Car Parking System
Car Parking System
PROJECT REPORT
ON
“CAR PARKING”
BACHELOR OF COMPUTER APPLICATION
Degree
Session: 2018-2021
BY
RAJEEV KUMAR-200901106022
“CAR PARKING”
BACHELOR OF COMPUTER APPLICATION
Degree
Session: 2018-2021
BY
RAJEEV KUMAR-200901106022
First, I would like to thanks “Mr. Sandeep Kumar Gupta, Director, BIMT
COLLEGE MEERUT” for guiding me with knowledge and support.
I would also like to thanks “Mr. Amar Garg, Coordinator Incharge, BIMT
COLLEGE MEERUT” for guiding me through each and every step of the
process.
I would also like to thank “Mr. Amar Garg, project Guide”, who showed
immense patience and understanding throughout the project and provided
suggestions.
ROLL NO - 200901106022
TABLE OF CONTENTS PAGE NO.
1. Introduction 5
1.1 Introduction of project
1.2 Purpose
1.3 Scope
1.4 Benefits
2. Proposed system (working/functioning / methodology) 7
5. Coding 20
6. Testing 72
7. Implementation/Maintenance 74
8. Snapshots 77
9. Conclusion 83
Car Parking Management System is software which is helpful for bus operators, who
wants to operate many bus trips in a day. Vehicle Management System is a windows
application written for 32-bit Windows operating systems which focused in the area of
adding, editing and deleting the passengers, staff and the bus routes. In this software a
person can be register as a user and he can manage the bus routes and the staff,
passengers’ details. He can add a bus and its details including bus route details. User
can also add the details of the staff and their duty time in the system.
Bus Management
Route Management
Employee Management
Passenger Management
In Bus module a user can add a new bus details to the database. He can set the details of
the route and the timing also. Bus details like the type, engine number, seating capacity
and the route in which the bus is going to be operated are added. Whenever the user
wants to modify these details he can update new values through this software. Route
Management module deals with the route management of the bus. A user can add the
route and if he wants he can change it or delete that route. The main advantage is that
this module is helpful for the agents to get details of the route and the details of the bus
which have trip to that route. He can also get the information of the number of seats
available in a particular day. Employee details of any bus can add to the database and
this is helpful to the bus operators in the case of the salary and bates for the employee.
An operator can add the personal details and if we want to edit or delete he can done
modification using the Vehicle Management System. This is very helpful for the
passenger also; if they have any complaint against staff he can approach the operator and
easily identify the employee. Details of every passenger are stored in the system. A user
can add a passenger only one time and if he came again operator can identify that
person. Operator can add, edit and delete the details of the passenger.
HARDWARE CONFIGURATION:-
RAM : 128 MB
SOFTWARE CONFIGURATION
Windows 98,
Windows XP.
Language : Java 2 Runtime Environment
Database : MS Access2007.
SYSTEM ANALYSIS
EXISTING SYSTEM:
System Analysis is a detailed study of the various operations performed by a system and
their relationships within and outside of the system. Here the key question is- what all
problems exist in the present system? What must be done to solve the problem? Analysis
begins when a user or manager begins a study of the program using existing system.
During analysis, data collected on the various files, decision points and transactions
handled by the present system. The commonly used tools in the system are Data
Flow Diagram, interviews, etc. Training, experience and common sense are required
for collection of relevant information needed to develop the system. The success of
the system depends largely on how clearly the problem is defined, thoroughly
investigated and properly carried out through the choice of solution. A good analysis
model should provide not only the mechanisms of problem understanding but also
the frame work of the solution. Thus it should be studied thoroughly by collecting data
about the system. Then the proposed system should be analyzed thoroughly in
Information Gathering
Feasibility study
Cost/ Benefit analysis
In the existing system all the jobs of the bus route management is done manually.
