Online Rto Management System PDF
Online Rto Management System PDF
Online Rto Management System PDF
KOTTAYAM
Presented by,
KRISHNALAL.K.J (SBAD10186520)
CERTIFICATE
This is to certify that the report entitled ONLINE RTO MANAGEMENT SYSTEM
External Guide
DECLARATION
KRISHNALAL.K.J
Place :.
Date :.
ACKNOWLEDGEMENT
With profound sense of indebtedness, we use this opportunity to express our sincere
thanks to our beloved principal, P.M.SURESH for providing all sorts of support and
necessary facilities throughout the course and for the inspiration to complete my project. We
express our sincere gratitude to Mrs. Swapna Suman Head of BSc. Computer Science
Department for inspiration and permission to carry out our project.
We wish to extend our thanks to our project guide ANITHA C.R Lecturer, Department
of BSc. Computer Science, JISH JOHN Lecturer, Department of BSc. Computer Science
and NIMI V.P, Lecturer, Department of BSc. Computer Science and JISHA DEEPU
Lecturer , Department of BSc. Computer Science for their keen interest, valuable guidance
and support rendered throughout our project.
Last but not the least; we extend our sincere thanks to all our seniors and
classmates for their help and support. And also we would like to extend our deep sense of
gratitude to all those who have assisted us in the successful completion of this project.
CONTENTS
CONTENTS PA
GE
NO
:
1. INTRODUCTION 7
1.3 MODULES 10
2. SYSTEM ANALYSIS 12
3. SYSTEM SPECIFICATION 17
4. SYSTEM DESIGN 20
5. SOFTWARE DEVELOPMENT 30
6. SOURCE CODE 36
8. CONCLUSION 69
9. FUTURE ENHANCEMENT 71
10. APPENDIX 73
10.2 BIBLIOGRAPHY 85
INTRODUCTION
1.INTRODUCTION
The project RTO MANAGEMENT SYSTEM is proposed to install a system that shall
enable the proposed RTO SYSTEM interface with the existing system with maximum
accuracy .This project is very useful for those who are concern with the different
processes on RTO. During study phase, we have done a preliminary analysis sufficient
depth to permit a technical and economic evaluation of proposed system.
As a total manpower based system is currently running for the whole procedures,
designing a new system which makes the whole process online, demands a deep
knowledge about the existing system. Throughout the project we focus on presenting
information and commands in an easy and intelligible manner.
The purpose of our RTO management system is to provide a leading technological tool
for the ease of RTO functions such as Registration, Learners License, and Fitness etc...It
will reduce considerably the difficulties faced on existing system, with minimum error
and difficulties.
1.1OVERVIEW
Administrator is power user. He has the power to verify the data entered by the
user, processing of data and provide appropriate solutions. Any person who
have been authorized by the administrator. An authorized user should have a
user name and password to access detailed information from the site excluding
for accessing general information in shared, public pages.User is the person
who gets the full benefits of this application.By introducing the new system we have
been organized some striking felicities.Registration of vehicle through online. Fancy
number selection of vehicles through online. Issue of informations about
license, which include application forms, demo of leaners license test and other
informations. It helps traffic police for tracing particular vehicles. It helps for
public awareness.Separate account for the license holders and police. Provide
mail alerts for users about license expiry.And also register Complaint.
RTO Management System has been designed to automate the process of registration of
vehicle and issuing driving license process. System can make the daily activities efficient
and providing the fast response to store and retrieve information.
Type - Web
As a total manpower based system is currently running for the whole procedures,
designing a new system which makes the whole process online, demands a deep
knowledge about the existing system. Throughout the project we focus on presenting
information and commands in an easy and intelligible manner. The purpose of our RTO
management system is to provide a leading technological tool for the ease of RTO
functions such as Registration, Learners License, and Fitness etc...It will reduce
considerably the difficulties faced on existing system, with minimum error and difficulties.
1.3MODULES
User Management
Learning License
Learning license module includes the learners registration and the license expire details.
Also includes the online license test.
Permanent License
The module includes permanent license registration. Also Renewal License feature. And
also provides facility for Duplicate License.
Vehicle Registration
The module includes new registration of vehicles. And Getting Duplicate Registration,
Reports
Corresponding to each operation report generation in PDF format will be available for
future reference.
