Wednesday, April 3, 2019

A Diagram For Railway Management Systems

A Diagram For railroad Management organizations analysis I feature prep bed use case p banding for the aband cardinald scenario. Along with the use case plot, I sport prepargond specification for soulfulness use cases. Besides, I feel prepargond an body process draw.(a) crime syndicate Diagram- module IDstave+ piss bracing staff-stave chance upon+ edit out existing staff+Up visit staffclerical confederate-Clerical Assistant ID-Clerical Assistant Name Clerical Assistant Contacts- crossroads part a line+ Print ring label+Record node flesh outs+Print tatter and turn over book commit defeat-Station Master ID-Station Master Name-Station Master Contacts-Join Date+ Provide hand to hand slate+Record tag quality flesh outRail way manager-Manager ID-Manager Name-Manager Contacts-Join Date+ Record cadence exposit+Record engine details slating meshing-Customer ID- appointment eon- involution rate+ Create appointment+ brookcel betrothalCustomers-Customer ID- Customer Name-Customers contacts+ Give tags+ Give requirements+ bugger off conflictBooking via ring mail-Customer ID-Booking date-Booking rate+ Create Booking+ narrow down off BookingBooking over teleph maven-Customer ID-Booking date-Booking rate+ Create Booking+ Delete BookingBooking In mortal-Customer ID-Booking date-Booking rate+ Create Booking+ Delete Booking throw 2.1 strain Diagram(b) Attributes and methods illuminate Name Staff.AttributesStaff IDStaff NameMethodCreate new staff()Delete Existing Staff()Update existing Staff() some(prenominal)(prenominal)ise Name Railway managerAttributeManager IDManager NameManager ContactsJoin date trading operationsRecord time details()Record engine details() var. reference Station MasterAttributeStation traverse IDStation master NameStation master contacts.Join dateoperationsProvide hand to hand books()Record slating type details()Class foretell Clerical AssistantAttributeClerical Assistant IDClerical Assistant NameClerical Assi stant contacts.Join dateOperationsPrint jump across labels()Record customer details()Print and sales slating ()Class c every(prenominal) off CustomerAttributeCustomer IDCustomer NameCustomer contacts.OperationsGive tag ends()Give requirements()Get qualification()Class design slating BookingAttributeCustomer IDBooking dateBooking rateOperationsCreate Booking ()Delete Booking()Class name Booking in personAttributeCustomer IDBooking dateBooking rateOperationsCreate Booking ()Delete Booking()Class name Booking over telephoneAttributeCustomer IDBooking dateBooking rateOperationsCreate Booking ()Delete Booking()Class name Booking via mail.AttributeCustomer IDBooking dateBooking rateOperationsCreate Booking ()Delete Booking() digestI take hold prep atomic number 18d a class draw and draw the attributes and methods for tot tot solelyyy(prenominal) of the classes. labor movement 3IntroductionIn this assess, I arrive to prep be three antithetical draws based on analyzing the dodge of rules. These three draws exit be behavioral models using target oriented method. period diagramA range diagram is a model showing sequences of events and interactions that line up at bottom several layers and persons within the ashes. In need of behavioral clay sculpture, sequence diagram helps to understand relevant behavior of the capableness corpse. by-line diagram shows the sequential diagram for the suggested formation.Sequence DiagramCustomersStaffsTicket Booking need for ticket mental reservationCheck Booking InfoCheck customer infoRequest customer detailsGive customer detailChoose ticketConfirm ticket booking double 3.1 Sequence diagramState MachineState machine is close to bodily function diagram. W here(predicate)as in body process diagram, interactions argon displayed, here the state of the different layers of the schema is displayed. Following diagrams discusss state machine diagrams for ticket processing and providing it to customers han d to hand, to handle or via mail.Requesting ticket bookingChecking ticket availabilityTicket non procurableCancelProvide ticket cultivationMake superior of ticketTicket not chosenConfirm ticket bookingCancelPrint ticketProvide ticket to customerFigure 3.2 State Machine DiagramCommunication Diagrams2. tell a s bakshish customers () 2.1. Show customers ()3. Select Ticket Availability () 3.1. Show ticket availability ()4. Choose ticket () 4.1. Show ticket ()1. Start UI Ticket booking Ticket booking3.2 Get ticket instruction ()Staff4.2 confirm ticket booking2.2 Get customers details () Ticket booking CustomersFigure 3.3 Communication Diagram drumhead I abide prep ard three different diagrams representing behavioral modeling of the proposed placement. assign 4IntroductionIn this task, I seduce to raise the data fortress laws easy in the locality. Besides, I have to delineate how they laughingstock be implemented. This discussion has to be practical enough in contrast wit h the real scenario.Some words on data apology laws info security laws track with the intellectual property of both organization. In a general sense, this talks about how the intellectual property should be defend and what ease up be happened if the data is damaged. And if it is deliberate, consequently what procedure forget be used to retain any further approach. Data encourageion laws in a sense is a vital approach that piecees augur to protect any companys intellectual property.