This is very difficult to the operators who want to handle hundreds of trips and many
buses in a day. The currents system is that an operator wants to keep the physical records
of the bus route in his office and a separate record for the passengers’ and for the booked
seats. In current system there is no way to store the details of the employees’ working in
the bus. So many complaints against staff can arise from the passengers’ side. More
over there is no detailed record of the bus and routes in which they service
PROPOSED SYSTEM
The proposed system is very useful for the operators and passengers. This avoids
the overheads for the operators. They can minimize the working stress and can keep
essential documents related to the bus and the passengers as a softcopy. The advantage
of the proposed system is the reduction in the cost of the office equipments and the
transaction is done quickly. Any operator can answer if any seats for a particular route in
Less error
Search facility
Look and Feel Environment
One of the most difficult tasks of system analysis is developing a clear, in-depth
to specify the requirements for a new project with any accuracy. Several questions
It takes considerable skill to determine the true cause of a system problem. A systems
analyst might begin to define the problem by determining if the problem can be
knowledge of the common types of systems problems, the analyst can diagnose a
Organizations usually face problems or have opportunity due to the following facts:
After identification of the problem, it is defined and a general direction or method for
solving this problem is also determined. The management establishes the term of
reference as well as the resources to be provided for the project. System development is
an iterative process and the first identifiable stage of it is problem definition, whose final
and result from one month to the next. Some items it gives good output, but
3. Problem of timeliness: In the current system the reports and output produced is
mostly late and in most of the cases it is useless because it is not on time.
5. Problem of economy: The current system is very costly. We have to spend lots
System analysis and design refers to the process of examining a business situation
with the intent of improving it through better procedures and methods. Systems
Analysis and System Design. System design is the process of planning a new system
or replace or complement an existing system. But before this planning can be done,
we must thoroughly understand the existing system and determine how computers
can best be used to make its operation more effective. System analysis, then, is the
process of gathering and interpreting facts, diagnosing problems and using the
analysis specifies what the system should do. Design states hew to accomplish the
objective.
In this project we have used Rapid Application Development (RAD) model; RAD is
Business modeling: All the information about the business functioning of the
gateway development is collected, how the data and information is flow from one
end to another end using the following questions: What information drives the
department process? What information is generated? Who generates it? Where does
Data modeling: The information collected in business modeling phase is refined into
a set of data objects that are needed to support the project. The attributes of each
object are identified and the relationship between these objects defined.
deleting student records, assigning marks, generating mark sheet, printing reports,
Testing: Most of the functions are already tested, as they are predefined functions.
However, new components or functions are also tested after application generation.
FEASIBILITY ANALYSIS
Whatever we think need not be feasible .It is wise to think about the feasibility of
any problem we undertake. Feasibility is the study of impact, which happens in the
negative. When the positives nominate the negatives, then the system is considered
feasible. Here the feasibility study can be performed in two ways such as technical
system.
Economic analysis is the most frequently used technique for calculating the
this procedure we determine the benefits and savings that are expected from a proposed
system and compare them with costs. We found the benefits outweigh the costs; we take
needed not spend much m money for the development of t he system already available.
The only thing is to be done is making an environment for the development with an
effective supervision. I f we are doing so , we can attain the maximum usability of the
corresponding resources .Even after the development , the organization will not be in a
feasible.
Technical Feasibility:
This is concerned with specifying equipment and software that will successfully satisfy
the user requirement. The technical needed of the system may vary considerable, but
might include:
the system then the actual make of hardware. The configuration gives the complete
Ten to twelve workstations are required, these units should be interconnected through
LAN so that could operate and communicate smoothly. They should have enough speeds
We can strongly says that it is technically feasible, since there will not be much
difficulty in getting required resources for the development and maintaining the system
as well. All the resources needed for the development of the software as well as the
maintenance of the same is available in the organization here we are utilizing the
Operational Feasibility:
considered are:
such considerations are likely to critically affect the nature and scope of the eventual
recommendations.
For operational feasibility study we appointed a small group of people who are familiar
with information system techniques, who understand the of the business that are relevant
Social Feasibility:
the people or not. This determination typically examines the probability of the project
being accepted by the group directly affected by the proposed system change.
