Professional Documents
Culture Documents
Pin and Puk System Final Final Project
Pin and Puk System Final Final Project
FACULTY OF MANAGEMENT
AND
INFORMATION TECHNOLOGY
Development of a Personal Identification Number (PIN) &
Personal Unblocking Key (PUK) System
by
Benjamin R.Chiro
W110837
May 2014
A research project submitted to Women’s University in Africa in partial fulfilment for the
requirements of the BSc (hons) in Information Systems.
ABSTRACT
Personal Identification Number (PIN) & Personal Unblocking Key (PUK) System is a
system that will be extracting subscriber pin and puk details from the SQL database as per
requirements from customer care departments. The proposed system is expected to
enhance current process and reduce delays when handling customer care issues. Personal
Identification Number (PIN) & Personal Unblocking Key (PUK) System comes with a
graphical user interface which is user friendly and it will be HTTP based.
i
ACKNOWLEDGEMENT
My most and highest gratitude goes the Lord God Almighty who has blessed me with this
life with which all this is able and all my fathers in the Lord for spiritual covering. I wish
to acknowledge the invaluable contribution from my project supervisor Mr. Rupere who
though we met very few times provided me with the much needed support.
I also want to extend my gratitude to the Women’s university in Africa for all the
infrastructural support and all the academic provisions that fostered the “growth” and
completion of this study and particularly Mr Cry Kuranga for believing in me.
I would like to this opportunity to express my profound gratitude and deep regards to my
study mates Kumbirai Mbedzi,Moja Mutizira and Kudakwashe Mudyanadzo including for
their support throughout the course of this thesis.
My heartfelt appreciation goes to my Wife Pauline, and our lovely three children who
provided the moral support and were my source of strength and inspiration through the
period of the study.
Let me also extend a special thanks to Telecel staff, which assisted in all my research
work and systems analysis. Thank you, especially for your time and patience which have
made this project a success.
Last but not least I would to express my sincere gratitude to Mr Tapfuma for his
unconditional support during the course of the project.
ii
APPROVAL
This dissertation thesis entitled ”Personal Identification Number (PIN) & Personal
Unblocking Key (PUK) System” by Benjamin R Chiro meets the regulations governing the
award of the degree of BSc Honors in Information Systems of the Women’s University in
Africa, and is approved for its contribution to knowledge and literal presentation.
Supervisor .....................................................................................................
Date ......................................................................................................
iii
TABLE OF Contents
TABLE OF Contents...........................................................................................................................iii
1 CHAPTER ONE: INTRODUCTION................................................................................................1
1.1 Background to the study...................................................................................................1
1.2 Problem statement............................................................................................................1
1.3 Scope.................................................................................................................................1
1.4 Goal of the proposed system.............................................................................................2
1.5 Objectives of the proposed system...................................................................................2
1.6 Novell Characteristics........................................................................................................2
1.7 The Solution and Justification............................................................................................3
1.8 Advantages of proposed system........................................................................................3
1.9 Disadvantages of proposed system...................................................................................3
1.10 Disadvantages of current system......................................................................................4
1.11 Advantages of current system...........................................................................................4
1.12 HARDWARE AND SOFTWARE TOOLS.................................................................................4
1.13 Conclusion.........................................................................................................................5
2 CHAPTER TWO: PLANNING PHASE............................................................................................5
2.1 Introduction.......................................................................................................................5
2.2 Feasibility Study.................................................................................................................5
2.2.1 Technical feasibility...................................................................................................6
2.2.2 Operational Feasibility...............................................................................................7
2.2.3 Economic feasibility...................................................................................................7
Cost benefit analysis......................................................................................................................7
Development and operational costs...........................................................................................8
Tangible cost benefits................................................................................................................9
2.3 Work Plan........................................................................................................................11
2.4 Gantt chart......................................................................................................................11
2.5 Work plan........................................................................................................................12
2.6 ACTIVITY NETWORK DIAGRAM........................................................................................13
iv
2.7 Conclusion.......................................................................................................................13
3 CHAPTER THREE: ANALYSIS PHASE..........................................................................................15
3.1 Introduction.....................................................................................................................15
3.2 Data gathering Technics..................................................................................................15
3.2.1 Observation.............................................................................................................15
3.2.2 Documentation inspection......................................................................................16
3.2.3 Interviews................................................................................................................17
3.3 Analysis of the current system........................................................................................17
