Enterprise Resource Planning (ERP) exists in every enterprise. It is often a low priority for IT managers until changes to the business make a very real, and very expensive, project. The real cost of a failed ERP initiative is IT careers. ERP is always challenging, so IT leaders must determine which of three strategies are most appropriate:
•Stick. Maintain the existing system and establish a date to revisit the strategy.
•Augment. Stay on the existing ERP platform, but augment with additional modules, custom development, or bolt-ons.
•Rip & Replace. Initiate the move to a new ERP system.
The best way to develop an ERP plan is through an annual audit that assesses the priorities of the enterprise and capabilities of the existing ERP platform. Use this storyboard and associated tools to get your ERP strategy on the right track.
Enterprise Resource Planning (ERP) exists in every enterprise. It is often a low priority for IT managers until changes to the business make a very real, and very expensive, project. The real cost of a failed ERP initiative is IT careers. ERP is always challenging, so IT leaders must determine which of three strategies are most appropriate:
•Stick. Maintain the existing system and establish a date to revisit the strategy.
•Augment. Stay on the existing ERP platform, but augment with additional modules, custom development, or bolt-ons.
•Rip & Replace. Initiate the move to a new ERP system.
The best way to develop an ERP plan is through an annual audit that assesses the priorities of the enterprise and capabilities of the existing ERP platform. Use this storyboard and associated tools to get your ERP strategy on the right track.
ERP software is good for reconciling financials, creating sales forecasts, maintaining order volumes and increasing customer satisfaction. Yes, it can be done using 4-5 different platforms, but managing the data in one place is easier than in several places.
Bluejacking is the sending of unsolicited messages over Bluetooth to Bluetooth-enabled devices such as mobile phones, PDAs or laptop computers,etc.
Bluetooth has a very limited range; usually around 10 meters on mobile phones, but laptops can reach up to 100 meters with powerful transmitters.
ERP software is good for reconciling financials, creating sales forecasts, maintaining order volumes and increasing customer satisfaction. Yes, it can be done using 4-5 different platforms, but managing the data in one place is easier than in several places.
Bluejacking is the sending of unsolicited messages over Bluetooth to Bluetooth-enabled devices such as mobile phones, PDAs or laptop computers,etc.
Bluetooth has a very limited range; usually around 10 meters on mobile phones, but laptops can reach up to 100 meters with powerful transmitters.
Internship report on "Contemporary Management Practices and Global Management...
ERP
1. AWARNESS ON THE IMPLEMENTATION OF
ERP &
DELEGATION OF POWERS
A Project Report submitted in the partial fulfillment of the requirement
for the award of degree of
BACHELOR OF TECHNOLOGY
IN
COMPUTER SCIENCE & ENGINEERING
Submitted By
AVINASH NAHAK (1201106061)
COLLEGE OF ENGINEERING AND TECHNOLOGY
BHUBANESWAR
Under the esteemed guidance of
Sri K.V.V SANJEEV KUMAR
ASSISTANT GENERAL MANAGER
DEPARTMENT OF ENTERPRISE AND RESOURCE PLANNING
VISAKHAPATNAM STEEL
2. 1
VISAKHAPATNAM STEEL PLANT
Department of Enterprise Resource Planning
CERTIFICATE
This is to certify that the project report entitled “AWARNESS ON THE IMPLEMENTATION
OF ERP” is being submitted by AVINASH NAHAK (Regd. No. 1201106061) in partial
fulfillment for the award of the degree of Bachelor of Technology (Computer Science &
Engineering). It is a bonafide work carried by him in proper guidance and supervision.
PROJECT GUIDE
Sri K.V.V.SANJEEV KUMAR
ASSISTANT GENERAL MANAGER
DEPARTMENT OF ERP
VISAKHAPATNAM STEEL
3. 2
ACKNOWLEDGEMENT
The completion of this project could not have been possible without the
participation and assistance of so many people whose names may not all be
enumerated. I sincerely appreciate and gratefully acknowledge their
contributions. However, I would like to express my deep appreciation and
indebtedness to the following:
Sri K.V.V.SANJEEV KUMAR, Assistant General Manager (Department of ERP),
who showed keen interest and considered patience for coordinating all the
project activities that helped the project work to get successfully completed.
Sri N Narasingarao, Assistant General Manager (Department of ERP), for his
endless support, kind and understanding spirit throughout the project period.
Sri A.N BISWAL, Assistant General Manager (Department of ERP), for sharing
his valuable suggestions and knowledge that benefitted me a lot.
Sri A.P LENKA, Assistant General Manager (Distribution Network), for providing
me with the opportunity to do my project in “RASHTRIYA ISPAT NIGAM LIMITED”,
also for rendering all possible help and guidance during the period.
My parents, relatives, friends who one way or the other shared their support,
morally, financially and physically, thank you!
Above all, to the Great Almighty, the author of all knowledge and wisdom,
for his countless love.
4. 3
ABSTRACT
An enterprise resource planning (ERP) project is a large enterprise program, both from
business and technological point of view. It generates huge changes and often involves
calling into question many traditional functions within the company, for which people
are seldom well prepared. It often requires the implementation of several new systems
and their integration with existing systems.
Before starting such a challenging project, certain conditions must be assured. The
company must ensure the maturity in ERP and the technical and management
capabilities of the IT department and the ability of both Business and IT to work together.
Without these prerequisites, companies would not be able to lead and achieve the
different phases of an ERP project. This preparation may require some communication
and educational campaign, which is critical for success. Once the level of maturity,
acceptance and technical capabilities are reached, then the project team must be
given the structure and the skills that will allow it to face and overcome the inevitable
challenges it will encounter.
The project “Awareness on the implementation of ERP” gives the consolidated
knowledge on the core elements required for the practical implementation of ERP, at
least in any medium level organization by the students with a little support from the
professionals. This study gives the real time worth & understandability in domains such as
networking, software and hardware that are crucial in the assessment of resources for
implementing ERP. Especially, the study in VSP results in the fulfillment of every basic
stream of ERP in detail as it holds one of the biggest ERP implemented centers in the
country. Watching the datacenters lively remains as the biggest adornment for the
project.
The project presents the respective strengths and drawbacks of the equipment used in
the implementation. So it leads to the advancement at the level of quality in any further
implementations and emerging the profitable and preferable decisions of the students
in the “Implementation of ERP”.
“Delegation of Powers” system presents a way for the users (employees) in the
organization to know their powers. It captures the attention due to its richness in
information handling, easy-to-handle interface and security. Any employee can know
his/her powers and perform their jobs accordingly. This project is done in ASP.NET as
frontend, with PL/SQL supported backend. Robustness of the system adds the durability.
Modules of ERP are unique and the implementation requires many employees. This DOP
system helps the organization to make their employees to know their performable
processes in each module of ERP. So this “Delegation of Powers” system supports the
functions in the successful “Implementation of ERP in Visakhapatnam Steel Plant”.
5. 4
INDEX
Part 1: Awareness on the implementation of ERP
S.no Topic Page No.
1. Introduction to VSP 8
2. About ERP 19
3. Hardware 26
4. Network 39
5. Software 50
6. 5
Part 2: Delegation of Power
S.no Topic Page No.
1. Introduction 62
1.1 Introduction to Project
2. System Analysis 62
2.1 Analysis Model
2.2 Elements of Analysis Modeling
2.3 Modules
2.4 Feasibility Study
3. Software Requirement Specification 67
3.1 Introduction
3.2 Information Description
3.3 Functional Description
3.4 Requirement Analysis
4. System Design & Implementation Details 69
4.1 Software Design, Coding and Constraints
4.2 Implementation Plan
4.3 Client Server Model
4.4 Database Design
7. 6
5. Technology Used 90
5.1 Introduction to ASP.NET
5.2 Database Models
5.3 Introduction to PL/SQL
6. Testing 95
6.1 Introduction to Testing
6.2 Testing Methods
6.3 Testing Types
6.4 Testing Levels
7. Test Plans Document 97
7.1 Testing Cycle
7.2 Test Cases
8. Conclusion 99
9. Future Scope of the Project 99
9. 8
INTRODUCTION TO VIZAG STEEL PLANT
Visakhapatnam Steel Plant (VSP) is the first coast based Steel Plant of India. It is located 16 KM
South West of the city of Destiny i.e. Visakhapatnam. Vizag Steel Plant has been conferred
NAVRATNA status on 17th November 2010. Founded in 1971, the company focuses on producing
value-added steel with the aid of modern technologies from Germany and Russia, VSP has an
installed capacity of 3 million Tonnes per annum of Liquid Steel and 2.656 million Tonnes of
saleable steel. VSP has become the first integrated Steel Plant in the country to be certified to all
the three international standards for quality (ISO-9001), for Environment Management (ISO-
14001) & for Occupational Health & Safety (OHSAS-18001). The certificate covers quality systems
of all Operational, Maintenance and Service units besides Purchase systems, Training and
Marketing functions spreading over 4 Regional Marketing Offices, 24 branch offices and stock
yards located all over the country. VSP exports Quality Pig Iron & Steel products' to Sri Lanka,
Myanmar, Nepal, Middle East, USA, China and South East Asia. RINL-VSP was awarded "Star
Trading House" status during 1997-2000. Having a total manpower of about 16,600 VSP has
envisaged a labor productivity of 265 Tonnes per man year of Liquid Steel.
RASHTRIYA ISPAT NIGAM LIMITED [RINL]
Rashtriya Ispat Nigam Limited, popularly known as ‘Vizag Steel’ the ‘Pride of Steel’, is a leading
Central PSU under the Ministry of Steel. It is also the first shore based Integrated Steel Plant in
the country.
Its products are made from 100% virgin steel, maintaining stringent tolerances both in chemical
& physical properties. It has been supplying various grades of steel for construction of projects
of National importance which include Metros, Power Sector, Bridges, Nuclear complexes and
several others. RINL‐VSP has a wide marketing network spread across the country and is the
“preferred steel maker” for the customers.
10. 9
PARTICULARS OF ORGANIZATION
Name of the Company : Rashtriya Ispat Nigam Limited
Company Identification : U27109AP1982GOI003404
Number (CIN)
Date of Incorporation : 18th February 1982
Mode of Incorporation : Incorporated as a Government Company
Under the provisions of the Companies
Act, 1956
Administrative Ministry : Ministry of Steel, Govt. of India
Present Status : A Govt. Company within the meaning of
Section - 617 of the Companies Act, 1956
Share Capital :
I. Authorized
Equity Share Capital - Rs.4890 Crores
Preference Share capital - Rs.3110 Crores
--------------------------------
Total: Rs.8000 Crores
--------------------------------
II. Subscribed, Issued - Rs.7,827.32 Crores
And paid up capital
Present Shareholding. : The entire Share Capital is held
By President of India.
