Está en la página 1de 57

ON ROAD VEHICLE BREAKDOWN ASSISTANCE 1

1. INTRODUCTION

Department Of Computer science K.V.V.S College of Science & technology


ON ROAD VEHICLE BREAKDOWN ASSISTANCE 2

1.1 PROJECT PROFILE


On Road Vehicle Breakdown Assistance

This vehicle management system is fully customized web application where company staff
can view each customer order and give a solution to those vehicle problems. The locating
system allows you to search Mechanics from different locations. Admin handles and can
access the user details as well as the Mechanic details. Admin has the access to allow/block
and view the mechanics. This online mechanic locator reduces your work and can easily
find the mechanics from various areas. Reduces your time and cost.

Modules and their Description

The system comprises of 3 major modules with their sub-modules as follows:

Admin

a. Login: Admin need to login with valid login credentials.


b. View Mechanics: Admin can view the registered mechanics with their details and
has the access to allow or block a mechanics.
c. View Users: Admin can view all the registered user details.
d. View Feedback: Admin can view all the feedback given by the user and mechanic.

Mechanic:
e. Register: Mechanics can register with all their information.
f. Login: Registered mechanics will be provided access to Login only if the Admin
will allow or block.
g. View Request: Mechanics can view the request which is sent by the user.
h. Feedback: Mechanics can provide their own feedback.

Department Of Computer science K.V.V.S College of Science & technology


ON ROAD VEHICLE BREAKDOWN ASSISTANCE 3

2. User:
a. Register: User can register with all their details.
b. Login: Registered user can Login with their credentials.
c. Search Mechanics: User can search for local mechanics on the basis of their
locations.
d. Send Request: On selection of the mechanics, the user can send the request to the
respective mechanic.
e. Feedback: User can give their feedback accordingly.

Department Of Computer science K.V.V.S College of Science & technology


ON ROAD VEHICLE BREAKDOWN ASSISTANCE 4

2. ABOUT THE DEVELOPING TOOLS

Department Of Computer science K.V.V.S College of Science & technology


ON ROAD VEHICLE BREAKDOWN ASSISTANCE 5

2.1 INTRODUCTION TO PHP


The PHP Hypertext Preprocessor (PHP) is a programming language that allows web developers
to create dynamic content that interacts with databases. PHP is basically used for developing
web based software applications. HP started out as a small open source project that evolved as
more and more people found out how useful it was. Rasmus Lerdorf unleashed the first version
of PHP way back in 1994.

 PHP is a recursive acronym for "PHP: Hypertext Preprocessor".

 PHP is a server side scripting language that is embedded in HTML. It is used to manage
dynamic content, databases, session tracking, even build entire e-commerce sites.

 It is integrated with a number of popular databases, including MySQL, PostgreSQL,


Oracle, Sybase, Informix, and Microsoft SQL Server.

 PHP is pleasingly zippy in its execution, especially when compiled as an Apache module
on the Unix side. The MySQL server, once started, executes even very complex queries
with huge result sets in record-setting time.

 PHP supports a large number of major protocols such as POP3, IMAP, and LDAP. PHP4
added support for Java and distributed object architectures (COM and CORBA), making
n-tier development a possibility for the first time.

 PHP is forgiving: PHP language tries to be as forgiving as possible.

 PHP Syntax is C-Like.

Common uses of PHP


 PHP performs system functions, i.e. from files on a system it can create, open, read,
write, and close them.

 PHP can handle forms, i.e. gather data from files, save data to a file, through email you
can send data, return data to the user.

 You add, delete, and modify elements within your database through PHP.

 Access cookies variables and set cookies.

Department Of Computer science K.V.V.S College of Science & technology


ON ROAD VEHICLE BREAKDOWN ASSISTANCE 6

 Using PHP, you can restrict users to access some pages of your website.

 It can encrypt data.

Characteristics of PHP
Five important characteristics make PHP's practical nature possible −

 Simplicity
 Efficiency
 Security
 Flexibility
 Familiarity
 All of the PHP present in the Web page is processed and stripped from the page; the only
thing returned to the client from the Web server is pure HTML output.

 All PHP code must be included inside one of the three special markup tags ATE are
recognized by the PHP Parser.

In order to develop and run PHP Web pages three vital components need to be installed on your
computer system.

 Web Server − PHP will work with virtually all Web Server software, including
Microsoft's Internet Information Server (IIS) but then most often used is freely available
Apache Server. Download Apache for free here − https://httpd.apache.org/download.cgi

 Database − PHP will work with virtually all database software, including Oracle and
Sybase but most commonly used is freely available MySQL database. Download
MySQL for free here − https://www.mysql.com/downloads/

 PHP Parser − In order to process PHP script instructions a parser must be installed to
generate HTML output that can be sent to the Web Browser. This tutorial will guide you
how to install PHP parser on your computer.

Department Of Computer science K.V.V.S College of Science & technology


ON ROAD VEHICLE BREAKDOWN ASSISTANCE 7

2.2 DATABASE

MY SQL

MySQL exceeds dependability requirements and provides innovative capabilities that increase
employee effectiveness, integrate heterogeneous IT ecosystems, and maximize capital and
operating budgets. MySQL provides the enterprise data management platform the organization
needs to adapt quickly in a fast-changing environment. With the lowest implementation and
maintenance costs in the industry, MySQL delivers rapid return on data management investment.
It supports the rapid development of enterprise-class business applications that can give an
insurance company a critical competitive advantage. Benchmarked for scalability, speed, and
performance, it is a fully enterprise-class database product, providing core support for Extensible
Mark-up Language (XML) and Internet queries.