3.3.1 Evaluation of existing System..................................................................................18
3.4 Alternatives of proposed system.....................................................................................19
3.4.1 Buying a (COTS) off –the-shelf software..................................................................19
3.4.2 Developing an in house PIN /PUK system................................................................20
3.5 The selected alternative..................................................................................................21
3.6 Analysis of proposed system...........................................................................................21
3.6.1 Advantages of proposed system..............................................................................21
3.7 Functionality of the proposed system.............................................................................22
3.8 Functional Requirements................................................................................................22
3.8.1 Non-Functional Requirements.................................................................................23
3.8.2 Constrains................................................................................................................23
3.9 Conclusion.......................................................................................................................24
4 CHAPTER FOUR: SYSTEM DESIGN PHASE.................................................................................25
4.1 Introduction.....................................................................................................................25
4.2 HARDWARE AND ARCHITECTURE DESIGN.......................................................................25
4.3 System Architecture Design.............................................................................................26
4.4 Database Design..............................................................................................................33
4.5 User Interface design.......................................................................................................34
5 CHAPTER FIVE: IMPLEMENTATION PHASE..............................................................................36
5.1 Introduction.....................................................................................................................36
5.2 Coding.............................................................................................................................36
5.3 System Testing.................................................................................................................39
5.3.1 Strategic Approach to Testing..................................................................................39
5.4 Installation.......................................................................................................................41
5.5 System conversion...........................................................................................................42
6 CHAPTER SIX: MAINTENANCE..................................................................................................43
v
6.1 SYSTEM REVIEW..............................................................................................................43
6.2 DISASTER RECOVERY PLAN..............................................................................................43
6.2.1 EMERGENCY PLAN...................................................................................................43
6.3 Security Design................................................................................................................44
6.4 Backup Design.................................................................................................................44
6.4.2 BACKUP PLAN..........................................................................................................46
6.4.3 RECOVERY PLAN......................................................................................................46
6.5 Conclusion.......................................................................................................................47
7 REFERENCES............................................................................................................................48
vi
1 CHAPTER ONE: INTRODUCTION
With the reduced productivity and efficiency levels at Telecel Zimbabwe, it is becoming
essential to find a viable alternative to the internal extraction of pin and puk files in the
Databases. The aim of this project is to create a design that substitutes the manual way of
retrieving files, the main criteria being environmental friendliness in terms of both user
independency and understanding. This report presents the designs for the Personal
Identification Number (PIN) & Personal Unblocking Key (PUK) system, which includes
the following components: user interface, department functionality, accessories and safety
features.
Accessing records takes time as the agents need to send a request to the I.T
department while the customer waits.
It reduces productivity in the I.T department since engineers will be trapped in
attending requests from the front office to meet customer demands.
1
1.3 Scope
The project is being undertaken to optimize the current process of extracting subscriber pin
and puk details from the system database as per requirements from customer care
departments.
The proposed system is expected to enhance current process and reduce delays when
handling customer care issues
• To develop a simple PIN & PUK System that will be used to serve customers’ request.
• To improve customer services and gain a large market share due to efficiency.
2
1.6 Novell Characteristics
Pin and Puk system will be beneficial to the following stakeholders, in the following ways
- Pin and Puk system will improve the current process of handling customer care issues
- Pin and Puk system will reduce turn around times for solving queried customer problems
Pin and Puk system will set a benchmark of the system needed to enhance and automate
business processes in telecommunication business environment
3
-the proposed system(Pin and Puk system) will help enhance system development skills of
the researcher
•it improves customer services and gain a large market share due to efficiency.
.it ensures the smooth functioning of all the departments in the firm such as the customer
service department, I.T department and in security related purposes
- the PIN & PUK System provides flexibility to modify the software as per requirements.
Accessing records takes time as the agents need to send a request to the I.T
department while the customer waits.
It reduces productivity in the I.T department since engineers will be trapped in
attending requests from the front office to meet customer demands.
4
1.11 Advantages of current system
HARDWARE SOFTWARE
Star topology
Microsoft Windows 2008 Server
Switching hubs
Routers
Firewall
Gateway
Memory (RAM) 2 GB +
UPS
1.13 Conclusion
This chapter describes the problems identified with manual PIN & PUK detail extraction in
Telecel Zimbabwe as well as the aim and objectives of coming up with an Automated
5
system. The writer strongly recommend the management to accept this proposal as it will
help in in addressing the problems and magnifying efficiency of the PIN & PUK detail
extraction process highlighted above and offer the benefits mentioned above.
