Sunday, 12 August 2012

Assignment on Product Manufacture:- Inventory Management System


NATIONAL INSTITUTE OF INDUSTRIAL ENGINEERING
PGDIE-42
Industrial Engineering


 Assignment on Product Manufacture:-
Inventory Management System
Presented by:

Rahul Sen(Roll no:72)
Raunak Goyal(Rollno:76)




Introduction:
An inventory control system is an integrated package of software and hardware used in warehouse operations, and elsewhere, to monitor the quantity, location and status of inventory as well as the related shipping, receiving, picking and putaway processes. In common usage, the term may also refer to just the software components.

An inventory control system may be used to automate a sales order fulfillment process. Such a system contains a list of order to be filled, and then prompts workers to pick the necessary items, and provides them with packaging and shipping information.


Software Specification:

MS ACESS ,Visual basic


Minimum Requirements:

Windows Xp and above operating system,Microsoft office -2007.
SDLC(Software development life cycle : Model used is Iterative waterfall model.


WaterfallModel: he waterfall model is a sequential software development model in which development is seen as flowing steadily downwards (like a waterfall) through several phases.
In 1970 Royce proposed what is now popularly referred to as the waterfall model as an initial concept, a model which he argued was flawed (Royce 1970). His paper then explored how the initial model could be developed into an iterative model, with feedback from each phase influencing previous phases, similar to many methods used widely and highly regarded by many today.
Despite Royce's intentions for the waterfall model to be modified into an iterative model, use of the "waterfall model" as a purely sequential process is still popular, and, for some, the phrase "waterfall model" has since come to refer to any approach to software creation which is seen as inflexible and non-iterative.
Usage of the waterfall model
In Royce's original waterfall model, the following phases are followed perfectly in sequential order:
  • Requirements specification
    • Requirements are captured and set in stone.
  • Design
    • A "blueprint" is drawn up for the developers to implement.
  • Implementation
  • Integration
  • Testing
  • Installation
  • Maintenance

Advantages of a Waterfall Model:

l  A waterfall model helps find problems earlier on which can cost a business less than if it was found later on.
l  Requirements will be set and these wouldn't be changed.
l   As everything is documented a new team member can easily understand what's to be done.
l  Implementers have to follow the design accurately














ITERATIVE WATERFALL MODEL













Design process:  Below is the design of basic form implemented using Vb tools and connected a db (Ms Access) using queries.









                 Design structure of Inventory Management Software



How to_Generate_Sanction Notes
Hence, before generating a Sanction Note containing a particular Note Number, you have to follow
certain steps. The steps are as under :
The Command button in the Form is linked to under Reports which
in turn call the information/data from the answer extracted by Query. You can
include as many number of items as possible of a particular branch in each Office Note. For an item
or a set of items under single Office Note number, only one Office Note will have to be generated.
Sanction Note Sanction Note
Sanction Not e
1. Minimise the Form being used for entering the information on individual item
2. Then you will find a small window titled the leftside of it appears
portion. Below the objects, Ensure that (object) is highlighted and right-side of it you can see
number of Queries. Out of these queries, you will find a Query by name Right-click on
this query and choose from the PopUp Menu. Now you will actually see the Sanction-
Note (Query)window. In this query, in the column and row, please type the
branch code number (e.g.141, 303, 2071, 2077, 809 etc.) and under Criteria row of "AMC Sanction
Note Ref', mention the Office Note number for which you are going to generate the sanction Note. For
Sanction Note number, please give the numbers like '141/999' or "2071/999", first three digit is for
Branch/EC code and last three digit is actual Note Number (started from 001, 002.... ). For each and
every branch and for different Office Note numbers, you have to generate the separate Office Note
Reports.
Asset
AMC0203 : Database Objects
Queries
Sanction Note.
Design View
Branch Code Criteria
3. Save the Query and close the Query Window
4. Maximise the Form Window. Click on the Sanction Notes Butten. You will get preview
of the Office Note of a specific Note Number selected by you in the Query. You can take
the print out.