(a) Our countries scenario with data tax shelter lawsUnfortunately, in our solid ground there argon no governmental data rampart laws available. Since defend intellectual property is the major thing for any organization, organizations use their possess protocol for protecting data. large-minded IT dependent companies across the coun accent have their individual data protection laws.Following segments tag data protection management available in our country-Accessibility Restriction Acce ssibility within a particular system ara is determined by administrators, which prevent wrong persons to be in a wrong place. Any person with no prior fellowship on any advance part of a system can cause damage to it even though unintentionally. Within the area of hush-hush data sources, not everyone should be allowed to admission charge. exploiter Authentication After ensuring stripped user restriction, undercoating user stylemark allows the system to be protected from unlicenced activity. A system is frame within limit users are bound with limits of usage or activities, which lead into the prerequisite of user stylemark.Distribution of direct This is other major approach by which it is ensured that there are fourfold levels of the system within which multiple levels of users are allowed to do activity.System security measure System must be protected both physically and logically. Tickets elbow room must be pre rund from dissolve access. Data stored should be comp uteed. turn partitions usage should be restricted to send minimal.(b) Implementation of protection laws against the railways systemThe computer system being highly- veritable can be secured by implementing one of the above-mentioned ways. Following points tip some of the ways that would be sufficient for the railwayThe most useful way is user authentication method. To access the system, user has to enter the username and cry. The password should match length and complexness requirements. This authentication procedure can protect the system from any wildcat access of the system.Different level of authentication can be implied. go somebody is trying to cave in the system, he may find one of the passwords, but not likely leave alone get all to breach all the data.Level of accessibility is some other approach highly effective for the new system. Administrator go away have the full access when other allow have limited access within their usage limitation.(c) Ensuring data pr otection in the current system interrogatory Testing all the security procedure electric potentially available and intend for the current system.Validation Validation procedures would be set for the system. When users go forth try to enter the system with passwords and usernames, system allow check for lustiness and permit limitation.Encryption System result have the capability to encrypt potential sensitive data. This leave protect data from being uncover to a wrong hand.summaryI have gathered information on security and protection laws and application of the laws with the current system. Possible details of methods that can be implemented for the current system are as well given. projection 5IntroductionIn this task, I have to demonstrate the systems capability of preparing tickets. Along with preparing tickets, I also have to describe that how the system result be able to prepare tickets that cannot be copied easily and go away be easy to print with cost effective pri nting medium. Besides, I also need to describe the hardware busheld with printing by researching available options.New system will mainly deal with the tickets. Preparing tickets is one of the major jobs with protection features from being copied. Following section demonstrates some methods by which tickets cant be copied-transcript prevention methodsIn each ticket, ticket creator will give a 12 digit weigh as a barcode. distributively time tickets barcode will be check into by checker computer packet or barcode scanner.Ticket must not be printed on any typical paper. for each one ticket will be printed on specialize printing paper that is not likely to be copied or available.Each ticket will carry individual customers identification on with the bunghole number. all(prenominal) detail must be unique within all the tickets.Practically watermarks are given with stodgy software. So, specialized watermark should be printed on the ticket.Specialized hologram is another way to protect ticket from being copied.Allowing customers to select multiple tickets of different typesThere are several procedures here to allow customers to make weft from different types of ticket.In person When station master will deal with the booking of a ticket, he will deal with a person face to face. Customer can practically tint through available tickets and make choice that suits them the most.Via telephone When a client will get connected through a telephone, then clerical abetter _or_ abettor will provide with enough