hotel_mgt
TRANSCRIPT
-
7/28/2019 Hotel_MGT
1/74
CONTENTS
I INRODUCTION Page No.
1.1. An Overview
1.2. Mission of the Project
1.3. Background Study
1.3.1. The Organization Profile
1.3.2. Study on Existing System
II SYSTEM ANALYSIS
2.1. Study on Proposed System
2.1.1. Defining the problem
2.1.2. Developing Solution Strategies
2.2. User Requirement Specification
2.3. Software Requirement Specification
2.4. System Specification
2.4.1. Application Specification2.4.2. Hardware Specification
2.4.3. Software Specification
2.4.4. Network Specification
2.5. Cost Estimation and Scheduling
2.6. Final Outline of the Proposed System
III DESIGN AND DEVELOPMENT PROCESS
3.1 Fundamental Design Concepts
3.2 Design Notations
3.2.1. Structure Chart
3.2.2. Data Flow Diagram
3.2.3 .ER Diagram
-
7/28/2019 Hotel_MGT
2/74
3.3 Design Process
3.3.1 Database Design
3.3.2 Input Design
3.3.3 Output Design
3.4 Development Approach
IV TESTING AND IMPLEMENTATION
4.1. Testing
4.1.1 Testing Methodologies
4.2. Quality Assurance
4.2.1. Generic risks
4.2.2. Security Technologies & Policies
4.3. System Implementation
4.3.1. Implementation Procedures
4.2.2 User Manual
4.3 System Maintenance
V CONCLUSION
5.1 Scope for Future Enhancement
5.2 Bibliography
ANNEXURE-A
1. Input Design
2. Out Design
3. Sample Source
ANNEXURE-B
Abbreviation
-
7/28/2019 Hotel_MGT
3/74
INRODUCTION
1.1. An Overview
HOTEL MANAGEMENT SYSTEM
Hotel Management System is a software system where the management ofentire hotel is computerized. The hotel management system is designed using
visual basic.net as the rich GUI for front end and MS-Access as the secured
backend database.
In this project the details are maintained like customer details, reservation
details, Booking details and billing details The reservation process of reserving
rooms for the customers, canceling the reserved rooms, booking the rooms ,
vacating the rooms, the restaurant management, billing process, etc all are
computerized and the management is done without any difficulty.
The reports can be viewed completely and the head of the management daily
or weekly or monthly can review it. For company auditing it will be more useful.
This Proposed System will be interactive, faster and user-friendly for the end users.
Using the hotel management system, the following activities can be performed.
o Booking or reservations of the rooms
o Cancellation of the rooms
o Cash billing
o Room service / Restaurant service
o
Restaurant billing
o Total billing
o Travels arrangement
-
7/28/2019 Hotel_MGT
4/74
1.2. Mission of the Project
The mission is to to facilitate easy management and administration of a hotel with
capabilities to do Booking or reservations of the rooms, Cancellation of the rooms, Cash billing,
Room service, Restaurant service, Restaurant billing, Total billing, Travels arrangement etc.
using the automated hotel management software. One can keep detailed records or info on an
unlimited amount of customers.The system lets the user know which all rooms are available for
occupancy at any point of time. This makes the booking considerably faster. And thus helps the
hotel in better management and reduce a lot of paper work as well as manpower.
-
7/28/2019 Hotel_MGT
5/74
1.3. Background Study
1.3.1. The Organization Profile
N Solutions is an emerging provider of IT development solutions, servicing customers
nationwide.The ability of N Solutions to anticipate future technological requirements and
capabilities is vital to the success of their business and that of their clients. The objective of N
Solutions is to work, communicate and support customers as the pace of change accelerates and
demands grow.
N Solutions business lines include:
Tailor-made software solutions development
Outsourcing software development
Business solutions deployment and integration
IT Consulting
IT Infrastructure building / maintenance and related services including technical support
to both customers and IT companies.
N Solutions software development services cover the complete project life cycle, from
requirement assessment and task definition, to solution development, to implementation and
integration, followed by support and maintenance. The ability to integrate software with existing
systems by expanding information systems infrastructure is an important advantage of N
Solutions as a turn-key solution provider.
N Solutions expertise covers the following areas:
Enterprise Application Integration;
Data Warehousing and Decision Support;
Electronic Document Management;
Information Security;
Internet/Intranet and e-Commerce solutions.
Excellent quality of N Solutions software development is guaranteed by their team of
professionals with certified skills and experienced project managers. N Solutions also ensures
quality control at all stages of development process. Transparent software development process
and interaction with the customer are taken utmost care at N Solutions. They give their clients a
real commercial advantage by the professionalism, flexibility and specialist knowledge
-
7/28/2019 Hotel_MGT
6/74
1.3.2. Study on Existing System
EXISTING SYSTEM
Hotel Management involves maintaining various operations of the hotel like Booking or
reservations of the rooms, Cancellation of the rooms, Cash billing, Room service, Restaurant
service, Restaurant billing, Total billing, Travels arrangement etc. The existing system is a
manual one and there is lot of issues like erroneous data, slow process, lack of security etc.