2.3 OPERATING SYSTEM

WINDOWS XP

Windows XP is an operating system produced by Microsoft for use on personal computers,


including home and business desktops, laptops and media centers. First released to computer
manufacturers on August 24, 2001, it is the second most popular version of windows, based on
installed user base. The name “XP” is short for “experience”, highlighting the enhanced user
experience.

Windows XP, the successor to Windows Me, was the first consumer-oriented operating system
produced by Microsoft to be built on the Windows NT kernel. Windows XP was released
worldwide for retail sale on October 25, 2001, and over 400 million copies were in use in
January 2006. It was succeeded by Windows Vista in January 2007. Direct OEM and retail test
of windows XP ceased on June 30, 2008. Microsoft continued to sell Windows XP through their
System Builders (smaller OEMs who sell assembled computers) program until January 31, 2009.

Department Of Computer science K.V.V.S College of Science & technology


ON ROAD VEHICLE BREAKDOWN ASSISTANCE 8

On April 10, 2012, Microsoft reaffirmed that extended support for Windows XP office 2003
would end on April 8, 2014 and suggested that administrators begin preparing to migrate to a
newer OS.

We make use of the latest OS because, now a days, all the users are friendly with the latest
technologies , so as the latest the OS, that well the user will be able to handle the new software.

Department Of Computer science K.V.V.S College of Science & technology


ON ROAD VEHICLE BREAKDOWN ASSISTANCE 9

3. SYSTEM ANALYSIS

Department Of Computer science K.V.V.S College of Science & technology


ON ROAD VEHICLE BREAKDOWN ASSISTANCE 10

3.1 INTRODUCTION

System Analysis refers to the process of examining a situation with the intention of improving it
through better process and methods. System analysis is therefore, the process of gathering and
interpreting facts, diagnosing problem and using the information to recommend information in
system or in other words, it means a detailed explanation or description. Before computerizing a
system under consideration, it has to be analyzed. We need to study how it functions currently,
what are problems and what are requirements that proposed software should meet.

The software provides a user friendly interface which can be operated by anyone with a
minimum knowledge of the computer system. It should maintain a well-organized database for
storing the resources .This helps us to eliminate the entering of invalid data. Most problems of
manual system can be solved by this required system.
The main components of making software are:
• System and software requirements analysis.

•Design and implementation of software.

•Ensuring, verifying and maintaining software integrity.

3.2 EXISTING SYSTEM

In the present system a customer has to approach various services to get proper and well
maintained result. This often requires a lot of time and effort. A customer may not get the
desired services from the centers and often the customer may be misguided.

Disadvantages of existing system

 Validating problems.
 Time consumption.
 More formalities needed.
 Need of more administrator assistants.

Department Of Computer science K.V.V.S College of Science & technology


ON ROAD VEHICLE BREAKDOWN ASSISTANCE 11

3.3 PROPOSED SYSTEM

The computerization of the system allows the easy maintenance of the details. Large amount of
data can be stored easily. Addition and updating other changes can be done easily. The
information can be retrieved with high speed and accuracy. The use of GUI oriented software
makes the system user friendly. Since all work is computerized, the calculations are effortless
and less time consuming. Speed, accuracy, storage capacity, versatility, automation etc are the
advantages of using a computerized system.

The main purpose behind the proposed system is to provide a comprehensive computerized
system, which can capture, collate and analyze the data from these wards and evaluate the impact
of the program.

The main advantages of the new system are:


 Security:
The software used for this “On Road Vehicle Breakdown Assistance” includes the
password, so the security is provided. When anyone opens the software it has the
provision for entering password. We have to enter the correct password; otherwise we
cannot enter into the system. Password is saved in system registry for more security.

 User Friendly:
This package is very user friendly because it is easy to maintain and operate. All data
entry operations are simple, administrator needs only to enter data and all other
operations are performed by the computer.

 Speed and Accuracy:


Computerization process increases the speed of all the operations. The manpower is
reduced. Instead of doing all operation manually, computer will do it automatically. It
also increases the accuracy of all the operations performed.

Department Of Computer science K.V.V.S College of Science & technology


ON ROAD VEHICLE BREAKDOWN ASSISTANCE 12

 Efficiency and flexibility:


The flexibility and the efficiency of all the operation is increased because of the
computerization. No errors are occurred compared to the manual system.

 Automation: The proposed system automates each and every activity of the manual
system and increases its throughput. Thus the response time of the system is very less and
it works very fast.

3.3.1 Justification of the proposed system

The propose system is interactive, highly user friendly and designed exclusively for “On Road
Vehicle Breakdown Assistance”. The system covers almost all the functional areas of the
training and placement cell management.

The “On Road Vehicle Breakdown Assistance” is a database system used to store the
information regarding details of users, mechanics, feedback etc...

All the operations and activities related to “On Road Vehicle Breakdown Assistance “can be
carried out efficiently. The project maintains well organized database for storing the resources
that they are provided by the members. This helps us to eliminate the entering of invalid data.
Most problems of manual system can be solved by this system.