How to_Generate_Monthly AMC Register
On completion of each month, the Register has to be generated and sent to H.O. Hence, before generating
a Monthly AMC Sanction Register, you have to follow certain steps. The steps are as under :
The Command button in the Form is linked to
under Reports which in turn call the information/data from the answer extracted by
Query.
AMC Sanction Register AMC Sanction Register
Monthly AMC Registe
1. Minimise the Form being used for entering the information on individual item;
2. Then you will find a small window titled the leftside of it appears
portion. Below the objects, Ensure that (object) is highlighted and right-side of it you can see
number of Queries. Out of these queries, you will find a Query by name Rightclick
on this query and choose from the PopUp Menu. Now you will actually see the
"Monthly-AMC-Register" (Query)window. In this query, in the column
and row, please type the date range to get the data of the particular month. The date range
for extracting data for the month of June can be like this : For
each month for extracting the data, only the month digits has to be changed.
Asset
AMC0203 : Database Objects
Queries
Monthly-AMC-Register.
Design View
Sanction Note Signed on
Criteria
3. Save the Query and close the Query Window;
4. Maximise the Form Window. Click on the AMC Sanction Register Butten. You will get preview
of the AMC Sanction Register of a specific month. The Register will contain details of all the
items against which Sanction has been accorded during the particular month selected by you in
the Query. You can take the print out in two sets - one has to be despatched to I.T.Division, H.O.
duly assigning a OR number, and other to be kept in the "2002-03 AMC" file.
>=#01.06.2002# and <=#30.06.2002#.
Rahul Sen

How to_Generate_Sanction Letters
Hence, before generating Sanction Letters, you have to follow certain steps. The steps are as under :
The Command button in the Form is linked to under Reports which in turn call the
information/data from the answer extracted by Query. For each Sanction Note, there will be only
one Sanction Letter. The Sanction Letters have to be generated with reference to a particular Office Note and
particular Branch Code.
Sanction Letters Sanction-Letters
Sanction-Letters
1. Minimise the Form being used for entering the information on each item
2. Then you will find a small window titled the leftside of it appears portion.
Below the objects, Ensure that (object) is highlighted and right-side of it you can see number of
Queries. Out of these queries, you will find a Query by name Right-click on this query and
choose from the PopUp Menu. Now you will actually see the Sanction-Letters (Query)window. In
this query, in the column and row please type the branch code (e.g.205, 2071, 638,
809 etc.) and under Criteria row of "Sanction Note Signed on" , it is already mentioned "Is not Null" and in the
column "AMC Sanction Note Ref" under criteria row, mention the Office Note number (for eg. 141/999 or
2071/999, first three or four digits for Br/EC Code and last three digits for OFFICE NOTE NUMBER) for which
the Sanction Letter has to be generated.
Asset
AMC0203 : Database Objects
Queries
Sanction-Letters.
Design View
Branch Code Criteria
3. Save the Query and close the Query Window and maximise the Form Window;
5. Now you can see/preview the sanction letter you needed. As mentioned herein above, for each Office Note
signed on a particular date, there will be only one sanction letter covering all the items sanctioned under the
said Office Note.. Only the outward number for this sanction letter has to be filled in duly mentioned the
particulars of the sanction in the OR Register.
Generation of Sanction Letters should be only after ensuring that the Office Note is returned back
from the Sanctioning Authority duly signed. After getting back the Note, please enter the Date in
the column "Sanctioned on" in the Form Asset. Please note that Date should be entered for all the
items covered under the particular Office Note received back duly signed
4. Click the Button "Sanction Letters" on the Form.
6. Take two copies of "Sanction Letter" - one to despatch to the Branch and other stapple along with the
Sanction Note duly marking as "Office Copy" and file in the "2002-03 AMC" Box File, Office Note number-wise.










