My Project5
My Project5
My Project5
BY :- Group 2
Acknowledgment ............................................................................................................................ v
Abstract .......................................................................................................................................... vi
Introduction ..................................................................................................................................... 1
1.1. Mission..................................................................................................................................... 2
Chapter Two.................................................................................................................................. 14
2.3.1. The major role of user in the existing system as input, process and Output....................... 15
2.3.3. The major role of ICT Director in the existing system as input, process and output ......... 16
2.3.2. The major role of Technician in the existing system as input, process and output ............ 16
Chapter Three................................................................................................................................ 21
Introduction ................................................................................................................................... 30
Introduction ................................................................................................................................... 66
5. 7. Conclusion ............................................................................................................................ 85
DB Database
UA User action
SA System action
FR Functional requirement
Admin Administrator
Empid Employ ID
Taking into account the fast-changing national quest for reform in the public sectors in particular
and educational dynamics in general the university has been undertaking various reform
1|Page
1.1. Mission
Oromia State University is in charge of capacity building for generating, embracing and
sustaining reform initiatives in the region and beyond through first-rating education, training,
research, consultancy and community services backed by state of the art of technology.
Oromia State University has a mission to support the development endeavors of the people by
tackling the insistent problems by utilizing natural resources and cultural values, through
inculcating scientific knowledge and skills relevant to the country and ensuring quality
education.
1.1. 2.Vision
By 2020 E.C OSU is to be one of the competent and best reform sustaining institutions in East
Africa in delivering high quality education, training, research and consultancy services.
2|Page
1.3.2. Specific Objectives
In order to achieve the general objective, we have the following specific objectives:
To register user.
Limitations of the proposed system well and the users have technical capability labiality to use
this system. As a result the develop the system for Oromia State University successfully within
proposed resources (budget, time, etc.). This also deals with the hardware as well as software
3|Page
requirements. We have to find out whether the necessary technology and the proposed equipment
have the capacity to hold the maintenance used in the project. The technical feasibility issues
usually raised during the stage of fact finding includes the following:-
The system will be very simple and easy to use and since the interface has nothing complicated
and interesting to use, we have made it so that any user can easily use it and achieve its
performance without any confusion.
Reduce cost.
Updating information.
Improved productivity.
4|Page
Improving the morale of our team.
reduce manpower
5|Page
• The system can deliver fast service for office.
Organizational Perspective
• Enable to perform different activities within short period of time & less cost.
• Reduce complexity.
4. Technician Perspective
• Reduce complexity.
6|Page
1.6. Scope and Limitation of the Project
1.6.1.Scope of the Project
Defines what the proposed system is not going to perform or what is not including in the
proposed System. This project covers some of the aspects of computer software web based
maintenance processing system using Oromia State University as case study.
There are many systems in OSU, from those different systems our project concerns on the
university web based maintenance management system. The project was develop a system for
generating report and for controlling data in web based maintenance management system office.
The project is mainly aimed to develop cost effective and efficient web based maintenance
management system. Hence, It includes all the important functions in maintenance management
like add user cases, manager user , register user, director, expert, store manager, purchase .
Registering user.
To develop a system for generating report and for controlling data in web based
maintenance management system office.
To develop cost effective and efficient web based maintenance management system.
7|Page
1.6.2. Limitation of the Project
Internet reliance means internet is not everywhere yet so that area cannot be connect.
Since it is an online project, customers need internet connection to log complain or for
request for services.
People who are not familiar with computers can’t use this application.
User can login only with his assigned username and password i.e. no guest facility is
available.
There are two types of interviews which we chose to use to collect the required data
Document analysis: - Using this method the team was try to analysis written documents in the
organization which have importance to the project.
8|Page
1.7.2. System Analysis and Design
In this project the team used Object Oriented System Analysis and Development methodology
Object Oriented Analysis (OOA):- During this phase the team used to model the functions of the
System (Use case modeling), find and identify the business objects, organize the objects and
identify the relationship between them and finally model the behavior of the object.