The new system works on a windows based platform, PHP as front end. The computerization of
the system allows the easy maintenance of the details. Large amount of data can be stored easily.
Addition and updating other changes can be done easily. The information can be retrieved with
high speed and accuracy. The use of GUI oriented software makes the system user friendly.
Since all work is computerized, the calculations are effortless and less time consuming. Speed,
accuracy, storage capacity, versatility, automation etc. are the advantages of using a
computerized system.

Department Of Computer science K.V.V.S College of Science & technology


ON ROAD VEHICLE BREAKDOWN ASSISTANCE 13

3.3.2 Benefits of the proposed system

 Security:
The software used for this project includes the password, so the security is provided.
When anyone opens the software it has the provision for entering password. We have to
enter the correct password; otherwise we cannot enter into the system. Password is saved
in system registry for more security.

 User Friendly:
This package is very user friendly because it is easy to maintain and operate. All data
entry operations are simple, administrator needs only to enter data and all other
operations are performed by the computer.

 Speed and Accuracy:


Computerization process increases the speed of all the operations. The manpower is
reduced. Instead of doing all operation manually, computer will do it automatically. It
also increases the accuracy of all the operations performed.

 Efficiency and flexibility:


The flexibility and the efficiency of all the operation in this system is increased because
of the computerization. No errors are occurred compared to the manual system.

 Automation: The proposed system automates each and every activity of the manual
system and increases its throughput. Thus the response time of the system is very less and
it works very fast.

Department Of Computer science K.V.V.S College of Science & technology


ON ROAD VEHICLE BREAKDOWN ASSISTANCE 14

4. SYSTEM SPECIFICATION

Department Of Computer science K.V.V.S College of Science & technology


ON ROAD VEHICLE BREAKDOWN ASSISTANCE 15

4.1. SOFTWARE SPECIFICATION

We require much different software to make the application which is in making to work
efficiently. It is very important to select the appropriate software so that the software works
properly.

Below is the software that is required to make the new system.

1. Windows 7 or higher versions

2. PHP

3. MySQL

4.2. HARDWARE SPECIFICATIONS

The selection of hardware is very important in the existence and proper working of any
software. When selecting hardware, the size and capacity requirements are also important. Below
is some of the hardware that is required by the system

Processor : Dual core processor of 2.0 GHz or more


RAM : 1GB of RAM
Hard Disk Space : 2GB free hard disk space
Input Devices : Mouse, Keyboard
Output Devices : Monitor, Printer

Department Of Computer science K.V.V.S College of Science & technology


ON ROAD VEHICLE BREAKDOWN ASSISTANCE 16

5. SYSTEM DESIGN

Department Of Computer science K.V.V.S College of Science & technology


ON ROAD VEHICLE BREAKDOWN ASSISTANCE 17

5.1 INTRODUCTION TO SYSTEM DESIGN

The most creative and challenging phase of the system life cycle in the system design. The term
design describes a final system and the processed by which it is developed, it refers to the
technical specifications that be applied in implementing a candidate system. It also includes the
construction of program testing.

The goal of design process is to produce a model as representation of the system; which can be
used later to build the system. The design process for software for the system, the specification
of those modules, and how the modules should be interconnected. This is called top level design.
In the second level, the internal design of the module can be satisfied, is decided. This design is
called logical design.

System designing is the process of defining the architecture, components, modules, interfaces
and data for the “On Road Vehicle Breakdown Assistance” to satisfy specified requirements of
the customer. It says “how to” approach compared to system analysis which is a “what is”
orientation. It translates the system requirements into ways of making them operational. The
design phase focuses on the detailed implementation of the training and placement cell
management recommended in the feasibility study.

Department Of Computer science K.V.V.S College of Science & technology


ON ROAD VEHICLE BREAKDOWN ASSISTANCE 18

5.2 INPUT DESIGN

Input design is the process of converting user originated inputs to a computer based format. Input
data are collected and organized into groups of similar data. Data are entered through keyboard
and also the user can use the mouse for selecting options. Errors entered by data entry operation
can be controlled by input design. The goal of designing input data is to make data entry an easy.
Logical and free from errors are possible.

All input data are validated in the order and if any data violates any condition the user is warned
by a message and asks to re-enter data. If the data satisfies all the condition then it is transferred
to the appropriate tables in the database.

5.3 OUTPUT DESIGN

Output design is used to provide outputs to the users of the system. Computer output is the most
important direct source of information to the user. Efficient intelligible output design improves
the system relationships with the user and help in decision making major form of the output is
the hardcopy from the printer and the screen reports. The output devices to consider depend on
factors such as compatibility of the devices with the system, expected print quality and number
of copies needed.

Department Of Computer science K.V.V.S College of Science & technology


ON ROAD VEHICLE BREAKDOWN ASSISTANCE 19

5.4 DATABASE DESIGN

A database is a collection of interrelated data stored within minimum redundancy to serve many
users quickly and efficiently. It is a process of designing the database file, which is the key
source of the information in the system. The objective of database is to design is to provide
storage and it contributes to the overall efficiency of the system. The file should properly design
and planned for collection, accumulation, editing and retrieving the required information. The
primary objective of a database design are fast response time to inquiries ,more information at
low cost, control of redundancy, clarity and ease of use, accuracy and integrity of the system, fast
recovery and availability of powerful end-user languages. The theme behind a database is to
handle information as an integrated whole thus the main objective is to make information as
access easy, quick, inexpensive and flexible for the users. In this project, we mainly concentrated
into relational databases. Relational database stores data in tables, which is turn, are composed of
rows also known as records, columns also known as fields. The fields in the relational model
are:-

Primary Key
The key which is uniquely identify records. They also notify the not null constraints.