Thursday, 9 August 2012

Reaserch Paper on Multicast Protocol(Computer Science)


                                                                            
                                                                                                                        Raunak Goyal
                                                                                                                        Roll -76,Secton -B
                                                                                                                        PGDIE 42
Summary of “Multicast Data Transmission Using Distance Vector Multicast Routing Protocol



Delivering of packets from a single source (Sender) to a single destination (Receiver) is called Unicast. In Unicast Communication, relationship between the source and destination is One-to-One [3]. Here both source and destination addresses in IP datagram are unicast addresses, assigned to the hosts. Protocols providing Unicast communication is meant as Unicast Protocols.
Communicating with all the hosts that can be called as destinations using a single source (Sender) can be called as Broadcast Communication. Here the relationship between the source and destination is One-to-All [3]. Internet does not  explicitly support broadcasting because of huge amount of traffic it would create with higher bandwidth. Imagine the traffic generated in the Internet if one person wanted to send a message to everyone connected in the internet.
In networking, an emerging trend evolves with the delivery of packets from one or more senders to a group of receivers. This mechanism includes bulk data transfer, continuous media streaming, updating web cache, data feeds and interactive gaming [9]. In these applications, a process called multicast is used in extreme. Sending of a packet from one source (Sender) to multiple destinations (Receivers) using a single operation – send is called as Multicast Communication. Multicast packets sent among hosts are the Multicast Groups. Multicast communication is not a connection oriented. Multicast datagram is transmitted over the destination group members that are reliable as unicast IP datagram.

Today‘s challenging economy demands that enterprises leverage the value of their current technology investments to increase productivity, while at the same time decreases their operating costs. As a result, enterprises are beginning to explore the benefits of sending single data to multiple destinations using Internet Protocol (IP) based network that can deliver significant cost savings and help to provide for enterprise continuity [9]. In computer networking, multicast is the delivery of a message or information to a group of destination computers simultaneously in a single transmission from the source creating copies automatically in other network elements, such as routers, only when the topology of the network requires it. IP multicast is a technique for one-to-many communication over an IP infrastructure in a network. i.e., single user to the multiple user of the assigned group. The main advantages of the multicast distance vector routing protocol is that DVMRP is cheaper and cost effective when compared to other alternatives for increasing LAN and WAN capacities, Reduces the load on the sending server, which no longer supports sequential or concurrent unicast sessions due to scalability factor. Gets rid of network congestion that is caused by existing application. Using a single send operation, the data‘s are sent and those sent data copies are delivered to many receivers in several ways: One-to-All Unicast: Sender uses separate unicast transport connection to each receiver [16]. Sender‘s transport layer is duplicated and transmitted over each of the individual connections..

Explicit Multicast: Router involves replication and forwarding of data copies on the multiple links to reach the receivers. It provides explicit multicast support in the network laye
DISTANCE VECTOR MULTICAST ROUTING PROTOCOL:
Unicast distance vector routing is very simple; extending it to support multicast routing is complicated. Multicast routing does not allow a router to send its routing table to its neighbors. To accomplish this, the multicast distance vector algorithm uses a process based on four decision-making strategies can improve the shortcomings of the previous one. They are
 Flooding
 Reverse Path Forwarding(RPF)
 Reverse Path Broadcasting(RPB)
 Reverse Path Multicasting(RPM)

a) Flooding: In flooding strategy each router sends the incoming packet to the every interface except the one from which it was received. Flooding accomplishes the first goal of multicasting i.e., every network with active members receives not a multicast . Although, flooding is broadcast, not a multicast, there is another problem: it creates loops. This will be overcome by the next strategy.

 b) Reverse Path Forwarding (RPF): RPF is a modified flooding strategy. To prevent loops, only one copy is forwarded; the other copies are dropped. In RPF, a router forwards only the copy that has travelled the shortest path from the source the router. To find this copy, RPF uses the unicast routing table. The router receives a packet and extracts the source address( a unicast address). It consults its unicast routing table an though it wants to send a packet to source address

c) Reverse Path Broadcasting (RPB): RPF guarantees that each network receives a copy of the multicast packet without formation of loops. However, RPF does not guarantee that each network receives only one copy; a network may receive two or more copies

d) Reverse Path Multicasting (RPM): As you have noticed, RPB does not multicast the packet, it broadcasts it. This is not efficient. To increase efficiency, the multicast packet must reach only those networks that have active members for broadcasting to multicasting; the protocol uses two procedures, pruning and grafting.