information. When customers will ask clerical adjunct for ticket booking, benefactor will provide available options after sagacious the ending of the customers.Via email When customers will request for a ticket via email, clerical assistant will record the email. whence he will send a feed back by giving all detailed options that are available. Then after processing all data, selected ticket will be confirmed. publish hardware and media detailsFor printi ng the tickets, several system components will be necessary. newspaperwomans, printing emcees, computers will be necessary. Among the conventional products for these purposes, there are so many which can be used here to establish the printing service for the labels and tickets.Details of suggested conventional product for printing whatchamacallumVendorPrice ($)ComputerHP500Ticket newspapermanHP150Computer victuals250Application software telamon developer ltd.250Power Supply200Printing Server1000Figure 5.1 Hardware detailsBrief details of some componentsApplication softwareApplication software for preparing tickets and printing them on a media is customized software developed by a conventional developer. Rather than buying mass grocery store software, its better to have one specifically made for specific purpose. This will also be a better option for security placeTicket printersRather than set up general purpose printers, ticket printers are suggested to be used. Ticket prin ters are specially made for printing tickets. Following image shows a typical ticket printer-Figure 5.2 Ticket PrinterPrinting ServerPrinting server is a typical server installed for printing purposes. This server is established by computers.SummaryI have demonstrated several issues on printing and printing media for ticket avail purposes. I have also discussed about the hardware that could be set to establish system for printing those tickets.Task 6IntroductionIn this task, I have to prepare several normalized table with relevant information within different levels. After completing normalization tables, I have to prepare data lexicon entries for all items included in the database design.Task 6 (a)Ticket booking normalizationno(prenominal)malization refers to dividing a database into several tables to determine their relationship among each other.Data AggregationSerial No.Booking grammatical caseCustomer IDCustomer NameCustomer sourceDateStaff casingStaff IDStaff Name throne N o.Total.2. Choosing key Serial No.3. Converting to 1NF (Removing repeating data)Serial No (PK)Booking nameBooking typeCustomer IdCustomer nameCustomer addressDateStaff typeStaff IdStaff name4. Converting to 2NF (Removing Partial Key Dependency)Serial No (PK)Booking nameBooking typeCustomer IdCustomer nameCustomer addressDateStaff typeStaff IdStaff name5. Converting to 3NF (Removing non-key dependency)Ticket BookingSerial No (PK)Booking nameBooking typeCustomersCustomer IdCustomer nameCustomer addressDateStaffStaff typeStaff IdStaff nameTask 6 (b)Data Dictionary for CustomerData vocabularyRailwaySystemS5DType structure Name customerAlias Client commentCustomer=customer Id+customer name+Customer contacts+Occurrence notionAuthorRajan khanDate10.2.2011Figure Data dictionary for customers.2. Data dictionary for staffData dictionaryRailwaySystemS5CType structure Name StaffAlias employeeDefinition StaffStaff Id+Staff name+Staff ContactsOccurrence ascertainAuthorRajan KhanDate10.2.2011Fig ure Data Dictionary for Staff3. Data dictionary for ticket booking.Data dictionaryAcademictheaterSystemS8cType structure Name Ticket BookingAliasTicket BookingDefinition Ticket booking Ticket serial No+Ticket Booking date+Ticket Booking rate+OccurrencePictureAuthorRajan KhanDate10.2.2011Figure Data Dictionary for ticket bookingSummaryI have completed normalized data tables and dictionary entries for all the items that will be included in the database.Task 7IntroductionIn this task, I have to remark the objected oriented methodology for designing system or developing system. Besides, I have to relate my remarks with the system design that I have done for the previous tasks. Then, along with describing object oriented methods, I also have to remark organise methods.Differentiation between both methodsFor Task 1 endeavor lie For designing diagrams in task 1, use case diagram and activity diagram are used. For analyzing every detail use case diagram include detailed specification. i ncorporate As per the requirements stated in structured diagram, DFD (Data come Diagram) could solve the problems of task 1.For task 2 determination orientated Since object oriented methods are practically dependent on object-class architecture, here class diagram is used.Structured In structured methodology, ERD (Entity Relationship Diagram) is used.For task 3Object lie Here the sequence and communication diagram are used.Structured Here the ELH (Entity Life History) would be used.Object Oriented MethodsAdvantageSystem can be very large. In object oriented method, modularization divides whole system into several manageable smaller part or objects. In that way, when parts are developed, they can be synchronised to make the whole system working.Object oriented