Foreign Key
The key which reference the primary key, is the data inserted in the primary key column of the
table.

Department Of Computer science K.V.V.S College of Science & technology


ON ROAD VEHICLE BREAKDOWN ASSISTANCE 20

Normalization

After the conceptual level, the next level of process of database design to organize the database
structure into a good shape called Normalization. The normalization simplifies the entries,
removing redundancies from the system data and finally builds a data structure, which is both
flexible and adaptable to the system. The different normal forms obtained during the database
design are given below:

In the database design, we create a database with different tables that is used to store the data.
We normalize the data in the table. Database normalization is the process of organizing the
fields and tables in a relational database to minimize redundancy and dependency. Normalization
usually involves dividing large tables into smaller (and less redundant) tables and defining
relationships between them. The objective is to isolate data so that additions, deletions, and
modifications of a field can be made in just one table and then propagated through the rest of the
database via the defined relationships.
In the project I have made used of the 3rd normal form, Third Normal Form (3NF) is a property
of database tables. A relation is in third normal form if it is in Second Normal Form and there are
no functional (transitive) dependencies between two (or more) non-primary key attributes. The
overall objective in the development of database technology has been to treat data as an
organizational resource and as an integrated whole. Database Management System allows data to
be protected and organized separately from other resources. Database is an integrated collection
of data. This is the difference between logical and physical data.

The tables are used to store the values that are generated by the application. The main field
names and the key constraints of all the tables are shown below in detailed

 A database is a collection of data. Database design refers to the design of


the table used to store the data. The database involves name of record, data items with its
name, type and size. In the design of the database program first we have to thoroughly
look into the requirements of the program for design of the database. Then we have to
design how much tables are required in the database. Thereafter as per requirement of the
end user we can decide which fields that must be in this table. As per a general rule a

Department Of Computer science K.V.V.S College of Science & technology


ON ROAD VEHICLE BREAKDOWN ASSISTANCE 21

provision must be taken in design for the future enhancement of the program. Here we
have designed a database with some tables as shown.

 For the database normalization different tables used for storing data is
broken to simplified tables in a relational database to minimize redundancy and
dependency. Normalization usually involves dividing large tables into smaller tables and
defining relationships between them. Database Management System allows data to be
protected and organized separately from other resources. Database is an integrated
collection of data. This is the difference between logical and physical data. Are used to
store the values that are generated by the application.

5.5 DATA FLOW DIAGRAM

A DFD also known as ‘bubble chart’ has the purpose of clarifying system requirements and
identifying major transformations. It shows the flow of data through a system. It is a graphical
tool because it presents a picture. The DFD may be partitioned into levels that represent
increasing information flow and functional detail. Four simple notations are used to complete a
DFD. These notations are given below:-

5.5.1 DFD Symbols

The data flow is used to describe the movement of information from one part of the system to
another part. Flows represent data in motion. It is a pipe line through which information flows.
Data flow is represented by an arrow.

Department Of Computer science K.V.V.S College of Science & technology


ON ROAD VEHICLE BREAKDOWN ASSISTANCE 22

PROCESS
A circle or bubble represents a process that transforms incoming data to outgoing data. Process
shows a part of the system that transforms inputs to outputs.

EXTERNAL ENTITY
A square defines a source or destination of system data. External entities represent any entity
that supplies or receive information from the system but is not a part of the system.

DATA STORE
The data store represents a logical file. A logical file can represent either a data store symbol
which can represent either a data structure or a physical file on disk. The data store is used to
collect data at rest or a temporary repository of data. It is represented by open rectangle.

Department Of Computer science K.V.V.S College of Science & technology


ON ROAD VEHICLE BREAKDOWN ASSISTANCE 23

5.6 ENTITY RELATIONSHIP DIAGRAM

This depicts relationship between data objects. The attribute of the each data objects noted in the
entity relationship diagram can be described using a data object description.

Data objects: a data is a representation of almost any composite information that must
understood by the software.

Attribute: it defines the properties of a data object and takes on one of three different
characteristics.

Entity –

Relationship –

Attribute –

Line-
.