 IMPLEMENTATION OF DISTANCE VECTOR ROUTING :
DVMRP can be termed as a ―broadcast & prune‖ multicast routing protocol. It builds per-source group multicast delivery trees by pruning (removing branches from) the source‘s truncated broadcast tree. It performs Reverse Path Forwarding checks to determine when multicast traffic should be forwarded to downstream interfaces [1, 9]. In this way, source-rooted shortest path trees can be formed to reach all group members from each source network of multicast traffic.


A performance analyzer is introduced between the routers to analyze the 1) Separation of multicast traffic with the measurement of its statistics, 2) Internal information of the routers are estimated, 3) A specific structure of mapping is introduced between multicast traffic and internal information estimated.


Analyzer finds the status of the message that is survived along the network. It identifies the message status and reports in two different states such as:
 1) Prune Message: It searches the multicast group addresses that are to be prune and analyses the valid and invalid period of propagation, if finds an invalid period then the group address involves the mechanism of Pruning.
2) Graft Messages: It searches the multicast group address where the messages are to be grafted and also while analyzing the time period it becomes valid period. Also the time period in pruning can be invalid.


PERFORMANCE ANALYSIS:
DVMRP provides a simple model when compared to other multicast routing protocols by making a pure source specific multicast distribution trees for deploying and troubleshooting [2, 17]. It uses a own topology mechanism by updating the routing table each time for enhancing a secure and fast transmission of messages in a network. Multicast routing maintains an efficient data transmission by calculating the shortest path in the network whereas other routing algorithm may transmit the message through the network without any subsequent path [13, 16]. DVMRP routing table that are constructed in multicasting technique can be the enhanced part of the forwarding table, in which it shows the specific delay of the transmission. Routing table of each router are automatically updated and deleted for each round or for each data transfers that could enable a continuous task in the network. By introducing a performance analyzer in this task, we could grasp that the traffic intensity of this multicast data transmission using DVMRP is low. By analysis, only the valid period can be noted in the whole traffic made in the network which would be 49.1% over the monitored link.
An enhanced mechanism is dedicated here to survive fit, in this fast changing world. Multicast data transmission using distance vector multicast routing protocol has brought a revolutionary change in the communication field. Routing table concept for multicast data transmission makes an affordable communication in the network. Delivery trees that are identified along the network can be efficient. Multicasting is made effective using DVMRP procedure for enhancing a secure transmission of data. Implementation of this mechanism can endure a cost effective, a reliable and a responsible data transmission. Multicasting procedure can be implemented in upcoming communication fields to make an effective action. Several enhancements can be made along this routing protocol to make a useful propagation. Multicasting using DVMRP is a humble work, which can be subjected to further improvements. In future, this core model can be developed with some enhancing software which would specify only a secure multicasting task in data transmission and can be used in the development of Wide area networks.

Wednesday, 8 August 2012

Research Paper on Industrial Engineering


                                                                                   Raunak Goyal

                                                                                   Roll No:76,Sec-B

                                                                                   PGDIE-42

 

Summary of “Technology's impact on the future of industrial engineering”

 

