Академический Документы
Профессиональный Документы
Культура Документы
Page No.
ACKNOWLEDGEMENT
SYNOPSIS
1. INTRODUCTION
1.1 Organization Profile
1.2 Overview of the System
1.3 System Specification
1.3.1 Hardware Specification
1.3.2 Software Specification
2. SYSTEM STUDY
2.1 Existing System
2.2 Proposed System
2.3 Comparative System Study
3. SYSTEM DESIGN
3.1 Input Design
3.2 Output Design
3.3 Database Design
4. SYSTEM TESTING & IMPLEMENTATION
4.1 System Testing
4.2 System implementation
5. CONCLUSION
6. SCOPE FOR FURTHER DEVELOPMENT
7. DATA FLOW DIAGRAM
APPENDIX
Tables
Sample Input
Sample Output
BIBLIOGRAPHY
1. INTRODUCTION
PACIFIC ITSOLUTIONS
Pacific IT Solutions Pvt .Ltd was started on 28th March 2000 as a software
development at Bangalore, India. It was set up with a single goal and direction, namely
making quality work for our customers.
Infrastructure Resources
To excel in customer satisfaction and to be the centre of excellence in providing an
on time, high quality and customize solutions to telecommunication and web e-solutions.
They combine the best people and technology to achieve excellent results consistently.
They also offer customers the advantages of,
Speed:
They understand the importance of timing. A rich portfolio of reusable, modular
framework help jump-start projects. Tried and tested methodology ensures that they
follow a predictable, low risk path to achieve result.
Expertise:
Their team combines cutting edge technology skills with rich domain expertise. What
is equally important they share a strong customer orientation that means they actually
start by listening to the customer, they are focused on coming up solutions that serve
customer requirement today and anticipate future needs.
Fields of expertise:
A diverse skill set in almost in every key area in the web e-solution and
telecommunication space sees us deliver varied solution frame work for client world
wide.
Internet Solutions
Intranet Solutions
Web designing
Hosting Solution
Internet security
Banking Project
Internet Project
ERP projects
1.2OVERVIEW OF THE SYSTEM
Module Classification:
Administrator Module
Recruitment Module
Leave Admin Module
Discipline Module
Payroll Module
Module Description:
Administrator Module:
This module is to maintain the employee details, project details, role details,
general leave roster and also has options to view, modify and delete all these details.
Reports can also be viewed.
Discipline Module:
This module handles the disciplinary activities of employee. Any event of breach
of discipline will be noted and informed to the HR. After project HR level
investigation, suspension or warning letters will be issued to the employee. This event
details will be maintained in the database tables. Reports are generated for event
recorded.
Recruitment Module:
This module deals with finding vacancy post based on skill set. After finding
vacancy, request will be sent to HR for approving the vacancy posts. After getting
approval, these details will be maintained. New applicants can also be applied in the
website provided and that details will be maintained in the separate table and viewed
by the HR. Further, recruited candidate’s details will be maintained in the database by
the Administrator.
Payroll Module:
Processing in this module is to create general pay slip and calculate salary for
individual employee based on their disciplinary activities. Reports are generated for
individual pay slip and general pay slip.
SYSTEM SPECIFICATION
Hardware Requirements
Software Requirements
Java Technology
1. Simple
2. Architecture neutral
3. Object oriented
4. Portable
5. Distributed
6. High performance
7. Interpreted
8. Multithreaded
9. Robust
10.Dynamic
11.Secure
You can think of Java byte codes as the machine code instructions for
the Java Virtual Machine (Java VM). Every Java interpreter, whether it’s a
development tool or a Web browser that can run applets, is an
implementation of the Java VM. Java byte codes help make “write once, run
anywhere” possible. You can compile your program into byte codes on any
platform that has a Java compiler. The byte codes can then be run on any
implementation of the Java VM. That means that as long as a computer has a
Java VM, the same program written in the Java programming language can
run on Windows 2000, a Solaris workstation, or on an iMac.