Department Of Computer science K.V.V.S College of Science & technology


ON ROAD VEHICLE BREAKDOWN ASSISTANCE 24

ER DIAGRAM SHOWING ON ROAD VEHICLE BREAKDOWN


ASSISTANCE

Level 0

Context Level DFD

Department Of Computer science K.V.V.S College of Science & technology


ON ROAD VEHICLE BREAKDOWN ASSISTANCE 25

Department Of Computer science K.V.V.S College of Science & technology


ON ROAD VEHICLE BREAKDOWN ASSISTANCE 26

Department Of Computer science K.V.V.S College of Science & technology


ON ROAD VEHICLE BREAKDOWN ASSISTANCE 27

Department Of Computer science K.V.V.S College of Science & technology


ON ROAD VEHICLE BREAKDOWN ASSISTANCE 28

5.7 TABLE STRUCTURE

Table 5.7.1

Table Name : login

Field Name Data Type Constrains Description


uid int(11) Primary key Login Id
uname varchar(20) Not null Login Name
upass varchar(20) Not null Login Password

utype varchar(20) Not null Status

Table 5.7.2

Table Name:book

Field Name Data Type Constrains Description


bid Int(11) Primary key
bdte varchar(20) Not null
smid Int(20) Not null
uid Int(11) Primary key Login Id
dte varchar(20) Not null Date
tym varchar(20) Not null Time
status varchar(50) Not null Status

Department Of Computer science K.V.V.S College of Science & technology


ON ROAD VEHICLE BREAKDOWN ASSISTANCE 29

Table 5.7.3

Table Name: breakdown

Field Name Data Type Constrains Description

bid Int(11)
bdte varchar(20)
smid int(20)

uid Int(11)

Table 5.7.4

Table Name: feedback

Field Name Data Type Constrains Description

fid int(11) Primary key Feedback id

uid int(11) Primary key Login id

fdbk varchar(500) Not null Feedback

Department Of Computer science K.V.V.S College of Science & technology


ON ROAD VEHICLE BREAKDOWN ASSISTANCE 30

Table 5.7.5

Table Name: mechanic

Field Name Data Type Constrains Descriptions


mid int(11) Primary key Mechanic id
mname varchar(50) Not null Mechanic name
adr varchar(100) Not null Address
loc varchar(50) Not null Location
phn varchar(15) Not null Phone
em varchar(50) Not null email

Table 5.7.6

Table Name: register

Field Name Data Type Constrains Description


rid int(11)
name varchar(50)
adr varchar(100)
phn varchar(15)
em varchar(50)

Department Of Computer science K.V.V.S College of Science & technology


ON ROAD VEHICLE BREAKDOWN ASSISTANCE 31

Table 5.7.7

Table Name : service

Field Name Data Type Constrains Description


sid int(11)
mid vnt(20)
sname varchar(50)
dtls varchar(6000)

Department Of Computer science K.V.V.S College of Science & technology


ON ROAD VEHICLE BREAKDOWN ASSISTANCE 32

6. SYSTEM TESTING

Department Of Computer science K.V.V.S College of Science & technology


ON ROAD VEHICLE BREAKDOWN ASSISTANCE 33

6.1 INTRODUCTION TO SYSTEM TESTING

System testing is actually a series if different tests whose primary process is to fully exercise the
computer based system. Each test has different purpose, but all work that system elements have
been properly integrated and perform allocated functions.

System testing is the stage of implementation, which is aimed at ensuring that the system works
accurately and efficiently before live operation commences. Testing is vital to the success of the
system. Testing is the process of executing programs with the explicit intention of finding errors
that is making the program fail.

System testing is a critical aspect of software quality assurance and represents the ultimate
review of specification, design and ending. Testing is a process of executing a program with the
intent finding an error. No system design is ever perfect. The basic types of testing procedure
are:
Unit testing
Integration testing
Validation testing
Output testing
User acceptance

6.2 UNIT TESTING

Unit testing focuses verification efforts on the smallest unit of software design, the Module. This
is also known as module. This is also known as module testing. The module testing is tested
separately. The important control paths are tested to uncover errors within the boundary of the
module. These testing are carried out during the programming itself.

Department Of Computer science K.V.V.S College of Science & technology


ON ROAD VEHICLE BREAKDOWN ASSISTANCE 34

This testing is carried out during the programming stage itself. In this testing step each module is
found to be working satisfactorily as regards to the expected output from the module. Using a
method called white box testing in which the software tester has knowledge of the inner
workings, structure and language of the software, or at least its purpose and where each module
or component of the software is tested individually.

6.3 INTEGRATION TESTING

After splitting the program into units were tested together to see the defects between each
module which are connected to each and function. It is testing 2 or more modules or functions
together with the intent of finding interface defects between the modules or functions. Testing
completed as part of unit or functional testing, and sometimes, becomes its own standalone test
phase. On a larger level, integration testing can involve putting together of groups of modules
and functions with the goal of completing and verifying that the system meets the system
requirements.

6.4 VALIDATION TESTING

Validation testing is the process of evaluating software at the end of the software development
process to ensure the compliance with software requirements. Validation testing is where
requirements established as a part of software requirement analysis is validated against the
software that has been constructed. This test provides the final assurance that the software meets
all the functional, behavioral and performance requirements. The errors which are uncovered
during integration testing are corrected during this place. Errors discovered where corrected prior
to completion of this project with the help of user by negotiating to establish the method of
resolving deficiencies. Thus the proposed system under consideration has been tested by using
validation testing and found to be working satisfactory.