Management Feasibility:
management does not accept a project or gives a negligible support to it, the analyst will
Legal Feasibility:
Acts, Statutes, as well as any pending legislation. Although in some instances the project
might appear sound, on closer investigation it may be found to infringe on several legal
areas.
Time Feasibility:
fully within a stipulated time frame. If a project takes too much time it is likely to be
rejected.
SYSTEM DESIGN
Introduction:
The system objectives outlined during the feasibility study serve as the basis from which
the work of the system design is initiated. Much of the activities involved at this stage is
available in the market and the various facilities provided by the vendors. Nevertheless,
a system cannot be designed in isolation without the active involvement of the user. The
user has a vital role to play at this stage too. As we know that data collected during
feasibility study will be utilized systematically during the system design. It should,
however, be kept in mind that detailed study of existing the system is not necessarily
over with the completion of the feasibility study. Depending on the plan of feasibility
study, the level of detailed study will vary and the system design stage will also vary in
the amount of investigation that still needs to be done. This investigation is generally an
urgent activity during the system design as the designer needs to study minute’s details
in all aspects of the system. Sometimes, but rarely, this investigation may from a
separate stage between feasibility study and computer system design. Designing a new
system is a creative process, which calls for logical as well as lateral thinking. The
logical approach involves systematic moves towards the end product keeping in mind
the capabilities of the personnel and the equipment at each decision making step. Lateral
thought implies encompassing of ideas beyond the usual functions and equipment. This
is to ensure that no efforts are being made to fit previous solutions into new situations.
System Design Considerations:
The system design process is not a step-by-step adherence of clear procedures and
guidelines. Though, certain clear procedures and guidelines have emerged in recent
days, but still much of design work depends on knowledge and experience of the
designer.
When designer starts working on system design, he will face different type of problems.
Many of these will be due to constraints imposed by the user or limitations of the
the complexity of the problems and solutions thereof since the variety of likely problems
specified in the feasibility report. In general, the following design objectives should be
kept in mind:
a. Practicality: The system must be stable and can be operated by people with average
+.
output.
c. Cost: It is desirable to aim for a system with a minimum cost subject to the condition
e. Security: This is very important aspect of the design and should cover areas of
hardware reliability, fall back procedures, physical security of data and provision for
System design involves first logical design and then physical construction of the system.
The logical design describes the structure and characteristics of features, like the outputs,
inputs, files, databases and procedures. The physical construction, which follows the
logical design, produces actual program software, files and a working system.
Hardware: The existing hardware will obviously affect the system design.
Software: The available software (operating system, utilities, language etc.) in the
Budget: The budget allocated for the project will affect the scope and depth of design.
Time-scale: The new system may be required by a particular time (e.g. the start of a
financial year).This may put a constraint on the designer to find the best design.
Interface with other systems: The new system may required some data from another
computerized system or may provide data to another system in which case the files must
be compatible in format and the system must operate with a certain processing cycle.
Processing Techniques:
Batch processing
Real-time processing
Online processing
You are already aware of these techniques. It is quite interesting to note, however that a
applications. This increases throughput of the system as also brings down the response
time of on-line activities. In most of die business applications, 24-hour data is acceptable
enough and hence it is possible to update voluminous data after office-hours in batch
mode.
Design Methodologies:
The scope of the system design is guided by the framework for the new system
developed during analysis. More clearly defined logical method for developing system
that meets user requirements has led to new techniques and methodologies that
SYSTEM REQUIREMENTS
This management system can be used in windows 98, Windows2000, Windows XP and
Windows NT, supported for other platform such as Applet, Macintosh and UNIX.