Address of Registered : Rashtriya Ispat Nigam Limited
Office Visakhapatnam Steel Plant
Administrative Building
Visakhapatnam – 530 031
Website: www.vizagsteel.com
MAIN PRODUCTS OF VSP
STEEL
PRODUCTS
Blooms Billets Angles Beams Squares Wire rods
BY
PRODUCTS
Nut Coke Coke Dust Coal Tar Benzene Toluene Zylene
Wash Oil Lime Fines
11. 10
MAJOR SOURCES OF RAW MATERIALS
RAW MATERIAL SOURCE
Iron Ore Lumps & Fines Bailadila, Chhattisgarh
BF Lime Stone Jaggayyapet, AP
SMS Lime Stone SMS Lime Stone Dubai
BF Dolomite Madharam, AP
SMS Dolomite Madharam, AP
Manganese Ore Chipurupalli, AP
Boiler Coal Talcher, Orissa
Imported Boiler Coal Indonesia
Imported Coking Coal Australia / US
Medium Coking Coal (MCC) Kathara / Swang / Rajarappa / Kedla
Imported LAM Coke China
Quartzite Lump & Fines Local
Sand Sarepalli, AP
MAJOR UNITS
DEPARTMENT ANNUAL
CAPACITY(‘000 T)
UNITS (3.0 MT Stage)
Coke Ovens 2,701 4 Batteries of 67 Ovens & 7 Mtrs. Height
Sinter Plant 5,256 2 Sinter Machines of 312 Sq. Mtr. grate area
each
Blast Furnace 3,400 2 Furnaces of 3200 Cu. Mtr. volume each
Steel Melt Shop 3,000 3 LD Converters each of 133 Cu. Mtr.
Volume and Six 4 strand bloom casters
LMMM 710 2 Strand finishing Mill
WRM 850 4 Strand high speed continuous mill with no
twist finishing blocks
MMSM 850 6 Stand Finishing Mill
12. 11
VSP INFRASTRUCTURE
1.Coke Ovens & Coal Chemical Plant
Coal is converted into coke by heating the prepared coal blend charge in the coke ovens in the
absence of air at a temperature of 1000oC-1050oC for a period of 16/19 hours. The volatile matter
of coal liberated during carbonization is collected in gas collecting mains in the form of raw coke
oven gas passing through stand pipes and direct contact cooling with ammonia liquor spray.
Fig. Coke Ovens & Coal Chemical Plant
Facilities:
1. There are 4 batteries, each having 67 ovens.
2. The volumetric capacity of each oven is 41.6 m3.
3. Dry Coal charge /Oven is 32 t.
Salient Features:
1. Largest and technologically unique Coke Oven Batteries in the country at the time of
commissioning.
2. 7 meter tall coke ovens batteries.
3. Selective crushing of coal to improve the coke quality.
4. 100% Dry Quenching of coke using Nitrogen gas.
Capacity:
Production capacity – 2.635 Mt of Gross coke and 2.261 Mt of BF Coke per annum
13. 12
2.Sinter Plant
Sintering is agglomeration of fine mineral particles into a porous mass by incipient fusion caused
by heat produced by combustion within the mass itself. Iron ore fines, coke breeze, limestone
and dolomite along with recycled metallurgical wastes are converted into agglomerated mass at
the Sinter Plant, which forms 70-80% of iron bearing charge in the Blast Furnace. The vertical
speed of sintering depends on the suction that is created under the grate. At VSP, two exhausters
are provided for each machine to create a suction of 1500 mm water column under the grate.
Each exhauster is driven by a 5.6 MW motor capable of rotation of the fan at 1000 rpm.
Fig. Sinter Plant
Facilities:
Two Sintering machines of Dwight Lloyd type each having 312 M2 total grate area.
Salient Features:
On ground blending of sintering base mix.
Capacity:
Production Capacity - 5.256 MT of Gross Sinter per annum.
14. 13
3.Blast Furnace
Iron is made in the Blast Furnaces by melting iron bearing materials with the help of coke and air.
The solid charge materials like sinter, sized iron ore, coke etc. are charged in the vertical shaft of
the Blast Furnace at top and hot air blast is blown through the tuyeres located at the bottom.
The oxygen from the hot air combines with the carbon of the coke and generates heat and carbon
monoxide. The gases, while ascending upwards react with the descending charge materials.
Eventually the charge melts and hot metal and slag are produced and tapped out. The cooled gas
is also used as fuel in the plant. The Paul-Wurth, bell less top system is installed for furnace
charging.
Fig. Blast Furnace
Facilities:
1. Two Blast Furnaces of 3200 cum. useful volume each.
2. One Blast Furnace of 3800 cum. useful volume.
15. 14
Salient Features:
BF-1&2
1. Conveyorised charging of Blast Furnaces.
2. Paul-Wurth “Bell-less” top charging system for Blast Furnace.
3. On-line correction of coke moisture and batch weights.
4. Circular cast house with four tap holes and no slag notch.
5. Cast house slag granulation plant.
6. Tuyere leakage detection system
7. Gas Expansion turbines for power generation by utilizing the blast furnace gas top
pressure.
8. Automation with Programmable Logic Controllers (PLC)
BF- 3
1. New Generation Parallel Hopper Bell Less Top
2. BF Cooling elements (Cast Iron Staves & Copper Staves)
3. Flat Cast house Equipment (by TMT)
4. INBA Slag Granulation system
5. Annular Gap Scrubber
6. Pulverized Coal Injection system
7. Hot Stoves (internal combustion chamber)
8. Automation
Fig. Blast Furnace
Capacity:
Production Capacity – 3.4 MT of Hot Metal per annum for BF-1&2
– 2.5 MT of Hot Metal per annum for BF-3
16. 15
4.Steel Melt Shop & Continuous Casting
Steel is made in steel melting shop in the refractory lined vessels called LD Converters by blowing
oxygen through the hot metal bath. While iron making is a reduction process, steel making is an
oxidation process. The oxygen reacts with the carbon in the hot metal and releases large
quantities of gas rich in carbon monoxide along with huge amount of dust. The gases released
from the converter are collected, cooled, cleaned and recovered for use as fuel in the steel plant.
The entire molten steel at VSP is continuously cast at the radial type continuous casting machines.
Fig. Steel Melt Shop & Continuous Casting
Facilities:
1. Three LD converters of 133 cum. volume each.
2. 6 nos. of 4 - Strand Continuous Bloom Casting machines.
Salient Features:
1. 100% Continuous casting of steel
2. Converters gas cooling, cleaning and recovery systems
3. Computerization of the converter process
Capacity:
Production Capacity – 3.0 MT of Liquid Steel per annum
– 2.820 MT of CC Blooms per annum
17. 16
Visakhapatnam Steel Plant has three sophisticated Rolling mills, designed to produce 2.656
million tonnes per annum of finished products from continuously cast blooms.
1.Light & Medium Merchant Mill (LMMM)
Fig. Light & Medium Merchant Mill (LMMM)
The cast blooms from continuous casting department are heated and rolled in the two high speed
and fully automated rolling mills namely Light & Medium Merchant Mill (LMMM) and Medium
Merchant & Structural Mill (MMSM). The billets produced in LMMM are further rolled in Bar Mill
/ Wire Rod Mill (WRM). The finished products include wire rods & long products like
Reinforcement bars, rounds, squares, flats, angles, channels, billets etc.
Salient Features:
1. Evaporating cooling systems in Rolling Mill furnaces.
2. Computerization in Rolling Mill.
3. Tempcore cooling process facilitating high strength with good bend ability and weld
ability.
Capacity:
A Mill of 0.710 MT per annum production capacity.
18. 17
2.Medium Merchant & structural Mill (MMSM)
The Medium Merchant and Structural Mill (MMSM) is one of the modern rolling mills of
Visakhapatnam Steel Plant. This is a single strand continuous mill having production capacity of
850,000 T/year. The important feature of this mill is that Universal beams (both parallel and wide
flange) have been rolled first time in India using Universal stands. Parallel flange beams have
advantage over conventional beams as, for the same weight; the section is stronger and stiffer
due to greater moment of inertia and higher radius of gyration.
Fig. Medium Merchant & structural Mill (MMSM)
Salient Features:
1. Evaporating cooling systems in Rolling Mill furnaces.
2. Sophisticated, High speed rolling mills with computerized controls.
Capacity:
A Mill of 0.85 MT per annum production capacity.
19. 18
3.Wire Rod mill (WRM)
The Wire Rod Mill of VSP is high speed 4 strand No-Twist continuous mill designed to produce
8,50,000 T of wire rod coils. The mill is designed to produce plain wire rods from 5.5 mm to 12.7
mm diameter and Rebar in 8mm, 10mm, 12mm and 14mm diameter in coil form. The mill is
constructed at an elevated level of +5350 mm. Rolled billets of 125 mm x 125 mm square cross
section, ranging from 9.8 m to 10.4 m and weighing approx. 1250 kg are used as input material.
Fig 1.7.Wire Rod mill (WRM)
Facilities:
1. 7 Stand Roughing Mill (4 Strand rolling)
2. 6 Stand Intermediate Mill (4 Strand rolling)
3. 4*2 Stand Pre-finishing Mill (Single Strand rolling)
4. 4*10 Stand Finishing Mill (MORGAN BLOCK-Single Strand rolling)
Salient Features:
1. Computerization in Rolling Mill
2. Controlled cooling of Wire Rods (‘Stelmore’ Process) giving high strength and ductility.
Capacity:
A Mill of 0.85 MT per annum production capacity.
20. 19
ABOUT ERP
Enterprise resource planning (ERP) is an integrated business management software, typically a
suite of integrated applications that helps an enterprise to access, interpret and monitor all the
transactional and informational flow existing within the enterprise. It is a package based system
that allows an organization to:
1. Automate and integrate the business processes
2. Share common data and practices across the enterprise
3. Produce and access information in a real time mode
4. Lays the foundation for intelligence, integration, extended enterprise
5. Forms the basis for business growth and expansion
ERP provides an integrated view of core business processes that allows information to enter at a
single point in the process, often in real-time, updating a single, shared database for all functions
maintained by a database management system. All the departments are served by the same
integrated application through one point of entry. Information need only be entered or update
once, reducing errors, time and labor for reports, analysis, and planning and program
management. ERP systems track business resources, cash, raw materials, production capacity
and the status of business commitments: orders, purchase orders, and payroll. Ultimately, time
and resources are shifted to innovation, problem solving and enhances service to customers
rather than inputting, processing, organizing and verifying, leading to greater efficiency and
saving potential.
ERP systems run on a variety of computer hardware and network configurations, typically using
a database as an information repository. ERP facilitates information flow between all business
functions, and manages connections to outside stakeholders.
ORIGIN
The Gartner Group and others first used the acronym ERP in the 1990s, where it was seen to
extend the capabilities of Material Requirements Planning (MRP), and the later Manufacturing
Resource Planning (MRP II) as well as Computer Integrated Manufacturing. Without replacing
these terms, ERP came to represent a larger whole that reflected the evolution of application
integration beyond manufacturing. ERP systems experienced rapid growth in the 1990s. Because
of the year 2000 problem and introduction of the euro disrupted legacy systems, many
companies replaced their old systems with ERP. By the mid-1990s ERP systems addressed all core
enterprise functions. Governments and non–profit organizations also began to use ERP systems.