Object Oriented Design (OOD):- During this phase the team used to refine the use case model
to elect the implementation environment, model object interactions and behavior' s that support
the use case scenario, and finally update object model.
Analysis: In this phase, the requirements identified in the planning phase are analyzed in detail.
The functional and non-functional requirements of the system are defined, and the system
architecture is designed.
Design: In this phase, the detailed design of the maintenance management system is created. The
design includes the database schema, user interface, and system modules.
Implementation: In this phase, the maintenance management system is developed. The code is
written, tested, and integrated into the system.
Testing: In this phase, the maintenance management system is tested to ensure that it meets the
requirements defined in the planning phase. The system is tested for functionality, performance,
and security.
Deployment: In this phase, the maintenance management system is deployed to the production
environment. The system is installed, configured, and tested in the production environment.
Maintenance: In this phase, the maintenance management system is maintained. The system is
monitored, and any issues are resolved. The system is updated to meet changing requirements.
9|Page
1.7.4. Testing Methodology.
We will perform different testing for checking functionality of our proposed system:-
Unit testing: first we will test each unit at each system, so if a problem is encountered it will
immediately maintain at which the problem is occurred.
Integration testing: after we test each unit of the proposed system we will perform and
integration test to check whether the system meets all the functional requirements. When a
number of components are complete, it will test to ensure that they integrate well with each
System testing: after all of the above testing is checked we will test our system by other
Peoples and we will conduct some comments how they get our system.
Platform MS windows
10 | P a g e
1.7.5.1. Frontend Technologies
S.NO Front end Requirement
1 HT ML Interface Design
2 JS For validation
11 | P a g e
1.8.1. Budget of the Project
Activities Fees in birr
1 Proposal 25000
5 Implement 60,000
6 Test 35,000
7 Maintenance 55,000
Total 260,000
Activities Week Week Week Week Week Week Week Week Week Week Week Week
1 2 3 4 5 6 7 8 9 10 11 12
Requirement
Gathering &
Analysis
System Design
Implementation
Testing
12 | P a g e
1.9. Team Composition.
No Student Name ID/NO Email Task
13 | P a g e
Chapter Two
The current maintenance processing: system is the manual system that needs intensive human labor,
resource, consume time, less security. Here, the users to visit all the maintenance offices with a form for
them to fill and get sign by the respected offices. Once these forms are signed, it proves that the users
have been cleared. This process takes some days to be completed and possess a lot of stress to all the
users and workers who provide maintenance system.
ICT Director: - ICT Directors are responsible for maintaining the functionality, security, and
accessibility of all computer resources within the organization. This includes networking equipment,
computer hardware and software, data storage infrastructure, and web applications .
Technician: - You will be responsible for a wide variety of tasks, from fixing broken equipment to
performing preventative maintenance. This is a critical role, and you will need to be able to work quickly
and efficiently to keep our company running smoothly.
Users:- users will go to Office to get the maintenance form and fill the form then go to different offices to
get sign..
14 | P a g e
2.2.1.Data flow diagram
15 | P a g e
2.3.3. The major role of ICT Director in the existing system as
input, process and output
Input: maintenance Form signed by all officers will be submitted to ICT Director by the users.
Process: Collect and store maintenance form of users on which all other officers sighed.
Br 2: -officials of the University are not expected to give maintenance on ,Saturday, Sunday and holiday
Br 3: - When a user wants to sign a maintenance form, the must fill the required information and must
have the id code with it.
Br 4: - the user must return any Exchange items or pay for any lost items or Damage before repair.
Br 5: - users the university beneficiary must send the system a user maintenance form to the registrar.
Here are some examples of the types of reports that can be generated:
Work order completion report: This report provides information on the number of work orders
completed within a specific time frame. It can help identify trends and patterns in work order completion
rates and help identify areas for improvement.