The system must be running Windows 98, Windows 98 or Windows NT4.0 operating
format. Input design is a part of overall system design, which requires very careful
attention .Often the collection of input data is the most expensive part of the system. The
Input Data
The goal of designing input data is to make entry easy, logical and free from
errors as possible. The entering data entry operators need to know the allocated space for
each field; field sequence and which must match with that in the source document. The
format in which the data fields are entered should be given in the input form .Here data
entry is online; it makes use of processor that accepts commands and data from the
operator through a key board. The input required is analyzed by the processor. It is then
Data Transcription
Data Conversion
Data Verification
Data Control
Data Transmission
Data Correction
One of the aims of the system analyst must be to select data capture method and
devices, which reduce the number of stages so as to reduce both the changes of errors
External
Internal
Operational
Computerized
Interactive
Input files can exist in document form before being input to the computer. Input
design is rather complex since it involves procedures for capturing data as well as
Outputs from computer systems are required primarily to communicate the results
of processing to users. They are also used to provide a permanent copy of these result for
latter consultation .Computer output is the most important and direct source of
well throughout the manner. The right output must be available for the people who find
the system easy o use. The outputs have been defined during the logical design stage. If
not, they should defined at the beginning of the output designing terms of types of output
External outputs
Internal outputs
Operational outputs
Interactive outputs
All screens are informative and interactive in such a way that the user can ful fill
to serve many users quickly and effectively. After designing input and output, the
analyst must concentrate on database design or how data should be organized around
user requirements. The general objective is to make information access, easy quick,
inexpensive and flexible for other users. During database design the following objectives
are concerned:-
Controlled Redundancy
Data independence
Performance
USERS
Name Text -
Category Text -
Username Text -
Password Text -
BOOKING
Pass_No Text -
PassName Text -
Bus_RegNo Text -
SeatNo Text -
Date_of_Travel Text -
Time_of_Travel Text -
Pass_From Text -
Destination Text -
Amount Text -
BUSES
BusNo Text -
Model Text -
Capacity Number -
DateBought Date/Time -
Insurance_Status Text -
Date_Insured Date/Time -
Insurance_Expiry Date/Time -
Emp
Sname Text -
Fname Text -
Lname Text -
Gender Text -
DOB Date/Time -
Designation Text -
Telephone Number -
E_Mail Text -
Address Text -
Passenger
Pass_Name Text -
Address Text -
Tel_No Number -
Date_of_Travel Date/Time -
Depot Text -
To Text -
Pay_Status Text -
Booked_Status Text -
Payment
Pass_No Text -
Pass_Name Text -
Payment_Mode Text -
Date_Payment Date/Time -
Amount_Paid Currency -
Received_By Text -
Route
RouteName Text -
Depot Text -
Destination Text -
Distance Text -
Fare_Charged Number -
Schedules
Route_Name Text -
empNo Text -
Driver_Name Text -
Trip_No Number -
Date_Scheduled Date/Time -
Dept_Time Text -
Trips
Bus_RegNo Text -
Route_No Text -
S_Date Text -
Validator
Bus_No Text -
DriverNo Text -
RouteNo Text -
Date_Schedule Text -
Trip_No Text -
STRUCTURE DESIGN
Introduction:
Structure design is a data flow based methodology. The approach begins with a system
specification that identifies inputs and outputs and describes the functional aspects of the
system. The specifications then are used as a basis for the graphics representation. The
step is the definition of the modules and their relationship to one another in a form called
Logical design proceeds from the top down. General features such as reports and inputs
are identified first. Then each is satisfied individually and in more detail. Hence, the
structure design partitions a program into small, independent modules. They are
arranged in a hierarchy that approximates a model of the business area and is organized
and make a problem manageable by subdividing it into smaller segments which is called
module having a single entry and a single exit subroutine. The primary advantages of
Early versions of the design, through incomplete, are useful enough to resemble
Several development activities are carried out during structured design. They are data
a. Data base design: This activity deals with the design of the physical database. A key
procedure prior to conversion. The operating system limits the programming languages
c. System and program test preparation: Each aspect of the system has a separate test
requirement. System testing is done after all programming and testing completed. The
test cases cover every aspect of the proposed system, actual operations, and user
interface and so on. System program test requirements become a part of design
In contrast to the system testing is acceptance testing. Which puts the system through a
procedure design to convince the user that the proposed system will meet the started and
Graphical description of a system`s data and how the processes transform the data is
Unlike detail flowcharts. DFDs do not supply detailed descriptions of modules but
graphically describe a system`s data and how the data interact with the system.