6
1.14 Introduction
The aim of this phase is to identify the business value of the project to the
organization, analyzing the feasibility of pursuing the project and developing a
scheduled work plan for the project. If the investigations show that the project is
viable and feasible the project is carried out. Planning phase reveals answers to
questions like “what’s the reason of building the system?”
•If the system can be engineered using current technology and within budget
•If the system can be integrated with other systems that are used.
7
1.15.1 Technical feasibility
The PIN/PUK system is a simple system to implement, there is enough technical staff to
support and maintain the system. The organization has the necessary Hardware and
software required to run the system. All Telecel Zimbabwe’s products have an application
programming interface that will allow the integration of already existing systems to them
PIN/PUK system.
HARDWARE SOFTWARE
Processor 2 GHz + Microsoft SQL Server 2008
Switching hubs
Routers
Firewall
Gateway
Memory (RAM) 2 GB +
UPS
8
Determines how the proposed system will fit with current operational system. The
PIN/PUK system development will be in line with the company’s developmental policy on
our system shortcomings where we do add on applications those do not require the change
in architecture of our current systems. The new system will be linked to existing
applications via application programming interfaces or the new method of linking
applications using web service technology. Telecel Zimbabwe being an organisation that
deals with offering services to its customers, it has been ascertained that the system will be
feasible operationally because of the following:
The users will accept the system because it is user friendly and will reduce the
paperwork involved in job cards.
There will be improved security, improved storage capabilities and faster extraction
of files to respond customer issues.
In terms of manpower- we have qualified experienced programmers, testers &
debuggers.
Customer care agents will be able to log in the system and get PIN/PUK records on
their own because their interface will be connected directly to the database.
The benefits of implementing the PIN&PUK System definitely outweigh the costs of
implementing it. It will not take much time to implement and the benefits will be
immediately felt. The same solution can be used in other branches of Telecel Zimbabwe
covering all costs involved in the development of the system.
9
According to J.Dupuit “Cost-Benefit Analysis involves adding up the benefits of a course
of action, and then comparing these with the costs associated with it”. Some of the
benefits are not easy to measure for example there will be less time wasted in retrieval of
data from the database and the interface for the customer care agents is easy to understand,
so there is no need for an I.T representative.
However, they are development and operational costs in the system’s life cycle and these
costs are incurred during the development and running of the system. Examples of such
costs include:
Salaries
User training.
Maintenance after every 6 months of use.
Computer consumables and printer cartridges.
10
e
The following are some of the tangible benefits expected to be derived from the system.
Intangible benefits
The following are some of the intangible benefits expected to be enjoyed from the system.
11
Improved corporate image
Evaluation Methods
When all the financial data have been identified and broken down into cost categories, the
analyst selects a method for evaluation. There are various analysis methods available.
Some of them are:
Net present value is one of the most reliable measures used in capital investment. It is the
present value of net cash inflows generated by a project less the initial investment on the
project. The PIN/PUK System project is a capital investment to your firm since it adds
value to customer services. Net present value accounts for time value of money.
Payback analysis
The length of time required to recover the cost of an investment. The payback period helps
to answer the question "how long will it take to make back the money spent on the
investment?" Calculated as:
Payback Period = Cost of Project / Annual Cash Inflows
This is beneficial information to decision makers because out-year benefits are often less
certain than benefits that occur early in the life cycle.
12
Selected Evaluation Method
The developer has chosen the Payback analysis to calculate the period it will take the
organisation to make back the money spent on the investment and it was calculated basing
on the figures in Table 2.3 below. The calculation was done as follows:
Project costs $13,000 and is expected to return $8,000 annually, the payback
period will be $13,000/$8,000, or 1, 6 years. The current system had an initial cost
of 12,000
Payback Analysis
Benefits = Total costs (existing system) – Total Costs Proposed system Operational costs
= $12,000 - $8,000
= $4,000
Payback in years:
= 13,000 / 8000
= 1,6 years
This is an outline of activities against time schedules of the project and linkages of should
complete first before another activity can be started or kick off (showing starting and
ending times as well as dependencies). This is an important tool in time management
so as to ensure that the project is completed in time. Various tools will be used to
13
represent the time plan. The project schedule to depict the beginning times and
durations of each task, milestone to show dependence on tasks and the Gant chart
will be used: For
14
Project planning 25/03/2014 3/04/2014 8 days
Analysis of current
system
Collecting information
System model
development
User requirements
In house testing
Generation of test
reports
15
Review
Project Planning
25/03/14 à 3/4/14
Project analysis
7/4/14à 13/04/14
Project Design
14/04/14à 7/5/2014
Implementation
21/05/14à 01/06/14
Evaluation &
Mantainance
2/6/14à 10/6/14 END
1.20 Conclusion
This chapter saves as an introduction to the systems development project and places a
perspective of the user’s problem. The project scope aims and objectives are identified at
16
this point of the project. Feasibility studies are carried out and it is concluded that the
project is worth pursuing because the benefits of doing the project outweigh the costs of
doing the problem. The road map in the project work plan has been drafted.