The Java Platform
A platform is the hardware or software environment in which a
program runs. We’ve already mentioned some of the most popular
platforms like Windows 2000, Linux, Solaris, and MacOS. Most
platforms can be described as a combination of the operating system
and hardware. The Java platform differs from most other platforms in
that it’s a software-only platform that runs on top of other hardware-
based platforms.
The Java platform has two components:
The Java Virtual Machine (Java VM)
You’ve already been introduced to the Java VM. It’s the base for
the Java platform and is ported onto various hardware-based
platforms.
The Java API is a large collection of ready-made software
components that provide many useful capabilities, such as graphical
user interface (GUI) widgets. The Java API is grouped into libraries of
related classes and interfaces; these libraries are known as packages.
The next section, What Can Java Technology Do? Highlights what
functionality some of the packages in the Java API provide.
The following figure depicts a program that’s running on the Java
platform. As the figure shows, the Java API and the virtual machine
insulate the program from the hardware.
Native code is code that after you compile it, the compiled code
runs on a specific hardware platform. As a platform-independent
environment, the Java platform can be a bit slower than native code.
However, smart compilers, well-tuned interpreters, and just-in-time
byte code compilers can bring performance close to that of native
code without threatening portability.
We can’t promise you fame, fortune, or even a job if you learn the
Java programming language. Still, it is likely to make your programs
better and requires less effort than other languages. We believe that
Java technology will help you do the following:
Get started quickly: Although the Java programming language
JDBC Goals
Few software packages are designed without goals in mind. JDBC is
one that, because of its many goals, drove the development of the API.
These goals, in conjunction with early reviewer feedback, have finalized the
JDBC class library into a solid framework for building database applications
in Java.
The goals that were set for JDBC are important. They will give you some
insight as to why certain classes and functionalities behave the way they do.
The eight design goals for JDBC are as follows:
The JDBC SQL API must “sit” on top of other common SQL level
APIs. This goal allows JDBC to use existing ODBC level drivers by the
use of a software interface. This interface would translate JDBC calls to
ODBC and vice versa.
Provide a Java interface that is consistent with the rest of the Java
system
Because of Java’s acceptance in the user community thus far, the
designers feel that they should not stray from the current design of the
core Java system.
Keep it simple
This goal probably appears in all software design goal listings. JDBC
is no exception. Sun felt that the design of JDBC should be very simple,
allowing for only one method of completing a task per mechanism.
Allowing duplicate functionality only serves to confuse the users of the
API.
Use strong, static typing wherever possible
Strong typing allows for more error checking to be done at compile
time; also, less error appear at runtime.
Keep the common cases simple
Because more often than not, the usual SQL calls used by the
programmer are simple SELECT’s, INSERT’s, DELETE’s and
UPDATE’s, these queries should be simple to perform with JDBC.
However, more complex SQL statements should also be possible.
Simple Architecture-neutral
Object-oriented Portable
Distributed High-performance
Interpreted multithreaded
Robust Dynamic
Secure
Compilers My Program
Java byte codes help make “write once, run anywhere” possible.
You can compile your Java program into byte codes on my platform
that has a Java compiler. The byte codes can then be run any
implementation of the Java VM. For example, the same Java
program can run Windows NT, Solaris, and Macintosh.
Networking
TCP/IP stack
IP datagram’s
The IP layer provides a connectionless and unreliable delivery
system. It considers each datagram independently of the others. Any
association between datagram must be supplied by the higher layers.
The IP layer supplies a checksum that includes its own header. The
header includes the source and destination addresses. The IP layer
handles routing through an Internet. It is also responsible for
breaking up large datagram into smaller ones for transmission and
reassembling them at the other end.
UDP
UDP is also connectionless and unreliable. What it adds to IP is a
checksum for the contents of the datagram and port numbers. These
are used to give a client/server model - see later.
TCP
TCP supplies logic to give a reliable connection-oriented
protocol above IP. It provides a virtual circuit that two processes can
use to communicate.
Internet addresses
In order to use a service, you must be able to find it. The Internet
uses an address scheme for machines so that they can be located.
The address is a 32 bit integer which gives the IP address. This
encodes a network ID and more addressing. The network ID falls
into various classes according to the size of the network address.