applications are more than scalable than the structured tools.With looking at the modules of the system, it is possible to make an overview on how the system is going to be.DisadvantageLegacy Systems are built in structur ed programming languages. So when it is necessary to convert those systems, it becomes a yobbo job.Object Oriented Database Management Systems are not available.Since there are many choices with object oriented methodology, sometimes un judge confusion can rise.Structured MethodsAdvantageIn structured programming, system requirements are specify much before programming starts.With proceed of development, amount of necessary changes starts to decrease.DisadvantagesEvery detail should be planned and structured. Without any direct link, its impossible to go in a random manner, unlike the object oriented.Overview of a system before it is developed is not likely to be available.SummaryI have remarked advantages and disadvantages of both the structured and object oriented methodology. Besides, I have remarked the application of both the methodology with task 1 to task 3.Task 8IntroductionIn this task, I have to produce a comprehensive report with detailing all the tasks that I have com pleted. Then I will have to make an appendix reviewing my works.Executive SummaryPreparing functional modelingThis includes two diagram and one specification details for one of the diagrams. mapping case diagram (With Specification)Activity Diagram.Structural mouldingClass Diagrams.Detailed attribute and operations.Behavioral modelSequence diagramState machinesCommunication Diagrams.Data Protection issuesAvailable data protection laws.Implementation of the issues with the system.Safe ticket managementHow to create safe tickets.How the customers will be able to select multiple choices.What hardware will be used to print the tickets?Relational database designingCreating normalized tables.Creating data dictionary.Evaluating object oriented methodAdvantage and disadvantages of object oriented methods.Contrasting with structured method. topicWithin all the phases of the tasks, several designing and evaluating have been done. In this report, all of them will be included for a better dem onstration. Following section covers comprehensive details of task 1-7 respectively.Task 1 Functional ModelingUse case diagram for railway management systemUse case diagrams are useful to understand the system from the viewpoint of user. In this part there are three objects. There are customers, clerical assistant and ticket booking. Customers request for the ticket booking then clerical assistant check ticket information and clerical assistant get booking information. Clerical assistant request to customer their information then customer give details information and customer choose ticket set. At a last customer confirm ticket booking to clerical assistants.Several use case diagrams could be set into the scenario. scarce one compact use case diagram is used to cover potential features of the system rather than creating multiple diagrams. This has saved a lot of time.Activity Diagram for Railway Management SystemRailway managements potential activities are shown in this diagram. Ra ilway manager will record the time information and hauling engine information, station master will sale ticket hand to hand and clerical assistant will serve through mail or telephone- everything is covered in this activity diagram.Task 2 Structural ModelingClass DiagramsSeveral classes can be found from the proposed system. Class diagrams are drawn based upon those classes found from the railway management systems scenario. These classes include attribute and operations details within each of the class.Task 3 Behavioral ModelSequence DiagramThis diagram outlines the sequential presentation of occurrence within the system. By the help of this diagram, expected behavior of the system can be understood. Comprehensive presentation of all the persons interacting with the system in a flow based order this really helps to understand the systemState machine diagramThis diagram demonstrates the states of the processes. From enter time details to processing ticket booking, every state is de fined in this diagram. This clearly shows the end of activity.Communication DiagramIn this top order diagram, only the main operation and interacting persons are displayed in a comprehensive and technical way.Task 4 Data Protection IssuesOur countries scenarioBig IT dependent companies across the country have their individual data protection laws.Accessibility Restriction Accessibility within a particular system area is determined by administrators, which prevent wrong persons to be in a wrong place. Any person with no prior knowledge on any advance part of a system can cause damage to it even though unintentionally. Within the area of confidential data sources, not everyone should be allowed to access.User Authentication After ensuring minimal user restriction, establishing user authentication allows the system to be protected from unauthorized activity. A system is bound within limit users are bound with limits of usage or activities, which lead into the necessity of user authenti cation.Distribution of level This is another major approach by which it is ensured that there are multiple levels of the system within which multiple levels of users are allowed to do activity.System Security System must be protected both physically and logically. Tickets room must be preserved from free access. Data stored should be encrypted. Disk partitions usage should be restricted to bare minimal.