Hotel_MGT

  • Upload
    ab7178

  • View
    218

  • Download
    0

Embed Size (px)

Citation preview

  • 7/28/2019 Hotel_MGT

    1/74

    CONTENTS

    I INRODUCTION Page No.

    1.1. An Overview

    1.2. Mission of the Project

    1.3. Background Study

    1.3.1. The Organization Profile

    1.3.2. Study on Existing System

    II SYSTEM ANALYSIS

    2.1. Study on Proposed System

    2.1.1. Defining the problem

    2.1.2. Developing Solution Strategies

    2.2. User Requirement Specification

    2.3. Software Requirement Specification

    2.4. System Specification

    2.4.1. Application Specification2.4.2. Hardware Specification

    2.4.3. Software Specification

    2.4.4. Network Specification

    2.5. Cost Estimation and Scheduling

    2.6. Final Outline of the Proposed System

    III DESIGN AND DEVELOPMENT PROCESS

    3.1 Fundamental Design Concepts

    3.2 Design Notations

    3.2.1. Structure Chart

    3.2.2. Data Flow Diagram

    3.2.3 .ER Diagram

  • 7/28/2019 Hotel_MGT

    2/74

    3.3 Design Process

    3.3.1 Database Design

    3.3.2 Input Design

    3.3.3 Output Design

    3.4 Development Approach

    IV TESTING AND IMPLEMENTATION

    4.1. Testing

    4.1.1 Testing Methodologies

    4.2. Quality Assurance

    4.2.1. Generic risks

    4.2.2. Security Technologies & Policies

    4.3. System Implementation

    4.3.1. Implementation Procedures

    4.2.2 User Manual

    4.3 System Maintenance

    V CONCLUSION

    5.1 Scope for Future Enhancement

    5.2 Bibliography

    ANNEXURE-A

    1. Input Design

    2. Out Design

    3. Sample Source

    ANNEXURE-B

    Abbreviation

  • 7/28/2019 Hotel_MGT

    3/74

    INRODUCTION

    1.1. An Overview

    HOTEL MANAGEMENT SYSTEM

    Hotel Management System is a software system where the management ofentire hotel is computerized. The hotel management system is designed using

    visual basic.net as the rich GUI for front end and MS-Access as the secured

    backend database.

    In this project the details are maintained like customer details, reservation

    details, Booking details and billing details The reservation process of reserving

    rooms for the customers, canceling the reserved rooms, booking the rooms ,

    vacating the rooms, the restaurant management, billing process, etc all are

    computerized and the management is done without any difficulty.

    The reports can be viewed completely and the head of the management daily

    or weekly or monthly can review it. For company auditing it will be more useful.

    This Proposed System will be interactive, faster and user-friendly for the end users.

    Using the hotel management system, the following activities can be performed.

    o Booking or reservations of the rooms

    o Cancellation of the rooms

    o Cash billing

    o Room service / Restaurant service

    o

    Restaurant billing

    o Total billing

    o Travels arrangement

  • 7/28/2019 Hotel_MGT

    4/74

    1.2. Mission of the Project

    The mission is to to facilitate easy management and administration of a hotel with

    capabilities to do Booking or reservations of the rooms, Cancellation of the rooms, Cash billing,

    Room service, Restaurant service, Restaurant billing, Total billing, Travels arrangement etc.

    using the automated hotel management software. One can keep detailed records or info on an

    unlimited amount of customers.The system lets the user know which all rooms are available for

    occupancy at any point of time. This makes the booking considerably faster. And thus helps the

    hotel in better management and reduce a lot of paper work as well as manpower.

  • 7/28/2019 Hotel_MGT

    5/74

    1.3. Background Study

    1.3.1. The Organization Profile

    N Solutions is an emerging provider of IT development solutions, servicing customers

    nationwide.The ability of N Solutions to anticipate future technological requirements and

    capabilities is vital to the success of their business and that of their clients. The objective of N

    Solutions is to work, communicate and support customers as the pace of change accelerates and

    demands grow.

    N Solutions business lines include:

    Tailor-made software solutions development

    Outsourcing software development

    Business solutions deployment and integration

    IT Consulting

    IT Infrastructure building / maintenance and related services including technical support

    to both customers and IT companies.

    N Solutions software development services cover the complete project life cycle, from

    requirement assessment and task definition, to solution development, to implementation and

    integration, followed by support and maintenance. The ability to integrate software with existing

    systems by expanding information systems infrastructure is an important advantage of N

    Solutions as a turn-key solution provider.

    N Solutions expertise covers the following areas:

    Enterprise Application Integration;

    Data Warehousing and Decision Support;

    Electronic Document Management;

    Information Security;

    Internet/Intranet and e-Commerce solutions.