Arrows
Circles
Open–ended boxes
Squares
flows. Like the rectangle in flowcharts, circles stand for a process that converts data/into
The following seven rules govern construction of data flow diagrams (DFD).
Decomposed data flows must be balanced (all data flows on the decomposed
Choose meaningful names for data flows, processes, and data stores.
If too many events seem to be occurring at a given point, an analyst can decompose a
data conversion (circle). The new data conversions from a parent-child relationship with
other information decision, The variety of sizes and types of computing resources
available puts a burden on the analyst who must select hardware, software and advise the
Today, selecting a system is a serious and time-consuming. The time spent on the
selection process is a function of the applications and whether the system is a basic
There are various important factors, which should be considered prior to system
Specify the magnitudes of the problem; that is, clarify section entails a few
Provide user indoctrination. This is crucial, especially for first time users. Selling
the system to the user staff, provide adequate training and creating an
acquisition.
The selection process should be viewed as a project and a project team should be formed
with the help of management. The selection process consists of several steps, which are
discussed below:
requirements within the framework of the organization`s objectives and the environment
specifications must reflect the actual applications to be handled by the system and
include system objectives, Flowcharts, input-output requirements, file structure and cost.
Request for proposal: After the requirement analysis and system specifications have
been defined, a request for proposal is prepared and sent to selected vendors for bidding.
Evaluation and validation: The evaluation phase ranks various vendor proposal and
determines the one best suited to the user`s requirements. It looks into items such as
price, availability and technical support. System validation ensures that the vendor can,
Vendor selection: This step determines the vendor with the best combination of
reputation, reliability, service record, training, delivery time, lease/finance terms. The
This project as title “Student management system” is comes under the Relational
Database Management System (RDBMS). This application is developed with the help
of java 6.0 and Microsoft Access. This application can also be run on the network
From a proper analysis of positive points and constraints on the component it can be
safely concluded that the product is a highly efficient GUI based component. This
application is working properly and meeting to all user requirements. This component
Nothing is perfect in this world. So, we are also no exception. Although, we have tried
our best to present the information effectively, yet, there can be further enhancement in
the Application. We have taken care of all the critical aspects, which need to take care of
during the development of the Project. Like the things this project also has some
limitations and can further be enhances by someone, because there are certain drawbacks
Any education institute can make use of it for providing information about
student.
requirements.
Implementation is the stage in the project where the theoretical design is turned
into a working system. The implementation phase constructs, installs and operates the
new system. The most crucial stage in achieving a new successful system is that it will
System Design
The successful implementation of the new system will purely upon the involvement of
the officers working in that department. The officers will be imparted the necessary
The education of the end user start after the implementation and testing is over.
When the system is found to be more difficult to understand and complex, more effort is
put to educate the end used to make them aware of the system, giving them lectures
about the new system and providing them necessary documents and materials about how
After providing the necessary basic training on the computer awareness, the users
will have to be trained upon the new system such as the screen flows and screen design
type of help on the screen, type of errors while entering the data, the corresponding
validation check at each entry and the way to correct the data entered. It should then
cover information needed by the specific user or group to use the system.
implementation process. For that regular meeting will be arranged by the concerned
LOGIN PAGE
<table>
<tr>
</td>
</tr>
<tr>
required=""/></td>
</tr>
<tr>
</tr>
</table>
</form>
<script type="text/javascript">
<%
request.getParameter("login").contentEquals("failed")) {
%>
<% }
%>
<%
request.getParameter("login").contentEquals("dissabled")) {
%>
<% }
%>
<%
request.getParameter("login").contentEquals("unknown")) {
%>
</script>
%@include file="template/body_end.jsp" %
REGISTRATION
<%@page import="DataBase.DB"%>
<%@page import="java.sql.ResultSet"%>
<div class="entry">
<table>
<tr>
<td>User Name
</td>
<td><input type="text" required="" name="uname" id="uname" />
</td>
</tr>
<tr>
<td>Password
</td>
</td>
</tr>
<tr>
<td>Login Name
</td>
</td>
</tr>
<tr>
<td>Email
</td>
</td>
</tr>
<tr>
<td>Mobile No.