SYSTEM ANALYSIS
Authorized user: Any person who have been authorized by the administrator.
An authorized user should have a user name and password to access detailed
information from the site excluding for accessing general information in shared,
public pages.
User: He is the person who gets the full benefits of this application.
By introducing the new system we have been organized some striking felicities:
Registration of vehicle through online.
Complaint registration.
Proposed system is an online system: so any persons can browse the sit and
download & upload the application form.
Helpful in traffic issues: authorized users can trace the vehicle in the accident
cases using their register number.
It is more users friendly: the sections such as, registration, license etc are
combined together in a single window.
Demo questions of learners license test will help the users in their license
test.
Users can have knowledge about the new rules and regulations from the
informations & awareness section.
Technical feasibility
Operational feasibility
Economic Feasibility:
Economic feasibility is used to determine the benefits and savings expected from the
candidate system and to compare them with costs incurred. If benefits outweigh cost, then
decision will be to design and implement system. Otherwise, alterations will have to be
made to the proposed system. The proposed system is economically feasible.
Technical Feasibility:
Technical feasibility centers on existing system and to what extent it can support proposed
modifications. It involves financial enhancement.
This evaluation determines whether the technology needed for the proposed system is
available or not. This is concerned with specifying satisfy the user requirements. The
technical needs of the system may include front-end and backend-selection.
An important issue for the development of a project is the selection of suitable front-end
and back-end. Based on some aspects, we select the most suitable platform that suits the
needs of the organization.
Operational Feasibility:
The present system is easily understandable. The users are presented with friendly user
interface that helps them to understand the flow of the system more easily.
Maximum transparency has been provided. The new system is very much user friendly
and operational cost is bearable. The maintenance and working of the new system needs
less human efforts. The proposed project is beneficial to the organizational and is user
friendly.
SYSTEM SPECIFICATION
Operating System : Windows NT/2000 Server/ XP/ 2003/ Longhorn (with IIS)
Hard disk : 80 GB
SYSTEM DESIGN
Outputs form computer systems are required primarily to communicate the processing to
the end users. The output of the system designed in such a way that it provides,
opportunities, problem or warnings, trigger an action and confirm an action. The user-
friendly interfaces provide a clear output to the system.
The output of this software system is a website. This system consists of online vehicle
registration, fancy number selection, informations about License, helps traffic police for
tracing particular vehicles, and complaint registration.
In this system the output that can be viewed by the end user is the website. It provides an
opportunity to get public awareness, online registration for vehicles, selection of fancy
number, license application form downloading and uploading, and complaint registration,
automatic e mail for the registered user about license renewal etc.
Table. Name:QuestionBank
As the name suggests DFD is a representation of the data flow within the system. It
includes processes, data stores and external interfaces to the system. External interfaces
may be treated as external entities. DFDs can by explode to sub-processes. Any two
entities/data stores must be connected to each other by some process. The processes
cannot be directly connected to each other. The following are the four major components
of the DFD:
Process
External Entity
Data Store
Connector
The DFD is also known as the bubble chart. It is a simple graphical formalism that can be
used to represent a system in terms of the input data to the system, various processing
carried out in these data and the output data generated by the system. The main reason
why this DFD technique is so popular is probably because of the facts that DFD is very
simple formalism. It is simple to understand and use. A DFD model uses a very limited
number of primitive symbols to represent the functions performed by a system and the
data flow among these systems. Starting with a set of high-level functions that a system
performance of DFD .
Level 0
Level 1
SOFTWARE DEVELOPMENT
5. SOFTWARE DEVELOPMENT
ASP.NET
ASP.NET is more than the next version of Active Server Pages (ASP); it is a
unified Web development platform that provides the services necessary for developers to
build enterprise-class Web applications. While ASP.NET is largely syntax compatible
with ASP, it also provides a new programming model and infrastructure for more secure,
scalable, and stable applications.
ASP.NET is an entirely new technology. ASP.NET is a part of the Microsoft
.NET framework, and a powerful tool for creating dynamic and interactive web pages.