Department Of Computer science K.V.V.S College of Science & technology


ON ROAD VEHICLE BREAKDOWN ASSISTANCE 35

During this phase the user check whether the system works in a proper manner or not. The
developer will correct all the errors that are remained unchanged. After integration testing, may
be some bugs will remain in the system. It will affect the proper functionality of the system. In
order to avoid, this validation testing is necessary. Validation testing is defined with a single
definition that validation succeeds when the software functions in a manner that can be
reasonably accepted by the user. By using the helpful information’s from the organization we
can remove the defects of the system. The various modules that require validation are:

Test plan
A test plan is a general document for the entire project that defines the scope, approach to be
taken and the schedule of testing as well as identifies the test item for the entire testing process
and personal responsibility for the different activities of testing. The test pan can do as well
before actual testing and can be done parallel with the coding and design phases. A test plan
should contain the following:
1. Test unit specification

2. Features to be tested

3. Approach for testing

4. Test deliverables

5. Schedule

6. Personal allocation

Department Of Computer science K.V.V.S College of Science & technology


ON ROAD VEHICLE BREAKDOWN ASSISTANCE 36

Testing strategy
Software is viewed as white-box, in white-box testing, as the structure and flow of software
under test are visible to the tester. Testing plan is made according to the details of the software
implementation, such as programming language, logic and styles. Test cases are derived from the
program structure. While white-box testing is applicable at the unit, integration, and system
levels of the software testing progress, it is typically applied to the unit.
So while I normally test paths within a unit, it can also test paths between units during
integration, and between sub systems during level test.

System testing
In principle, system testing is an ongoing activity throughout the project. The logical design and
physical design should be thoroughly and continually examined on paper to ensure that they will
work when implemented. Thus the system test in implication should be a confirmation that all is
correct and an opportunity to show the user that the system works. This checks all the elements
of the system. The most important elements are the hardware, software, people and information.
The 4 types of system test are:
 Recovery testing the software is allowed to fail in a number of ways and then recovery of
software is tested. In recovery testing, data recovery or operating system/hardware
recovery are tested.
 Security testing in this safety of the system is tested. The test engineer himself attacks
System and checks whether a system is safe or not.
 Stress testing in this testing we check the various resources of a system. The resources
that checked include memory limit, OS capacity
 Performance testing in this testing we check the runtime performance of the system.
This testing is conducted at the unit level, integration level, and implementation level.
This testing uses both black white box testing methods.

Department Of Computer science K.V.V.S College of Science & technology


ON ROAD VEHICLE BREAKDOWN ASSISTANCE 37

6.5 ALPHA TESTING


The alpha test is conducted at the developer’s site by end users. The software is used in a natural
setting with the developer “looking over the shoulder” of typical users and recording errors and
usage problems. Alpha test are conducted in a controlled environment. It is testing of software at
the developer side by the customer. This testing uses:

Output testing
It includes producing the output that is generated by the system in the required format, the format
can be both in the screen and printed format. Producing the output in the correct format is very
necessary in the useful implementation of the system.

System testing
When a system is developed it is hoped that it perform properly. In practice, however some
errors will occur. The main purpose of testing and information system is to find the errors and
correct them. A successful test is one which finds an error.

6.6 BETA TESTING


The beta test is conducted at the end user sites. Unlike alpha testing the developer is generally
not present. Therefore beta test is a “live” application of software in an environment that cannot
be controlled by the developer. The end user records all problems (real or imagines) that are
encountered during beta testing. As a result of problems reported during beta test, software
engineers make notifications and prepare for the release of the software product to the entire
customer base. Beta test release the product to the end user. He is at liberty to proceed as the
requirements dedicate.

Department Of Computer science K.V.V.S College of Science & technology


ON ROAD VEHICLE BREAKDOWN ASSISTANCE 38

6.7 TEST CASES

The test plan represents the overall approach to the test. In many ways, the test plan serves as the
summary of the activities that will be performed. It shows how the test will be organized and
outlines all the testers’ need that must be met in orders to properly carryout the test. The test plan
is especially valuable because it is not a difficult document to review, so the members of
engineering team and senior managers can inspect it. The bulk of test planning effort is focused
on creating the rest cases. A test case is a descriptive of a specific interaction that a tester will
have, in order to test the single behavior of the software. Test cases are very similar to use cases,
in that way they are step by step narratives that define a specific interaction between the user and
software. However, unlike use cases, they contain references to specific features of the user
interface. The test case contains actual data that must be entered into software and the expected
result that the software must generate. A test case, in software engineering is a set of conditions
or variables under which a tester will determine whether an application, software system or one
of its feature is working as it was originally established for it to do. The mechanism for
determining whether a software program or a system has passed or failed such a test is known as
test oracle. In some settings, an oracle could be a requirement or a use case, while in other case it
could be a heuristic.

It may take many test cases to determine that software or a system is considered sufficiently
scrutinized to be released. Test cases are often referred to as test scripts; particularly when
written-when they are usually collected into test suites.

Department Of Computer science K.V.V.S College of Science & technology


ON ROAD VEHICLE BREAKDOWN ASSISTANCE 39

7. SYSTEM IMPLEMENTATION

Department Of Computer science K.V.V.S College of Science & technology


ON ROAD VEHICLE BREAKDOWN ASSISTANCE 40

1.1 SYSTEM IMPLEMENTATION

Implementation is an activity that is contained throughout the development phase. It is the


process of bringing a developed system into operational use and turning it over to the user. The
new system and its components are to be tested in a structured and planned manner. A successful
system should be delivered and users should have the confidence that the system would work
efficiently and effectively. The more complex the system being implemented the more involved
will be the system analysis and design effort required for implementation. Implementation is the
stage of the system when the theoretical design is turned into working system. The
implementation involves careful planning investigation of the current system and its constraints
on implementing, design of methods to achieve the changeover method.