Authors:C. Patrick Koelling, Mario G. Beruvides , and Kriengkrai Tankoonsombut

*Department of Industrial  and Systems Engineering

Virginia Polytechnic Institute and State University

Blacksburg, VA  24061-0118

*Department of Industrial Engineering

Texas Tech University

Lubbock, TX  79409-3061

Industrial engineers in the future will use high-technology systems which will largely affect the ways of their doing work as well as impact of their work.  This paper addresses some of these main facts  and duscusses the potential impacts on the industrial engineer of the future.
Major development in  computing,  information,  and  communications  technology  are dramatically, and permanently, changing  the ways how we work and also the future that industrial  engineers will  work  with.  That is, industrial engineers must  design systems  of people, machines, materials, capital,  and so on, in a world that will be drastically different from the one we see today.  In addition to this, the current education  and tools of industrial  engineers  are itself out dated for today's needs, not to mention the future. The main issues which will affect the systems are organizational restructuring, Client/server computing models. In this paper, Author has discussed what changes Industrial Engineer profession will  undergo in the next 10-20 years. Before that however, let's consider what industrial engineers do.
According to Author,” "Industrial  engineers  design,  improve,  and  install  integrated  systems  of  people, materials,  information, equipment, and energy.”
The most important aspects among these are improvement and integration. Industrial
Engineer works in all occupations: agricultural, manufacturing and service. These activities have not changed much in the past. But the way of doing these activities have changed. And these changes are being brought about, either directly or indirectly, by one thing , Computer or Information technology.
Author has discussed few of most important technologies that will affect industrial engineers.Let us analyse them.
Tools For Collaboration: Indistrial Engineers will have to use new  types of collaborative  tools like groupware.They will begin to use strong automated information system.Organzation culture will be more flexible and they need to be cross functional Thus,  technology will introduce cultural  change,  which  in  turn  will  promote technology . Planning may become very difficult, and will at the very least become quite different. The  use of internet will increase tremendously. The platform-independence of  technology  will  reduce resistance to multi-platform organizations. So, now Unix,.net,Java all can coexist together. There will be a huge increase in the use of Electronic Data Interchange (EDI).  As  industrial engineers look for ways to improve supplier-vendor relationships,  and  increase  communication, we  will  find EDI  to  be  an  indispensable  tool.It will require some sort of security standardization though. Teleconferencing will reduce the amount of travel and compresses  video tools  are becoming usable,  and  increased  bandwidth  will  allow  use  of  this technology to skyrocket.
Technical and Information Computing: The power of computer will increase day by day .So many of work will tend to be more automatic than manual. Information needs will be met in an effective and efficient manner through these systems.  Technical computing will prosper,  allowing industrial  engineers to solve problems that heretofore have been too difficult.. In  addition,  this  computational  improvement  has  led  to  advances  in  the  use  of  scientific visualization techniques.  Other engineering  disciplines  have realized  the  value  of these  tools  in identifying trends  and patterns in data that couldn't be seen  otherwise.
No Time or Space Barriers: Because of advancement in technology there will not be any geographical or time constraints.
IMPACTS ON INDUSTRIAL ENGINEERS:
Author has analysed the impact of technology on different aspects of Industrial Engineers in the following way:
Products/Services Issues: Customer will be of prime importance and all the irtual  products will be customer oriented, requiring continued  focus  on  quality.  Organizations must become highly responsiveness to customer needs and they need to efficient as well. Lead time for the product should be very short.
Infrastructure Issues: Organizations will "go virtual."  There will be an increased demand for industrial engineers to use their human factors skills in designing new infrastructures.
Management Issues: Hiring employees, job classifications, quality control will be very important issues for management. The labour force of the future may be built on a "just-in-time" basis. The virtual workplace will require totally different management procedures.  Personnel selection and placement will become more challenging.  Employees may feel isolated.  Performance measurement and evaluation will be increasingly difficult.  Traditional industrial engineering tools and techniques may not be useful in this new environment.  How will effective work measurement be conducted? Trust will have to be at the highest level in virtual settings.  The organization cannot succeed in partnerships without trust.  Since employees may be  "just-in time"  or  on  a consulting basis, what will happen to culture, identity, loyalty, and a sense of community?
Training and Skills Issues: The new environment will require working in teams.  The work place is getting “flatter and team- cantered.  A greater percentage of employees will be doing knowledge work.  Industrial  engineers will  face  increasing  pressure  to  become  more  "general"  because  the  environment  will  change rapidly  and  require different kinds  of skills. It is certain that Industrial engineers will require expertise in computer and information technologies.

Conclusion: The profession of industrial engineering will have to evolve considerably with the changing trends and technology if we are to meet the challenges that lie ahead.