16 | P a g e
Asset performance report:- This report provides information on the performance of assets within the
system. It can help identify assets that are underperforming or require maintenance and help prioritize
maintenance activities.
Maintenance cost report:- This report provides information on the cost of maintenance activities within
the system. It can help identify areas where costs can be reduced and help optimize maintenance
spending.
Maintenance management report:- This report provides information on the inventory levels within the
system. It can help identify inventory shortages or surpluses and help optimize inventory levels.
Downtime report:- This report provides information on the amount of downtime experienced by the
system. It can help identify areas where downtime can be reduced and help improve system availability.
These are just a few examples of the types of reports that can be generated in a maintenance management
system. The specific reports that are generated will depend on the needs of the organization and the
capabilities of the system.
Different reports are generated in the existing user maintenance system of Oromia State University.
Reports are generated based on the general information about a user and workers in the University.
In an existing system there are different reports generated for different purposes. Those reports include
customer allocation report, customer status report; Resource maintenance report, repaired property
report,unrepaired property report and damaged resource report etc.
17 | P a g e
2.6.Maintenance registering form
take a lot of time to get back a particular maintenance from the respected offices.
18 | P a g e
2.7.2. Input (Inaccurate/redundant/flexible) and Output
During filling of the form the user may fill inaccurate or incorrect information and may miss necessary
information, this show the system is inaccurate and the system is not flexible because if User wants to
erase the form he/she must only change another form.
Identify the requirements: The first step in creating a Security and Controls maintenance management
system is to identify the requirements of the system. You need to determine what features and
functionalities the system should have to meet the needs of Oromia State University.
Design the system: Once you have identified the requirements, the next step is to design the system. You
need to create a detailed design of the system that includes the architecture, data model, user interface,
and other components.
Develop the system: After designing the system, the next step is to develop the system. You need to
write the code for the system and test it to ensure that it works as expected.
Deploy the system: Once the system is developed, the next step is to deploy the system. You need to
install the system on the servers and configure it to work with the existing infrastructure.
Maintain the system: Finally, you need to maintain the system to ensure that it continues to work as
expected. This includes monitoring the system, fixing bugs, and updating the system to meet changing
requirements.
2.7.4. Efficiency
Due to the manual operation most of the activities are easy to wastage of resources like stationary
materials, manpower, time etc. to produce the corresponding outputs. This makes the current system
inefficient while utilizing resources.
19 | P a g e
2.8. Practices to the Preserved
Even if the existing system has a lot of problems, there are a number of activities that need to be
preserved. The system uses files and forms to define operations and to perform business rules in the
maintenance system. Our team members preserve the following practices form the existing system.
System procedures.
Formalities of the users of the system, offices concerned staffs and users.
20 | P a g e
Chapter Three
3. Proposed System
To be simple the facility maintenance system in the campus by observing the existing general service to
develop the new automated system. To identify problems and make the system to reduce or remove those
problems by giving services to the customers with interaction to the system Webpages. To solve the
problem of manual record keeping system by using computerized information system with only
interaction to the system. To reduce the time to get service from the maintenance system by only passing
message proposed system. The proposed system is used to solve the existing problems and it include the
following tasks:
• The system shall allow applicants to register about failed and/or malfunctioned item information.
• User friendly system, that means the customer and system interact in a good manner.
21 | P a g e
3. Data flow diagram for proposed system.
The requirements described in the following section define the required functionality for the maintenance
management system. Each functional requirement is given an identifier.
Technician Requirements
Manager Requirements
Description- manager is the person who control the flow of the work
Create Account
Description- an account is the fundamental object for the system (refer to the glossary for a detailed
description). The functional requirements for creating new accounts are described below.
22 | P a g e
Change password
Description- the system must allow the users to change their account password
Search:- Enables the Registrar and Officer login to the system and search maintenance.
Authentication: - The system will be verified by denying unauthorized user from using the system.
Displaying of user maintenance from the database was the main process for the system.