There are 3 types of implementation:

 Implementation of a computer system to replace a manual system. The problems


involved are converting files, training users, creating accurate files, and verifying
printouts for integrity.
 Implementation of a new computer system to replace an existing one. This is usually a
difficult conversion. If not properly planned, there can be many problems. Some larger
systems have taken as long as a year to convert.
 Implementation of a modified application to replace an existing one using the same
computer. This type of conversion is relatively easy to handle, provided there are no
major changes in files.

Department Of Computer science K.V.V.S College of Science & technology


ON ROAD VEHICLE BREAKDOWN ASSISTANCE 41

1.2 SYSTEM MAINTENANCE

Maintenance covers a wide range of activities including correcting coding and design
errors, updating documentation and test data and upgrading user support.

After a system is successfully implemented, it should be maintained in a proper manner.


The need for system maintenance is to make the system adaptable to the changes in the
system environment. There may be social, economical or technical changes, which affect
system being implemented. Through proper system maintenance procedures, the system
can be adapted to cope with these changes. Maintenance can be classified as corrective,
adaptive, perfective. Corrective maintenance means repairing, processing or performance
failure or making changes because previously un-corrected problem false assumption.
Adaptive maintenance means changing the program function. Perfective maintenance or
modifying the programs is to respond to the user’s additional or changing needs.

Any system developed should be secured and protected against possible hazards. Security
measures are provided to prevent unauthorized access of the database at various levels. An
uninterrupted power supply should be that the power failures or voltage fluctuation will not
erase the data in files.

Password protection and simple procedures to prevent the unauthorized access are provided
to the user. The system allows entering the system only through proper username and
password.

Department Of Computer science K.V.V.S College of Science & technology


ON ROAD VEHICLE BREAKDOWN ASSISTANCE 42

8. SYSTEM EVALUATION

Department Of Computer science K.V.V.S College of Science & technology


ON ROAD VEHICLE BREAKDOWN ASSISTANCE 43

The project entitled “On Road Vehicle Breakdown Assistance” has been developed to
meet the requirements of the existing system. it has made operational after going
through a series of phases: study phase, analysis , design, and followed by testing
evaluation.

After considering various feasible solutions the most feasible one was selected and
designed along considering the time and efficiency constraints and named the most
feasible one as “On Road Vehicle Breakdown Assistance”. Software maintenance and
evaluation of the system was first developed by Meir M Lehman in 1969. Over a period
of 20 years researched has led to the formation of Lehman’s law (Lehman 1970). Key
findings of his research include that the maintenance is really solutionary development
and that maintenance decisions are aided by understanding what happens to the
systems overtime. Lehman demonstrated that system control to solve overtime. As they
involve they grow more complex unless some actions such as code, refactoring is taken
to reduce the complexity.

Department Of Computer science K.V.V.S College of Science & technology


ON ROAD VEHICLE BREAKDOWN ASSISTANCE 44

8. CONCLUSION

Department Of Computer science K.V.V.S College of Science & technology


ON ROAD VEHICLE BREAKDOWN ASSISTANCE 45

10.1 APPENDIX A

10.1.1 Sample source code

<!doctype html>

<html>

<head>

<title>Car Repair A Auto Mobile Category Flat Bootstarp Resposive Website


Template | Home :: w3layouts</title>

<meta name="viewport" content="width=device-width, initial-scale=1">

<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />

<meta name="keywords" content="Car Repair Responsive web template,


Bootstrap Web Templates, Flat Web Templates, Andriod Compatible web
template, Smartphone Compatible web template, free webdesigns for Nokia,
Samsung, LG, SonyErricsson, Motorola web design" />

<script type="application/x-javascript"> addEventListener("load", function()


{setTimeout(hideURLbar, 0); }, false); function hideURLbar(){
window.scrollTo(0,1); } </script>

<!meta charset utf="8">

<link rel="stylesheet" href="css/flexslider.css" type="text/css" media="screen"


/>

<!--bootstrap-->

<link href="css/bootstrap.min.css" rel="stylesheet" type="text/css">

<!--coustom css-->

<link href="css/style.css" rel="stylesheet" type="text/css"/>

<!--default-js-->

<script src="js/jquery-2.1.4.min.js"></script>

<!--bootstrap-js-->

Department Of Computer science K.V.V.S College of Science & technology


ON ROAD VEHICLE BREAKDOWN ASSISTANCE 46

<script src="js/bootstrap.min.js"></script>

</head>

<body>

<div class="header_nav" id="home">

<nav class="navbar navbar-default chn-gd">

<!-- Brand and toggle get grouped for better mobile display -->

<div class="navbar-header">

<button type="button" class="navbar-toggle collapsed" data-


toggle="collapse" data-target="#bs-example-navbar-collapse-1" aria-
expanded="false">

<span class="sr-only">Toggle navigation</span>

<span class="icon-bar"></span>

<span class="icon-bar"></span>

<span class="icon-bar"></span>

</button>

</div>

<!-- Collect the nav links, forms, and other content for toggling -->

<div class="collapse navbar-collapse" id="bs-example-navbar-collapse-


1">

<ul class="nav navbar-nav navbar-right">

<li class="col-md-2">

<a href="index.php" class="blue">

<span class="glyphicon glyphicon-home " aria-


hidden="true"></span>

Department Of Computer science K.V.V.S College of Science & technology


ON ROAD VEHICLE BREAKDOWN ASSISTANCE 47

Home

</a>

</li>

<!---->

<li class="col-md-2">

<a href="" class="pink">

&nbsp;