    Excellent quality of N Solutions software development is guaranteed by their team of

    professionals with certified skills and experienced project managers. N Solutions also ensures

    quality control at all stages of development process. Transparent software development process

    and interaction with the customer are taken utmost care at N Solutions. They give their clients a

    real commercial advantage by the professionalism, flexibility and specialist knowledge

  • 7/28/2019 Hotel_MGT

    6/74

    1.3.2. Study on Existing System

    EXISTING SYSTEM

    Hotel Management involves maintaining various operations of the hotel like Booking or

    reservations of the rooms, Cancellation of the rooms, Cash billing, Room service, Restaurant

    service, Restaurant billing, Total billing, Travels arrangement etc. The existing system is a

    manual one and there is lot of issues like erroneous data, slow process, lack of security etc.

    Finding out the final payment amount completely relies on the hotel manager and if he is absent,

    it takes a long time to find out the details during check out and is prone to errors.

    Drawbacks of the Existing System

    Manual entry consumes more time.

    It is difficult to maintain bulk of record in manual.

    Restrictions in the users.

    Not easy to prepare the daily reports.

    Lack of accuracy and error prone.

    Overall efficiency is less.

    Lot of paperwork.

    Non-secure.

    No perfect maintenance of report.

    No method to trace details

    Human errors

    The manual system is too slow

    Searching is more time consuming

  • 7/28/2019 Hotel_MGT

    7/74

    II SYSTEM ANALYSIS

    2.1. Study on Proposed System

    2.1.1. Defining the problem

    Currently,the system used is manual. It requires a lot of time spared in writing the details

    in the paper and manually validates and maintains the records It can involve lots of search and

    time wastage. Preserving and maintaining large amount of data manually is a difficult task. The

    existing system is a manual one and there is lot of issues like erroneous data, slow process, lack

    of security etc. Finding out the final payment amount completely relies on the hotel manager and

    if he is absent, it takes a long time to find out the details during check out and is prone to errors.

    2.1.2. Developing Solution Strategies

    The proposed system is to facilitate easy management and administration of a hotel with

    capabilities to do Booking or reservations of the rooms, Cancellation of the rooms, Cash billing,

    Room service, Restaurant service, Restaurant billing, Total billing, Travels arrangement etc.

    using the automated hotel management software.

    Advantages of proposed system

    The following are the objectives and highlights of the proposed system

    Secure data Faster process

    Error Free

    Better management

    Save a lot of manpower

    Can easily make the daily reports

    Elimination of Paper work.

    High reliability and security.

    Fast and economical.

    Maintains large Terabytes of data.

  • 7/28/2019 Hotel_MGT

    8/74

  • 7/28/2019 Hotel_MGT

    9/74

    the check in and checkout details of the person. The Restaurant bill is generated based on the

    food items consumed by the guest during his stay in the hotel.

    Reports

    This module deals with the generation of the reports for the various modules. The

    customer list can be generated. Room status list can be retrieved for reference. The check in and

    check out registers can also be retrieved for any future queries.

  • 7/28/2019 Hotel_MGT

    10/74

    2.3. Software Requirement Specification

    VB.NET

    Visual Basic (VB) is a programming language based on the original DOS language called

    BASIC (Beginners' All-purpose Symbolic Instruction Code). VB.NET 2005, an offshoot of

    Visual Basic, is an object-oriented programming language based on VB that is implemented

    using the Microsoft .NET framework. The basic syntax of the Visual Basic language remains

    unchanged in VB.NET 2005, but includes additional features such as structured exception

    handling and short circuited expressions to enhance the infrastructure of the programming

    language.

    Developers have found VB.NET to be controversial as some of the software and

    developmental changes clash with the original language within VB and have caused

    compatibility issues. Visual Studio .NET is the predominant integrated development environment

    (IDE) that VB.NET developers employ.

    Visual Basic programmers supporting VB.NET indicate that language constructs and

    user interface features in the newer system have caused programming issues within the original

    VB system. Developers using VB.NET recognize that the upgraded VB system incorporates

    contemporary object oriented programming paradigms in a more stable environment than was

    originally thought possible.

    Visual Basic .NET is a programming language that can be used to create win forms or

    web applications and create programming based in any object-oriented programming language

    (OOP), ADO.NET, Multithreading or Windows Services. VB.NET programming utilizes

    concepts connected to string encryption, forms inheritance, regular expressions and deployment.

    TEN ENHANCEMENTS

    1. Visual Basic is truly object-oriented.

  • 7/28/2019 Hotel_MGT

    11/74

    2. The new Windows Forms model for programming a user interface is more powerful than

    ever, and bundles convenient controls for everything from system tray icons to print previewing

    to web browser windows.

    3. Theres no automatic type conversion: Option Strict lets you turn off this dangerous

    convenience.

    4. Structured error handling makes it as easy to trap an error in Visual Basic as in any other

    modern programming language.

    5. ASP.NET provides the easiest and most powerful system to date for programming web

    applications.

    6. Method overloading now allows you to create different versions of methods with the same

    name, but with different arguments. Visual Basic 2005 will use the correct one automatically.