For those who use it to solve problems by asking questions Check at any time about the maintenance
status.
Handles all the user made by officer from the time it is placed to the dispatching of there quest.
The system performance is one of the functional requirement in which they regularly and maintenance
quality. It is all time ready to perform all the maintenance, faster maintenance and use minimal space
usage.
The system shall enable the administrator to access and manage the maintenance information.
The system shall enable the user to view maintenance clearance online.
The system shall process administrator and user account creation, and update
23 | P a g e
3.1.4 Input Related Requirements.
After the System is implemented, to perform a process it needs inputs like user username, user ID No and
other information which are necessary to in processing maintenance are entered in maintenance process.
USABILITY
Description: The system easy to be used by user with less knowledge & experience with computers.
Ranking: essential
Reliability
Description: Any information, comment, or complain the user gives is only viewed by the authentication
person.
Ranking: essential
Performance
The system performs efficiently and effectively as much as possible which is going to be used 24 hours a
day Fast loading system
Description: Waiting for an opening and load can be frustrating for an end user. To them, loading is
extremely important high connection.
24 | P a g e
Requirements: the connection must fast.
Ranking: essential
Availability
Description: The system is available anywhere any time, where internet access is available.
Security: - The system is secured and safeguard as much as possible so that there is permissible.
Authenticates:- the user by means of a user name and password with which user will be able to
login to his/her respective pages and use the system as required.
Portability: -
The system is machine independent and software system independent so it can be transported to different
target platforms.
Authenticated user with predefined access right will only enter to the information related to
maintenance.
25 | P a g e
Every users should use strong passwords especially admin.
User must enter valid user name and password to login to system. Without this, access to the
system is denied.
System allows only registered users to access maintenance system and also allows the users to
view their own profile not the other users' profile.
Availability: The new system provides service to the client without concerning the locations of the user
and also it works for 24 hours.
Reliability: The user of the new system can access more relevant and reliable information about the
services and also it detect the current location accurately.
Robustness: The ability of error detection of the new system is more efficient than the current system.
Since the new system is based on client-server architecture when an error occurred we were just
concerned mainly on the server side. For this reason, we are saving time in detecting errors.
Content Richness: The new system provides information about maintenance in the University. In the
case of our new system user involvement in the development processes is a vital requirement for the
quality of the system.
26 | P a g e
3.2.7 Backup and recovery.
Backups: - Backups are useful primarily for two purposes. The first is to restore a state following a
disaster (called disaster recovery). The second is to restore small numbers of files after they have been
accidentally deleted or corrupted. Data loss is also very common. 66% of internet users have suffered
from serious data loss. The system should be holding a backup of the data by using different storage
devices. Some of them are Flash Memory, DVD Backup, Tape Backup, Hard Drives and A drive.
Recovery: - Data recovery is the process of restoring data that has been lost, accidentally deleted,
corrupted or made inaccessible for some reason. Data recover by using system recovery and any software
like restoration, wise data recovery, recover software.
A maintenance management system is a process developed by your maintenance team to improve the
reliability, safety, and longevity of your physical assets . The physical environment in a maintenance
management system refers to the physical conditions of the assets being maintained. This includes the
location of the assets, their current condition, and the resources needed to maintain them.
To detect the current location of the user the system needs protection from external factors like those
things that do not make a clear connection between the device and the internet since the system needs a
clear Connection between the computer to detect the location of the user.the system needs a good
environment. But also a harsh environment that must be used: backup the cloud and protect the System.
Web-based maintenance management systems can help to address resource allocation issues by providing
real-time data on resource availability, utilization, and performance . This data can be used to optimize
resource allocation and improve the efficiency of maintenance operations
27 | P a g e
3.2.10. Documentation
The system contains the required documents needed to implement the project.
After the project, every activity of the entire development, design, and other process will be documented
for future reference.
There will also be documentation of implementation for maintenance during web application failure.