21. 20
MODULES OF ERP
HR (Human Resources) or HCM (Human Capital Man Powering)
FICO (Financing & Controlling)
MM (Material Management)
PP (Production Planning)
SD (Sales & Distribution)
QM (Quality Management)
SRM (Supplier Relationship Management)
CRM (Customer Relationship Management)
APO (Advanced Planning Optimization)
PS (Project Systems)
PI (Project Interface)
22. 21
LEGACY SYSTEM
A legacy system is an old method, technology, computer system or even an application program,
"of, relating to, or being a previous or outdated computer system”. Often a pejorative term,
referencing a system as "legacy" often implies that the system is out of date or in need of
replacement. The first use of the term legacy to describe computer systems probably occurred
in the 1970s. By the 1980s it was commonly used to refer to existing computer systems to
distinguish them from the design and implementation of new systems. Legacy was often heard
during a conversion process, i.e. when moving data from the legacy system to a new database.
Even if it is no longer used, a legacy system may continue to impact the organization due to its
historical role. Historic data may not have been converted into the new system format and may
exist within the new system with the use of a customized schema crosswalk or data warehouse.
In either case, the effect on business intelligence and operational reporting can be significant. A
legacy system may include procedures or terminology which are no longer relevant in the current
context, and may hinder or confuse understanding of the methods or technologies used.
LEGACY SYSTEM VS ERP
Enterprise Resource Planning Legacy System
Integrated system Nonintegrated system
Aimed for Process-Reengineering Aimed for automation
Code developed by huge software
professionals
Small in-house group developed
code
Alternate manual system No alternate manual system
Performance is very fast Performance is slow
Uses less software, Hardware &
Manpower
Uses more software, Hardware &
Manpower
Implementation is complex Implementation is simple
Implementation cost is high Implementation cost is low
Maintenance is simple Maintenance is complex
Scalable Non – Scalable
23. 22
IMPLEMENTATION OF ERP
Tougher competition in the marketplace is generating the need to better optimize resources,
improve profitability and keep customers satisfied. Companies are increasingly implementing
Enterprise Resource Planning (ERP) software solutions to improve operations and provide faster
customer response. An ERP solution that meets the specific business requirements enables one
to have a smooth implementation and the organization won’t have to custom design a solution.
Customized solutions are time consuming to and add unnecessary cost. One of the top reasons
ERP fails is because the software doesn’t meet basic industry specific business requirements.
Implementation of ERP System is a complex exercise, involving many process alterations and
several legacy issues. Organizations need an implementation strategy encompassing both pre
implementation and implementation stages. The various steps included are:
1. STRATEGIC PLANNING
• Assign a project team
• Examine current business processes and information flow
• Set objectives
• Develop a project plan
2. PROCEDURE REVIEW
• Review software capabilities
• Identify manual processes
• Develop standard operating procedures
3. DATA COLLECTION & CLEAN-UP
• Convert data
• Collect new data
• Review all data input
• Clean-up data
4. TRAINING AND TESTING
• Pre-test the database
• Verify testing
• Train the Trainer
• Perform final testing
5. GO LIVE AND EVALUATION
• Develop a final Go-Live Checklist
• Evaluate the solution
24. 23
CRITICAL SUCCESS FACTORS IN ERP IMPLEMENTATION
Critical success factors (CSFs) are often used to identify and state the key elements required for
the success of a business operation. Further on, critical success factors can be described in more
details as a small number of easily identifiable operational goals shaped by the industry, the firm,
the manager, and the environment that assures the success of an organization. CSFs are the
operational goals of a firm and the attainment of these goals will assure the successful operation.
The shaping of CSFs could be seen from four viewpoints that were shaped by:
Industries and the structural changes
Firm operational strategies
Managers’ perception
The changes in environment (with regards to technology)
We intend to study the CSFs in ERP implementation because ERP software impounds deep
knowledge of business practices accumulated from vendor implementation in many
organizations. The critical success factors can be divided into three phases of the implementation
project
The Strategic (planning) phase
The Tactical (action) phase
The Cultural phase
Strategic issues specify the need for a project mission, top management support, and a project
schedule outlining individual action steps for project implementation. Tactical issues focus on
communication with all affected parties, recruitment of necessary personnel for the project
team, and obtaining the required technology and expertise for the technical action step. Cultural
issues specify cultural diversity among customers, consultants, and vendors.
STRATEGIC TACTICAL CULTURAL
Top management support Business process reengineering Organizational culture
ERP strategy Project team & change management Effective communication
Business vision Monitoring & performance evaluation Cultural diversity
Legacy system information Monitoring and feedback
Retaining experienced employee
Problem anticipation
25. 24
ERP IMPLEMENTATION: VARIOUS REQUIREMENTS
In order to successfully implement ERP, an organization requires four major components
Implementation partner
Hard Ware
Network solutions
Software - ERP product
Implementation Partner:
Implementation of ERP is the most crucial part of ERP. In general, it is understood that purchasing
of ERP software and required hard ware along with network solutions is sufficient to implement
ERP. It is like purchasing a PC and windows software. But without knowing how to install the
software, how to use it and how to configure to suite to your requirements, there is no use of
such software and hard ware. Same is the case with ERP in an organizational level.
Hardware:
Entire data base of the organization including application software is stored at one place. Since
all the processes are automated in ERP, the processing speed of the hardware needs to be very
high. Data base servers, Application Servers and Web servers are provided with more than 100%
redundancy and with highest level of reliability. Personal computer to each user any way is a
necessity for implementing ERP.
Network solutions:
ERP software and Hardware to be connected to all the users across the organization through
Local Area Network (LAN) and across the globe through Virtual Private Network (VPN) or Internet.
Dedicated LANS need to be provided for local users which require switches, firewalls, routers,
fiber optic cable, LAN cable etc. Dedicated VPN either hired or own is required to be proved to
connect outside users which require switches, routers, modems, VPN bandwidth and internet
bandwidth.
ERP product:
It is software developed to suite various types of organizations. Each of the ERP developing
companies conducts research on requirements of different organizations before developing and
selling the software. There are thousands of such ERP developers across the globe, but very few
are globally respected and used. Organizations like SAP, ORACLE, INFOR and Microsoft occupy
more than 70% of the market share.
All the four requirements are discussed in independent sections from here onwards.
26. 25
IMPLEMENTATION PARTNER
There are some prominent software organizations across the globe that has knowledge of the
ERP software and Hardware along with the knowledge of different organizations. These are called
Implementation Partner (IP). They help the organization in identifying the needs and
improvements which can be brought through ERP. IP understands the organizational needs after
thorough study and discussion and configures the ERP software and hardware to suit to the
specific requirements of the type of organization. Steel industry requires different type of
configuration and Banking or Insurance companies requires different types of configuration, but
from the same ERP product like SAP or Oracle. IP acts as mediator between the implementing
organization and ERP product.
LEADING IMPLEMENTATION PARTNERS
Infosys Technologies Accenture
Wipro Technologies HCL Technologies
Tata Consultancy Services Cognizant
Hexaware Solutions Capgemini
IBM L&T Infotech
Oracle Consulting Hitachi Consulting
27. 26
HARDWARE
SERVER
A server is a program that awaits and fulfills requests from client programs in the same or other
computers. A given application in a computer may function as a client with requests for services
from other programs and also as a server of requests from other programs. In information
technology, a server is a computer program that provides services to other computer programs
(and their users) in the same or other computers.
Fig. A server room
Servers used in ERP Department at VSP
Application Server
Data Base Server
Rack Mount Server
Web Server
Blade Server
Quorum Server
Back Up Server
SAN (Storage Area Network)
NAS (Network Attached Storage)
28. 27
APPLICATION SERVER
An application server is a software framework that provides both facilities to create web
applications and a server environment to run them. An application server is a component-based
product that resides in the middle-tier of a server centric architecture. It provides middleware
services for security and state maintenance, along with data access and persistence. An
application server acts as a set of components accessible to the software developer through an
API defined by the platform itself. For Web applications, these components are usually
performed in the same running environment as their web server(s), and their main job is to
support the construction of dynamic pages. However, many application server implement
services like clustering, fail-over, and load-balancing.
Fig. HPrx7640
29. 28
DATABASE SERVER
Database server is the term used to refer to the back-end system of a database application using
client/server architecture. The back-end, sometimes called a database server, performs tasks
such as data analysis, storage, data manipulation, archiving, and other non-user specific tasks.
Fig. Database server model
30. 29
WEB SERVER
A web server is an information technology that processes requests via HTTP, the basic network
protocol used to distribute information on the World Wide Web. A Web server hosts websites
and runs web server software, such as Apache or Microsoft IIS, which provides access to hosted
webpages over the Internet. Most Web servers are connected to the Internet via a high-speed
connection, offering OC-3 or faster data transmission rates. A fast Internet connection allows
Web servers to support multiple connections at one time without slowing down. A Web server
serves fixed substance to a Web browser by loading a file from any storage device and helping it
transversely the network to a user's Web browser. At its core, a Web server serves static content
to a Web browser by loading a file from a disk and serving it across the network to a user's Web
browser.
Fig. Dell PowerEdge web server
Web Server supports session replication that provides high availability to web applications.
Session replication achieves this by replicating HTTP sessions from one instance to another server
instance of the same cluster. So, each HTTP session has a backup copy on a remote instance.
31. 30
RACK MOUNT SERVER
A rack server, also called a rack-mounted server, is a computer dedicated to use as a server and
designed to be installed in a framework called a rack. The rack contains multiple mounting slots
called bays, each designed to hold a hardware unit secured in place with screws. A rack server
has a low-profile enclosure, in contrast to a tower server, which is built into an upright,
standalone cabinet.
A single rack can contain multiple servers stacked one above the other, consolidating network
resources and minimizing the required floor space. The rack server configuration also simplifies
cabling among network components. In an equipment rack filled with servers, a special cooling
system is necessary to prevent excessive heat buildup that would otherwise occur when many
power-dissipating components are confined in a small space.
Fig. Rack Mount server room
32. 31
BLADE SERVER
A blade server is a server chassis housing multiple thin, modular electronic circuit boards, known
as server blades. A blade server is essentially a single circuit board populated with components
such as processors, memory, and network connections that are usually found on multiple boards.
Since they use laptop technology, blades are usually thin and require less power and cooling than
traditional rack mount servers. Blades are also designed to slide into existing servers (chassis)
and overall are more cost-efficient, smaller and tend to consume less power than traditional box-
based servers.