Finding out the final payment amount completely relies on the hotel manager and if he is absent,
it takes a long time to find out the details during check out and is prone to errors.
Drawbacks of the Existing System
Manual entry consumes more time.
It is difficult to maintain bulk of record in manual.
Restrictions in the users.
Not easy to prepare the daily reports.
Lack of accuracy and error prone.
Overall efficiency is less.
Lot of paperwork.
Non-secure.
No perfect maintenance of report.
No method to trace details
Human errors
The manual system is too slow
Searching is more time consuming
-
7/28/2019 Hotel_MGT
7/74
II SYSTEM ANALYSIS
2.1. Study on Proposed System
2.1.1. Defining the problem
Currently,the system used is manual. It requires a lot of time spared in writing the details
in the paper and manually validates and maintains the records It can involve lots of search and
time wastage. Preserving and maintaining large amount of data manually is a difficult task. The
existing system is a manual one and there is lot of issues like erroneous data, slow process, lack
of security etc. Finding out the final payment amount completely relies on the hotel manager and
if he is absent, it takes a long time to find out the details during check out and is prone to errors.
2.1.2. Developing Solution Strategies
The proposed system is to facilitate easy management and administration of a hotel with
capabilities to do Booking or reservations of the rooms, Cancellation of the rooms, Cash billing,
Room service, Restaurant service, Restaurant billing, Total billing, Travels arrangement etc.
using the automated hotel management software.
Advantages of proposed system
The following are the objectives and highlights of the proposed system
Secure data Faster process
Error Free
Better management
Save a lot of manpower
Can easily make the daily reports
Elimination of Paper work.
High reliability and security.
Fast and economical.
Maintains large Terabytes of data.
-
7/28/2019 Hotel_MGT
8/74
-
7/28/2019 Hotel_MGT
9/74
the check in and checkout details of the person. The Restaurant bill is generated based on the
food items consumed by the guest during his stay in the hotel.
Reports
This module deals with the generation of the reports for the various modules. The
customer list can be generated. Room status list can be retrieved for reference. The check in and
check out registers can also be retrieved for any future queries.
-
7/28/2019 Hotel_MGT
10/74
2.3. Software Requirement Specification
VB.NET
Visual Basic (VB) is a programming language based on the original DOS language called
BASIC (Beginners' All-purpose Symbolic Instruction Code). VB.NET 2005, an offshoot of
Visual Basic, is an object-oriented programming language based on VB that is implemented
using the Microsoft .NET framework. The basic syntax of the Visual Basic language remains
unchanged in VB.NET 2005, but includes additional features such as structured exception
handling and short circuited expressions to enhance the infrastructure of the programming
language.
Developers have found VB.NET to be controversial as some of the software and
developmental changes clash with the original language within VB and have caused
compatibility issues. Visual Studio .NET is the predominant integrated development environment
(IDE) that VB.NET developers employ.
Visual Basic programmers supporting VB.NET indicate that language constructs and
user interface features in the newer system have caused programming issues within the original
VB system. Developers using VB.NET recognize that the upgraded VB system incorporates
contemporary object oriented programming paradigms in a more stable environment than was
originally thought possible.
Visual Basic .NET is a programming language that can be used to create win forms or
web applications and create programming based in any object-oriented programming language
(OOP), ADO.NET, Multithreading or Windows Services. VB.NET programming utilizes
concepts connected to string encryption, forms inheritance, regular expressions and deployment.
TEN ENHANCEMENTS
1. Visual Basic is truly object-oriented.
-
7/28/2019 Hotel_MGT
11/74
2. The new Windows Forms model for programming a user interface is more powerful than
ever, and bundles convenient controls for everything from system tray icons to print previewing
to web browser windows.
3. Theres no automatic type conversion: Option Strict lets you turn off this dangerous
convenience.
4. Structured error handling makes it as easy to trap an error in Visual Basic as in any other
modern programming language.
5. ASP.NET provides the easiest and most powerful system to date for programming web
applications.
6. Method overloading now allows you to create different versions of methods with the same
name, but with different arguments. Visual Basic 2005 will use the correct one automatically.
7. Even critics cant deny that the new development environment is heartstoppingly beautiful.
Does any other language offer collapsible code, intelligent dynamic help, and an entire
programming language for creating macros?
8. A new event model lets you connect multiple event handlers to a single control and store
function references in special variables,
called delegates.
9. Initializers let you set the value of a variable on the same line where it is declared.
10. Metadata means that DLL Hell may finally be a thing of the past. You can now set up a
program just by copying its directorya capability that hasnt existed in the Windows world for
years.
DATABASE DESIGN
A collection of data designed to be used by different people is called a database. It is
collection interrelated data stored together with controlled redundancy to serve one or more
applications in an optional fashion.