ASP.NET is a server side scripting technology that enables scripts (embedded in web
pages) to be executed by an Internet server. Microsoft's Internet Information Services
(IIS) Web server is by far the most common platform for ASP.NET websites it supports
code written in compiled languages such as Visual Basic, C#, this technology can be
very beneficial in today's broadband era where web applications play a very significant
role.Asp.Net is Compiled one rather than interpreted.
Asp.net provides the developer with several controls to perform basic as well as
advanced operations. Controls provided in Asp.net falls under HTML Controls, HTML
Server Controls.
HTML Server Controls looks exactly like the HTML Controls with one difference that
they are executed on the server rather than the client. Just add a run at server attribute to
indicate that element should be treated as a server control. HTML server controls must be
within a <form> tag with the runat="server" attribute.
Web Server Controls are the most advanced controls in Asp.net. Each control comes with
tons of features that allows the developer to complete the task in less time. Web Server
Controls are executed on the Server. Web Server Controls include datagrid control,
datalist control, calendar control and many many more.
ASP.NET ARCHITECTURE
The .NET Framework is an environment for building, deploying, and running Web
applications and Web Services. Microsoft's first server technology ASP (Active Server
Pages), was a powerful and flexible "programming language". But it was too code
oriented. It was not an application framework and not an enterprise development tool. The
Microsoft .NET Framework was developed to solve this problem.
The .NET Framework is the infrastructure for the new Microsoft .NET Platform.
And it is a common environment for building, deploying, and running Web applications
and Web Services. The .NET Framework contains a common language runtime and
common class libraries - like ADO .NET, ASP .NET and Windows Forms - to provide
advanced standard services that can be integrated into a variety of computer systems. The
.NET Framework provides a feature-rich application environment, simplified development
and easy integration between a numbers of different development languages. The .NET
Framework is language neutral. Currently it supports C++, C#, Visual Basic, and Jscript.
Microsoft's Visual Studio.NET is a common development environment for the new .NET
Framework.
Programming languages:
C# (Pronounced C sharp)
Visual Basic (VB .NET)
J# (Pronounced J sharp)
C# LANGUAGE
C# is introduced as Visual C# in the Visual Studio .NET suite. Support for Visual C#
includes project templates, designers, property pages, code wizards, an object model, and
other features of the development environment. The library for Visual C# programming
is the .NET Framework.
With the lowest implementation and maintenance costs in the industry, SQL Server
2005 delivers rapid return on your data management investment. SQL Server 2005 supports
the rapid development of enterprise-class business applications that can give your company a
critical competitive advantage. Benchmarked for scalability, speed, and performance, SQL
Server 2005 is a fully enterprise-class database product, providing core support for
Extensible Markup Language (XML) and Internet queries.
Microsoft SQL Server 2005 includes a complete set of graphical tools and command line
utilities that allow users, programmers, and administrators to increase their productivity.
SQL Server is a Relational database where data is stored and retrieved very
efficiently.SQL Server Express is a free, easy to use, redistributable version of SQL
Server 2005 designed for building simple data-driven applications. Developers can
design schemas, add data, and query local databases, and perform most of the features
supported by SQL Server 2005.