</td>
</td>
</tr>
<tr>
<td>
return null;
}
public static void close() {
try {
con.close();
stmt.close();
rs.close();
} catch (Exception e) {
System.out.println("Exception" + e);
import com.onlineshopping.activity.R;
SCREEN
LAYOUT
LOGIN FORM
Main Form
User Master
Company Master
Customer Master
Item Master
Purchase Transaction
Sales Transaction
Vehicle Mast
Vendor Master
SOFTWARE TESTING
Introduction:-
Is the menu bar displayed in the appropriate contested some system related
features included either in menus or tools? Do pull –Down menu operation and Tool-
bars work properly? Are all menu function and pull down sub function properly listed ?;
Is it possible to invoke each menu function using a logical assumptions that if all parts of
the system are correct, the goal will be successfully achieved .? In adequate testing or
non-testing will leads to errors that may appear few months later.
Testing is the process of exercising software with the intent of finding errors and
ultimately correcting them. The following testing techniques have been used to make
Content Review
The whole content of the project has been reviewed thoroughly to uncover typographical
Navigation Errors
Different users were allowed to navigate through the project to uncover the navigation
errors. The views of the user regarding the navigation flexibility and user friendliness
A unit can be compiled /assembled / linked/loaded; and put under a test harness.
Unit testing done to show that the unit does not satisfy the application and /or its
Integration Testing:-
Integration testing done to show that even though components were individually
2. The effect of the system errors on files and records within the system
The purpose of the system testing is to consider all the likely variations to which it will
The testing process focuses on the logical intervals of the software ensuring that
all statements have been tested and on functional interval is conducting tests to uncover
errors and ensure that defined input will produce actual results that agree with the
required results. Program level testing, modules level testing integrated and carried out.
White box sometimes called “Glass box testing” is a test case design uses the
Using white box testing methods, the following tests were made on the system
a) All independent paths within a module have been exercised once. In our system,
ensuring that case was selected and executed checked all case structures. The bugs that
b) All logical decisions were checked for the truth and falsity of the values.
While white-box testing can be applied at the unit, integration and system levels of the
software testing process, it is usually done at the unit level. It can test paths within a unit,
paths between units during integration, and between subsystems during a system–level
test. Though this method of test design can uncover many errors or problems, it might
designer can create tests to cause all statements in the program to be executed at least
once) Fault injection methods – intentionally introducing faults to gauge the efficacy of
Code coverage tools can evaluate the completeness of a test suite that was created with
any method, including black-box testing. This allows the software team to examine parts
of a system that are rarely tested and ensures that the most important function points
have been tested. Code coverage as a software metric can be reported as a percentage
for:
reports on the number of lines executed to complete the test 100% statement coverage
ensures that all code paths, or branches (in terms of control flow) are executed at least
once. This is helpful in ensuring correct functionality, but not sufficient since the same
Black box testing focuses on the functional requirements of the software. This is black
box testing enables the software engineering to derive a set of input conditions that will
fully exercise all functional requirements for a program. Black box testing is not an
alternative to white box testing rather it is complementary approach that is likely to
1) Interface errors
3) Performance errors
Black-box testing treats the software as a "black box", examining functionality without
any knowledge of internal implementation. The tester is only aware of what the software
is supposed to do, not how it does it. Black-box testing methods include: equivalence
partitioning, boundary value analysis, all-pairs testing, state transition tables, decision
table testing, fuzz testing, model-based testing, use case testing, exploratory testing and
specification-based testing.