28 | P a g e
29 | P a g e
Chapter Four
4. System Analysis.
Introduction
This chapter deals with analyzing the proposed system by using different UMI analysis Modeling
techniques such as use case diagrams, the use case descriptions (scenarios), analysis Class diagram,
Sequence diagram. Activity Diagram, State chart Diagram. After identifying the actors and use cases, he
use cases are developed and textual descriptions (Scenarios) are stated. The Sequence diagram id depicted
based on the use cases which are developed for the proposed system. Activities will be represented by the
activity diagrams.
System modeling is intended to assist in developing and maintaining large systems with emphasis on the
Construction phase. The idea is to encapsulate complex or changeable aspects of a design inside separate
components with well-defined interfaces indicating how each component interacts with its environment.
Complete systems are then developed by composing these components. System modeling can increase
reliability and reduce development cost by making it easier to build systems, to reuse previous built
components within new systems, to change systems to suit changing requirements such as functional
enhancement and platform changes, and to understand systems. In this way, a system mode can satisfy
different requirements such as documenting the system, providing a notation for tools such as consistency
checkers and can also be used in the design stage of system development. Thus, system modeling is used
ensure that a developing piece of software evolves in a Consistent manner and that the task of integrating
software components is simplified.
30 | P a g e
4.1.1. Use case Model
Key terms.
ICT Director
Technician
User
Actors Description
The actors that interact with the system are the Manager user, Registrar Admin, Technician, consumer are
users of the system. They are described here in brief:-
Description: ICT Directors are responsible for maintaining the functionality, security, and accessibility of
all computer resources within the organization. This includes networking equipment, computer hardware
and software, data storage infrastructure, and web applications
Name: Technician.
Name: User
Description: User is able to their profile customization. Request, and views their own information.
31 | P a g e
figure 4.1.use case diagram
32 | P a g e
4.1.1.2. Use case description
Login
33 | P a g e
Log out
Description: Actors logout from the system when finishes their task.
Create account
34 | P a g e
course of 1. Open website. 3. Display create account form.
events
2. Click create account link. 8. If the new user name and password is
not found in account table, display
4. Select status.
successfully created.
5.Enter new user name and password
6.Re-enter password
Alternative If the form is not fulfilling, back to the form and return error message that
course: inform ICT Director.
Send request
Description: This use case describes that User can send request.
35 | P a g e
Preconditions UC-1
View request
Description: This use case describes that ICT Director can views request send from User
Preconditions UC-1
Write report
36 | P a g e
Typical course of Actor Action System Response
events
1.Open website 4.Display write report page
Preconditions Uc-1
Sign up
Description: This use case describes that User can sign up.
37 | P a g e
View order
Description: This use case describes that technician can views order send from manager to
maintenance.
Alternative course: If there is no message, return error message that inform technician.
Preconditions UC-1
Post condition The manager sends message to technician and a technician maintain a
particular problem
View report
38 | P a g e
Description: This use case describes that ICT Director views report that have information
about previous operation that have been done and the achievements (feedback).
2. Logged to website.
Assign technician
2. Logged to website
39 | P a g e
Change password
4. Select status.
40 | P a g e
4.1.1.3. Use case scenarios
A scenario is a description of some definite interaction between one or more actors and the system.
Log in
This use case used for a security check point to access the system
• Id preparation
When the consumer requests ID then the register checks his/her information and the department
head approves it
Retirement
Whenever the user request retirement and the Register check her or his and the department head allow the
retirement.
Biography
File borrowing
users request file borrowing and the officers checks his or her file give the file to the user
Summary sheet
user request maintenance the Officers checks his or her file and writes the maintenance with the
Officers approval
41 | P a g e
Log off
After the user and Officer finished working, the system should be log off.
42 | P a g e
4. Scenario for detect location
Actor: User
Actor: User
The system display basic information about the particular place. Scenario for Available services
Actor: User
43 | P a g e
4.2. Object Model
The class diagram is the main building block in our project modeling.