SQL Server 2005 supports Windows and Server authentication modes and is closely
integrated with it. In Windows Authentication mode, specific Windows user and group
accounts are trusted to log in to SQL Server. no passwords are passed across the network
during the authentication process. In Mixed Mode Authentication, both Windows
accounts and SQL Server-specific accounts (known as SQL logins) are permitted. When
SQL logins are used, SQL login passwords are passed across the network for
authentication
SOURCE CODE
SqlHelper.cs
using System;
using System.Data;
using System.Configuration;
using System.Linq;
using System.Web;
using System.Web.Security;
using System.Web.UI;
using System.Web.UI.HtmlControls;
using System.Web.UI.WebControls;
using System.Web.UI.WebControls.WebParts;
using System.Xml.Linq;
using System.Data.SqlClient;
using System.Data;
/// <summary>
/// Summary description for database
/// </summary>
public class database
{
Sql Connection con =new
SqlConnection(ConfigurationManager.ConnectionStrings["ConnectionString"].Connectio
nString);
public int nonquery(string s)
{
int n = 0;
try
{
con.Open();
catch
{
}
finally
{
con.Close();
}
return n;
}
/*License Application*/
using System;
using System.Collections;
using System.Configuration;
using System.Data;
using System.Linq;
using System.Web;
using System.Web.Security;
using System.Web.UI;
using System.Web.UI.HtmlControls;
using System.Web.UI.WebControls;
using System.Web.UI.WebControls.WebParts;
using System.Xml.Linq;
using System.IO;
}
protected void Button1_Click(object sender, EventArgs e)
{
int i=0;
string cnt = "";
try
{
cnt = db.scalar("select max(id) from LicensePhoto");
}
catch { }
int id = 0;
if (cnt != "")
{
id = int.Parse(cnt) + 1;
}
else
{
id = 1;
}
string ft = FileUpload1.PostedFile.FileName;
string fname = Path.GetFileName(ft);
string str = (id.ToString()) + fname;
Label1.Text = "success";
}
else
{
Label1.Text = "Not success";
}
}
}
else
{
Label1.Text = "Not Saved";
}
}
}
/*Vehicle Registration*/
using System;
using System.Collections;
using System.Configuration;
using System.Data;
using System.Linq;
using System.Web;
using System.Web.Security;
using System.Web.UI;
using System.Web.UI.HtmlControls;
using System.Web.UI.WebControls;
using System.Web.UI.WebControls.WebParts;
using System.Xml.Linq;
}
protected void TextBox8_TextChanged(object sender, EventArgs e)
{
}
protected void Button1_Click(object sender, EventArgs e)
{
int i = 0;
i = db.nonquery("insert into VehicleReg values('" + TextBox1.Text + "','" +
TextBox2.Text + "','" + TextBox3.Text + "','" + TextBox4.Text + "','" + TextBox5.Text +
"','" + TextBox6.Text + "','" + TextBox7.Text + "','" + TextBox8.Text + "','" +
TextBox9.Text + "','" + TextBox10.Text + "','" + TextBox11.Text + "','" +
TextBox12.Text + "','" + TextBox13.Text + "','" + TextBox14.Text + "','" +
TextBox15.Text + "','" + TextBox16.Text + "','" + TextBox17.Text + "','" +
TextBox18.Text + "','" + TextBox19.Text + "','" + TextBox20.Text + "')");
if (i > 0)
{
Label1.Text = "Saved";
TextBox1.Text = "";
TextBox2.Text = "";
TextBox3.Text = "";
TextBox4.Text = "";
TextBox5.Text = "";
TextBox6.Text = "";
TextBox7.Text = "";
TextBox8.Text = "";
TextBox9.Text = "";
TextBox10.Text = "";
TextBox11.Text = "";
TextBox12.Text = "";
TextBox13.Text = "";
TextBox14.Text = "";
TextBox15.Text = "";
TextBox16.Text = "";
TextBox17.Text = "";
TextBox18.Text = "";
TextBox19.Text = "";
TextBox20.Text = "";
}
else
{
Label1.Text = "Not Saved";
}
}
}
Use: To apply for vehicle registration.
/*Complaint Module*/
using System;
using System.Collections;
using System.Configuration;
using System.Data;
using System.Linq;
using System.Web;
using System.Web.Security;
using System.Web.UI;
using System.Web.UI.HtmlControls;
using System.Web.UI.WebControls;
using System.Web.UI.WebControls.WebParts;
using System.Xml.Linq;
using System;
using System.Collections;
using System.Configuration;