Each blade is a server in its own right, often dedicated to a single application. The blades are
literally servers on a card, containing processors, memory, integrated network controllers, an
optional Fiber Channel host bus adaptor (HBA) and other input/output (IO) ports. Blade servers
allow more processing power in less rack space, simplifying cabling and reducing power
consumption. According to a SearchWinSystems.com article on server technology, enterprises
moving to blade servers can experience as much as an 85% reduction in cabling for blade
installations over conventional tower servers. With so much less cabling, IT administrators can
spend less time managing the infrastructure and more time ensuring high availability.
Fig. IBM HS20 blade server
33. 32
QUORUM SERVER
A quorum server is a cluster comprising of multiple servers, users or other computers that any
given point appears to users as a single highly available virtual server. Cluster quorum disk is the
storage medium on which the configuration database is stored for a cluster computing network.
The cluster configuration database, also called the quorum, tells the cluster which physical
server(s) should be active at any given time. Cluster computing is used to load-balance the traffic on
high-traffic Web sites. Load balancing involves dividing the work up among multiple servers so that users
get served faster. The quorum tells the cluster which node should be active at any given time, and
intervenes if communications fail between cluster nodes by determining which set of nodes gets to run
the application at hand. The set of nodes with the quorum keeps running the application, while the other
set of nodes is taken out of service. The quorum disk comprises a shared block device that allows
concurrent read/write access by all nodes in a cluster.
The quorum server process runs on a machine outside of the cluster for which it is providing
quorum services. The quorum server listens to connection requests from the Service guard
nodes on a known port. The server maintains a special area in memory for each cluster, and
when a node obtains the cluster lock, this area is marked so that other nodes will recognize the
lock as “taken.”
The operation of the quorum server is shown in the figure below. When there is a loss of
communication between node 1 and node 2, the quorum server chooses one node (in this
example, node 2) to continue running in the cluster. The other node halts.
Fig. Quorum implementation
34. 33
STORAGE AREA NETWORK
A network which is created by attaching storage devices such as disk arrays and tapes to a
common server so that the storage devices appear to be confined to operating system is known
as storage area network. It provides access to consolidated, block level data storage. SANs are
primarily used to enhance storage devices, such as disk arrays, tape libraries, and optical
jukeboxes, accessible to servers so that the devices appear to the operating system as locally
attached devices. A SAN typically has its own network of storage devices that are generally not
accessible through the local area network (LAN) by other devices. A SAN does not provide file
abstraction, only block-level operations. However, file systems built on top of SANs do provide
file-level access, and are known as shared-disk file systems.
Data in SAN can be stored using two basic modules as
DAS (Direct Attached Storage)
NAS (Network Attached Storage)
DAS is so named because it is a directly attached to a server without any intermediary network
involved. Main distinguishing character of DAS is its direct connectivity through a host bus
adapter without the use of the networking devices as hubs, bridges and switches. DAS can also
provide multiple and parallel access if we equip this network with multiple ports.
NAS is a file-level computer data storage server connected to a computer network providing data
access to a heterogeneous group of clients. NAS is specialized for serving files either by its
hardware, software, or configuration. We can convert NAS to a DAS by disconnecting the entire
network and attach the port to a single computer. NAS systems are networked appliances which
contain one or more storage drives, arranged into logical, redundant storage containers or RAID.
35. 34
MANAGING DATA CENTRES
The management of the Data Centre which houses all the hardware components and few of the
networking tools require the two basic things
Power supply
Cooling
Backup
POWER SUPPLY
Power for the data centers in VSP are from two main sources.
TPP (Thermal Power Plant)
APSEB (Andhra Pradesh State Electrical Board)
The uninterrupted power supply (UPS) unit is used as stand by power supply during interruption
of regular power supply due to load shedding, power failure, power fluctuations etc. The UPS
provides a reliable and stable power to the equipments/systems sensitive to power variations
and interruptions. It functions as voltage stabilizer and at the same time it isolates the
equipment/systems from the power lines.
The UPS consists of a battery charger an inverter, output transformer, a set of batteries, control
circuits and transient/EMI filters. Data centers are operated even in the absence of power failure
with the help of batteries for an hour. The power sources can be altered by using bus coupler.
Fig. Uninterrupted Power Supply
36. 35
PDB (Power Distribution Box)
Electricity distribution is the final stage in the delivery of electricity to servers. A distribution
system's network carries electricity from the power sources (transmission system) and delivers it
to servers.
Fig. Power Distribution Unit
37. 36
COOLING - AIR CONDITIONING SYSTEMS
The control of temperature, humidity, motion of air, air distribution, air pressure, dust, bacteria,
odors, toxic gases and ionization is known as Air Conditioning Systems. All the electronic and
computerized control systems require controlled environment (i.e., temperature and humidity).
The environment is maintained to the respective requirements by air conditioning systems. Air
conditioning system in Datacenters of VSP are provided by PACs.
PAC (Precision Air Conditioner)
Precision air conditioning systems are used in a wide range of applications such as Server rooms,
Computer rooms, Data centres, Switch centres, Telecom shelters, Quality Control labs, Precision
Manufacturing CNC Machine, Pharmaceutical industry, Medical equipment, Clean rooms and
many more. These large computers required reliable air conditining systems capable of running
round the clock, maintain very close control on environmental conditions i.e. temperature and
humidity and have high sensible cooling capacity (equipment cooling / equipment heat removal)
since the equipment loads were dominant in these applications.
Fig. PAC working
38. 37
Data centers have to be maintained in a particular temperature (180C – 230C) and relative
humidity (80%). Cool air which is released by PAC is travelled through the false floor and comes
out of openings, located in front of servers. Hot air which is emitted by servers is captured by the
filter of PAC and later converted into cool air.
The above process is repeated in a cyclic manner, continuously for proper working of servers.
Fig. EMERSON Liebert PoX cooling system
39. 38
BACK UP
These days, more and more people are using computers to store memories, important
documents, and various other bits of information that may need to be kept for long periods of
time. Backing up a computer is essential for keeping long term (or even short term) documents
around. The various types of backups are
Operating System backup
All File Systems database backup
Off - line database backup - Fortnight basis
On - line database backup - Daily basis
Archive logs - Hourly basis
Off-line Backup
When the backup storage media is kept at a different geographic location from the source, this
is known as an offsite backup. Once the storage medium is brought to another location, it
becomes an offsite backup. Examples of offsite backup include taking the backup media or hard
drive home, to another office building or to a bank safe deposit box. Offsite backups provide
additional protection from theft, fire, floods and other natural disasters. Putting the backup
media in the next room as the source would not be considered an offsite backup.
On-line Backup
These are backups that are ongoing or done continuously or frequently to a storage medium that
is always connected to the source being backed up. Typically the storage medium is located
offsite and connected to the backup source by a network or Internet connection. It does not
involve human intervention to plug in drives and storage media for backups to run. The storage
data centers are located away from the source being backed up and the data is sent from the
source to the storage data center securely over the Internet.
Fig. Hard Disk backup
40. 39
NETWORK
A computer network, often simply referred to as a network, is a collection of computers and
devices interconnected by communications channels that facilitate communications and allows
sharing of resources and information among interconnected devices.
Fig. Data centers connecting diagram
NETWORK TYPES
The three types of networks are:
Internet
Intranet
Extranet
41. 40
INTRANETS AND EXTRANETS
Intranets and extranets are parts or extensions of a computer network, usually a local area
network.
An intranet is a set of networks, using the Internet Protocol and IP-based tools such as web
browsers and file transfer an application that is under the control of a single administrative
entity. That administrative entity closes the intranet to all but specific, authorized users. Most
commonly, an intranet is the internal network of an organization. A large intranet will typically
have at least one web server to provide users with organizational information.
An extranet is a network that is limited in scope to a single organization or entity and also has
limited connections to the networks of one or more other usually, but not necessarily, trusted
organizations or entities - a company's customers may be given access to some part of its
intranet, while at the same time the customers may not be considered trusted from a security
standpoint. Technically, an extranet may also be categorized as a CAN, MAN, WAN, or other
type of network, although an extranet cannot consist of a single LAN; it must have at least one
connection with an external network.
PURPOSE:
Computer networks can be used for a variety of purposes:
Facilitating communications
Using a network, people can communicate efficiently and easily via email, instant messaging, chat
rooms, telephone, video telephone calls, and video conferencing.
Sharing hardware
In a networked environment, each computer on a network may access and use hardware
resources on the network, such as printing a document on a shared network printer.
Sharing files, data, and information
In a network environment, authorized user may access data and information stored on other
computers on the network. The capability of providing access to data and information on shared
storage devices is an important feature of many networks.
Sharing software
Users connected to a network may run application programs on remote computers.
42. 41
NETWORKING METHODS
Local area network (LAN), which is usually a small network constrained to a small geographic
area. An example of a LAN would be a computer network within a building.
Metropolitan area network (MAN), which is used for medium size area. Examples for a city or
a state.
Wide area network (WAN) that is usually a larger network that covers a large geographic area.
Wireless LANs and WANs (WLAN & WWAN) are the wireless equivalent of the LAN and WAN.
Networks may be classified according to a variety of characteristics such as topology, connection
method and scale. All networks are interconnected to allow communication with a variety of
different kinds of media, including twisted-pair copper wire cable, coaxial cable, optical
fiber, power lines and various wireless technologies. The devices can be separated by a few
meters (e.g. via Bluetooth) or nearly unlimited distances (e.g. via the interconnections of
the Internet).Networking, routers, routing protocols, and networking over the
public Internet have their specifications defined in documents called RFCs.
NETWORK CLASSIFICATIONS
Networks can be classified and named by their physical extent, and intended purpose. Common
types of computer networks are outlined below:
HOME AREA NETWORK
A home area network (HAN) is a residential LAN which is used for communication between digital
devices typically deployed in the home, usually a small number of personal computers and
accessories, such as printers and mobile computing devices. An important function is the sharing
of Internet access, often a broadband service through a CATV or Digital Subscriber Line (DSL). . It
can also be referred to as an office area network (OAN).
PERSONAL AREA NETWORK
A personal area network (PAN) is a computer network used for communication among computer
and different information technological devices close to one person. Some examples of devices
that are used in a PAN are personal computers, printers, fax machines, telephones, PDAs,
scanners, and even video game consoles. A PAN may include wired and wireless devices. A wired
PAN is usually constructed with USB and Fire wire connections while technologies such as
Bluetooth and infrared communication typically form a wireless PAN.
43. 42
LAN (Local Area Network)
Fig. Local Area Network
A local area network (LAN) is a computer network that interconnects computers in a limited area
such as a home, school, computer laboratory, or office building using network media.
VIRTUAL PRIVATE NETWORK
A virtual private network (VPN) is a computer network in which some of the links between nodes
are carried by open connections or virtual circuits in some larger network (e.g., the Internet)
instead of by physical wires. The data link layer protocols of the virtual network are said to be
tunneled through the larger network when this is the case. One common application is secure
communications through the public Internet, but a VPN need not have explicit security features,
such as authentication or content encryption. VPNs, for example, can be used to separate the
traffic of different user communities over an underlying network with strong security features.