</a>

</li>

<!---->

<li class="col-md-2">

<a href="" class="orang">

&nbsp;

</a>

</li>

<!---->

<li class="col-md-2">

<a href="" class="gray">

&nbsp;

</a>

</li>

<!---->

<li class="col-md-2">

<a href="register.php" class="green">

Department Of Computer science K.V.V.S College of Science & technology


ON ROAD VEHICLE BREAKDOWN ASSISTANCE 48

User Register

</a>

</li>

<li class="col-md-2">

<a href="mechanics.php" class="sky">

Mechanics

</a>

</li>

<div class="clearfix">

<!--script-->

<script type="text/javascript">

jQuery(document).ready(function($) {

$(".scroll").click(function(event){

event.preventDefault();

$('html,body').animate({scrollTop:$(this.hash).offset().top},900);

});

});

</script>

<!--script-->

</ul>

</div><!-- /.navbar-collapse -->

<div class="clearfix"></div>

Department Of Computer science K.V.V.S College of Science & technology


ON ROAD VEHICLE BREAKDOWN ASSISTANCE 49

<!-- /.container-fluid -->

</nav>

</div>

<div class="container">

<div class="logo">

<h1><a href="index.html">CAR REPAIR</a></h1>

</div>

<div class="ad-ph">

<form action="loginaction.php">

<table>

<tr>

<td>Username &nbsp;<input type="text" name="t1"


required="1"/></td>

<td>Password<input type="password" name="t2"


required="1"/></td>

<td> <input type="submit" value="LOGIN"/></td>

</tr>

</table>

</form>

</div>

<div class="clearfix"></div>

</div>

<!-- banner -->

<div class="banner">

Department Of Computer science K.V.V.S College of Science & technology


ON ROAD VEHICLE BREAKDOWN ASSISTANCE 50

<div class="container">

<div class="banner-info">

<h2>MEETING ALL YOUR AUTO REPAIR NEEDS IN TIME AND ON YOUR


BUDGET</h2>

</div>

</div>

</div>

<!-- /banner -->

<!-- our -->

<div class="our">

<div class="container">

<div class="our-top">

<li><img src="images/b1.jpg" class="img-responsive" alt=""></li>

<li><img src="images/b2.png" class="img-responsive" alt=""></li>

<li><img src="images/b3.png" class="img-responsive" alt=""></li>

<li><img src="images/b4.png" class="img-responsive" alt=""></li>

<li><img src="images/b5.png" class="img-responsive" alt=""></li>

<li><img src="images/b6.jpg" class="img-responsive" alt=""></li>

<li><img src="images/b7.jpg" class="img-responsive" alt=""></li>

<li><img src="images/b8.jpg" class="img-responsive" alt=""></li>

<li><img src="images/b9.png" class="img-responsive" alt=""></li>

<li><img src="images/b10.png" class="img-responsive" alt=""></li>

<div class="clearfix"></div>

Department Of Computer science K.V.V.S College of Science & technology


ON ROAD VEHICLE BREAKDOWN ASSISTANCE 51

</div>

</div>

</div>

<!-- our -->

<!-- high -->

<!-- high -->

<!-- over -->

<!-- over -->

<!-- expert -->

<!-- expert -->

<!-- footer -->

<div class="footer">

<div class="container">

<div class="foot-bottom">

</div>

</div>

</div>

<!-- footer -->

</body>

</html>

Department Of Computer science K.V.V.S College of Science & technology


ON ROAD VEHICLE BREAKDOWN ASSISTANCE 52

10.2 APPENDIX B

10.2.1 Screen shots

10.2.1.1 Login page

Department Of Computer science K.V.V.S College of Science & technology


ON ROAD VEHICLE BREAKDOWN ASSISTANCE 53

10.2.1.2 Admin Home

Department Of Computer science K.V.V.S College of Science & technology


ON ROAD VEHICLE BREAKDOWN ASSISTANCE 54

10.1.2.3 Customer home

Department Of Computer science K.V.V.S College of Science & technology


ON ROAD VEHICLE BREAKDOWN ASSISTANCE 55

10.1.2.4

Department Of Computer science K.V.V.S College of Science & technology


ON ROAD VEHICLE BREAKDOWN ASSISTANCE 56

10.3 APPENDIX C

10.3.1 Acronym

1. SQL - Structured Query Language


2. DB - Data Base
3. DFD - Data Flow Diagram
4. ER - Entity Relationship diagram

Department Of Computer science K.V.V.S College of Science & technology


ON ROAD VEHICLE BREAKDOWN ASSISTANCE 57

10.3.2 Bibliography

Elias. M. Awad, “System Analysis and Design”, Galgoeia publications – Second


Edition, 2005.

Henry Korth,” Data Base Design Concept”, Mc grew hill – Fifth Edition 2001.

Roger.S.Pressman,” Software Engineering “, Mc grew hill – Fifth Edition 2006.

Department Of Computer science K.V.V.S College of Science & technology

También podría gustarte