17
2 CHAPTER THREE: ANALYSIS PHASE
2.1 Introduction
The analysis part examines and evaluates data or information, by breaking it into its
component parts to uncover their interrelationships. “Analysis is a problem solving
technique that decomposes a system into component pieces for the purpose of studying
how well those component parts work and interact to accomplish their purpose.”
In this chapter, the analysts will look at the current system and see flaws that need to be
fixed within the new system design and this will be put into consideration. Thus the old
system provides the core requirements for the new system and the boundaries of the new
system can also be defined. After gathering data of the old system, tools used for the
design include; Dataflow diagrams, Use Case Diagrams and Activity Diagrams.
This part presents data collection methods that the writer used in this evaluation plan.
Three of the gathering technics where used and these where:
Observation
Document inspection
Interviews
18
2.2.1 Observation
The observation method involves human or technical observation of what people actually
do or what events take place on the old system. Thus, information is collected by observing
process currently being performed. The following are a few examples of observations:
However, it is wise to let workers know why you are observing them because sometimes,
people act temporarily and perform their job correctly when they are being watched, they
might actually violate the standard of manner. Hence observations are usually done in
conjunction with another data gathering method that is used to fill in the gaps and answer
questions.
2.2.3 Interviews
They are a type of meeting used to collect information verbally. As a data gathering
technique the purpose of the interview is for the researcher to gain information. In many
situations the first step is to interview someone carefully about it. All interviews need to be
documented together with their subsequent analysis. Interviews can be grouped by types
which include structured, unstructured, semi structured interviews and they can also be
carried out based on the number of participants involved. They can be one to one, group,
focus group interviews. Interviews are particularly useful in their openness and flexibility
unlike questionnaires the interviewee to broach new topics that the researcher had not
anticipated. This gives the interviewer the flexibility to turn the investigation of new
directions and topics they emerge. They can foster a positive relationship between
interviewer and interviewee.
The current system is partially a manual system that involves the writing of queries by I.T
personnel to retrieve information requested by a customer. The process has basically two
phases of information request, thus an external request that initiates the whole process and
20
an internal request which is the solution to the customers’ request. The internal request is
made by the customer care agents to the I.T department in form of a mail, anyone in the I.T
department is able to attend the request and give feedback copying everyone who was
copied as reply after execution. After receiving the confirmation, the customer care agent
sends the solution to the cashiers, where a cashier writes a receipt in exchange with
payment by the customer.
The main problem with the system is duplication of work in the I.T department, thus each
I.T personnel might attend to the issue and this will result in many instances of the same
process being done by many people, hence reduced of productivity.
Process 3
- PAYMENTS BY CUSTOMER Mail to I.T I.T
Cashier receipting - RECORDING IN SUN system Department
- customer receipt issued BILLING
payment
MySQL analyser
Cashier customer approval Querying the
of payment retrival DATABASE
Respond
PROCESS 2 Attached
Customer care On a Mail
Agent/ Sales Receiving the solution - DATA request by agents to the
represantative I.T DEAPARTMENT
Sending request - respond to the agents throug
mail.
Oracle 10g
- Outlook as the Office
PIN&PUK
Automated System for
DATABASE
Print/give communication.
interpret
solution
21
Figure 3.1 Data flow diagram for the existing system
The primary purpose of evaluation, in addition to gaining insight into prior or existing
initiatives, is to enable reflection and assist in the identification of future change. In this
case, it is unwise to advice Telecel Zimbabwe to procure the PIN/PUK system without an
insight of what is there and it’s benefits. Therefore having reviewed how the existing
system works, its pros and cons where revisited below:
Advantages
Disadvantages
poor security, everyone in I.T has access to information that might be sensitive
Requires lots of efforts for retrieval of information from the database through
querying.