The data is stored in such a fashion that it is independent of the programs of people using
the data. A common and controlled approach is used in adding new data and modifying and
retrieving existing data with in the database.
-
7/28/2019 Hotel_MGT
12/74
MICROSOFT SQL SERVER
SQL SERVER 2005 is a Relational Database Management System. The abbreviation is
Structure Query Language. SQL is the language used to query the database. SQL is a declarative
language where you just say store this or modify this without saying how to do. It is the product
of Microsoft. The version of SQL used by SQL SERVER 2005 is called Transact SQL. It
supports the client/server architecture. It receives requests from the clients for data and returns
the result of the processed query. All the SQL statements are submitted to the Transact-SQL,
which on receiving them passes the result and displays it for the user.
SQL solved the ad hoc needs of users; the need for data access by computer programs did
not go away. In fact, most database access still was (and is) programmatic, in the form of
regularly scheduled reports and statistical analyses, data entry programs such as those used for
order entry, and data manipulation programs, such as those used to reconcile accounts and
generate work orders.
The following is a list of relational database that support SQL:
SQL SERVER
MS Access
Sybase
Oracle
Ingress
Informix
Features of SQL
SQL is used to query the database to get results
Used to inserts new data
-
7/28/2019 Hotel_MGT
13/74
Used to modify the data
Extremely flexible query language
Over the years its functional capabilities can be extended
-
7/28/2019 Hotel_MGT
14/74
2.4. System Specification
2.4.1. Application Specification
In Client/Server architecture, a web application sends requests to a web server using a
private network. This is usually some type of local area network (LAN) or wide area network
(WAN). The server processes these requests and returns data. The results of the request are
handled as response to the client machines.
Hotel managment
System
Client1Client2
requests
Client3Client4
response
-
7/28/2019 Hotel_MGT
15/74
2.4.2. Hardware Specification
Processor : Pentium IV
Clock Speed : 2 GHz
RAM : 512 MB
Hard disk Capacity : 80 GB
Floppy disk Capacity : 1.44 MB
Keyboard : 101 Keys
Mouse : Optical Mouse
2.4.3. Software Specification
Front End : VB.net
Back End : MS SQL
Operating System : Windows 2000/XP or above
-
7/28/2019 Hotel_MGT
16/74
2.4.4. Network Specification
The two standard input device viz., keyboard and mouse are used to get input from all users. The
system will be working on HTTP protocol for intranet. The centralized server will be a windows
server with a web server installed. The client machines connect to it through ordinary LAN
settings. The Client machines need to have a browser to access the remote web server through
http requests.
-
7/28/2019 Hotel_MGT
17/74
2.5. Cost Estimation and Scheduling
Computing the development time using Intermediate COCOMO is done in two stages. The
parameter, the length of the product in KDSI (thousand delivered source instructions) is
estimated. Then, using this, the nominal effort is calculated. This project is considered to be
essentially straightforward and hence it comes under organic mode. The nominal effort (in
person-months) is given by,
Nominal Effort = 4* (2) 1.05 person-months
= 4 * 2.07
= 8.3 person-months.
Next, this nominal value must be multiplied by 15 software development effort
multipliers. These multipliers are as follows:
Intermediate COCOMO software development effort multipliers for this project are
as follows:
COST DRIVERS SITUATION RATINGEFFORT
MULTIPLIER
(1)PRODUCT
ATTRIBUTES1. Required Software
Reliability
Normal finance for
SoftwareNominal 1.00
2. Database Size Few bytes Very low3. Product Complexity Processing Details Nominal 1.00
(2) COMPUTER
ATTRIBUTES4. Execution Time
ConstraintWill use a little time Nominal 1.00
5. Main StorageConstraint
Medium size storagearea
Low 0.87
6. Virtual Machine
Volatility
Commercial
Microprocessor
Hardware
Nominal 1.00
7. Computer Turnaround Average Turnaround Nominal 1.00
-
7/28/2019 Hotel_MGT
18/74
Time Time
(3) PERSONNEL
ATTRIBUTES
8. Analyst Capabilities Good senior analysts High 0.86
9. Applications
Experience Few years Low 1.13
10. Programmer
CapabilityJunior Programmer Nominal 1.00
11. Virtual Machine
ExperienceSix Months Low 1.10
12. Programming
Language
Experience
Six Months Low 1.07
(4) PROJECTATTRIBUTES
13. Use of Modern
Programming Practices
Most techniques in use
over one yearHigh 0.91
14. Use of Software
ToolsMinicomputer Nominal 1.00
15. Required
Development ScheduleSix Months Low 1.08
The estimated development effort is obtained by multiplying the nominal effort by the 15
multipliers. Using the above values, the product of the multipliers is calculated as 0.97, so the
estimated effort for the project is0.97 * 8.23= 8.02 person-months
Thus, the approximate cost is calculated as:
8 .02* 2500 = Rs. 20000
Scheduling
-
7/28/2019 Hotel_MGT
19/74
Scheduling is the culmination of a planning activity that is a primary component of
software project management. When combined with estimation methods and risk analysis,
scheduling establishes a road map for the project manager. Scheduling begins with process
decomposition.