VPN may have best-effort performance, or may have a defined service level agreement (SLA)
between the VPN customer and the VPN service provider. Generally, a VPN has a topology more
complex than point-to-point.
44. 43
WAN (Wide Area Network)
A Wide Area Network (WAN) is a network that covers a broad area (i.e., any telecommunications
network that links across metropolitan, regional, or national boundaries) using private or public
network transports. Business and government entities utilize WANs to relay data among
employees, clients, buyers, and suppliers from various geographical locations.
Fig. Wide Area Network
VIRTUAL LAN
In computer networking, a single layer-2 network may be partitioned to create multiple distinct
broadcast domains, which are mutually isolated so that packets can only pass between them via
one or more routers; such a domain is referred to as a Virtual Local Area Network, Virtual LAN or
VLAN.
45. 44
IP ADDRESS
Every device connected to the public Internet is assigned a unique number known as an Internet
Protocol (IP) address. IP addresses consist of four numbers separated by periods (also called a
'dotted-quad') and look something like 127.0.0.1.
Transportation of packets in the network layer is based on IP address.
Class A - supports 16 million hosts on each of 126 networks
Class B - supports 65,000 hosts on each of 16,000 networks
Class C - supports 254 hosts on each of 2 million networks
An IP address can be static or dynamic. A static IP address will never change and it is a permanent
Internet address. A dynamic IP address is a temporary address that is assigned each time a
computer or device accesses the Internet.
SUBNET MASK
It is a mask used to determine what subnet an IP address belongs to. An IP address has two
components, the network address and the host address. For example, consider the IP address
150.215.017.009. Assuming this is part of a Class B network, the first two numbers (150.215)
represent the Class B network address, and the second two numbers (017.009) identify a
particular host on this network.
SUBNETTING
Sub netting enables the network administrator to further divide the host part of the address into
two or more subnets. A part of the host address is reserved to identify the particular subnet. This
is easier to see if we show the IP address in binary format.
The full address is:
10010110.11010111.00010001.00001001
The Class B network part is: 10010110.11010111
And the host address is: 00010001.00001001
GATEWAY
A node on a network that serves as an entrance to another network. In enterprises, the gateway
is the computer that routes the traffic from a workstation to the outside network that is serving
the Web pages.
46. 45
MAC ADDRESS
MAC (Media Access Control address) is a hardware address that uniquely identifies each node of
a network. In IEEE 802 networks, the Data Link Control (DLC) layer of the OSI Reference Model is
divided into two sub-layers: the Logical Link Control (LLC) layer and the Media Access Control
(MAC) layer. The MAC layer interfaces directly with the network medium.
DNS SERVER
Domain Name Server is an internet service that translates domain names into IP addresses. DNS
is a system that is used in TCP/IP network for naming computers & network services. DNS naming
locates computers and services through user friendly names. When a user enters a DNS name in
an application, DNS services can resolve the name to other information such as an IP address.
DHCP SERVER
Dynamic Host Configuration Protocol (DHCP) is an IP standard for simplifying management of
host IP configuration. Dynamic Host Configuration Protocol is a network protocol that enables a
server to automatically assign an IP address to a computer from a defined range of numbers
configured for a given network.
The DHCP standard provides for the use of DHCP servers as a way to manage dynamic allocation
of IP addresses and other related configuration details for DHCP-enabled clients on the network.
Fig. Dynamic Host Configuration Protocol (DHCP)
47. 46
BENEFITS of using DHCP
DHCP provides the following benefits for administering your TCP/IP-based network:
Safe and reliable configuration
Reduces configuration management
WORKING OF DHCP
DHCP uses a client-server model. The network administrator establishes one or more DHCP
servers that maintain TCP/IP configuration information and provide it to clients. The server
database includes the following:
Valid configuration parameters for all clients on the network.
Valid IP addresses maintained in a pool for assignment to clients, plus reserved addresses for
manual assignment.
Duration of a lease offered by the server. The lease defines the length of time for which the
assigned IP address can be used.
SWITCH
In networks, a device that filters and forwards packets between LAN segments. Switches operate
at the data link layer (layer 2) and sometimes the network layer (layer 3) of the OSI Reference
Model and therefore support any packet protocol. LANs that use switches to join segments are
called switched LANs or, in the case of Ethernet networks, switched Ethernet LANs. Types of
switches:
Core switch
Distribution switch
Access switch
Fig. Sitecom LN-131 24-port Switch
48. 47
HUB
A common connection point for devices in a network. Hubs are commonly used to connect
segments of a LAN. A hub contains multiple ports. When a packet arrives at one port, it is copied
to the other ports so that all segments of the LAN can see all packets.
ROUTER
A device that forwards data packets along networks. A router is connected to at least two
networks, commonly two LANs or WANs or a LAN and its ISPs network. Routers are located at
gateways, the places where two or more networks connect. Routers use headers and forwarding
tables to determine the best path for forwarding the packets, and they use protocols such as
ICMP to communicate with each other and configure the best route between any two hosts. Very
little filtering of data is done through routers
FIREWALL
Firewalls are the most important aspect of a network with respect to security. A firewalled system
does not need every interaction or data transfer monitored by a human, as automated processes
can be set up to assist in rejecting access requests from unsafe sources, and allowing actions from
recognized ones. The vital role firewalls play in network security grows with the constant increase
in 'cyber' attacks for the purpose of stealing/corrupting data, planting viruses, etc.
49. 48
SERVICES
A network is used to provide some kind of service as follows
Company/ enterprise may need a great Web site, or email service or a simple file or print
server.
The hardware needed for creating a network switches, hubs, routers, MODEMs and links
(phone lines, network cables, frame relay, DSL, cable MODEM, ISDN).
Servers and Clients must speak the same network protocols to do so. Servers and clients
must agree upon how to transmit information and the protocols which can be used are:
Internet and Intranets - TCP/IP (Transmission Control Protocol/ Internet Protocol)
NetBEUI (Network Basic Input/ Output System Extended User Interface) – designed by
MS/IBM for small networks
PRIMARY CONCERNS WHILE DEPLOYING ANY NETWORK
Performance: A measurement of some output or behavior in engineering or computing
Scalability: it is the ability of a system, network, or process, to handle growing amounts
of work in a graceful manner or its ability to be enlarged to accommodate that growth
Availability: it shows the amount or number of useful components available readily in a
machine. For example, a unit that is capable of being used 100 hours per week (168
hours) would have an availability of 100/168.
NETWORK ARCHITECTURE
50. 49
Network architecture is the design of a communications network. It is a framework for the
specification of a network's physical components and their functional organization and
configuration, its operational principles and procedures, as well as data formats used in its
operation.
In telecommunication, the specification of a network architecture may also include a detailed
description of products and services delivered via a communications network, as well as detailed
rate and billing structures under which services are compensated.
The network architecture of the Internet is predominantly expressed by its use of the Internet
Protocol Suite, rather than a specific model for interconnecting networks or nodes in the
network, or the usage of specific types of hardware links.
THE NETWORK INFRASTUCTURE OF VSP
Visakhapatnam Steel Plant (VSP) presently is having IBM 3090 catering the need of various
computer applications running on it, for the entire plant. This Mainframe computer system is
associated with its SNA network for catering the needs of mainframe connection to various
units of plant.
As this system is old and outdated the entire Mainframe system is being replaced with new
computer system of open standard (i.e. client server system).
Fig. Client-Server Technology
51. 50
SOFTWARE
ERP product
These software are developed to suite various types of organizations. Each of the ERP developing
companies conducts research on requirements of different organizations before developing and
selling the software. There are thousands of such ERP developers across the globe, but very few
are globally respected and used. Organizations like SAP, ORACLE, INFOR and Microsoft are the
leaders in the ERP software market. Some of the ERP software available in the market are:
PRODUCT VENDOR
EPICOR ERP Epicor
INFOR ERP BPCS/LX Infor Global Solutions
MAXIMO (MRO IBM
MICROSOFT DYNAMICS AX, GP, NAV, SL Microsoft
NETSUITE NetSuite Inc.
OPERA (I, II AND 3) Pegasus Software
ORACLE FUSION Oracle
SAP BUSINESS ALL-IN-ONE SAP
52. 51
SAP, started in 1972 by five former IBM employees in Mannheim, Germany, states that it is the
world's largest inter-enterprise software company and the world's fourth-largest independent
software supplier. The original name for SAP was German: Systeme Anwendungen Produkte,
German for "Systems Applications and Products". The original SAP idea was to provide customers
with the ability to interact with a common corporate database for a comprehensive range of
applications. Gradually, the applications have been assembled and today many corporations,
including IBM and Microsoft, are using SAP products to run their own businesses.
SAP applications, built around their latest R/3 system, provide the capability to manage financial
assets, cost accounting, production operations and materials, personnel, plants and archived
documents. The R/3 system runs on a number of platforms including Windows 2000 and uses the
client/server model. The latest version of R/3 includes a comprehensive Internet-enabled
package.
SAP has recently recast its product offerings under a comprehensive Web interface, called
mySAP.com, and added new e-business applications, including customer relationship
management (CRM) and supply chain management (SCM). As of January 2007, SAP, a publicly
traded company, had over 384000 employees in over 50 countries, and more than 36,200
customers around the world. SAP is turning its attention to small- and-medium sized businesses.
R/3
R/3 is the comprehensive set of integrated business applications from SAP. R/3 replaced an
earlier system, R/2, which is still in use. R/3 uses the client/server model and provides the ability
to store, retrieve, analyze, and process in many ways corporate data for financial analysis,
production operation, human resource management, and most other business processes. The
"R" was for "Real-Time Data Processing" and "3" was for "3-tier":
Database
Application server
Client (SAP GUI)
A recent release of R/3 makes it possible to get to the R/3 database and applications through
Internet access and Web browsers. A sales representative can initiate the workflow for a sales
order by filling out an electronic form on a laptop that will be "translated" into input for the R/3
system. Other interfaces such as Lotus Notes can also be used. The Web implementation adheres
to the Workflow Client API standard of the Workflow Management Coalition (WfMC).
53. 52
ABAP
ABAP (Advanced Business Application Programming) is a programming language for developing
applications for the SAP - R/3 system, a widely-installed business application subsystem. The
latest version, ABAP Objects, is object-oriented programming. SAP will run applications written
using ABAP/4, the earlier ABAP version, as well as applications using ABAP Objects. It is 4th
generation language and it is a proprietary language of SAP.
SAP’s original business model for R/3 was developed before the idea of an object-oriented model
was widespread. The transition to the object-oriented model reflects an increased customer
demand for it. ABAP Objects uses a single inheritance model and full support for object features
such as encapsulation, polymorphism, and persistence.
CATT
CATT (Computer Aided Test Tool) is a test tool in the ABAP Workbench package from SAP, part
of its popular R/3 system. CATT allows a developer to create test data and group and automate
reusable test runs for repetitive business transactions.