Reduced efficiency on the I.T side.
High lag times in terms of processing request. It lakes Real time response.
22
2.4 Alternatives of proposed system
Telecel Zimbabwe can choose purchasing an off the shelf application from being made
outside by developing firms. This will save them a lot of time which could be wasted while
customising this PIN&PUK System. However this solution will not give them the
flexibility that the company requires in customising the product to meet their requirements.
Most off the shelf applications are generic in terms of their functionality which means the
company will not get their desired output.
Advantages
Short Implementation period because the system has already been developed
The system architecture is designed to allow changes and additions of features and
modules in the future
Disadvantages
System may not be best suited for the firm. This may mean that some
functionality will not be available or, the company will be purchasing some
functionality that they will not make use of.
Can be very expensive to purchase and licensing issues
They are very rigid making them difficult to work with and understand.
23
2.4.2 Developing an in house PIN & PUK system
This might sound like a drastic idea, but it is a great organisational capital appraisal
achievement. An in-house built PIN&PUK System will enable a firm to have task specific
software that handles designated problems suitably and efficiently without altering
anything after a systems judgment.
Advantages
The software is a web based application, which can be used by other branches of
Telecel Zimbabwe to access the database.
Reduced queues at reception due to increased efficiency.
Improved security to information due to the use of interfaces that use system
passwords.
The system is most likely to address the Organisation’s problems and satisfy their
needs at their different levels
Easy system support and maintenance since the system is documented at the end of
the implementation.
In-house is not very expensive, it is usually within the Organisation’s budget
Increased productivity due to automation of processes
Disadvantages
24
2.5 The selected alternative
After evaluating the alternatives of coming up with the proposed system, developing an in-
house system was found to be the best alternative. It was chosen because of its advantages
that outweigh the advantages of purchasing an off the shelf system. The system will also be
implemented within the Organisation’s budget. In-house will encourage user participation,
hence users are likely to accept the system.
The proposed system is an automated system with a central database for all pin and puk
records distributed by Telecel Zimbabwe. All users will be able to log in the system,
extract details, such as PIN, PUK codes and they are able extract call history records
(CDR) from the system. The accounts department (cashiers) will have access to the system
and create a receipt narrating the customer’s service by the firm. The central database will
be managed by the Customer services manager who constantly communicates with the
customers.
The customer care agents would be able to access information without contacting
the I.T
The system is based on user requirements and is custom made for the
organization.
It is easy to make changes to the system and add more functionality.
25
2.7 Functionality of the proposed system
It allows Time sharing of a computer system among multiple users, usually giving each
user the illusion that they have exclusive control of the system. The users may be working
on the same workstation or different, but there are usually few restrictions on the type of
work each user is doing. It divides work into individual, indivisible operations, called
transactions. Thus it supports transaction processing by many different agents at a single
instance. It also functions as a Management information system (MIS) that provide
information in the form of reports and displays to managers and other business
professionals. For example, sales managers may use their networked computers and Web
browsers to get instantaneous displays about the sales results of their products and to
access their corporate intranet for daily sales analysis reports that evaluate sales made by
each salesperson. The following diagrams illustrate the other functionalities of the
proposed system:
26
Customer care agents – should be able to view all information in line with sim_card
from the database through a portal.
Report generation – reports should be generated faster from the system and should
be viewed on the screen (soft copy) or printed (hard copy).
Query handling - Queries should be solved faster and queried information to be
viewed through a Web based portal.
Should allow management to access information from their workstations and allow
prepared viewable reports to be accessed through the use of passwords for
authentication.
Administrator should be able to add, modify and delete users and errors when
loading files.
System interface - the system should be user friendly and very interactive for ease
of operation and ensure efficiency.
All computers should be connected to the Telecel network in order to access the
system.
Long lag times – lag times should greatly be reduced.
Data validation capabilities, the system should be able to validate user’s input and
handle errors amicably.
2.8.2 Constrains
The following are constraints that might be encountered with the development of the
system:
The costs of implementing the project might take some time to recover.
User access levels should be well defined as customer care management may alter
I.T data thereby making the information inaccurate.
27
The system’s interface should be user friendly and at the same time provide the
appropriate interaction and error handling.
The system security should meet the passwords policy and not violate any
organisation’s policy.
The system can be attacked by viruses since accessed over the network.