Analysis
17%
Design22%
Coding
18%
Testing
17%
Maintenance
16%
Implementation
10%
Fig. Scheduling Chart
-
7/28/2019 Hotel_MGT
20/74
Scheduling Table
Phases Days
Requirement Analysis 32
Design 40Coding 35
Testing 32
Implementation 11Maintenance 30
PERT and CPM one two of the many network techniques have been widely used for planning,
scheduling and controlling the large and complex projects.
-
7/28/2019 Hotel_MGT
21/74
2.6. Final Outline of the Proposed System
The proposed system is to facilitate easy management and administration of a hotel with
capabilities to do Booking or reservations of the rooms, Cancellation of the rooms, Cash billing,
Room service, Restaurant service, Restaurant billing, Total billing, Travels arrangement etc.
using the automated hotel management software.
Advantages of proposed system
The following are the objectives and highlights of the proposed system
Secure data
Faster process
Error Free
Better management
Save a lot of manpower
Can easily make the daily reports
Elimination of Paper work.
High reliability and security.
Fast and economical.
Maintains large Terabytes of data.
-
7/28/2019 Hotel_MGT
22/74
III DESIGN AND DEVELOPMENT PROCESS
3.1 Fundamental Design Concepts
Although the degree of interest in each concept has varied over the years, each has stood the test
of time. Each provides the software designer with a foundation from which more sophisticated
design methods can be applied. Fundamental design concepts provide the necessary framework
for getting it right.
3.2 Design Notations
3.2.1. Structure Chart
3.2.2. Data Flow Diagram
The data flow diagram (DFD) is one of the most important tools used by system analysts. Data
flow diagrams are made up of a number symbols, which represent system components. Most data
flow modeling methods use four kinds of symbols. These symbols are used to represent four
kinds of system components such as Processes, data stores, data flows and external entities.
Circles in DFD represent processes. Data Flow is represented by a thin line in the DFD
and each data store has a unique name and rectangle represents external entities. Unlike detailed
flow chart, Data Flow Diagrams do not supply detailed description of the modules but
graphically describes a systems data and how the data interact with the system.
An arrow identifies the data flow in motion. It is a pipeline through which information is
flown like the rectangle in the flowchart. A circle stands for process that converts data into
information. An open-ended box represents a data store, data at rest or a temporary repository of
data. A square defines a source or destination of system data.
-
7/28/2019 Hotel_MGT
23/74
DATA FLOW DIAGRAM
DFD for Hotel Management System
DFD for Overall System:
DFD for Authentication:
DataData and
Commands
Hotel
Management
System
DatabaseUser
User Name &
PasswordUser
Validate the
User
Alert
Message
DataProcessing Database
Invalid
User
Valid User
Data
-
7/28/2019 Hotel_MGT
24/74
DFD for modules in the Hotel Management System
Customer Data D a t a
D a t a
RestaurantBill Details
Bill Details
Enquiry Data
Room
Data
User
Data
Food Details
User Process
the
Request
Restaurant Billing
Food Entry
Bill Entry
Enquiry Entry
Room Entry
Reservation Entry
Check-in Entry
Check-Out Entry
Database
ReportsReport Generation
User Management
Reservation Data
Check-in Data
Checkout Data
Report Data
Customer Entry
-
7/28/2019 Hotel_MGT
25/74
Valid Data
Data Data
Data
Data
Data
Data
Data
Data
DFD for user Entry:
Request
New IDAdd Record
Modified
Record
Delete Record
View Record
Generate
ID
Users
Last ID
Validate
Data
Alert
Message
Invalid Data
Users
Report
User
Data
-
7/28/2019 Hotel_MGT
26/74
-
7/28/2019 Hotel_MGT
27/74
-
7/28/2019 Hotel_MGT
28/74
Valid Data
Data
Status
Data Data
Room Status Room Type
DFD for Room Enquiry:
Data
RequestNew ID
New Enquiry
Change Status
Generate
ID
Enquiry
Last ID
ValidateData
Alert
Message
Invalid Data
EnquiryReport
Enquiry
Data
Enquiry_Det
Room_Master
-
7/28/2019 Hotel_MGT
29/74
Valid Data
Data
Status
DataData
Room Status Room Type
DFD for Room Booking:
Data
Request
New ID
New
Reservation
Change
Reservation
Status
Generate
ID
Reservation
Last ID
ValidateData
Alert
Message
Invalid Data
Reservation
Report
Reservation
Data
Room_Master
-
7/28/2019 Hotel_MGT
30/74
DFD for Check-in and Checkout and Billing:
Data
Data Request for bill CheckinID Checkin DetailsRoom No &
C ID
Data to be Validated
Room ID
& Status
Check-in Details
Room ID
Data
Get Room
Status
Customer
Room_Master
New Check in
Checkout
View Details
Validatethe data
Valid Data
Invalid Data
Alert Message
Check-in &
Checkout
Report
Get Details
Check_in_Out
Check-in.