using System.Data;
using System.Linq;
using System.Web;
using System.Web.Security;
using System.Web.UI;
using System.Web.UI.HtmlControls;
using System.Web.UI.WebControls;
using System.Web.UI.WebControls.WebParts;
using System.Xml.Linq;
}
protected void Button1_Click(object sender, EventArgs e)
{
string str = "";
try
{
/*Vehicle Search*/
using System;
using System.Collections;
using System.Configuration;
using System.Data;
using System.Linq;
using System.Web;
using System.Web.Security;
using System.Web.UI;
using System.Web.UI.HtmlControls;
using System.Web.UI.WebControls;
using System.Web.UI.WebControls.WebParts;
using System.Xml.Linq;
}
protected void RadioButtonList1_SelectedIndexChanged(object sender, EventArgs e)
{
CheckBox3.Visible = false;
CheckBox4.Visible = false;
}
protected void CheckBox3_CheckedChanged(object sender, EventArgs e)
{
RadioButtonList1.Visible = false;
}
protected void CheckBox4_CheckedChanged(object sender, EventArgs e)
{
RadioButtonList1.Visible = false;
}
int r = 0;
public static int cnt = 0;
r = 1;
Label4.Visible = true;
Button2.Visible = true;
TextBox3.Visible = true;
RadioButtonList1.Visible = false;
Label5.Visible = true;
TextBox4.Visible = true;
Label2.Visible = false;
TextBox1.Visible = false;
Label3.Visible = false;
TextBox2.Visible = false;
cnt = 3;
}
if (CheckBox3.Checked == true)
{
if (r == 0)
{
Button2.Visible = true;
Label4.Visible = true;
TextBox3.Visible = true;
RadioButtonList1.Visible = false;
Label5.Visible = false;
TextBox4.Visible = false;
Label2.Visible = false;
TextBox1.Visible = false;
Label3.Visible = false;
TextBox2.Visible = false;
cnt = 4;
}
}
if (CheckBox4.Checked == true)
{
if (r == 0)
{
Button2.Visible = true;
Label5.Visible = true;
TextBox4.Visible = true;
RadioButtonList1.Visible = false;
Label4.Visible = false;
TextBox3.Visible = false;
Label2.Visible = false;
TextBox1.Visible = false;
Label3.Visible = false;
TextBox2.Visible = false;
cnt = 5;
}
}
}
protected void Button2_Click(object sender, EventArgs e)
{
if (cnt == 1)
{
DataTable dt = new DataTable();
dt = db.table("SELECT name AS NAMEOFOWNER,age AS AGE,caddress AS
CONTADDRESS,dealer AS DEALERNAME,class AS CLASS, body AS BODY,vehicle
AS VEHICLENAME, manuname AS MANUNAME, dateofmanu AS DATEOFMANU,
hp AS HP, chassisno AS CHASSISNO, engno AS ENGNO,capacity AS CAPACITY,
fuel AS FUEL, color AS COLOUR, length AS LENGTH, width AS WIDTH, height AS
HEIGHT, regno AS REGNO FROM VehicleReg where chassisno like
'%"+TextBox2.Text+"%'");
if (dt.Rows.Count > 0)
{
GridView1.DataSource = dt;
GridView1.DataBind();
}
else
{
Label6.Text = "No Records";
}
}
else if (cnt == 2)
{
{
Label6.Text = "No Records";
}
}
else if (cnt == 4)
{
DataTable dt = new DataTable();
dt = db.table("SELECT name AS NAMEOFOWNER,age AS AGE,caddress AS
CONTADDRESS,dealer AS DEALERNAME,class AS CLASS, body AS BODY,vehicle
AS VEHICLENAME, manuname AS MANUNAME, dateofmanu AS DATEOFMANU,
hp AS HP, chassisno AS CHASSISNO, engno AS ENGNO,capacity AS CAPACITY,
fuel AS FUEL, color AS COLOUR, length AS LENGTH, width AS WIDTH, height AS
HEIGHT, regno AS REGNO FROM VehicleReg where vehicle like '%" +
TextBox3.Text + "%'");
if (dt.Rows.Count > 0)
{
GridView1.DataSource = dt;
GridView1.DataBind();
}
else
{
Label6.Text = "No Records";
}
}
else if (cnt == 5)
{
DataTable dt = new DataTable();
dt = db.table("SELECT name AS NAMEOFOWNER,age AS AGE,caddress AS
CONTADDRESS,dealer AS DEALERNAME,class AS CLASS, body AS BODY,vehicle
AS VEHICLENAME, manuname AS MANUNAME, dateofmanu AS DATEOFMANU,
hp AS HP, chassisno AS CHASSISNO, engno AS ENGNO,capacity AS CAPACITY,
fuel AS FUEL, color AS COLOUR, length AS LENGTH, width AS WIDTH, height AS
HEIGHT, regno AS REGNO FROM VehicleReg where color like '%" + TextBox4.Text
+ "%'");
if (dt.Rows.Count > 0)
{
GridView1.DataSource = dt;
GridView1.DataBind();
}
else
{
Label6.Text = "No Records";
}
}
}
}
Use: To search for a vehicle using some key.