2.9 Conclusion
There are lots of kinds of software out there. In many cases, you can outsource something
and be fine. The problem is that that decision needs to be taken on a per case basis, and
you cannot solve it in a one-size fits all situations. You're investing not just in the software,
but in the expertise solving the types of software problems your company has. The PIN and
PUK system has advantages that outweigh purchasing an off the shelf package in that it is
developed based on user requirements. It is easy to make changes and add functionality to
the system. The proposed system will have multiple interactive user portals that bridges
communication between the Database and the user. The system is compatible with all
major Web server software platforms (e.g., UNIX Apache and Microsoft IIS), works in
both Microsoft .NET and Sun/Java environments, and does not require any changes to the
existing firewall and Internet/Intranet security systems.
28
3 CHAPTER FOUR: SYSTEM DESIGN PHASE
3.1 Introduction
Having successfully gone through the existing system, and fully understood how it
operates the next step was to design the proposed system. This entails outlining how the
proposed system is going to be developed, configured and deployed. Generally, design
gives an outline of the System design, Physical Design, System Architecture, Database
Design, Interface Design, Program Design and Test Design. The essence of the project is
to replace the manual system that has caused and is still causing problems within the
company. This overview is meant to brainstorm all system functionalities so as to simplify
the design of the system.
Network printer
The system is going to take advantage of the network to save costs by installing a network
printer, which will be located in the receptionist’s office where everyone can print to from
their user’s workstations and it will also make it easy for everyone to access the printer
because it will be located at a convenient place.
29
Database server
The database will be placed on the database server so as to make updates to the database
global to everyone accessing the system and to minimize delays in terms of sharing
information as much as possible. The (DBMS) Database Management System which will
be used will be Microsoft Access (2007 or 2010), which is an efficient (DBMS) Database
Management System with a friendly user interface which will enables efficient database
administration and will also be efficient with the application programs.
Workstations
On the workstations is where all the application programs will be installed. The
applications are the ones which will authenticate the users and allow them access to the
database according to who they are. Microsoft Windows (XP or 7) will be the Operating
systems which will be used.
The diagram below shows the layout of the network and how all the components will be
arranged, thus the overall physical and network topology design
30
Figure 4.1
Architectural design is the plan for the hardware, software and communication
infrastructure for the new system, security and global support. A network is created to
show where the major components of the system will be connected to one another. The
users will be able to interact with the database through the application programs which will
enable them to search, store and update information in the database. The overall
architectural design of the system is shown in the diagram below:
Figure 4.2
-Data Updating
-Concurrency Control
-User Privileges
Read & View only
-Managing Users
Requirement received(PIN/PUK DETAILS)
Subscriber
ENQUERY
Fault Tolerance Server
Fail-Over
Server
DB Back-up
Client Machines
31
This is where the graphical interfaced applications, written for the windows
platform are going to reside. These machines are going to provide communication
with the database server requesting information for transaction processing.
Networking Cables
These are needed for communication links in the Local Area Network and the Wide
Area Network.
Printers
These are going to be used for the printing of reports needed by the management as
well as receipts produced after any payments made.
Server
All the information requirements for the firm are going to reside on this server.
Apache HTTP Sever 2.0.55 is a well known for its ease of management and low
cost of ownership. The necessary processing of data is going to be done here
ensuring data consistency and integrity.
CONTEXT DIAGRAM
· Customer enquiries
· Agent mobile number querying the DB
Input
MSISDN(M
·
·
Customer details should appear on the interface.
Data insertion done by IT in the DWH
Data as
obile
number)
· AUTOMATED SCRIPTING OF DATA WITHIN A TRANSPARENT CASCADIC output
SYSTEM; THUS DWH as the sole provider of the Pin & Puk system
· Window elevators to extract information into the normal package.
· Display tables
· Normalization
· Concurrency control measures and security
32
Figure 4.4
· Structured Querying
· Portal data extraction
CUSTOMER
· Agent portal
PORTAL
· Data dimensioning
· Logical extraction
Figure 4.5
33
CustCare PIN AND PUK
DATABASE
TECHNICAL QUERY
User Rights &
Accounts SQL & Data
analysis
(IT)
ADMIN CONFIGS
34
Data Flow Diagram (DFD) LEVEL 3.