Details
Checkout
Details
CheckinID
Generate Bill Hotel_Bill
-
7/28/2019 Hotel_MGT
31/74
Order Details
Request
Data Variety ID Rate
Data
Request
DFD for Restaurant:
3.2.3 .ER Diagram
Request Data
Request
Data
Variety
Details
Data
Bill Details
Get Food
Variety
Details
Food_Variety
NewBill
View Bills
Get Rate
Restaurant
Bills
Report
Food
Details
New
Food
Variety
View
Varieties
Food
Varieties
Report
Rest_Bill
Generate
Bill
-
7/28/2019 Hotel_MGT
32/74
The entity relationship diagram is based on a perception of real world that consists of a
collection of basic objects, called entities and of relationship among the objects. Entities are
described in a database by a set of attributes. The set of all entities of the same type, and the set
of all relationships of the same type, are termed as an entity set, and relationship set respectively.
The overall logical structure of a database can be expressed graphically by an entity relationship
diagram, which is built up using the notations
-
7/28/2019 Hotel_MGT
33/74
Food Variety
Restaurant Bill
Users
Hotel Management
System
Reservation
Customer
Room Master
Enquiry
Enquiry
Details
H
as
Y
Yy
Y Y
N
Y
N
Check-in-ou
Hotel Bill
H
as
H
asHa
Has
H
as
H
as
H
as
Y
Y
-
7/28/2019 Hotel_MGT
34/74
3.3 Design Process
3.3.1 Database Design
TABLE DESIGN
Users:
Field Name Datatype Description Constraint
Username varchar2(15) User Name Primary key
Password varchar2(15) Password
Fname varchar2(15) First NameLname varchar2(15) Last Name
Address varchar2(50) Address
Phno varchar2(15) Phone No
Mbno varchar2(15) Mobile No
Dept varchar2(15) Department
Desg varchar2(15) Designation
Room_Master:
Field Name Datatype Description ConstraintRoomno number(4) Room No primary key
Roomtype varchar2(15) Room type
Status number(1) Status
Tariff number(7,2)) Tariff
Customer:
Field Name Datatype Description Constraint
cid number(5) Customer ID primary key
cname varchar2(20) Customer Nameaddress varchar2(50) Address
phno varchar2(15) Phone No
mbno varchar2(15) Mobile No
Enquiry:
-
7/28/2019 Hotel_MGT
35/74
Field Name Datatype Description Constraint
Enqid number(7) Enquiry ID primary key
Edate varchar2(10) Enquiry Date
Ename varchar2(20) Enquirer Name
Eaddr varchar2(50) Enquirer Address
Phno varchar2(15) Enquirer Phone NoMbno varchar2(15) Enquirer Mobile No
Estatus varchar2(10)) Enquiry Status
Enquiry_det:
Field Name Datatype Description Constraint
Enqid number(7) Enquiry ID Primary Key,Foreign Key
Roomtype varchar2(10) Room Type Enquired Primary Key,
Noofrooms number(3) No of Rooms
Excepcheckindt varchar2(10) Expected Checkin Date
Noofdays number(2) No of Days
Reservation:
Field Name Datatype Description Constraint
Rid number(5) Reservation ID primary key
cid number(5) Customer ID Foreign Key
rdt varchar2(10) Reservation Date
noofdays number(3) No of Days
roomno number(4) Room No
rstatus varchar2(10) Reservation Status
Check_in_out:
Field Name Datatype Description Constraint
Checkinid number(5) Check-in ID primary key
cid number(5) Customer ID Foreign Key
ckdate varchar2(10) Check-in Date
cktime varchar2 (6) Check-in Time
noofper number(2) No of Persons
roomno number(4) Room No
noofdays number(2) No of Daysadvance number(9,2) Advance
cktdt varchar2(10) Checkout Date
ckttm varchar2(5)) Checkout Time
Hotel_Bill:
-
7/28/2019 Hotel_MGT
36/74
Field Name Datatype Description Constraint
Billno number(5) Bill No primary key
Checkinid number(5) Check-in ID Foreign Key
Sertax number(4,2) Service Tax (%)
Extchrg number(7,2) Extra Charge
Food_Variety:
Field Name Datatype Description Constraint
Varietyid number(5) Variety ID primary key
Varietyname varchar2(20) Variety Name
Cost number(7,2)) Cost
Rest_Bill:
Field Name Datatype Description Constraint
Rbillno number(5) Restaurant Bill No Primary keyVarietyid number(5) Variety ID Primary key, Foreign Key
Rbilldt varchar2(10) Restaurant bill Date
Qty number(2) Quantity
Tax number(4,2) Tax (%)
-
7/28/2019 Hotel_MGT
37/74
3.3.2 Input Design
The input design is the link that ties the information system into the world of its users. It
is a process of converting user-originated inputs to a computer-based format. Input data are
collected and organized into a group of similar data. Once identified, appropriate input media
are selected for processing.