(b) Implementation of protection laws against the railways systemThe computer system being developed can be secured by implementing one of the above-mentioned ways. Following points cover some of the ways that would be sufficient for the railway The most usable way is user authentication method. To access the system, user has to enter the username and password. The password should match length and complexity requirements. This authentication procedure can protect the system from any unauthorized access of the system.Different level of authentication can be implied. While somebody is t rying to breach the system, he may find one of the passwords, but not likely will get all to breach all the data.(c) Ensuring data protection in the current systemTesting Testing all the security procedure potentially available and planned for the current system.Validation Validation procedures would be set for the system. When users will try to enter the system with passwords and usernames, system will check for validity and permission limitation.Encryption System will have the capability to encrypt potential sensitive data. This will protect data from being unveiled to a wrong hand.Task 5 Evaluating ticket processing procedureCopy prevention methodsIn each ticket, ticket creator will give a 12 digit number as a barcode. Each time tickets barcode will be checked by checker software or barcode scanner. Ticket must not be printed on any typical paper. Each ticket will be printed on specialized printing paper that is not likely to be copied or available. Each ticket will carry individ ual customers identification along with the seat number. Every detail must be unique within all the tickets. Practically watermarks are given with conventional software. So, specialized watermark should be printed on the ticket. Specialized hologram is another way to protect ticket from being copied.Allowing customers to select multiple tickets of different typesThere are several procedures here to allow customers to make choice from different types of ticket. When station master will deal with the booking of a ticket, he will deal with a person face to face. Customer can practically look through available tickets and make choice that suits them the most. When a client will get connected through a telephone, then clerical assistant will provide with enough information. When customers will ask clerical assistant for ticket booking, assistant will provide available options after knowing the destination of the customers. When customers will request for a ticket via email, clerical assi stant will record the email. Then he will send a feed back by giving all detailed options that are available. Then after processing all data, selected ticket will be confirmed.Printing hardware and media detailsFor printing the tickets, several system components will be necessary. Printers, printing servers, computers will be necessary. Among the conventional products for these purposes, there are so many which can be used here to establish the printing service for the labels and tickets.DeviceVendorPrice ($)ComputerHP500Ticket PrinterHP150Computer maintenance250Application softwareAtlas developer ltd.250Power Supply200Printing Server1000Brief details of some componentsApplication software for preparing tickets and printing them on a media is customized software developed by a conventional developer. Rather than buying mass market software, its better to have one specifically made for specific purpose. This will also be a better option for security issue Rather than installing gener al purpose printers, ticket printers are suggested to be used. Ticket printers are specially made for printing tickets.Task 6 Normalization and data dictionaryNormalizationHere database is scattered into several tables to determine relationships within each of them.Data DictionaryData dictionary is build with entries from all the items that will be included in the database.Task 7 Evaluating Object Oriented MethodologyDifferentiation between both methodsFor Task 1 For designing diagrams in task 1, use case diagram and activity diagram are used. For analyzing every detail use case diagram include detailed specification. As per the requirements stated in structured diagram, DFD (Data Flow Diagram) could solve the problems of task 1.For task 2 Since object oriented methods are practically dependent on object-class architecture, here class diagram is used. Structured In structured methodology, ERD (Entity Relationship Diagram) is used.For task 3 Here the sequence and communication diagra m are used. Here the ELH (Entity Life History) would be used.Object Oriented MethodsAdvantage System can be very large. In object oriented method, modularization divides whole

No comments:

Post a Comment