/*Message*/
using System;
using System.Collections;
using System.Configuration;
using System.Data;
using System.Linq;
using System.Web;
using System.Web.Security;
using System.Web.UI;
using System.Web.UI.HtmlControls;
using System.Web.UI.WebControls;
using System.Web.UI.WebControls.WebParts;
using System.Xml.Linq;
SYSTEMTESTING
&
IMPLEMENTATION
System testing is actually a series of different whose primary purpose is to fully exercise
the computer based system. Software testing is critical element of software quality
assurance and represent the ultimate review of the specification, design and coding.
System testing makes a logical assumption that all the part of the system is correct; the
goal will be successfully achieved. Testing is the final verification and validation activity
within the organization itself. During testing the major activities are concerned on the
examinations and modification of the source code.
Testing is a process of executing a program with the intend of finding an error. A good
test is one that uncovers an as yet undiscovered error. Testing objectives are;
Unit testing
Integration testing
System testing
Validation testing
Unit Testing
Unit testing enables a programmer to detect error in coding. A unit test focuses
verification of the smallest unit of software design. This testing was carried out during the
coding itself. In this testing step, each module going to be work satisfactorily as the
expected output from the module.
Project aspect:
The front end design consists of various forms. They were tested for data acceptance.
Similarly, the back-end also tested for successful acceptance and retrieval of data.
Integration Testing
Through each program work individually, they should work after linking together. This is
referred to as interfacing. Data may be lost across the interface; one module can have
adverse effect on the other subroutines after linking may not do the desired function
expected by the main routine. Integration testing is the systematic technique for
constructing the program structure while at the same time conducting test to uncover
errors associated with the interface. Using integrated test plan prepared in the design
phase of the system development as a guide, the integration test was carried out. All the
errors found in the system were corrected for the next testing step.
Project Aspect
After connecting the back-end and the front-end as whole module, the data entered in the
front-end once submitted were successfully entered in the Database. On request, data
were successfully retrieved in to forms.
System Testing
After performing the integration testing, the next step is output testing of the
proposed system. No system could be useful if it doesnt produce the required output in a
specified format. The outputs generated are displayed by the user. Here the output format
is considered in to two ways. One in on screen and other in printed format.
Project aspect:
The entire project was tested and found successful.
Validation Testing
The user has to work with the system and check whether the project meets his needs. In
the validation checking the user works with the beta version of the software.
Project aspect:
User enters the appropriate data and results was checked and validated.
User Acceptance Testing
User acceptance of a system is a key factor of the success of any system. The system
under consideration was tested for user acceptance by running a prototype of the
software.
Project aspect:
An Alfa version is demonstrated to the users. Their suggestions are recorded.
White box testing is a set case design method that uses the control structure of the
procedural design to derive test cases. Using white box testing methods, we can derive
test cases that
Guarantee that all independent paths within a module have been exercised
at least once
Execute all loops at their boundaries and within their operational bounds
Black box testing methods focus on the functional requirements in the software. That is,
black box testing enables us to derive sets of input conditions that will fully exercise
All functional requirements of the program Black box testing attempts to find errors in the
following categories:
Incorrect or missing function
Interface errors
Performance errors
7.2.SYSTEM IMPLEMENTATION
Once the system was tested, the implementation phase started. Crucial phase in the
system development life cycle is successful implementation of new system design.
Implementation simply means converting new system design into operation. This is the
moment of truth the first question that strikes in everyones mind that whether the system
will be able to give all the desired result as accepted from system. Prior to starting the
project implementation process project must have successfully completed the project
evaluation process and the project has been approved for implementation.
The project evaluation process includes performing a needs analysis and architecture
review. The implementation phase of the software design consists of different tasks to be
done sequentially for obtaining the desired result. Several distinct implementation
projects rather than one large implementation could limit risk and in scope and resource
management. So the project was implemented module wise.
Implementation Methodology
An implementation methodology is a collection of practices, procedures and rules that
must be applied to perform a specific operation to provide deliverables at the end of each
stage. The eight principles listed below is built from a collection of procedures to
establish an effective implementation methodology framework. This framework provides
flexibility to react and adapt to the unique requirements of every project, incorporating
the principles of:
Project management is the art and science of communicating between individuals with
different responsibilities, perspectives, and expectations so that the project team and the
sponsoring organization perceive value and quality in the end product
The implementation process should be driven by solid project management principles and
the concept of people working in tandem. The project manager drives the collaborative
process so team members work together to accomplish agreed goals.