The goal of designing input data is to make entry easy, logical and free form errors. In
input data design, we design source document that capture the data and then select the media
used to enter them into the computer. The input forms are developed in a user-friendly way so
that a layman also can easily understand everything. Menus are provided to users and differenticons are designed so the proposed system design looks decorative. Input design is the part of the
overall system design.
Source documents initiate a processing cycle as soon as they are entered into the system
through the keyboard. A source should be logical and easy to understand.
Objectives of Input Design:
1 To achieve the highest possible level of accuracy.
2 To ensure that the input is acceptable and understood by the user.
-
7/28/2019 Hotel_MGT
38/74
Screens
-
7/28/2019 Hotel_MGT
39/74
-
7/28/2019 Hotel_MGT
40/74
-
7/28/2019 Hotel_MGT
41/74
-
7/28/2019 Hotel_MGT
42/74
-
7/28/2019 Hotel_MGT
43/74
-
7/28/2019 Hotel_MGT
44/74
-
7/28/2019 Hotel_MGT
45/74
-
7/28/2019 Hotel_MGT
46/74
-
7/28/2019 Hotel_MGT
47/74
-
7/28/2019 Hotel_MGT
48/74
-
7/28/2019 Hotel_MGT
49/74
-
7/28/2019 Hotel_MGT
50/74
-
7/28/2019 Hotel_MGT
51/74
-
7/28/2019 Hotel_MGT
52/74
-
7/28/2019 Hotel_MGT
53/74
-
7/28/2019 Hotel_MGT
54/74
3.3.3 Output Design
Output forms are also designed in a specific manner as per the user requirement. Results
are formatted to enhance clarity. Depending on the user the system would generate appropriate
output. The output forms are designed in such a way that the entire user required data is
presented.
While designing an output, the system analyst must accomplish the following.
Determine what information to present
Decide whether to display, print or speak information and select the output
medium.
Arrange the presentation of information in an acceptable form.
Decide how to distribute the output to intended users.
-
7/28/2019 Hotel_MGT
55/74
-
7/28/2019 Hotel_MGT
56/74
-
7/28/2019 Hotel_MGT
57/74
-
7/28/2019 Hotel_MGT
58/74
-
7/28/2019 Hotel_MGT
59/74
-
7/28/2019 Hotel_MGT
60/74
3.4 Development Approach
The ultimate aim of the proposed system is to provide service to the customers. They
need to get trained to use the newly proposed system. Hence developing a system without the
users feedback will lead to discard of the system. So Rapid Application model was used to
develop the system.
A rough interface of the system is given to the users for their feedback and suggestions.
Then the modifications are done. But as the system evolved and after a series of interactions and
demonstrations, the user felt comfortable with the newly developed system.
The system went through the following stages:
The software request is evaluated
Product requirements are collected
Design specification for the prototype is prepared
Prototype software is developed, tested and refined
Prototype is given to the user, who tested the system any gave suggestions for
further refinement
-
7/28/2019 Hotel_MGT
61/74
The process during the development of the software using the RAD model is
Requirement Gathering
Abbreviated
Representation
Prototype
Generation
Testing and
Refinement
Hotel Management
System
-
7/28/2019 Hotel_MGT
62/74
IV TESTING AND IMPLEMENTATION
4.1. Testing
4.1.1 Testing Methodologies
Testing is a process used to help identify the correctness, completeness and quality of developed
computer software. There are many approaches to software testing, but effective testing of
complex products is essentially a process of investigation, not merely a matter of creating and
following rote procedure. One definition of testing is "the process of questioning a product in
order to evaluate it", where the "questions" are things the tester tries to do with the product, and
the product answers with its behavior in reaction to the probing of the tester.
The quality of the application can and normally does vary widely from system to system but
some of the common quality attributes include reliability, stability, portability, maintainability
and usability.