Automated input
IT personal data
Punching
file into the
DATABASE
ETL Job
CUSTOMER CARE
AGENT
Output
Interface interface
Figure 4.6
Pseudo code
35
START
Open database connection
If client is already in the system
Then
Insert details
else
truncate and replace
Close database connection
If data = available
Then
Call new sticker form
Call sticker Customer agent display Mode
Else
If data already exists
Call Client display form
end
DATABASE NORMALISATION
Advantages
36
•Increased storage efficiency
•The normalization process helps maximize the use of clustered indexes, which is the most
powerful and useful type of index available. As more data is separated into multiple tables
because of normalization, the more clustered indexes become available to help speed up
data access
Disadvantages
•Requires much more CPU, memory, and I/O to process thus normalized data gives
reduced database performance
•Requires more joins to get the desired result. A poorly-written query can bring the
database down
•Maintenance overhead. The higher the level of normalization, the greater the number of
tables in the database.
37
Figure table 4.1
2NF: Translated to specific tuples and attributes (locating the Pimary key)
38
Databases are now an integral part of most system which plays a very important role in the
storage of data and its manipulation. Most databases come with a lot of functionality in
their RDMS relational database management system which include among other things
reporting tools, query language, stored procedures capability to program and create virtual
tables called views. The writer strongly recommends Microsoft SQL 2008 as my relational
database management solution. The following diagrams show the relationships between
the entities within the database of the newly proposed system.
USER ha s C lie n ts
USER C re a te s p ro c e d u re s
Pro c e d u re s Is in d a ta b a se
I.C .T Billin g c re a te d a ta b a se
39
3.5 User Interface design
The interface is a very critical part of the system because it is what makes the users enjoy
using the system or what can make them reject it. It is the reception of the system to the
users. The first version of the PIN AND PUK system is windows forms based or has a
Graphic User Interface (GUI) as some users term it. Below are the screen shots of the user
interface.
40
Figure 4.8 Main user account
4.1 Introduction
During program design, decisions will be made on the content, level of intensity and the
topic areas for the programs. Implementation translate design into effectively operating
41
programs. It requires precise planning of the details of an implementation plan and then
executing the implementation plan. The architecture of the system is established .The
requirements are mapped into an architecture .The architecture defines the components,
their interfaces and behaviours.The deliverable design document is the architecture .The
design document describes a plan to implement the requirements.
4.2 Coding
If IsNumeric(TextBox1.Text) Then
TextBox1.Text = Text
Else
Exit Sub
End If
End Sub
End Sub
42
Private Sub Button1_Click(ByVal sender As System.Object, ByVal e As
System.EventArgs) Handles Button1.Click
TableLayoutPanel1.Visible = False
connection.Open()
connection.Close()
provider = "PROVIDER=Microsoft.Jet.OLEDB.4.0;"
TableLayoutPanel1.Visible = False
connection.Open()
43
SqlDataSource3.SelectCommand = "SELECT * FROM Sales WHERE
ItemID = '" & TextBox1.Text & "'"
connection.Close()
provider = "PROVIDER=Microsoft.Jet.OLEDB.4.0;"
TableLayoutPanel1.Visible = False
connection.Open()
connection.Close()
End If
End Sub
44
Public Class Pin_And_Puk_System
' The custom principal can then be attached to the current thread's
principal as follows:
<span class="skimlinks-unlinked">Me.Hide</span>()
Form1.Show()
45
Else
End Sub
Me.Close()
End Sub
End Sub
End Sub
End Class
46
• Testing begins at the component level and works outward toward the integration of
the entire computer-based system.
• The developer of the software conducts testing and may be assisted by independent
testers.
• Sample data was used to test if the PIN and PUK System could function well with
all its modules integrated together. At this stage tests like PIN details querying can
be performed on the system to see whether the system meets your requirements.
Verification and validation of the system are the key main properties under test at
this phase. It will be a wise business idea to procure a system that guarantees
security and protection of information from the outside world.
47
Requirements
Analysis
System
Development
&
Design
Prototyping
& Design Unit
Testing
Implemantation
&
System Testing
Acceptence
Operations
&
mantainance
Stages of Testing
I will test the different modules separately before I have integrated them into a full
functional system
• Integration testing,
The developer of the system will then integrate the individual modules into a fully
functional complete system.
• Function testing.
In this phase I will be checking for the proper functionality of the system. Checks
to verify if the complete system is producing the desired results will also be
conducted
48
• Performance testing.
In this test I intend to subject the system to continuous operation to ascertain its
performance under heavy usage.
• Acceptance testing.