    7. Even critics cant deny that the new development environment is heartstoppingly beautiful.

    Does any other language offer collapsible code, intelligent dynamic help, and an entire

    programming language for creating macros?

    8. A new event model lets you connect multiple event handlers to a single control and store

    function references in special variables,

    called delegates.

    9. Initializers let you set the value of a variable on the same line where it is declared.

    10. Metadata means that DLL Hell may finally be a thing of the past. You can now set up a

    program just by copying its directorya capability that hasnt existed in the Windows world for

    years.

    DATABASE DESIGN

    A collection of data designed to be used by different people is called a database. It is

    collection interrelated data stored together with controlled redundancy to serve one or more

    applications in an optional fashion.

    The data is stored in such a fashion that it is independent of the programs of people using

    the data. A common and controlled approach is used in adding new data and modifying and

    retrieving existing data with in the database.

  • 7/28/2019 Hotel_MGT

    12/74

    MICROSOFT SQL SERVER

    SQL SERVER 2005 is a Relational Database Management System. The abbreviation is

    Structure Query Language. SQL is the language used to query the database. SQL is a declarative

    language where you just say store this or modify this without saying how to do. It is the product

    of Microsoft. The version of SQL used by SQL SERVER 2005 is called Transact SQL. It

    supports the client/server architecture. It receives requests from the clients for data and returns

    the result of the processed query. All the SQL statements are submitted to the Transact-SQL,

    which on receiving them passes the result and displays it for the user.

    SQL solved the ad hoc needs of users; the need for data access by computer programs did

    not go away. In fact, most database access still was (and is) programmatic, in the form of

    regularly scheduled reports and statistical analyses, data entry programs such as those used for

    order entry, and data manipulation programs, such as those used to reconcile accounts and

    generate work orders.

    The following is a list of relational database that support SQL:

    SQL SERVER

    MS Access

    Sybase

    Oracle

    Ingress

    Informix

    Features of SQL

    SQL is used to query the database to get results

    Used to inserts new data

  • 7/28/2019 Hotel_MGT

    13/74

    Used to modify the data

    Extremely flexible query language

    Over the years its functional capabilities can be extended

  • 7/28/2019 Hotel_MGT

    14/74

    2.4. System Specification

    2.4.1. Application Specification

    In Client/Server architecture, a web application sends requests to a web server using a

    private network. This is usually some type of local area network (LAN) or wide area network

    (WAN). The server processes these requests and returns data. The results of the request are

    handled as response to the client machines.

    Hotel managment

    System

    Client1Client2

    requests

    Client3Client4

    response

  • 7/28/2019 Hotel_MGT

    15/74

    2.4.2. Hardware Specification

    Processor : Pentium IV

    Clock Speed : 2 GHz

    RAM : 512 MB

    Hard disk Capacity : 80 GB

    Floppy disk Capacity : 1.44 MB

    Keyboard : 101 Keys

    Mouse : Optical Mouse

    2.4.3. Software Specification

    Front End : VB.net

    Back End : MS SQL

    Operating System : Windows 2000/XP or above

  • 7/28/2019 Hotel_MGT

    16/74

    2.4.4. Network Specification

    The two standard input device viz., keyboard and mouse are used to get input from all users. The

    system will be working on HTTP protocol for intranet. The centralized server will be a windows

    server with a web server installed. The client machines connect to it through ordinary LAN

    settings. The Client machines need to have a browser to access the remote web server through

    http requests.

  • 7/28/2019 Hotel_MGT

    17/74

    2.5. Cost Estimation and Scheduling

    Computing the development time using Intermediate COCOMO is done in two stages. The

    parameter, the length of the product in KDSI (thousand delivered source instructions) is

    estimated. Then, using this, the nominal effort is calculated. This project is considered to be

    essentially straightforward and hence it comes under organic mode. The nominal effort (in

    person-months) is given by,

    Nominal Effort = 4* (2) 1.05 person-months

    = 4 * 2.07

    = 8.3 person-months.

    Next, this nominal value must be multiplied by 15 software development effort

    multipliers. These multipliers are as follows:

    Intermediate COCOMO software development effort multipliers for this project are

    as follows:

    COST DRIVERS SITUATION RATINGEFFORT

    MULTIPLIER

    (1)PRODUCT

    ATTRIBUTES1. Required Software

    Reliability

    Normal finance for

    SoftwareNominal 1.00

    2. Database Size Few bytes Very low3. Product Complexity Processing Details Nominal 1.00

    (2) COMPUTER

    ATTRIBUTES4. Execution Time

    ConstraintWill use a little time Nominal 1.00

    5. Main StorageConstraint

    Medium size storagearea

    Low 0.87

    6. Virtual Machine

    Volatility

    Commercial

    Microprocessor

    Hardware

    Nominal 1.00

    7. Computer Turnaround Average Turnaround Nominal 1.00

  • 7/28/2019 Hotel_MGT

    18/74

    Time Time

    (3) PERSONNEL

    ATTRIBUTES

    8. Analyst Capabilities Good senior analysts High 0.86

    9. Applications

    Experience Few years Low 1.13

    10. Programmer

    CapabilityJunior Programmer Nominal 1.00

    11. Virtual Machine

    ExperienceSix Months Low 1.10

    12. Programming

    Language

    Experience

    Six Months Low 1.07

    (4) PROJECTATTRIBUTES

    13. Use of Modern

    Programming Practices

    Most techniques in use

    over one yearHigh 0.91

    14. Use of Software

    ToolsMinicomputer Nominal 1.00

    15. Required

    Development ScheduleSix Months Low 1.08

    The estimated development effort is obtained by multiplying the nominal effort by the 15