Scope & Requirements Specification
The implementation approach should have an outcomes-based focus. This means that the
process emphasizes on identifying the business requirements that target an organizations
specific goals and objectives.
This is achieved through a systematic manner which sets out a solution roadmap that
transforms goals and objectives into functional requirements (critical success factors,
csfs).
Risk Management
Risk is associated with almost everything we do and is definitely associated with software
implementation projects. A risk is something that may happen, implying a probability
of less than 100%, and if it does transpire, will have an adverse impact on the project. If it
has a probability of 100%, in other words, it occurs then it becomes an issue. Such an
issue is handled differently to a risk.
Risk management
An effective methodology approach addresses risk management in four stages:
Stage 1: Identification
Stage 2: Quantification
Stage 3: Response
Stage 4: Control
Issue management
Issues are really problems. To solve the problem, an action must be assigned to
someone who has to do something by a due date. Issues should be tracked by type,
status and priority. The methodology should encapsulate the following steps when
managing issues:
1. Define what an issue is.
model will determine the overall success of a project by measuring and reviewing the
client kpis in terms of the project and organizational objectives. Project learnings should
also feedback into the implementation methodology itself in the form of continual
improvement initiatives.
Documentation
An implementation methodology must be well documented. The documentation should
be content and audience-specific and usually comes in the form of:
Procedure An overview of the methodology, its phases, milestones and deliverables.
This type of documentation also includes templates that help promote efficiencies and
streamline the implementation process. This type of documentation is aimed at the project
team.
Technical Describes the technical & installation requirements for the information
system. This type of documentation is aimed at a technical audience.
End-User Refers to manuals for the end-user, system administrator and support staff.
They include resources such as training manuals, training aides (such as powerpoint
slides) and automated training material (such as animations).
Experience
Experience is a valuable commodity and vital ingredient for improving the success of any
project. Leveraging the knowledge, talent and skills acquired through years of operational
experience drives the development of a proven deployment methodology.
It is not possible to sustain a quality model without continual improvement initiatives. A
software providers implementation consultants should have extensive actual experience
in addressing the day-to-day issues with which their clients are confronted. They must be
able to advise, instruct, apply creative solutions, resolve process issues and leverage
organizational resources. In this way, they also help develop the methodology through
refinements and application of best practices.
Implementation Plan
Our project is designed by strictly following the rules and regulations of the Kerala Motor
Vehicle act. So this can implement in any Regional Transport Office in Kerala.
involved in more than a project conflicts may arise over the relative priorities of these
projects in the competition for resources. In addition, the lack of a central point of
complete responsibility and authority for the project may entails that a functional
department places more emphasis on its own specialty than on the goal of the project.
Project organizations are the opposite of the functional organizations (see figure 14). In
thiscase a manager is given the full responsibility and authority for conducting the
project; all the resources needed for accomplishing the project goals are separated from
the regular functional structure and organized into an autonomous, self-contained team.
The project manager may possibly acquire additional resources from outside the overall
organization. Advantages of this type of organization are a full control over the project,
quick decision making, and a high motivation of project personnel. Weaknesses include
the fact that there is a start-up time for forming the team, and there may be an inefficient
use of resources.Matrix organizations are a composition of functional and project
organizations with theobjective of maximizing the strengths and minimizing the
weaknesses of both types oforganizations.
Maintenance is still perceived by many organizations as a non strategic issue,and this
explain why it is staffed with students and new hired people. To compound theproblem
there is the fact that most Universities do not teach software maintenance,
andmaintenance is very rarely though in corporate training and education programs, too.
Thelack of appraisal of maintenancepersonnel generates other managerial problems,
primarily high turnover and low morale
Security can have varying levels of difficulty for implementation. One factor in
determining the difficulty is the number and distribution of the systems. When only
individual systems need to be protected, such as one computer with all files residing
locally and with no need to connect to any outside resources, security is not as complex as
with distributed systems. With distributed systems architecture, there are different nodes
and resources. One major issue with distributed systems is application security. There is
the question of how security is handled in distributed applications, and how the client
handles applications coming from an unknown source.