This will be done when the system will be handed over to its intended users
VALIDATION
Field of Application
• I will conduct validation test with different scenarios to verify whether the system
will output the expected results
4.4 Installation
The first installation of this system will be done at the Telecel Zimbabwe(pvt) ltd. For the
first month the new system will work hand in hand with the current set up. Installation of
the system will involve laying of communication cables connecting the finger print reader
49
at the main entrance to the centralized database.The software installations will be done
from removable media.MySQL database software provides a client for administering user
accounts as well as connection management
Training for the users on how to use the system will be conducted for one week. The
candidates mostly targeted by this training will be the accounts department as well as the
student registration department staff. Documentation in the form of user manuals will also
be they will form part of reference each time the users may have difficulties on the
operation of the system.
The system will run in parallel with the existing setup. This is the period in which the new
system will be put to test to ascertain its functionality. An failures that may arise within the
system will be rectified as well as any other features that might have been left out will be
added to come up with a robust system whose likelihood of failure will be very minimum
50
5 CHAPTER SIX: MAINTENANCE
Once installed the system will be continuously monitored for its conformance to the
desired specifications and the user requirements.. Any changes that they may be deemed to
be necessary on the system will be documented and effected on the system. Changes may
be effected on either the hardware as well as the software.The system review will be
conducted on weekly basis but if there is need to make changes that are critical to the
operation of the system, these will be conducted immediately.
51
In the event of a disaster the person responsible for working on the system should notify
the following members of staff
The emergency plan should be invoked in the event of the following scenarios
Major fire
System crash
In the event of a fire all personnel should leave the building immediately
Software Security - users will first be identified and authenticated before they can
get into the system, hence only authorized configured users can get into the system.
Access levels will determine system privileges and who does what and why for
tracking purposes. An Anti-virus will be installed on every client machine to
protect the computer and the application from malicious software.
Physical Security - the system database server will be in the Data Centre which will
be locked and only the administrator and authorized personnel will have the
physical fingerprint access and .a key to the room.
Database Security – the database will have an SQL server authentication password
plus the Windows authentication and the passwords will be known to the
Administrator only.
52
5.4 Backup Design
Backup is very crucial to the life of any system and is an exercise that needs to be carried
out consistently. The backup for this system will be done at different levels and intervals.
The levels of backup will include virtual online web based backup database which will
have the pin and puk details folder and Microsoft SQL database.
Complete: This creates a complete stand-alone image of the database. This backup
is self-dependent and can be restored to either the same or a new database on same
or other server.
Differential: This backs up only the modified contents since the last backup. They
do not provide much flexibility.
Transaction log: This backs up all transaction logs since the previous transaction
log backup or the complete transaction log backup if there has not been one in
past.
Files and File groups backup: This option is suitable when time constraints are
high and one cannot afford to perform a complete database backup. It also needs
transaction logs backup to take place to make it worth choosing this option. After
restoring file backup, apply transaction logs to roll the file contents forward to
make it consistent with the database.
Differential backups will be the main type of backup to be performed on a daily
basis and complete backups will be done at month ends and whenever there are
major changes to be made to the system.
53
5.4.1.1 Figure 6.1 Microsoft SQL server backup tool
Database backup should be done on daily basis at the end of each business day. The
backup file will be kept at the Telecel Zimbabwe148 situated at number Telecel Zimbabwe
148 Seke Rd Graniteside
54
MySql database provides a user friendly client interface for collecting database back files.
The procedure on how to collect the backup files will also be included in the training
manuals.
ITEM FREQUECNY/LOCATION
Due to the important nature of pin and puk records, a hot back site will be constructed at
202 Seke Rd. This site will immediately take over operations when services are disrupted
on the 148 Seke rd .
After services interruptions, all remote access will be redirected to the disaster recovery
site. The database administrator will carry out data integrity checks to the last point before
the disaster. This will involve execution of queries on the database, database table
structures as
5.5 Conclusion
55
With the system design complete, the new system can now be implemented. The designing
phase helped in identifying and arranging the program modules so as to come up with the
best system interfaces, data storage structures and the output formats. The program coding
stage marked the end of the designing phase and the beginning of the Implementation
Phase, which will begin by designing the implementation and testing strategies. I
recommend the management to approve the design phase and allow the implementation of
the system.
6 REFERENCES
56
1. www.telecelzim.co.zw
7. Truex, D., Baskerville, R., and Travis, J. (p79 :2000). "Amethodical systems
development: The deferred meaning of systems development methods". Accounting,
Management and Information Technologies 10 , IEEE Computer Society Press, New York
57
58