Testing objectives include
1. Testing is a process of executing a program with the intent of finding an error.
2. A goodtest case is one that has a high probability of finding an as yet undiscovered error.
3. A successful test is one that uncovers an as yet undiscovered error.
Testing should systematically uncover different classes of errors in a minimum amount of time
and with a minimum amount of effort. A secondary benefit of testing is that it demonstrates that
the software appears to be working as stated in the specifications. The data collected through
testing can also provide an indication of the software's reliability and quality. But, testing cannot
show the absence of defect -- it can only show that software defects are present.
http://www.onestoptesting.com/Introduction/http://www.onestoptesting.com/Introduction/http://www.onestoptesting.com/Introduction/http://www.onestoptesting.com/Introduction/http://www.onestoptesting.com/Introduction/http://www.onestoptesting.com/Introduction/http://www.onestoptesting.com/Introduction/http://www.onestoptesting.com/Introduction/http://www.onestoptesting.com/Introduction/http://www.onestoptesting.com/Introduction/ -
7/28/2019 Hotel_MGT
63/74
Black box testing
Black box testing attempts to derive sets of inputs that will fully exercise all the functional
requirements of a system. It is not an alternative to white box testing. This type of testing
attempts to find errors in the following categories:
1. incorrect or missing functions,
2. interface errors,
3. errors in data structures or external database access,
4. performance errors, and
5. initialization and termination errors.
White box testing
This testing is based on knowledge of the internal logic of an applications code. Also known as
Glass box Testing. Internal software and code working should be known for this type of testing.
Tests are based on coverage of code statements, branches, paths, conditions. White box testing is
a test case design methodthat uses the control structure of the procedural design to derive test
cases. Test cases can be derived that
1. Guarantee that all independent paths within a module have been exercised at least once.2.Exercise all logical decisions on their true and false sides,
3. Execute all loops at their boundaries and within their operational bounds, and
4. Exercise internal data structures to ensure their validity.
Website Cookie Testing
Cookie is small information stored in text file on users hard drive by web server.
This information is later used by web browser to retrieve information from that machine.
Generally cookie contains personalized user data or information that is used to
communicate between different web pages.
Cookies are nothing but the users identity and used to track where the user
navigated throughout the web site pages. The communication between web browser and
web server is stateless.
http://www.onestoptesting.com/types/Blackbox.asphttp://www.onestoptesting.com/types/Blackbox.asphttp://www.onestoptesting.com/types/Whitebox.asphttp://www.onestoptesting.com/types/Whitebox.asphttp://www.onestoptesting.com/types/Whitebox.asphttp://www.onestoptesting.com/types/Blackbox.asphttp://www.onestoptesting.com/types/Whitebox.asphttp://www.onestoptesting.com/types/Whitebox.asp -
7/28/2019 Hotel_MGT
64/74
Test cases:
1) As a Cookie privacy policy make sure from your design documents that no personal or
sensitive data is stored in the cookie.
2) If you have no option than saving sensitive data in cookie make sure data stored in cookie is
stored in encrypted format.
3) Make sure that there is no overuse of cookies on your site under test. Overuse of cookies will
annoy users if browser is prompting for cookies more often and this could result in loss of site
traffic and eventually loss of business.
4) Disable the cookies from your browser settings: If you are using cookies on your site, yoursites major functionality will not work by disabling the cookies. Then try to access the web site
under test. Navigate through the site. See if appropriate messages are displayed to user like For
smooth functioning of this site make sure that cookies are enabled on your browser. There
should not be any page crash due to disabling the cookies
5) Accepts/Reject some cookies: The best way to check web site functionality is, not to accept all
cookies. If you are writing 10 cookies in your web application then randomly accept some
cookies say accept 5 and reject 5 cookies. For executing this test case you can set browser
options to prompt whenever cookie is being written to disk. On this prompt window you can
either accept or reject cookie. Try to access major functionality of web site. See if pages are
getting crashed or data is getting corrupted.
6) Delete cookie: Allow site to write the cookies and then close all browsers and manually delete
all cookies for web site under test. Access the web pages and check the behavior of the pages.
7) Corrupt the cookies: Corrupting cookie is easy. You know where cookies are stored. Manually
edit the cookie in notepad and change the parameters to some vague values. Like alter the cookie
content, Name of the cookie or expiry date of the cookie and see the site functionality. In some
cases corrupted cookies allow to read the data inside it for any other domain. This should not
happen in case of your web site cookies.
-
7/28/2019 Hotel_MGT
65/74
8 ) Checking the deletion of cookies from your web application page: Some times cookie written
by domain say rediff.com may be deleted by same domain but by different page under that
domain. This is the general case if you are testing some action tracking web portal. Action
tracking or purchase tracking pixel is placed on the action web page and when any action or
purchase occurs by user the cookie written on disk get deleted to avoid multiple action logging
from same cookie.
9) Cookie Testing on Multiple browsers: This is the important case to check if your web
application page is writing the cookies properly on different browsers as intended and site works
properly using these cookies. You can test your web application on Major used browsers like
Internet explorer (Various versions), Mozilla Firefox, Netscape, Opera etc.
10) If your web application is using cookies to maintain the logging state of any user then log in
to your web application using some username and password. In many cases you can see the
logged in user ID parameter directly in browser address bar. Change this parameter to different
value say if previous user ID is 100 then make it 101 and press enter. The proper access message
should be displayed to user and user should not be able to see other users account.