BAPI
BAPI (Business Application Programming Interface) is a set of interfaces to object-oriented
programming methods that enable a programmer to integrate third-party software into the
proprietary R/3 product from SAP. For specific business tasks such as uploading transactional
data, BAPIs are implemented and stored in the R/3 system as remote function call (RFC) modules.
DATA DICTIONARY
Fig. Data Dictionary
54. 53
Data definitions (metadata) are created and managed in the ABAP Dictionary. The ABAP
Dictionary permits a central description of all the data used in the system without redundancies.
New or modified information is automatically provided for all the system components. This
ensures data integrity, data consistency and data security.
What Information is Stored in the ABAP Dictionary?
The most important object types in the ABAP Dictionary are tables, views, types, domains, search
helps and lock objects. Tables are defined in the ABAP Dictionary independently of the database.
A table having the same structure is then created from this table definition in the underlying
database.
Views are logical views on more than one table. The structure of the view is defined in the ABAP
Dictionary. A view on the database can then be created from this structure.
Types are used in ABAP programs. The structure of a type can be defined globally in ABAP
programs. Changes to a type automatically take effect in all the programs using the type.
Lock objects are used to synchronize access to the same data by more than one user. Function
modules that can be used in application programs are generated from the definition of a lock
object in the ABAP Dictionary. Different fields having the same technical type can be combined in
domains. A domain defines the value range of all table fields and structure components that refer
to this domain.
The ABAP Dictionary also contains the information displayed with the F1 and F4 help for a field
in an input template. The documentation about the field is created for a data element that
describes the meaning of the contents of a table field. The list of possible input values that
appears for the input help is created by a foreign key or a search help.
ABAP OBJECTS
In the R/3 product from the German software company, SAP, ABAP Objects is a programming
language and part of the ABAP Workbench that allows developers to create and run applications
that contain program objects. ABAP Objects includes a virtual machine that will run applications
compiled with ABAP Objects language. Like similar object-oriented programming languages,
ABAP Objects supports the concepts of class objects, class and subclass inheritance, and
polymorphism.
ABAP WORKBENCH
ABAP Workbench is a set of programs for developing enterprise resource management (ERM)
applications that run in the R/3 subsystem from SAP. The latest version includes ABAP Objects,
an object-oriented programming language. R/3 will also run programs written in the earlier
ABAP/4 language.
55. 54
Integration in the ABAP Workbench
The ABAP Dictionary is completely integrated in the ABAP Workbench. The R/3 System works
interpretatively, permitting the ABAP Dictionary to be actively integrated in the development
environment. Instead of the original objects, the interpreters see only internal representations
of these objects.
Fig. ABAP Screen
Fig. ABAP Initial Screen
56. 55
ABAP SYNTACTIC RULES
ABAP is not case sensitive but space sensitive.
All user defined objects (program name) should start with either ‘Z’ or ‘Y’.
All statements should terminate with period (.).
For printing the statements on the output screen (list) we should use single quotes.
To comment whole line we have to keep *(star) in the first position of the line.
To comment from particular position of a line “(double quotes) should be used.
Declaration of a variable which allows the user to enter the input at runtime is done with
keyword PARAMETERS.
Declaration of a variable which is used in the program is done with the keyword DATA.
Execution Commands:
SHORTCUT KEYS ACTION
Ctrl+F2 Checking for errors
Ctrl+F3 Activate the program & create runtime object
F8 Execution of the total program
F5 Line by line execution
F6 To come out of loop
F7 To come out of function module
/hs
This switches into debugging mode and activates
the debugging of system functions.
TRANSACTION CODES
It is flow of screens. Every screen is called a session. Maximum number of sessions allowed 6.It is
also called T-Code. In short we can say that it is a short form or short cut key to execute a
program.
/n -- Terminates present T-code and opens a new T-code.
/o -- Without terminating the present T-code opens a new T-code.
/nex -- It is used to close all the sessions at a time and to logout. But the problem with this is
unsaved data will be lost.
57. 56
Different types of Transaction codes (T- Codes)
TRANSACTION CODE USAGE
/NSE22 SAP Easy Access Screen
/NSE38 SAP Editor
/NSE32 SAP Program creation
/NSE37 Function module Creation
/NSE11 ABAP Data Dictionary
/NSE21 Package builder
/NSE51 Screen Painter
Comparison between ABAP and C language
ACTION ‘C’ language ABAP
Giving input at run time Scanf PARAMETERS
Getting output on screen Printf WRITE
End of the statement ; .
New line /n /
For one line comment // *
More than one line comment /* */ ‘’
Not equal != ><
58. 57
Types of programs in ABAP
There are 5 types of programs available in ABAP. They are...
1.Executable Program
An executable program can contain all possible declarative statements. All processing blocks are
possible except for function modules. It supports classical dynpros as well as selection screens
and can be executed both using the submit statement and transaction codes. You can create an
executable program using the ABAP Editor.
2.Function Group (Function Pool)
A function group can contain all types of declarative statements. All processing blocks are
supported except for the reporting event blocks. They support classical dynpros as well as
selection screens. You can call their function modules, but you can also access the dynpro
processing of the function group using transaction codes. You can create a function group using
the Function Builder.
3.Module Pool
A module pool can contain all possible declarative statements. All processing blocks are
supported except for the reporting event blocks and function modules. It supports classical
dynpros as well as selection screens, and you can execute it using transaction codes. You can
create a module pool using the ABAP Editor.
4. Include Programs
Include programs do not represent stand-alone compilation units with a memory area of their
own. Include programs cannot be executed. They serve as a library for ABAP source code. They
are used to organize program texts into small editable units which can be inserted at any place
in other ABAP programs using the INCLUDE statement. There is no technical relationship between
include programs and processing blocks. Includes are more suitable for logical programming
units, such as data declarations, or sets of similar processing blocks. The ABAP Workbench has a
mechanism for automatically dividing up module pools, function groups and class pools into
include programs. You create your own include programs using the ABAP Editor.
5.Subroutine Pools
Subroutine pools are created using the ABAP Editor and are introduced with the PROGRAM
statement. They may not contain any screens of their own, and with the exception of the LOAD-
OF-PROGRAM event block they may only use subroutines as processing blocks. Subroutine pools
are loaded by externally calling their subroutines from within other ABAP programs.
59. 58
TYPES OF TABLES
There are three types of tables:
1. Transparent Tables
2. Clustered Tables
3. Pooled Tables
TRANSPARENT TABLES POOL TABLES CLUSTER TABLES
Contain a single table. Used
to store master data
They are used to hold a
large number of very small
tables(stores customizing
data or system data)
They are used to hold data
from a few number of large
tables.(stores system data)
It has a one-to-one
relationship with a table in
the database
It has a many-to-one
relationship with a table in
the database
It has a many-to-one
relationship with table in
the database
For each transparent table
there is one associated
table in the database
It is stored with other
pooled tables in a single
table called table pool in
the database
Many cluster tables are
stored in a single table in
the database called a table
cluster
The database table has the
same name, same number
of fields and the fields have
the same names
The database table has
different name, different
number of fields and fields
have different names
The database table has
different name, different
number of fields and fields
have different names
There is only a single table
Table pools contain more
tables than table clusters
Contains less tables than
table pools
Single table can have one
or more primary key
Primary key of each table
does not begin with same
fields or fields
Primary key of each table
begins with same fields or
fields
61. 60
BENEFITS OF ERP
ERP improves the quality and efficiency of the business. By keeping a company's internal
business processes running smoothly, ERP leads to better output that may benefit the
company, such as in customer service and manufacturing.
ERP supports upper level management by providing information for decision making.
ERP creates a more agile company that adapts better to change.
ERP makes a company more flexible and less rigidly structured. So organization components
operate more cohesively, enhancing the business - internally and externally.
ERP can improve data security. A common control system, such as the kind offered by ERP
systems, allows organizations the ability to more easily ensure key company data is not
compromised.
ERP provides increased opportunities for collaboration. Data takes many forms in the
modern enterprise. ERP provides a collaborative platform that lets employees spend more
time collaborating on content rather than mastering the learning curve of communicating
in various formats across distributed systems
DISADVANTAGES OF ERP
Customization forces the organization to find workarounds to meet unique demands.
Re-engineering business processes to fit the ERP system may damage competitiveness or
divert focus from other critical activities.
ERP can cost more than less integrated or less comprehensive solutions.
High ERP switching costs can increase the ERP vendor's negotiating power, which can
increase support, maintenance, and upgrade expenses.
Overcoming resistance to sharing sensitive information between departments can divert
management attention.
Extensive training requirements take resources from daily operations.
Due to ERP's architecture (OLTP, On-Line Transaction Processing) ERP systems are not well
suited for production planning and supply chain management (SCM).
Harmonization of ERP systems can be a mammoth task (especially for big companies) and
requires a lot of time, planning, and money.
63. 62
1. INTRODUCTION
1.1 Introduction to Project
Delegation of Powers system presents a clear view to the users or employees of a particular
organization to know their powers of performing certain tasks that are the part of organizational
processes. This system captures the attention of users due to its reports regarding their power in
clear.
2. SYSTEM ANALYSIS
2.1 Analysis Model
At a technical level, software engineering begins with a series of modeling tasks that lead to
complete specification of requirements and a comprehensive design representation for the
software to be built. The ANALYSIS MODEL, actually a set of models, is the first technical
representation of a system. Main methods of analysis modeling are –
Structured Analysis
Object-Oriented Analysis
Significance of Analysis Modeling –
To validate software requirements, we need to examine them from a number of different points
of view. Analysis modeling represents requirements in three “dimensions” thereby increasing the
probability that errors will be found, that inconsistency will surface, and that omissions will be
uncovered.
2.2 Elements of Analysis Modeling
The analysis model must achieve three primary objectives. They are
(1) To describe what the customer requires
(2) To establish a basis for the creation of a software design
(3) To define a set of requirements that can be validated once the software is built
64. 63
Fig.1.0 Elements of Analysis Modeling
At the core of the model lies the data dictionary—a repository that contains descriptions of all
data objects consumed or produced by the software. Three different diagrams surround the core.
The entity relation diagram (ERD) depicts relationships between data objects. The ERD is the
notation that is used to conduct the data modeling activity. The attributes of each data object
noted in the ERD can be described using a data object description.
Fig.1.1.ER diagram
DOD - Data Object
Description
PSPEC - Process Specification
CSPEC - Control Specification
65. 64
The data flow diagram (DFD) serves two purposes:
1. To provide an indication of how data are transformed as they move through the system.
2. To depict the functions (and sub functions) that transform the data flow.
The DFD provides additional information that is used during the analysis of the information
domain and serves as a basis for the modeling of function. A description of each function
presented in the DFD is contained in a process specification (PSPEC).