    multipliers. Using the above values, the product of the multipliers is calculated as 0.97, so the

    estimated effort for the project is0.97 * 8.23= 8.02 person-months

    Thus, the approximate cost is calculated as:

    8 .02* 2500 = Rs. 20000

    Scheduling

  • 7/28/2019 Hotel_MGT

    19/74

    Scheduling is the culmination of a planning activity that is a primary component of

    software project management. When combined with estimation methods and risk analysis,

    scheduling establishes a road map for the project manager. Scheduling begins with process

    decomposition.

    Analysis

    17%

    Design22%

    Coding

    18%

    Testing

    17%

    Maintenance

    16%

    Implementation

    10%

    Fig. Scheduling Chart

  • 7/28/2019 Hotel_MGT

    20/74

    Scheduling Table

    Phases Days

    Requirement Analysis 32

    Design 40Coding 35

    Testing 32

    Implementation 11Maintenance 30

    PERT and CPM one two of the many network techniques have been widely used for planning,

    scheduling and controlling the large and complex projects.

  • 7/28/2019 Hotel_MGT

    21/74

    2.6. Final Outline of the Proposed System

    The proposed system is to facilitate easy management and administration of a hotel with

    capabilities to do Booking or reservations of the rooms, Cancellation of the rooms, Cash billing,

    Room service, Restaurant service, Restaurant billing, Total billing, Travels arrangement etc.

    using the automated hotel management software.

    Advantages of proposed system

    The following are the objectives and highlights of the proposed system

    Secure data

    Faster process

    Error Free

    Better management

    Save a lot of manpower

    Can easily make the daily reports

    Elimination of Paper work.

    High reliability and security.

    Fast and economical.

    Maintains large Terabytes of data.

  • 7/28/2019 Hotel_MGT

    22/74

    III DESIGN AND DEVELOPMENT PROCESS

    3.1 Fundamental Design Concepts

    Although the degree of interest in each concept has varied over the years, each has stood the test

    of time. Each provides the software designer with a foundation from which more sophisticated

    design methods can be applied. Fundamental design concepts provide the necessary framework

    for getting it right.

    3.2 Design Notations

    3.2.1. Structure Chart

    3.2.2. Data Flow Diagram

    The data flow diagram (DFD) is one of the most important tools used by system analysts. Data

    flow diagrams are made up of a number symbols, which represent system components. Most data

    flow modeling methods use four kinds of symbols. These symbols are used to represent four

    kinds of system components such as Processes, data stores, data flows and external entities.

    Circles in DFD represent processes. Data Flow is represented by a thin line in the DFD

    and each data store has a unique name and rectangle represents external entities. Unlike detailed

    flow chart, Data Flow Diagrams do not supply detailed description of the modules but

    graphically describes a systems data and how the data interact with the system.

    An arrow identifies the data flow in motion. It is a pipeline through which information is

    flown like the rectangle in the flowchart. A circle stands for process that converts data into

    information. An open-ended box represents a data store, data at rest or a temporary repository of

    data. A square defines a source or destination of system data.

  • 7/28/2019 Hotel_MGT

    23/74

    DATA FLOW DIAGRAM

    DFD for Hotel Management System

    DFD for Overall System:

    DFD for Authentication:

    DataData and

    Commands

    Hotel

    Management

    System

    DatabaseUser

    User Name &

    PasswordUser

    Validate the

    User

    Alert

    Message

    DataProcessing Database

    Invalid

    User

    Valid User

    Data

  • 7/28/2019 Hotel_MGT

    24/74

    DFD for modules in the Hotel Management System

    Customer Data D a t a

    D a t a

    RestaurantBill Details

    Bill Details

    Enquiry Data

    Room

    Data

    User

    Data

    Food Details

    User Process

    the

    Request

    Restaurant Billing

    Food Entry

    Bill Entry

    Enquiry Entry

    Room Entry

    Reservation Entry

    Check-in Entry

    Check-Out Entry

    Database

    ReportsReport Generation

    User Management

    Reservation Data

    Check-in Data

    Checkout Data

    Report Data

    Customer Entry

  • 7/28/2019 Hotel_MGT

    25/74

    Valid Data

    Data Data

    Data

    Data

    Data

    Data

    Data

    Data

    DFD for user Entry:

    Request

    New IDAdd Record

    Modified

    Record

    Delete Record

    View Record

    Generate

    ID

    Users

    Last ID

    Validate

    Data

    Alert

    Message

    Invalid Data

    Users

    Report

    User

    Data

  • 7/28/2019 Hotel_MGT

    26/74

  • 7/28/2019 Hotel_MGT

    27/74

  • 7/28/2019 Hotel_MGT

    28/74

    Valid Data

    Data

    Status

    Data Data

    Room Status Room Type

    DFD for Room Enquiry:

    Data

    RequestNew ID

    New Enquiry

    Change Status

    Generate

    ID

    Enquiry

    Last ID

    ValidateData

    Alert

    Message

    Invalid Data

    EnquiryReport

    Enquiry

    Data

    Enquiry_Det

    Room_Master

  • 7/28/2019 Hotel_MGT

    29/74

    Valid Data

    Data

    Status

    DataData

    Room Status Room Type

    DFD for Room Booking:

    Data

    Request

    New ID

    New

    Reservation

    Change

    Reservation

    Status

    Generate

    ID

    Reservation

    Last ID

    ValidateData

    Alert

    Message

    Invalid Data

    Reservation

    Report

    Reservation

    Data

    Room_Master

  • 7/28/2019 Hotel_MGT

    30/74

    DFD for Check-in and Checkout and Billing:

    Data

    Data Request for bill CheckinID Checkin DetailsRoom No &

    C ID

    Data to be Validated

    Room ID

    & Status

    Check-in Details

    Room ID

    Data

    Get Room

    Status

    Customer

    Room_Master

    New Check in

    Checkout

    View Details

    Validatethe data

    Valid Data

    Invalid Data

    Alert Message

    Check-in &

    Checkout

    Report

    Get Details

    Check_in_Out

    Check-in.

    Details

    Checkout

    Details

    CheckinID

    Generate Bill Hotel_Bill

  • 7/28/2019 Hotel_MGT

    31/74

    Order Details

    Request

    Data Variety ID Rate

    Data

    Request

    DFD for Restaurant:

    3.2.3 .ER Diagram

    Request Data

    Request

    Data

    Variety

    Details

    Data

    Bill Details

    Get Food

    Variety

    Details

    Food_Variety

    NewBill

    View Bills

    Get Rate

    Restaurant

    Bills

    Report

    Food

    Details

    New

    Food

    Variety

    View

    Varieties

    Food

    Varieties

    Report

    Rest_Bill

    Generate

    Bill

  • 7/28/2019 Hotel_MGT

    32/74

    The entity relationship diagram is based on a perception of real world that consists of a

    collection of basic objects, called entities and of relationship among the objects. Entities are

    described in a database by a set of attributes. The set of all entities of the same type, and the set

    of all relationships of the same type, are termed as an entity set, and relationship set respectively.

    The overall logical structure of a database can be expressed graphically by an entity relationship

    diagram, which is built up using the notations

  • 7/28/2019 Hotel_MGT

    33/74

    Food Variety

    Restaurant Bill

    Users

    Hotel Management

    System

    Reservation

    Customer

    Room Master

    Enquiry

    Enquiry

    Details

    H

    as

    Y

    Yy

    Y Y

    N

    Y

    N

    Check-in-ou

    Hotel Bill

    H

    as

    H

    asHa

    Has

    H

    as

    H

    as

    H

    as

    Y

    Y

  • 7/28/2019 Hotel_MGT

    34/74

    3.3 Design Process

    3.3.1 Database Design

    TABLE DESIGN

    Users:

    Field Name Datatype Description Constraint

    Username varchar2(15) User Name Primary key

    Password varchar2(15) Password

    Fname varchar2(15) First NameLname varchar2(15) Last Name

    Address varchar2(50) Address

    Phno varchar2(15) Phone No

    Mbno varchar2(15) Mobile No

    Dept varchar2(15) Department

    Desg varchar2(15) Designation

    Room_Master:

    Field Name Datatype Description ConstraintRoomno number(4) Room No primary key

    Roomtype varchar2(15) Room type

    Status number(1) Status

    Tariff number(7,2)) Tariff

    Customer:

    Field Name Datatype Description Constraint

    cid number(5) Customer ID primary key

    cname varchar2(20) Customer Nameaddress varchar2(50) Address

    phno varchar2(15) Phone No

    mbno varchar2(15) Mobile No

    Enquiry:

  • 7/28/2019 Hotel_MGT

    35/74

    Field Name Datatype Description Constraint

    Enqid number(7) Enquiry ID primary key

    Edate varchar2(10) Enquiry Date

    Ename varchar2(20) Enquirer Name

    Eaddr varchar2(50) Enquirer Address

    Phno varchar2(15) Enquirer Phone NoMbno varchar2(15) Enquirer Mobile No

    Estatus varchar2(10)) Enquiry Status

    Enquiry_det:

    Field Name Datatype Description Constraint

    Enqid number(7) Enquiry ID Primary Key,Foreign Key

    Roomtype varchar2(10) Room Type Enquired Primary Key,

    Noofrooms number(3) No of Rooms

    Excepcheckindt varchar2(10) Expected Checkin Date

    Noofdays number(2) No of Days

    Reservation:

    Field Name Datatype Description Constraint

    Rid number(5) Reservation ID primary key

    cid number(5) Customer ID Foreign Key

    rdt varchar2(10) Reservation Date

    noofdays number(3) No of Days

    roomno number(4) Room No

    rstatus varchar2(10) Reservation Status

    Check_in_out:

    Field Name Datatype Description Constraint

    Checkinid number(5) Check-in ID primary key

    cid number(5) Customer ID Foreign Key

    ckdate varchar2(10) Check-in Date

    cktime varchar2 (6) Check-in Time

    noofper number(2) No of Persons

    roomno number(4) Room No

    noofdays number(2) No of Daysadvance number(9,2) Advance

    cktdt varchar2(10) Checkout Date

    ckttm varchar2(5)) Checkout Time

    Hotel_Bill:

  • 7/28/2019 Hotel_MGT

    36/74

    Field Name Datatype Description Constraint

    Billno number(5) Bill No primary key

    Checkinid number(5) Check-in ID Foreign Key

    Sertax number(4,2) Service Tax (%)

    Extchrg number(7,2) Extra Charge

    Food_Variety:

    Field Name Datatype Description Constraint

    Varietyid number(5) Variety ID primary key

    Varietyname varchar2(20) Variety Name

    Cost number(7,2)) Cost

    Rest_Bill:

    Field Name Datatype Description Constraint

    Rbillno number(5) Restaurant Bill No Primary keyVarietyid number(5) Variety ID Primary key, Foreign Key

    Rbilldt varchar2(10) Restaurant bill Date

    Qty number(2) Quantity

    Tax number(4,2) Tax (%)

  • 7/28/2019 Hotel_MGT

    37/74

    3.3.2 Input Design

    The input design is the link that ties the information system into the world of its users. It

    is a process of converting user-originated inputs to a computer-based format. Input data are

    collected and organized into a group of similar data. Once identified, appropriate input media

    are selected for processing.

    The goal of designing input data is to make entry easy, logical and free form errors. In

    input data design, we design source document that capture the data and then select the media

    used to enter them into the computer. The input forms are developed in a user-friendly way so

    that a layman also can easily understand everything. Menus are provided to users and differenticons are designed so the proposed system design looks decorative. Input design is the part of the

    overall system design.

    Source documents initiate a processing cycle as soon as they are entered into the system

    through the keyboard. A source should be logical and easy to understand.

    Objectives of Input Design:

    1 To achieve the highest possible level of accuracy.

    2 To ensure that the input is acceptable and understood by the user.

  • 7/28/2019 Hotel_MGT

    38/74

    Screens

  • 7/28/2019 Hotel_MGT

    39/74

  • 7/28/2019 Hotel_MGT

    40/74

  • 7/28/2019 Hotel_MGT

    41/74

  • 7/28/2019 Hotel_MGT

    42/74

  • 7/28/2019 Hotel_MGT

    43/74

  • 7/28/2019 Hotel_MGT

    44/74

  • 7/28/2019 Hotel_MGT

    45/74

  • 7/28/2019 Hotel_MGT

    46/74

  • 7/28/2019 Hotel_MGT

    47/74

  • 7/28/2019 Hotel_MGT

    48/74

  • 7/28/2019 Hotel_MGT

    49/74

  • 7/28/2019 Hotel_MGT

    50/74

  • 7/28/2019 Hotel_MGT

    51/74

  • 7/28/2019 Hotel_MGT

    52/74

  • 7/28/2019 Hotel_MGT

    53/74

  • 7/28/2019 Hotel_MGT

    54/74

    3.3.3 Output Design

    Output forms are also designed in a specific manner as per the user requirement. Results

    are formatted to enhance clarity. Depending on the user the system would generate appropriate

    output. The output forms are designed in such a way that the entire user required data is

    presented.

    While designing an output, the system analyst must accomplish the following.

    Determine what information to present

    Decide whether to display, print or speak information and select the output

    medium.

    Arrange the presentation of information in an acceptable form.

    Decide how to distribute the output to intended users.

  • 7/28/2019 Hotel_MGT

    55/74

  • 7/28/2019 Hotel_MGT

    56/74

  • 7/28/2019 Hotel_MGT

    57/74

  • 7/28/2019 Hotel_MGT

    58/74

  • 7/28/2019 Hotel_MGT

    59/74

  • 7/28/2019 Hotel_MGT

    60/74

    3.4 Development Approach

    The ultimate aim of the proposed system is to provide service to the customers. They

    need to get trained to use the newly proposed system. Hence developing a system without the

    users feedback will lead to discard of the system. So Rapid Application model was used to

    develop the system.