Network address
Class A uses 8 bits for the network address with 24 bits left over
for other addressing. Class B uses 16 bit network addressing. Class
C uses 24 bit network addressing and class D uses all 32.
Subnet address
Internally, the UNIX network is divided into sub networks.
Building 11 is currently on one sub network and uses 10-bit
addressing, allowing 1024 different hosts.
Host address
Total address
Sockets
A socket is a data structure maintained by the system to handle
network connections. A socket is created using the call socket. It
returns an integer that is like a file descriptor. In fact, under
Windows, this handle can be used with Read File and Write File
functions.
#include <sys/types.h>
#include <sys/socket.h>
int socket(int family, int type, int protocol);
JFree Chart
JFreeChart is a free 100% Java chart library that makes it easy
for developers to display professional quality charts in their
applications. JFreeChart's extensive feature set includes:
A consistent and well-documented API, supporting a wide
range of chart types;
A flexible design that is easy to extend, and targets both server-
side and client-side applications;
Support for many output types, including Swing components,
image files (including PNG and JPEG), and vector graphics file
formats (including PDF, EPS and SVG);
JFreeChart is "open source" or, more specifically, free software.
It is distributed under the terms of the GNU Lesser General Public
Licence (LGPL), which permits use in proprietary applications.
1. Map Visualizations
Charts showing values that relate to geographical areas. Some
examples include: (a) population density in each state of the United
States, (b) income per capita for each country in Europe, (c) life
expectancy in each country of the world. The tasks in this project
include:
Sourcing freely redistributable vector outlines for the countries
of the world, states/provinces in particular countries (USA in
particular, but also other areas);
Creating an appropriate dataset interface (plus default
implementation), a rendered, and integrating this with the existing
XYPlot class in JFreeChart;
Testing, documenting, testing some more, documenting some
more.
3. Dashboards
4. Property Editors
2. SYSTEM STUDY
The proposed system overcomes all the problems involved in the existing
system. In the proposed system, the tool is used to help the project leaders to smoothly
track and monitor the project activities, defines tasks, compare estimated with actual
time report, create chart and report. The project leaders manage the project on a day-to-
day basis, coordinate communicate and facilitate all activities and review the project
deliverables.
2.3 Comparative System Study:
The proposed system has lot of advantage than the existing system.
This system can be extensively used to view and update employee details, add, view and
modify time sheet entry, allocate and reallocate resources. In existing system it is difficult
to track the status of the project.
But in the proposed system application we can analyze and track
the status of the project for the clients they are associated with vision InfoTech in
addition we can track must useful and advanced reports like time sheet report, status
reports and to reply for client remarks.
3. SYSTEM DESIGN
3.1 Input Design:
Input design is mainly concentrated on estimating what the inputs are and
how they have to be arranged on the input screen, how frequently the ideas are to be
collected. Project Tracking System provides many user-friendly features that help the
user to interact with the system easily.
The input screens are designed in such a manner that avoids confusion and
guides the user in the correct track. Although study has been made on the type and how
the input form is to be designed. Some inputs from the user may cause severe error and is
strictly validated.
This PTS software provides a point and click to its user. The layout of the
input screen is also taken into account. A very good look and feel is provided through the
organized arrangement of controls such as menus, tabs, and dialog boxes, buttons etc...
Input screen for PTS are very simple and user friendly. Users are allowed
to access the software only after the authentication process. If irrelevant data is entered
the validators will display the error messages.
Data Integration:
In a database information from several files is co-ordinates,
accessed and operated upon as though it is a single file. Logically, the information is
centralized. The data may be located on different devices connected through data
communication facilities.
Data Integrity:
Data integrity means storing all the data in single place and allows
each application to access it. This approach results in more consistent when updated,
being sufficient to achieve a new record status for all the applications, which access it.
This leads to less data redundancy, data items need not be duplicated, reduction in the
direct access storage requirements.
Data Independence:
Data independence is the insulation of application programs from
changing aspects of physical data organization. This objective seeks to allow changes in
the content and organization of physical data without reprogramming of applications and
to allow modifications to application programs without reorganizing the physical data.