applicable requirements. This level of testing usually requires thorough test cases to be
provided to the tester, who then can simply verify that for a given input, the output value
(or behavior), either "is" or "is not" the same as the expected value specified in the test
case. Test cases are built around specifications and requirements, i.e., what the
specifications, requirements, and designs to derive test cases. These tests can be
required. Whatever biases the programmers may have had, the tester likely has a
different set and may emphasize different areas of functionality. On the other hand,
black-box testing has been said to be "like a walk in a dark labyrinth without a
flashlight." Because they do not examine the source code, there are situations when a
tester writes many test cases to check something that could have been tested by only one
This method of test can be applied to all levels of software testing: unit, integration,
system and acceptance. It typically comprises most if not all testing at higher levels, but
requirements (test characteristics that are only present when entire system is run)
components.
Concern: issues, behaviors that can only be exposed by testing the entire integrated
each form encapsulates (labels, texts, grid etc.). Hence in case of project in V.B. form
are the basic units. Each form is tested thoroughly in term of calculation, display etc.
Regression Testing:-
Each time a new form is added to the project the whole project is tested thoroughly to
rectify any side effects. That might have occurred due to the addition of the new
INTRODUCTION :-
Deployment, and Maintenance. Maintenance is the last stage of the software life
cycle. After the product has been released, the maintenance phase keeps the
The earlier phases should be done so that the product is easily maintainable. The
design phase should plan the structure in a way that can be easily altered.
Similarly, the 5 implementation phase should create code that can be easily read,
understood, and changed. Maintenance can only happen efficiently if the earlier
phases are done properly. There are four major problems that can slow down the
at best insufficient, and software maintenance having a bad image. The success of
the maintenance phase relies on these problems being fixed earlier in the life
fixing bugs in the code. Adaptive maintenance deals with adapting the software to
with updating documentation and making the software more maintainable. All
changes to the system can be characterized by these four types of maintenance.
keep them updated with new user requirements. Maintenance costs developers
time, effort, and money. This requires that the maintenance phase be as efficient
as possible. There are several steps in the software maintenance phase. The first is
to try to understand the design that already exists. The next step of maintenance is
restructured. The final step is to test and debug the product to make the new
changes work properly. This paper will discuss what maintenance is, its role in
the software development process, how it is carried out, and its role in iterative
source development.
Software maintenance is widely accepted part of SDLC now a days. It stands for
all the modifications and updations done after the delivery of software product.
There are number of reasons, why modifications are required, some of them are
Market Conditions - Policies, which changes over the time, such as taxation and
Client Requirements - Over the time, customer may ask for new features or
system) of the target host changes, software changes are needed to keep
adaptability.
Organization Changes - If there is any business level change at client end, such
venturing into new business, need to modify in the original software may arise.
Types of maintenance :-
In a software lifetime, type of maintenance may vary based on its nature. It may
may be a large event in itself based on maintenance size or nature. Following are
keep the software product up-to date and tuned to the ever changing world of
to keep the software usable over long period of time. It includes new features,
new user requirements for refining the software and improve its reliability and
performance.
Preventive Maintenance - This includes modifications and updations to prevent
future problems of the software. It aims to attend problems, which are not
Cost of Maintenance :-
software maintenance found that the cost of maintenance is as high as 67% of the
On an average, the cost of software maintenance is more than 50% of all SDLC phases.
There are various factors, which trigger maintenance cost go high, such as:
Older software’s, which were meant to work on slow machines with less memory
and storage capacity cannot keep themselves challenging against newly coming
Most maintenance engineers are newbie and use trial and error method to rectify
problem.
Often, changes made can easily hurt the original structure of the software, making
Changes are often left undocumented which may cause more conflicts in future.
Software-end factors affecting Maintenance Cost
Programming Language
Maintenance Activities :-
used in iterative manner and can be extended so that customized items and processes
can be included.
may itself report via logs or error messages. Here, the maintenance type is
classified also.
Analysis - The modification is analyzed for its impact on the system including
against requirement specifications set in the previous stage. Test cases are
Implementation - The new modules are coded with the help of structured design
parallel.