    A rough interface of the system is given to the users for their feedback and suggestions.

    Then the modifications are done. But as the system evolved and after a series of interactions and

    demonstrations, the user felt comfortable with the newly developed system.

    The system went through the following stages:

    The software request is evaluated

    Product requirements are collected

    Design specification for the prototype is prepared

    Prototype software is developed, tested and refined

    Prototype is given to the user, who tested the system any gave suggestions for

    further refinement

  • 7/28/2019 Hotel_MGT

    61/74

    The process during the development of the software using the RAD model is

    Requirement Gathering

    Abbreviated

    Representation

    Prototype

    Generation

    Testing and

    Refinement

    Hotel Management

    System

  • 7/28/2019 Hotel_MGT

    62/74

    IV TESTING AND IMPLEMENTATION

    4.1. Testing

    4.1.1 Testing Methodologies

    Testing is a process used to help identify the correctness, completeness and quality of developed

    computer software. There are many approaches to software testing, but effective testing of

    complex products is essentially a process of investigation, not merely a matter of creating and

    following rote procedure. One definition of testing is "the process of questioning a product in

    order to evaluate it", where the "questions" are things the tester tries to do with the product, and

    the product answers with its behavior in reaction to the probing of the tester.

    The quality of the application can and normally does vary widely from system to system but

    some of the common quality attributes include reliability, stability, portability, maintainability

    and usability.

    Testing objectives include

    1. Testing is a process of executing a program with the intent of finding an error.

    2. A goodtest case is one that has a high probability of finding an as yet undiscovered error.

    3. A successful test is one that uncovers an as yet undiscovered error.

    Testing should systematically uncover different classes of errors in a minimum amount of time

    and with a minimum amount of effort. A secondary benefit of testing is that it demonstrates that

    the software appears to be working as stated in the specifications. The data collected through

    testing can also provide an indication of the software's reliability and quality. But, testing cannot

    show the absence of defect -- it can only show that software defects are present.

    http://www.onestoptesting.com/Introduction/http://www.onestoptesting.com/Introduction/http://www.onestoptesting.com/Introduction/http://www.onestoptesting.com/Introduction/http://www.onestoptesting.com/Introduction/http://www.onestoptesting.com/Introduction/http://www.onestoptesting.com/Introduction/http://www.onestoptesting.com/Introduction/http://www.onestoptesting.com/Introduction/http://www.onestoptesting.com/Introduction/
  • 7/28/2019 Hotel_MGT

    63/74

    Black box testing

    Black box testing attempts to derive sets of inputs that will fully exercise all the functional

    requirements of a system. It is not an alternative to white box testing. This type of testing

    attempts to find errors in the following categories:

    1. incorrect or missing functions,

    2. interface errors,

    3. errors in data structures or external database access,

    4. performance errors, and

    5. initialization and termination errors.

    White box testing

    This testing is based on knowledge of the internal logic of an applications code. Also known as

    Glass box Testing. Internal software and code working should be known for this type of testing.

    Tests are based on coverage of code statements, branches, paths, conditions. White box testing is

    a test case design methodthat uses the control structure of the procedural design to derive test

    cases. Test cases can be derived that

    1. Guarantee that all independent paths within a module have been exercised at least once.2.Exercise all logical decisions on their true and false sides,

    3. Execute all loops at their boundaries and within their operational bounds, and

    4. Exercise internal data structures to ensure their validity.

    Website Cookie Testing

    Cookie is small information stored in text file on users hard drive by web server.

    This information is later used by web browser to retrieve information from that machine.

    Generally cookie contains personalized user data or information that is used to

    communicate between different web pages.

    Cookies are nothing but the users identity and used to track where the user

    navigated throughout the web site pages. The communication between web browser and

    web server is stateless.

    http://www.onestoptesting.com/types/Blackbox.asphttp://www.onestoptesting.com/types/Blackbox.asphttp://www.onestoptesting.com/types/Whitebox.asphttp://www.onestoptesting.com/types/Whitebox.asphttp://www.onestoptesting.com/types/Whitebox.asphttp://www.onestoptesting.com/types/Blackbox.asphttp://www.onestoptesting.com/types/Whitebox.asphttp://www.onestoptesting.com/types/Whitebox.asp
  • 7/28/2019 Hotel_MGT

    64/74

    Test cases:

    1) As a Cookie privacy policy make sure from your design documents that no personal or

    sensitive data is stored in the cookie.

    2) If you have no option than saving sensitive data in cookie make sure data stored in cookie is

    stored in encrypted format.

    3) Make sure that there is no overuse of cookies on your site under test. Overuse of cookies will

    annoy users if browser is prompting for cookies more often and this could result in loss of site

    traffic and eventually loss of business.