The tables needed for each module and the specifications are
signed. The specification of each and every column is given based on the details collected
during record specification of each column was given based on the details collected
during record inspection during system study.
Normalization
Normalization is a series of tests use against the data to eliminate
redundancy and make sure the data is associated with the correct table or relationship.
For this work force management all tables are in third normal form. When data passes the
first test, it is considered to be in first normal form. When it passes the second test, it is in
second normal form and so on.
Integration testing
Integration testing focuses on the design and the construction of the
software architecture. The data can be lost across the interface or one module can pose an
adverse effect on another. The sub functions when combined may not produce the major
function. Integration testing is a systematic technique for the program structure, while at
the same conducting test to uncover errors associated with the interface.
Validation testing
Validation testing can be defined in many ways but a simple
definition is that validation succeeds when the software functions in a manner that can be
reasonably expected by the customer.
BlackBox Testing
The Black Box test is carried out to test that input to a function is properly
accepted, and output is correctly produced. A black box examines some aspects of a
system with little regard for the internal logical structure of the software.
Error in the following categories were found Black Box testing
Incorrect or missing functions
Interface errors
Error in database structure or external data base access
Performance error
Intialization and termination errors
WhiteBox Testing
The White Box testing of software is predicted on a close examination of
procedural detail. The status of the program may be tested at various points to determine
whether the expected or asserted status corresponding to the actual status. Using this, the
following test cases can be derived.
Exercise all logical conditions on their true and false sides
Execute all loops within boundaries and their operational bounds
Exercise internal data structures to ensure their validity
Programmer Training:
Programmers are assigned to the computer based business system
project at the beginning of the development phase. The programmer’s reference manual
informs an experienced programmer, unfamiliar with the system, about all of the aspects
of the computer program. The manual should enable this person to
Understand existing program components
Modify existing program components
Write new program components
Operator Training:
If new equipment is to be installed, operator training is completed
in conjunction with its installation and checkout. If new equipment is not required for the
computer-based system, operator still must become familiar with the operational
requirements of the new system.
User Training:
After the system is implemented successfully, training of the user is
one of the most important subtasks of the developers. Even well designed and technically
elegant systems can succeed or fail, because of the way they are operated and used. The
following activities were taken care of:
Preparation of user and system documentation.
Conducting user training with demo and hands on.
Test run some period to ensure smooth switching over the system.
Equipment Installation:
Equipment vendors can provide the specifications for equipment
installation. They usually work with the projects equipment installation team in planning
for adequate space, power, and light and a suitable environment.
Conversion:
Conversion is the process of performing all of the operations that
result directly in the turnover of the new system to the user. Conversion has two parts;
The creation of a conversion plan
The creation of a system changeover plan
5. CONCLUSION
Employee
MANPOWER
Administrator PLANNING Reports
Officers
ADMINISTRATOR MODULE:
Re-enter
Enter
Username,
Administrator password Login Invalid
Valid user
emp_det
Employees
General roster
General_ros
LEAVE ADMIN MODULE:
Re-enter
Enter
Employee username,
password Login Invalid
Valid
user
valid
Retreiving to
approve leave Approved /
` Rejected
status
Ind_roster Administrator
Retrieving
PAYROLL:
Re-enter
Storing
Enter Maintaining salary
Accountant Username, Valid user general salary details gensalary_tab
Login
password details
Viewing
salary Retrei-
Computing details ving
salary for each Displaying
employee salary details
pay_tab
Storing individual
Salary details
Retreiving
Computing
salary retreiving
Ind_roster
RECRUITMENT AND DISCIPLINE:
employee
Invalid
Sending warning,
suspension letter to
Enter employee
user
username, Valid HR
Login Investigating
password
Event
Valid Storing the Refering the
PM/TL action records
Storing
Valid event
PM/TL Recording Event_tab
Valid HR event
Retrieving
Involvecode_tab
Finding Refering
Requesting
vacancy vacanct_tab
HR
Viewing and
approving for Retrieving to view
recruitment
Approved details
Retrieving
New Applicant
SCREEN SHOT
BIBLIOGRAPHY
Websites
1 http://www.msdn.microsoft.com
2 www.apress.com
3 http://www.wrok.com