Integration testing is also carried out between new modules and the system.
acceptance with the help of users. If at this state, user complaints some issues
Delivery - After acceptance test, the system is deployed all over the organization
either by small update package or fresh installation of the system. The final
manual.
When we need to update the software to keep it to the current market, without
Legacy software cannot keep tuning with the latest technology available in the market.
For example, initially Unix was developed in assembly language. When language C
Other than this, sometimes programmers notice that few parts of software need more
Re-Engineering Process :-
software.
the existing system. This process can be seen as reverse SDLC model, i.e. we try to get
Designers then do reverse engineering by looking at the code and try to get the design.
With design in hand, they try to conclude the specifications. Thus, going in reverse
Program Restructuring :-
It is a process to re-structure and re-construct the existing software. It is all about re-
arranging the source code, either in same programming language or from one
programming language to a different one. Restructuring can have either source code-
Re-structuring does not impact the functionality of the software but enhance reliability
and maintainability. Program components, which cause errors very frequently can be
The dependability of software on obsolete hardware platform can be removed via re-
structuring.
Forward Engineering :-
in hand which were brought down by means of reverse engineering. It assumes that
Forward engineering is same as software engineering process with only one difference
Component reusability:-
Example
The login procedures used on the web can be considered as components, printing
Components have high cohesion of functionality and lower rate of coupling, i.e. they
work independently and can perform tasks without depending on other modules.
In OOP, the objects are designed are very specific to their concern and have fewer
In modular programming, the modules are coded to perform specific tasks which can be
software.
Reuse Process
Two kinds of method can be adopted: either by keeping requirements same and
are specified, which a software product must comply to, with the help of existing
Design - This is also a standard SDLC process step, where requirements are
together.
This section will cover what the software maintenance phase is about. As briefly
latent faults. The term software maintenance usually refers to changes that must
be made to software after they have been delivered to the customer or user. The
CONCLUSION
This project as title “Car Parking System” is comes under the Relational Database
Management System (RDBMS). This application is developed with the help of JSP 6.0
and Microsoft Access. This application can also be run on the network environment so it
From a proper analysis of positive points and constraints on the component it can be
safely concluded that the product is a highly efficient GUI based component. This
application is working properly and meeting to all user requirements. This component
Nothing is perfect in this world. So, we are also no exception. Although, we have tried
our best to present the information effectively, yet, there can be further enhancement in
the Application. We have taken care of all the critical aspects, which need to take care of
during the development of the Project. Like the things this project also has some
limitations and can further be enhances by someone, because there are certain drawbacks
Any education institute can make use of it for providing information about
student.
requirements.
Now one can easily plan the journey comfortably as the process is efficient and fast with
being easy to access. Reservations can be made through the Indian railways site or at the
ample reservation centers all over the country. Also now there are authorized agencies
which provide reservation facility on behalf of India railways and without waiting in
long line one can easily book a ticket. The booking is done through an ETicket issue
which have a PNR number of which one has to take a print and just have to show at the
station. It not only provide reservation but cancellation can also be done through this
system at ease and one can use a credit card to complete the process. This being a big
Our project is only a humble venture to satisfy the needs in a library. Several user
friendly coding have also adopted. This package shall prove to be a powerful
The objective of software planning is to provide a frame work that enables the
manger to make reasonable estimates made within a limited time frame at the
beginning of the software project and should be updated regularly as the project
progresses. Last but not least it is no the work that played the ways to success.
It means that same data fields appear in many different files and often in different
formats. In manual system, it poses quite a big problem because the data has to be
maintained in large volumes but in our system, this problem can be overcome by
providing the condition that if the data entered is duplicate, it will not be entered,
In manual system, searching information is time consuming but in our system, any
In manual system, no security measures were provided but in this system, password
security has been provided. The person can access the system by providing the correct
2) http://java.sun.com/javase/technologies/desktop/
3) http://www.roseindia.net/jdbc/jdbc-access/CreateTable.shtml
4) http://www.jdbc-tutorial.com/