It is used both for general conceptual modeling of the systematic of the application and for detailed
modeling translating the models into programming code.
The classes in a class diagram represent both the main objects and or interactions in the application and
the objects to be programmed.
Generally the project is including the following class in the class diagram the over view of the class
diagram is:-
44 | P a g e
figure 4.2.1.Normal class diagram
45 | P a g e
4.3 Dynamic Model
{ Creat Account}
:Owner :Create account link :Create account :Create account form :Account :Confirmation
<<Actor>> <<bouondary>> <<Controler>> <<UI>>
click
1. The owner click on create account create
button. create
2. The system display create account
form. Fill
create
display
46 | P a g e
Figure 4.2.2 Sequence diagram of login
47 | P a g e
Figure 4. 2.3 Sequence diagram of log out
48 | P a g e
Figure 4.2.4Sequence diagram of block account
49 | P a g e
Figure 4.2.5. sequence diagram of send request
50 | P a g e
{View report}
click
create
create
1. The owner click on view report link.
select
2. The system display category.
click on view report button
3.The owner select category
4.The owner click on view report button display
51 | P a g e
Figure 4.2.7 Sequence diagram of approve request
52 | P a g e
Figure 4.2.8 Sequence diagram of assign technician
53 | P a g e
{ Change password}
Owner,sales person :Change password link :Change password :Change password form :Account :Confirmation
<<Actor>> <<boundary>> <<Controller>> <<UI>>
click
1. Members click
'change password' link.
create
2. The system will display
the form that used to
change password. create
54 | P a g e
4.3.2. Activity Diagram
Activity diagram used to emphasize the flow of control from activity to activity or to model the low of an
object as it moves from state at different points in the flow of control.
55 | P a g e
Fig 4.3.2 Activity Diagram for login.
56 | P a g e
Fig 4.3.3 Activity Diagram for create account
57 | P a g e
Fig 4.3.6 Activity Diagram for request
58 | P a g e
Fig 4.3.7 Activity Diagram for views report
59 | P a g e
Fig 4.3.9 Activity Diagram for search
60 | P a g e
Fig 4.3.10 Activity Diagram for assign technician
61 | P a g e
Fig 4.3.11 Activity Diagram for update
62 | P a g e
Fig 4.3.12 Activity Diagram for change password
63 | P a g e
4.3.3. State Chart Diagram
State diagrams show the various states that are valid for an object (which could be anything from a
method to a class to the system as a whole.
Initial Time=0
Time=10
Logging in invalid username or Password
Logging in
64 | P a g e
Fig 4.3.13 State Chart Diagram for home page
65 | P a g e
Chapter Five:
SYSTEM DESIGN
Introduction
In designing this system, the object-oriented system approach was used. Specifically, to design the
System we have used UML the reason why we used object-oriented approach is that it allows
decomposition of systems in to objects.
Designing a system has a goal to involve converting the proposed system in to logical and then physical
design specification. We expect one can understand our new system implementation because it gives full
description about whole system. Also one can understand easily and enable to answer how the system
developed and functioned in simplified manner.
This project is a website web based maintenance management system it was solve problems related to
facility maintenance office. This website was help to the web based maintenance office to accomplish
their daily tasks easily and provides flexible service for the users. It makes the system easy to use.
Within the Software Design Document are narrative and graphical used throughout the document, Next,
the document describes the system under development in terms of subsystem decomposition,
hardware/software mapping, persistent data management and access control. Generally the purpose of this
document is to determine how we are going to implement our system and to obtain the information
needed to derive the actual implementations of our system.
Security: The system should be designed to prompt the user with password and user name. This provides
security in such a way that unauthorized users can not have access to the system’s resources. Moreover,
the system should be designed to reject invalid user inputs to ensure the system’s robustness for all
interacting users.
66 | P a g e
Maintainability: the system should be extensible enough to incorporate functionalities and easy
modifiable.