-
7/28/2019 Hotel_MGT
66/74
4.2. Quality Assurance
4.2.1. Generic risks
4.2.2. Security Technologies & Policies
A computer-base system is a combination of many assets or resources designed to perform some
function or to provide some services.Each of these assets is threatened by one or more of the
following unacceptable events:
Interruption
Disclosure
Removal
Destruction
Security Issues
The term security can be divided into four related issues
Security
Integrity
Privacy
Confidentiality
Authentication
In the system brief log on procedure for the customer was provided in order to enter and
accessthe system. This process is done in order to identify the valid user.
These attributes are stored in a table that cannot be easily trapped by unauthorized persons.
File protection
The various files and database tables are also highly secured in this system. The necessity for
securing the files and the table evolves because some persons who were not given authorization
for access may hacker files and corrupt the tables with wrong data which will response
tremendous hazards to the operations of the system. So in order to avoid these things,the data
encryption standards engine is attached to all files and database tables associated with the
system,which will facilitate encryption and decryption of files. Backup of the system are also
taken as a preventive measure.
-
7/28/2019 Hotel_MGT
67/74
4.3. System Implementation
Implementation is the stage of the project where the theoretical design is turned into a
working system. At this stage the main work load and the major impact on the existing system
shifts to the user department. If the implementation is not carefully planned and controlled, it can
cause chaos and confusion.
Implementation includes all those activities that take place to convert from the old system
to the new one. The new system may be totally new, replacing an existing manual or automated
system or it may be a major modification to an existing system. Proper implementation is
essential to provide a reliable system to meet the organization requirements.
The process of putting the developed system in actual use is called system
implementation. The system can be implemented only after thorough testing is done and it is
found to be working according to the specifications. The system personnel check the feasibility
of the system. The most crucial stage is achieving a new successful system and giving
confidence on the new system for the user that it will work efficiently and effectively. It involves
careful planning, investigation of the current system and its constraints on implementation. The
system implementation has three main aspects. They are education and training, system testing
and changeover.
The implementation stage involves following tasks.
Careful planning
Investigation of system and constraints
Design of methods to achieve the changeover.
Training of the staff in the changeover phase
Evaluation of the changeover method
-
7/28/2019 Hotel_MGT
68/74
-
7/28/2019 Hotel_MGT
69/74
4.3.2 User Manual
To achieve the objectives and benefits expected from the proposed system it is essential
for the people who will be involved to be confident of their role in the new system. As system
becomes more complex, the need for education and training is more and more important.
Education is complementary to training. It brings life to formal training by explaining
the background to the resources for them. Education involves creating the right atmosphere and
motivating user staff. Education information can make training more interesting and more
understandable.
Training on the Application Software
After providing the necessary basic training on the computer awareness, the users will
have to be trained on the new application software. This will give the underlying philosophy of
the use of the new system such as the screen flow, screen design, type of help on the screen,
type of errors while entering the data, the corresponding validation check at each entry and the
ways to correct the data entered. This training may be different across different user groups and
across different levels of hierarchy.
-
7/28/2019 Hotel_MGT
70/74
-
7/28/2019 Hotel_MGT
71/74
Preventive Maintenance
The fourth maintenance activity occurs when software is changed to improve future
maintainability or reliability, or to provide a better basis for future enhancements. Often called
preventive maintenance, this activity is characterized by reverse engineering and re-engineering
techniques.
-
7/28/2019 Hotel_MGT
72/74
CONCLUSION
5.1 Scope for Future Enhancement
The growth of any organization leads to enhancements, in future the system can be enhanced
according to requirements. In order to become an effective system, the developed system should
provide room for improvement and enhancement.
Hotel Management System is a software system where the management of entire hotel is
computerized. The reservation process of reserving rooms for the customers, canceling the
reserved rooms, booking the rooms, vacating the rooms, the restaurant management, billing
process, etc all are computerized and the management is done without any difficulty. The reports
can be viewed completely and the head of the management daily or weekly or monthly can
review it. For company auditing it will be more useful.
In future employee details, attendance maintenance and salary calculations can also be
incorporated.
-
7/28/2019 Hotel_MGT
73/74
5.2 Bibliography
Books
1. Professional VB.net 2nd Edition
Fried Barwell, Richard Blair, Richard Case, Jonathan Crossland, Bill Forgey, Whitney Hankison,
Billy S .Hollis, Rockford Lhotka, Tim McCarthy, Jan D.Narkiewicz, Jonathan Pinnock,RamaRamachandran, Mathew Reynolds, John Roth, Bill Sempf, Bill Sheldon.
2. Visual Basic.NET:The Complete Reference
Jeffrey R.Shapiro
3. Comdex .NET Programming Course KitVikas Gupta,Kogent Solutions Inc
4. Software Engineering
Roger S. Pressman., Tata McGraw Hill Publishing Company Limited
5. System Analysis and Design
Elias. M Award., Tata McGraw Hill Publishing Company Limited
-
7/28/2019 Hotel_MGT
74/74
SAMPLE SOURCE CODE