<C


hite5bo% testing sometimes called glass5bo% testing, is a test case design method that users the control structure of the procedural design to drive the test case. &ogical errors and incorrect assumption are inversely proportional to the probability that a program will be e%ecuted. ,rrors tend to creep into our work we design and implement function, condition or control that is out of the mainstream tends to be well understood. e often believe that a logical path is not likely to be e%ecuted when in fact it may be e%ecuted on a regular basis. :he logical flow of a program times counter intuitive. 71. 9&./#59OL :,S:(<C? -or our project periodically we have tested our software using black5bo% testing. :hinking as a client we have evaluated the software for its easy going and convenience.

Enit :esting?

During the programming stages each and every form, modules and class treated unit has been put into the test data. ,very module is tested independently. :he steps are follows? 6. "anually code is tested like spelling checks, logic and errors. 7. Once the manual checking is over the complication has been done. Syntactical errors if any have to be corrected. 8. .fter the clean complication the program, some dummy data, as specification, has been used for testing of the module to see if it works as specified. (ntegration :esting

345/,567 345/,568

D4

/omputer ,ngineering

.fter our individualHs modules were tested out we go the integrated to create a complete system. :his integration process involves building the system and testing the resultant system for problems that arise from component interaction. *erformance :esting *erformance testing is designed to test the runtime performance of the system within the conte%t of the system. :hese tests were performed as module level as well as system level. (ndividual modules were tested for re2uired performance. /ondition :esting *erformance testing is a test case design method that e%ercises the logical conditions. (nterface :esting (nterface sting is integral part of integration. e e%amined the code to be tested and e%plicitly list each call to an e%ternal component. (n the system standards tests for CE(s have been performed, which are as follows? :he position and related labels for all controls were checked. @alidations for all inputs were done. *ull down controls was verified for proper functionality.

hether the non5editable te%t controls disabling and it was also verified that it doesnHt e%ceed the ma%imum allowed length.

B.D :est /ases? 061(nvalid *arameter Setting. :est /ase?5 (f the cameras are calibrated in a wrong manner, then the values derived from the images would be incorrect.

Solution 345/,567 345/,568

D=

/omputer ,ngineering

Solution of this case is that we have to check the values from the ./S@ file and see to that they are within the permissible range or not. 071&ight source moves out of the camera plane. :est /ase?5 (f the any user by mistake moves the light source out of the camera plane, the captured image would then not contain any co5ordinate information. Solution Solution of this case is that there is a condition kept when no co5ordinates are e%tracted pass on the value of the origin.

081(f any of the cameras are not connected. :est /ase?5 (f the cameras are disconnected from the computer the initialization of the process will not occur. Solution?5 Solution of this case is that user has to be aware of all the hardware has been correctly connected to the system before initialization. Eser has to keep a checklist of all the system before initializing the system.

0D1(f a proper base is not taught. :est /ase?5 (f the user teaches an invalid base then there remain chances of the robot to collide with the surrounding. Solution Solution of this case is that user is not aware about the base, and then the user should e%ecute the robot motion in :6 testing mode.

0B1/ommunication error between controller and computer. 345/,567 345/,568 B3 /omputer ,ngineering

:est /ase?5 (f user is unable to connect the computer to the controller, then user would not be able to pass on the co5ordinate values. Solution Solution of this case is that user has to first establish the connectivity by configuring the .pi/onfig file, and check the connecting ,thernet cable. Successful connection can be known by using the *(<C command.

6.3 &imitation and -uture ,nhancement


345/,567 345/,568

B6

/omputer ,ngineering

&imitation?
.lthough ( have tried to add all the related features to this online 9us +eservation System but there are also some limitation. :his system is stand alone system so data saved during different processes are stored in the machine in which that process was e%ecuted. So there is the problem of distributed database.

-uture ,nhancement?
.s discussed the limitation of this system, we can implement this as clientGserver system. So all the data will be stored in the single machine, and for any purpose all the data will be retrieved from this central database. So there will be no human work re2uire for the employee. :here will be only one person re2uired who will maintain this central database.

/onclusion

345/,567 345/,568

B7

/omputer ,ngineering

9ack in 6=6=, /hemical 9ank announced that a new form of banking was being launched. ith that, customers were provided with plastic cards designed with a magnetic strip that could be used with a machine built into a wall. Cone were the days of having to stand in line for a teller or not having money on hand after normal banking hours. .lmost everyone has heard of and used an .:" machine. (nterestingly, some of people feel that .:" machines are the best thing to happen in the banking world while other people consider them a curse. :he main complaint heard about .:" machines is that while they are convenient, they are e%pensive to use. )owever, if we look at it from a banking perspective, business is business. +egardless of what we think of .:" machines, there is no doubt that they have changed the world and the way in which we do things. -or e%ample, think how many times we have been out somewhere only to discover we have no cash and we are out of checks, ah, but in the corner, there is an .:" machine. (n the blink of an eye, we swipe the card and now have cash on hand. (n addition to pulling money out, the .:" machine also makes it convenient to deposit money, transfer money, and check balances. 9est of all, to use an .:" machine, we do not have to go to the bank. e will find .:" machines at other banks, grocery stores, shopping malls, along the roadside, 9uckingham *alace, airports, in casinos, and even on the South +im of the Crand /anyon. -or this reason, .:" machines are e%tremely helpfulI

9ibliography
345/,567 345/,568

B8

/omputer ,ngineering

9ook +eference

-undamentals of Software ,ngineering 9y +ajib "all Software ,ngineering 9y (an Somerville .nalysis and Design of (nformation Systems 9y $ames Senn

ebsite +eference
www.google.com www.ask.com www.microsoft.com

www.iit.edu.com

345/,567 345/,568

BD

/omputer ,ngineering