User Interface: Our system provides user friendly and self-explanatory graphical user interface that eases
the interaction of the user with the system.
Reliability: The system should be reliable and consistent so that it provides the correct result in all
circumstances unless an error is encountered. If an error occurs the system was traps the error in the input
and notify the user to take appropriate corrections.
Availability: The system is web based or online system so it was be accessible 24 hours per day and 7
days per week unless some problems happened like connection failure, power failure and other. And also
the system accessible from any system that can operate internet access (like computers, smartphones,
tablets and soon) and was be accessible anytime a user would want to use the system.
Easy to use: This system was have a well-defined and easily understood interface. The processes was be
easy to understand and use by a user’s.
Data integrity: The system to maintaining and assuring the accuracy and consistency of data over its
entire life-cycle, and is a critical aspect to the design, implementation and usage of system which stores,
processes or retrieves data
67 | P a g e
5.3. Proposed System Architecture
This part describes the overall system architecture of facility management system how it is decomposed.
User interface: - that holds all possible presentation of the system, which is directly accessed and used by
users.
Database access: -which has direct interaction with database. It retrieves data from the database and
gives to logic process for further displaying to users by. It stores data as variables.
Web Server:-it stores the overall data that passes through the data base.
68 | P a g e
5.3.1. Subsystem Decomposition
To effectively provide these services as per the goals specified, the system is decomposed into SIX main
subsystems. These main subsystems are called facility maintenance management User Interface
subsystem and facility maintenance management Database.
Decomposition 1
USER<<BROWSER>>
TASK ASSIGN
MODULE
REQUEST MODULE
REPORT
MODULE
SERVER<<WAMP>>
DATABSE<<MYSQL>>
Decomposition 2
USER<<BROWSER>>
Request
MODULE
SERVER<<WAMP>>
69 | P a g e
DATABSE<<MYSQL>>
Decomposition 3
USER<<BROWSER>>
UPDATE
MODULE
ACCOUNT MODULE
SECURITY
SERVER<<WAMP>> MODULE
DATABSE<<MYSQL>>
Decomposition4
USER<<BROWSER>>
ACCOUNT
SECURITY MODULE MODULE
SERVER<<WAMP>>
DATABSE<<MYSQL>>
70 | P a g e
Decomposition 5
USER<<BROWSER>>
SERVER<<WAMP>>
DATABSE<<MYSQL>>
Decomposition 6
USER<<BROWSER>>
SERVER<<WAMP>>
DATABSE<<MYSQL>>
71 | P a g e
5.3.2. Hardware/Software Mapping.
Since the maintenance management system web based it needs servers networks, cables, and related
network hardware. The proposed subsystem will be implemented in Client Server architecture.
In this type of architecture, the clients request the server and the server responds to the client. Then the
client can get the information whatever they request to the server.
The first type is a web server which is responsible for receiving browsers' requests through the HTTP
protocol and responding accordingly the second type of server is a maintenance server, which is
Responsible for providing the requested maintenance services to the web server. The maintenance server
is responsible for the modification and insertion of material into the maintenance.
The client side is a web browser that receives requests from the user of the system and responds to the
request by communicating with the web server. The web server will run over XAMPP 3.2.1 Server, the
programming language Used to develop the proposed system is PHP version 5.2.6 and some scripting
languages such as hypertext markup language (HTML), Java script (JS) and MYSQL version 5.0.5 I b as
the maintenance management system or maintenance server.
The system was deploy or installed in server machine and can be accessed in the client side which means
the node is a three tier.
72 | P a g e
Fig 5.8 deployment diagram
73 | P a g e
5.3.4. Detailed Class Diagram
Class Modeling is design level that introduces changes to analysis class model based on implementation
technologies. It focuses on the solution domain instead of the problem domain. It shows static nature of
how the software is built.