The security policy consists of those procedures and regulations intended to maintain the
desired level of system security. The security policy for the Teradata RDBMS should
include two essential implementation elements:
The first step to establish a security policy is to identify security needs, which will
involve the following:
Identifying the business importance of the data and its associated processing system.
Assigning a security priority to the data, based on the business case evaluation.
Identifying the classes of users requiring access to the Teradata RDBMS and the data
under its control.
Identifying the system resources requiring protection to ensure continued availability to
all valid Teradata users.
The security requirements should be based on the business value of the data processed on
the system. A system that stores and processes highly sensitive data probably has a
greater need for security than one that does not.
There are three levels of data security, including minimal, moderate, and high. Each level
will have its advantages and disadvantages:
Minimal security Anyone who has successfully logged on to the system has unrestricted
access to all data and Teradata RDBMS resources. No security-related auditing is done,
and there is no formal security policy. The only security-related access restriction is that a
user must first gain access to a client system that is capable of communicating with the
Teradata RDBMS. All these make sharing information is extremely simple, and the
system performance is enhanced by the lack of security enforcement activities. On the
other hand, obviously, the data is subject to destroy or corrupt due to the luck of the
system security control.
Moderate security In this class, users are grouped according to their needs and
trustworthiness. Under moderate security, unlimited access is reserved for a small,
privileged subgroup. Only occasional auditing of security-related events is performed,
and no formal security policy exists for the users. In this class, security-related events that
have a little or no effect on system performance, and users are subject to little or no
demand for additional effort to perform their work, but the disadvantage is that it's
possible that serious violation attempt can go undetected for extended periods.
High security At this level, a security administrator is identified and charged with
establishing and maintaining Teradata RDBMS security. Physical access to processors,
disk storage units, and system consoles is carefully controlled. Security-related events are
audited regularly. Random security audits of individual users are performed. In this class,
data and processing resources are afforded a high level of protection. If an unauthorized
access is attempted, the auditing policy is designed to both detect the attempt and permit
corrective measures to be implemented. The disadvantage is that shared data requires
additional effort on the part of owner, as they must define who is authorized to access the
owned information. Also, based on the frequency and scope of the audit, system
performance can be negatively affected by the demands of auditing security-related
events.
Once the security needs of the system have been defined, a security policy can be
formulated. The security documents should cover:
CONCLUSION
7CONCLUSION
The application is designed in such a way that any further enhancements can be done
with ease. The system has the capability for easy integration with other systems. New
modules can be added to the existing system with less effort.
The system has six classes. Each of these classes has various procedures and functions.
In future a new function or procedure can be easily added in the system through these
classes. Or even a new class can be added. The system generates only a limited number
of reports. If more detailed reports are required the system can be directed. Even though
the system has well communication facility, it's not enough. The mail service can be
enhanced with features bcc, cc etc. the system has full security but the account
information for the customer credit information. Thus by adding this module the system
transaction will be improved.
FUTURE ENHANCEMENT
9. FUTURE ENHANCEMENTS
This application can be easily implemented under various situations. We can add new
features as and when we require. Reusability ispossible as and when require in this
application. There is flexibilityin all the modules.
SOFTWARE SCOPE:
Extensibility:
This software is extendable in ways that its originaldevelopers may not expect. The
following principles enhances extensibility like hide data structure, avoid traversing
multiplelinks or methods, avoid case statements on object type anddistinguish public and
private operations
Reusability:
APPENDIX
10 . APPENDIX
10.1 SCREENSHOT
login
admin Home
ViewRegisteredUsers
Add maker
add question
Userlogin
RequestLearningLicence
RequestDrivingLicence
RequestVehicleRegistration
RequestRenewLicence
RequestDuplicateLicence
RequestDuplicateRegistration
RequestRenewRegistration
BIBLIOGRAPHY
11. BIBLIOGRAPHY
Professional VB. NET - Bill Evjen, Billy Hollis, Rockford Lhotka
An Introduction To Database Systems -Bipin.C.Desai
Software Engineering -Roger S.
Elements Of System Analysis -Marvin Gore
Database system concept -Silberschatze
Designing Visual Basic.NET Applications -David Vitter
Mastering ASP.NET with VB.NET -A Russell Jones