Fig.1.2.Data Flow Diagram
The state transition diagram (STD) indicates how the system behaves as a consequence of
external events. To accomplish this, the STD represents the various modes of behavior (called
states) of the system and the manner in which transitions are made from state to state. The STD
serves as the basis for behavioral modeling. Additional information about the control aspects of
the software is contained in the control specification (CSPEC).
Use Case Diagram:
User
Authorized User
66. 65
2.3 Modeling Technique
WATER FALL MODEL
Fig.1.5.Waterfall model diagram
The model that is basically being followed is the “Water Fall Model”, which states that the phases
are organized in linear order. First of all the feasibility study is done. Once that part is over the
requirement analysis and project planning begins. If system exists one and modification and
addition of new module is needed, analysis of present system can be used as basic model.
The design starts after the requirement analysis is complete and the coding begins after the
design is complete. Once the programming is completed, the testing is done. In this model the
sequence of activities performed in a software development project are
Requirement Analysis
Project Planning
System Design
Detail Design
Coding
Unit Testing
System Integration & Testing
67. 66
Here the linear ordering of these activities is critical. End of the phase and the output of one
phase is the input of other phase. The output of each phase is to be consistent with the overall
requirement of the system. Some of the qualities of spiral model are also incorporated like after
the people concerned with the project review completion of each of the phase the work done.
WATER FALL MODEL was being chosen because all requirements were known beforehand and
the objective of our software development is the computerization/automation of an already
existing manual working system.
2.4 Modules
This project contains mainly 5 modules. But according to the eligibility and power of the
user/employee, user gets access to particular modules.
Modules in DOP system are -
Departments
Users
Powers
Procedures
Power Scale Code Matrix
2.5 Feasibility Study
Feasibility study can be carried out in many ways. Main considerations are -
Economic Feasibility
Operational Feasibility
Technical Feasibility
68. 67
3. SOFTWARE REQUIREMENT SPECIFICATION
3.1 Introduction
The software requirement specification states the goals and objectives of the software,
describing it in the context of the computer-based system. The software Requirement
Specification begins the translation process that converts the software Requirements into the
language the developers will use. The SRS draws on the use-cases from the Feasibility System
Study Report and analyses the situations from a number of perspectives to discover and eliminate
inconsistencies, ambiguities and omissions before development progresses significantly under
mistaken assumptions.
3.2 Information Description
Delegation of Powers will provide a system for users of an organization to know their powers and
act accordingly.
Information Content: This system contains all the details regarding employees in the database
system, and the necessary information will be accessed from the frontend by the user.
Information Flow: According to the queries, the information flow will be done in parallel.
Information Structure: With 6 entity tables, and required views, all data transactions will be done.
3.3 Functional Description
The system has 5 modules. They are:
1. Departments
Display all departments available in VSP
Insert, Delete, Update the departments
2. Users
Logged into the system with their authorized User ID and password.
View the details of all the employees
But modification accesses are only for authorized people
3. Powers
Displays powers of all the departments
Insert, Delete and Update the new power for a particular department and power.
4. Procedures
Displays Procedure Description for a selected power.
Insert a new power for a department.
69. 68
5. Power Scale Code Matrix
Displays the details of all the users.
The core functionality for this Delegation of Powers system is Identifying the valid
user and to go for further transactions. This is provided by a procedure called
PR_VALID_USER.
Data should be inserted simultaneously to more than one table and displayed on
views. This is achieved by the procedure called PR_DOP_INSERT_3TABS
3.4 Performance Requirements
Performance is measured in terms of the output provided by the application. Requirement
specification plays an important part in the analysis of a system. Only when the requirement
specifications are properly given, it is possible to design a system, which will fit into required
environment. It rests largely in the part of the users of the existing system to give the requirement
specifications because they are the people who finally use the system. This is because the
requirements have to be known during the initial stages, so that the system can be designed
according to those requirements. It is very difficult to change the system once it has been
designed and on the other hand designing a system, which does not cater to the requirements
of the user is of no use.
The requirement specification for any system can be broadly stated as given below.
1. The system should be able to interface with the existing system.
2. The system should be accurate.
3. The system should be better than the existing system.
The existing system is completely dependent on the user to perform all the duties.
3.5 Requirement Analysis:
3.5.1 Platform Specification - Operating System: Windows XP/7
3.5.2 Hardware Requirements - Processor: Pentium 4
Hard disk: 2GB
RAM: 512MB
3.5.3 Software Requirements - Operating System: Windows XP/7
Client-Side scripting: ASP.NET
Programming Language: VB.NET
Web Browser: Google Chrome
Server Deployment: PL-SQL 7.0
70. 69
4. SYSTEM DESIGN AND IMPLEMENTATION DETAILS
4.1 Software Design
Software design is a process through which the requirements are translated into a representation
of software. One of the software requirements have been analyzed and specified.
The software design involves 3 technical activities. They are -
Design
Code Generation
Testing
The Design of the system is in modular form i.e., the software is logically partitioned into
components that perform specific functions and sub functions. The design phase leads to
modules that exhibit independent functional characteristics. It even leads to interfaces that
reduce the complexity of the connections between modules and with the external environment;
the design phase is of main importance because in this activity, decisions ultimately affect the
success of software implementation and maintenance.
4.1.1 Screens, Coding & Constraints
Screen 1.0: Login
71. 70
Screen Inputs:
FIELD DESCRIPTION DATA TYPE & SIZE REMARKS
USER ID Varchar2(6) User Entry
PASSWORD Varchar2(10) User Entry
Screen Output:
Authorized persons logged into module
Coding:
.NET
Imports System.Data.OleDb
Imports System.Data
Partial Class login
Inherits System.Web.UI.Page
Protected Sub Button1_Click(ByVal sender As Object, ByVal e As
System.EventArgs) Handles Button1.Click
Dim strCS As String
Dim ds As New Data.DataSet
Dim rows As Integer
Dim res As String
Dim check_session As String
Try
strCS = "Provider=MSDAORA;Data Source=xe;Persist Security
Info=True;User
ID=dop;Password=dop;Unicode=True"
Dim objCon As New OleDbConnection(strCS)
objCon.Open()
72. 71
Dim objCmd As New OleDbCommand
objCmd.CommandType = CommandType.StoredProcedure
objCmd.Connection = objCon
objCmd.CommandText = "Valid_user"
Dim param1 As New OleDbParameter
param1.Direction = ParameterDirection.ReturnValue
param1.OleDbType = OleDbType.VarChar
param1.Size = 50
objCmd.Parameters.Add(param1)
Dim p_user_id As New OleDbParameter
p_user_id.Direction = ParameterDirection.Input
p_user_id.OleDbType = OleDbType.VarChar
p_user_id.Size = 6
p_user_id.ParameterName = "P_USER_ID"
p_user_id.Value = Me.TextBox1.Text.ToString()
objCmd.Parameters.Add(p_user_id)
Dim p_password As New OleDbParameter
p_password.Direction = ParameterDirection.Input
p_password.OleDbType = OleDbType.VarChar
p_password.Size = 10
p_password.ParameterName = "P_PASSWORD"
p_password.Value = Me.TextBox2.Text.ToString()
objCmd.Parameters.Add(p_password)
rows = objCmd.ExecuteNonQuery
res = objCmd.Parameters(0).Value.ToString
If res = "0" Then
Session("SessionUserid") = Me.TextBox1.Text
check_session = Session("SessionUserid")
Response.Redirect("Menu.aspx")
73. 72
Else
Me.Label4.Text = res
End If
objCmd.Dispose()
objCon.Close()
Catch objex As OleDbException
Me.Label1.Text = objex.Message.ToString
Catch objex As Exception
Me.Label1.Text = objex.Message.ToString
End Try
End Sub
Screen 1.1: Menu
75. 74
Screen Inputs:
FIELD DESCRIPTION DATA TYPE & SIZE REMARKS
DEPARTMENT CODE Varchar2(6) User Entry
DEPARTMENT NAME Varchar2(100) User Entry
HOD ID Varchar2(6) User Entry
Screen Output:
New Department Inserted Successfully…
Coding:
.NET
Imports System.Data.OleDb
Imports System.Data
Partial Class Department
Inherits System.Web.UI.Page
Protected Sub Button1_Click(ByVal sender As Object, ByVal e As
System.EventArgs) Handles Button1.Click
Dim strCS As String
Dim ds As New Data.DataSet
Dim objCmd As New OleDbCommand
strCS = "Provider=MSDAORA;Data Source=xe;Persist Security
Info=True;User ID=dop;Password=dop;Unicode=True"
Dim objCon As New OleDbConnection(strCS)
Try
objCon.Open()
Dim strSql As String
strSql = "insert into tdop_department ( dept_code, dept_name,
hod_id) values ('" & Me.TextBox1.Text.ToString & "','" &
Me.TextBox2.Text.ToString & "','" & Me.TextBox3.Text.ToString &
"')"
objCmd.CommandType = CommandType.Text
76. 75
objCmd.CommandText = strSql
objCmd.Connection = objCon
Dim rows As Integer
rows = objCmd.ExecuteNonQuery()
If rows = 1 Then
Me.Label7.Text = "data inserted"
Else
Me.Label7.Text = "data not inserted"
End If
Catch ex As Exception
Me.Label7.Text = ex.Message.ToString
Finally
objCmd.Dispose()
objCon.Close()
End Try
End Sub
End Class
Screen 3: Users
77. 76
Screen Inputs:
FIELD DESCRIPTION DATA TYPE & SIZE REMARKS
USER ID Varchar2(6) User Entry
USER NAME Varchar2(100) User Entry
DEPARTMENT CODE Varchar2(6) User Entry
DEPARTMENT NAME Varchar2(100) User Entry
POWER CODE Varchar2(6) User Entry
SCALE CODE Varchar2(2) User Entry
DESIGNATION Varchar2(200) User Entry
AMOUNT Varchar2(10) User Entry
Screen Output:
User Details are inserted successfully.