74 | P a g e
5.3.5. Persistent Data Privilege
The system was depend on a relational database to perform day-to-day operations and storing data.
Data was be stored in apache and manipulated through the Database Subsystem, which was ensure
integrity and consistency of the data. It allows the database to be easily integrated with and accessed by
the rest of the system. The database was retain customer information, managerial information, technician
information, system administrator information, types of requests and orders. Whenever possible, the data
itself was be used as a primary key – in the case of the user’s information table, the account and empid
would be unique to each user. An individual could not have more than one account and empid.
Request table
User table
75 | P a g e
Account table
Technician table
Manager table
76 | P a g e
Maintenance table
77 | P a g e
Fig 5.10 Package Diagram
78 | P a g e
5.5.Algorithm Design.
An algorithm design is detail serial of instruction for carrying out an operating or solving a problem. In a
non-technical approach.
Technically, our project use algorithms to list the detailed instructions for carrying out an operation to
compute online student clearance management system, the computer uses an algorithm. To accomplish
this task, appropriate data must be entered into the system. An algorithm is a detailed series of
instructions for carrying o Out an operation or solving a problem.
Steps/procedure
Begin
Variable:
User Name
Password
user type
If (*variable is valid*)
Then
Otherwise
End if
End
Steps/procedure
79 | P a g e
Begin
Variable:
User Name
Password
user type
If(variable is valid*)
Then
Otherwise
End if
End
Steps/procedure
Begin
Variable:
User Name
Password
user type
If (variable is valid*)
Then
Otherwise
80 | P a g e
Display "the entered input is invalid"
End if
End
Steps/procedure
Begin
Variable:
User Name
Password
user type
If (variable is valid*)
Then
Otherwise
End if
End
81 | P a g e
5.6. User Interface Design.
User interface design is the specification of the interaction between the system users and a system.
82 | P a g e
Fig 5.14 Create Account interface
83 | P a g e
Web Besed Maintenance Managment System
Home Page
1 * * *
Interface1
-End5 -End6
User Technician Manager
* *
End13
End1 End1
Approve expert
Generat Report
Update Profile
Generate Report
Register Admin
Register Dep't
End3
End9 Add case
Register Faculty
End11
Register User
End8
84 | P a g e
5. 7. Conclusion
Web based maintenance is one of the most important maintenance department in Oromia State
University. Web based maintenance is still in using manual system of files store. This system is
inefficient as well as looking up of specific information. This greatly affects the flow of Critical
information. All these deficiencies are removed using the online web based maintenance
management system. Web based maintenance management system effectively stores all the
information that are send from the customer which have all the necessary information about the
problem and the manager can see the requests. All these improvements greatly reduce the time
at which specific information is delivered to web based maintenance office.
5.8. Recommendation
Currently web based maintenance Management System can only be deployed for a manual based
with some computers. But the system has to be developed as computerized application where
each implementation of web based maintenance management can be connected and
communicate with each other. This will make the whole system highly centralized as well as
well connected.
85 | P a g e
5.9. References
These are the references that we use
Uml applied (object oriented analysis and design using Uml)
Doug Rosenberg and Matt Stephens 2007(use case driven object modeling with Uml: theory and
practice)
Margareta Rouse. (2013). Use case Diagram[online]. Website:
http://saerchsoftwareequality.techtarget.com/ Retrieved on: [December 14, 2014].
Kirill Fakhroutdihov. (2014). Sparx System: UML diagram[Online]. Website: http://www.uml-
diagrams.org/ Retrieved on: [December 20, 2014].
Scott Sehlhorst. (2006).RequirementGathering [Online]. Website:
http://www.tynerblain.com/blog. Retrieved on: [November 10, 2014].
Design specification template http://www.construx.com/survivalguide/desspec.html
http://en.wikipedia.org/wiki/Activity_diagram
Lars Mathiassen et.al 2000. Object oriented analysis & design. Marko, Aalborg. Dk.
86 | P a g e
87 | P a g e