Coding:
.NET
Imports System.Data.OleDb
Imports System.Data
Partial Class Users
Inherits System.Web.UI.Page
Protected Sub GridView1_SelectedIndexChanged(ByVal sender As Object,
ByVal e As System.EventArgs) Handles GridView1.SelectedIndexChanged
'Me.lblAudit_Type.Text = Me.GridView1.SelectedRow.Cells(3).Text
Me.TextBox1.Text = Me.GridView1.SelectedRow.Cells(1).Text
Me.TextBox2.Text = Me.GridView1.SelectedRow.Cells(2).Text
Me.TextBox3.Text = Me.GridView1.SelectedRow.Cells(3).Text
Me.TextBox4.Text = Me.GridView1.SelectedRow.Cells(4).Text
Me.TextBox5.Text = Me.GridView1.SelectedRow.Cells(5).Text
Me.TextBox6.Text = Me.GridView1.SelectedRow.Cells(6).Text
Me.TextBox7.Text = Me.GridView1.SelectedRow.Cells(7).Text
Me.TextBox8.Text = Me.GridView1.SelectedRow.Cells(8).Text
78. 77
End Sub
Protected Sub Button1_Click(ByVal sender As Object, ByVal e As
System.EventArgs) Handles Button1.Click
Dim strCS As String
Dim ds As New Data.DataSet
Dim rows As Integer
Try
strCS = "Provider=MSDAORA;Data Source=xe;Persist Security
Info=True;User ID=dop;Password=dop;Unicode=True"
Dim objCon As New OleDbConnection(strCS)
objCon.Open()
Dim objCmd As New OleDbCommand
objCmd.CommandType = CommandType.StoredProcedure
objCmd.Connection = objCon
objCmd.CommandText = "USER_INSERT"
Dim p_user_id As New OleDbParameter
p_user_id.Direction = ParameterDirection.Input
p_user_id.OleDbType = OleDbType.VarChar
p_user_id.Size = 6
p_user_id.ParameterName = "UI"
p_user_id.Value = Me.TextBox1.Text.ToString
objCmd.Parameters.Add(p_user_id)
Dim p_user_name As New OleDbParameter
p_user_name.Direction = ParameterDirection.Input
p_user_name.OleDbType = OleDbType.VarChar
p_user_name.Size = 6
p_user_name.ParameterName = "UN"
p_user_name.Value = Me.TextBox2.Text.ToString
objCmd.Parameters.Add(p_user_name)
Dim p_dept_code As New OleDbParameter
p_dept_code.Direction = ParameterDirection.Input
79. 78
p_dept_code.OleDbType = OleDbType.VarChar
p_dept_code.Size = 6
p_dept_code.ParameterName = "DC"
p_dept_code.Value = Me.TextBox3.Text.ToString
objCmd.Parameters.Add(p_dept_code)
Dim p_dept_name As New OleDbParameter
p_dept_name.Direction = ParameterDirection.Input
p_dept_name.OleDbType = OleDbType.VarChar
p_dept_name.Size = 10
p_dept_name.ParameterName = "DN"
p_dept_name.Value = Me.TextBox4.Text.ToString
objCmd.Parameters.Add(p_dept_name)
Dim p_pc As New OleDbParameter
p_pc.Direction = ParameterDirection.Input
p_pc.OleDbType = OleDbType.VarChar
p_pc.Size = 6
p_pc.ParameterName = "PC"
p_pc.Value = Me.TextBox5.Text.ToString
objCmd.Parameters.Add(p_pc)
Dim p_sc As New OleDbParameter
p_sc.Direction = ParameterDirection.Input
p_sc.OleDbType = OleDbType.VarChar
p_sc.Size = 2
p_sc.ParameterName = "SC"
p_sc.Value = Me.TextBox6.Text.ToString
objCmd.Parameters.Add(p_sc)
Dim p_designation As New OleDbParameter
p_designation.Direction = ParameterDirection.Input
p_designation.OleDbType = OleDbType.VarChar
p_designation.Size = 6
p_designation.ParameterName = "DES"
p_designation.Value = Me.TextBox7.Text.ToString
objCmd.Parameters.Add(p_designation)
Dim p_amount As New OleDbParameter
80. 79
p_amount.Direction = ParameterDirection.Input
p_amount.OleDbType = OleDbType.VarChar
p_amount.Size = 10
p_amount.ParameterName = "AM"
p_amount.Value = Me.TextBox8.Text.ToString
objCmd.Parameters.Add(p_amount)
Dim p_out As New OleDbParameter
p_out.Direction = ParameterDirection.Output
p_out.OleDbType = OleDbType.VarChar
p_out.Size = 10
p_out.ParameterName = "USERS_OUT"
p_out.Value = Me.TextBox8.Text.ToString
objCmd.Parameters.Add(p_out)
rows = objCmd.ExecuteNonQuery
If rows = 1 Then
Me.Label12.Text = "data inserted"
Else
Me.Label12.Text = "data not inserted"
End If
'Me.TextBox5.Text = objCmd.Parameters(0).Value.ToString
Catch objex As OleDbException
Me.Label12.Text = objex.Message.ToString
Catch objex As Exception
Me.Label12.Text = objex.Message.ToString
End Try
End Sub
End Class
81. 80
Screen 4: Powers
Screen Inputs:
FIELD DESCRIPTION DATA TYPE & SIZE REMARKS
DEPARTMENT CODE Varchar2(6) User Entry
POWER CODE Varchar2(6) User Entry
POWER DESCRIPTION Varchar2(3000) User Entry
Screen Output:
New power is generated for the current department.
Coding:
.NET
Imports System.Data
Imports System.Data.OleDb
Partial Class powers
82. 81
Inherits System.Web.UI.Page
Protected Sub Button1_Click(ByVal sender As Object, ByVal e As
System.EventArgs) Handles Button1.Click
Dim strCS As String
Dim ds As New Data.DataSet
Dim objCmd As New OleDbCommand
strCS = "Provider=MSDAORA;Data Source=xe;Persist Security
Info=True;User ID=dop;Password=dop;Unicode=True"
Dim objCon As New OleDbConnection(strCS)
Try
objCon.Open()
Dim strSql As String
strSql = "insert into tdop_powers ( dept_code, pwr_code,
pwr_description) values ('" & Me.TextBox1.Text.ToString & "','" &
Me.TextBox2.Text.ToString & "','" & Me.TextBox3.Text.ToString &
"')"
objCmd.CommandType = CommandType.Text
objCmd.CommandText = strSql
objCmd.Connection = objCon
Dim rows As Integer
rows = objCmd.ExecuteNonQuery()
If rows = 1 Then
Me.Label5.Text = "data inserted"
Else
Me.Label5.Text = "data not inserted"
End If
Catch ex As Exception
Me.Label5.Text = ex.Message.ToString
Finally
objCmd.Dispose()
objCon.Close()
84. 83
Screen Inputs:
FIELD DESCRIPTION DATA TYPE & SIZE REMARKS
DEPARTMENT CODE Varchar2(6) User Entry
POWER CODE Varchar2(6) User Entry
PROCEDURE CODE Varchar2(6) User Entry
PROCEDURE DESCRIPTION Varchar2(3000) User Entry
Screen Output:
New Procedure is generated successfully.
Coding:
.NET
Imports System.Data.OleDb
Imports System.Data
Partial Class Edit_procedures
Inherits System.Web.UI.Page
Protected Sub Button1_Click(ByVal sender As Object, ByVal e As
System.EventArgs) Handles Button1.Click
Dim strCS As String
Dim ds As New Data.DataSet
Dim objCmd As New OleDbCommand
strCS = "Provider=MSDAORA;Data Source=xe;Persist Security
Info=True;User ID=dop;Password=dop;Unicode=True"
Dim objCon As New OleDbConnection(strCS)
Try
objCon.Open()
Dim strSql As String
strSql = "insert into tdop_procedure( dept_code, pwr_code,
prced_code, prced_description) values ('" &
Me.TextBox1.Text.ToString & "','" & Me.TextBox2.Text.ToString &
"','" & Me.TextBox3.Text.ToString & "','" &
Me.TextBox4.Text.ToString & "')"
objCmd.CommandType = CommandType.Text
85. 84
objCmd.CommandText = strSql
objCmd.Connection = objCon
Dim rows As Integer
rows = objCmd.ExecuteNonQuery()
If rows = 1 Then
Me.Label4.Text = "data inserted"
Else
Me.Label4.Text = "data not inserted"
End If
Catch ex As Exception
Me.Label4.Text = ex.Message.ToString
Finally
objCmd.Dispose()
objCon.Close()
End Try
End Sub
End Class
Screen 6: Power Scale Code Matrix
86. 85
Editing Power Scale Code Matrix:
Screen Inputs:
FIELD DESCRIPTION DATA TYPE & SIZE REMARKS
DEPARTMENT CODE Varchar2(6) User Entry
USER ID Varchar2(6) User Entry
USER NAME Varchar2(100) User Entry
USER ENTRY DESIGNATION Varchar2(100) User Entry
POWER CODE Varchar2(6) User Entry
SCALE CODE Varchar2(2) User Entry
POWER DESCRIPTION Varchar2(3000) User Entry
AMOUNT Varchar2(10) User Entry
Screen Output:
Power Details of Department are created successfully.
87. 86
Coding:
.NET
Imports System.Data.OleDb
Imports System.Data
Partial Class Edit_procedures
Inherits System.Web.UI.Page
Protected Sub Button1_Click(ByVal sender As Object, ByVal e As
System.EventArgs) Handles Button1.Click
Dim strCS As String
Dim ds As New Data.DataSet
Dim objCmd As New OleDbCommand
strCS = "Provider=MSDAORA;Data Source=xe;Persist Security
Info=True;User ID=dop;Password=dop;Unicode=True"
Dim objCon As New OleDbConnection(strCS)
Try
objCon.Open()
Dim strSql As String
strSql = "insert into tdop_procedure( dept_code, pwr_code,
prced_code, prced_description) values ('" &
Me.TextBox1.Text.ToString & "','" & Me.TextBox2.Text.ToString &
"','" & Me.TextBox3.Text.ToString & "','" &
Me.TextBox4.Text.ToString & "')"
objCmd.CommandType = CommandType.Text
objCmd.CommandText = strSql
objCmd.Connection = objCon
Dim rows As Integer
rows = objCmd.ExecuteNonQuery()
If rows = 1 Then
Me.Label4.Text = "data inserted"
88. 87
Else
Me.Label4.Text = "data not inserted"
End If
Catch ex As Exception
Me.Label4.Text = ex.Message.ToString
Finally
objCmd.Dispose()
objCon.Close()
End Try
End Sub
End Class
Screen 6: Power Scale Code Matrix Report (Report)
89. 88
4.2 Implementation Plan
The main plan for the system developed is to upgrading existing system to the proposed system.
There are mainly 4 methods of upgrading the existing to proposed system.
1. Parallel Run System.
2. Direct Cut-Over System.
3. Pilot System.
4. Phase-In Method.
Parallel Run System -
It is the most secure method of converting from an existing to new system. In this approach both
the systems run in parallel for a specific period of time. During that period if any serious problems
were identified while using the new system, the new system is dropped and the older system is
taken at the start point again.
Direct Cut-Over Method -
In this approach a working version of the system is implemented in one part of the organization
such as single work area or department. When the system is deemed complete, it is installed
throughout the organization either all at once (direct cut-over) or gradually (phase-in).
Phase-In Method -
In this method a part of the system is first implemented and over time other remaining parts are
implemented.
Implementation Plan Used -
The Workflow Management system is developed on the basis of “Parallel Run Method” because
we upgraded the system, which is already in use to fulfill the requirements of the end-user. The
system already in use is treated as the Old System and the new system is developed on the basis
of the old system and maintained the standards processed by the older system. The upgraded
system is working well and is implemented on the client successfully.
4.3 Client Server Model
Client/Server Architecture is a simple and advanced computer system model in which software
residing on one computer (Client) requests service and/or data from another computer (Server).
Clients and Servers are communicated through LAN.