    4) Disable the cookies from your browser settings: If you are using cookies on your site, yoursites major functionality will not work by disabling the cookies. Then try to access the web site

    under test. Navigate through the site. See if appropriate messages are displayed to user like For

    smooth functioning of this site make sure that cookies are enabled on your browser. There

    should not be any page crash due to disabling the cookies

    5) Accepts/Reject some cookies: The best way to check web site functionality is, not to accept all

    cookies. If you are writing 10 cookies in your web application then randomly accept some

    cookies say accept 5 and reject 5 cookies. For executing this test case you can set browser

    options to prompt whenever cookie is being written to disk. On this prompt window you can

    either accept or reject cookie. Try to access major functionality of web site. See if pages are

    getting crashed or data is getting corrupted.

    6) Delete cookie: Allow site to write the cookies and then close all browsers and manually delete

    all cookies for web site under test. Access the web pages and check the behavior of the pages.

    7) Corrupt the cookies: Corrupting cookie is easy. You know where cookies are stored. Manually

    edit the cookie in notepad and change the parameters to some vague values. Like alter the cookie

    content, Name of the cookie or expiry date of the cookie and see the site functionality. In some

    cases corrupted cookies allow to read the data inside it for any other domain. This should not

    happen in case of your web site cookies.

  • 7/28/2019 Hotel_MGT

    65/74

    8 ) Checking the deletion of cookies from your web application page: Some times cookie written

    by domain say rediff.com may be deleted by same domain but by different page under that

    domain. This is the general case if you are testing some action tracking web portal. Action

    tracking or purchase tracking pixel is placed on the action web page and when any action or

    purchase occurs by user the cookie written on disk get deleted to avoid multiple action logging

    from same cookie.

    9) Cookie Testing on Multiple browsers: This is the important case to check if your web

    application page is writing the cookies properly on different browsers as intended and site works

    properly using these cookies. You can test your web application on Major used browsers like

    Internet explorer (Various versions), Mozilla Firefox, Netscape, Opera etc.

    10) If your web application is using cookies to maintain the logging state of any user then log in

    to your web application using some username and password. In many cases you can see the

    logged in user ID parameter directly in browser address bar. Change this parameter to different

    value say if previous user ID is 100 then make it 101 and press enter. The proper access message

    should be displayed to user and user should not be able to see other users account.

  • 7/28/2019 Hotel_MGT

    66/74

    4.2. Quality Assurance

    4.2.1. Generic risks

    4.2.2. Security Technologies & Policies

    A computer-base system is a combination of many assets or resources designed to perform some

    function or to provide some services.Each of these assets is threatened by one or more of the

    following unacceptable events:

    Interruption

    Disclosure

    Removal

    Destruction

    Security Issues

    The term security can be divided into four related issues

    Security

    Integrity

    Privacy

    Confidentiality

    Authentication

    In the system brief log on procedure for the customer was provided in order to enter and

    accessthe system. This process is done in order to identify the valid user.

    These attributes are stored in a table that cannot be easily trapped by unauthorized persons.

    File protection

    The various files and database tables are also highly secured in this system. The necessity for

    securing the files and the table evolves because some persons who were not given authorization

    for access may hacker files and corrupt the tables with wrong data which will response

    tremendous hazards to the operations of the system. So in order to avoid these things,the data

    encryption standards engine is attached to all files and database tables associated with the

    system,which will facilitate encryption and decryption of files. Backup of the system are also

    taken as a preventive measure.

  • 7/28/2019 Hotel_MGT

    67/74

    4.3. System Implementation

    Implementation is the stage of the project where the theoretical design is turned into a

    working system. At this stage the main work load and the major impact on the existing system

    shifts to the user department. If the implementation is not carefully planned and controlled, it can

    cause chaos and confusion.

    Implementation includes all those activities that take place to convert from the old system

    to the new one. The new system may be totally new, replacing an existing manual or automated

    system or it may be a major modification to an existing system. Proper implementation is

    essential to provide a reliable system to meet the organization requirements.

    The process of putting the developed system in actual use is called system

    implementation. The system can be implemented only after thorough testing is done and it is

    found to be working according to the specifications. The system personnel check the feasibility

    of the system. The most crucial stage is achieving a new successful system and giving

    confidence on the new system for the user that it will work efficiently and effectively. It involves

    careful planning, investigation of the current system and its constraints on implementation. The

    system implementation has three main aspects. They are education and training, system testing

    and changeover.

    The implementation stage involves following tasks.

    Careful planning

    Investigation of system and constraints

    Design of methods to achieve the changeover.

    Training of the staff in the changeover phase

    Evaluation of the changeover method

  • 7/28/2019 Hotel_MGT

    68/74

  • 7/28/2019 Hotel_MGT

    69/74

    4.3.2 User Manual

    To achieve the objectives and benefits expected from the proposed system it is essential

    for the people who will be involved to be confident of their role in the new system. As system

    becomes more complex, the need for education and training is more and more important.

    Education is complementary to training. It brings life to formal training by explaining

    the background to the resources for them. Education involves creating the right atmosphere and

    motivating user staff. Education information can make training more interesting and more

    understandable.

    Training on the Application Software

    After providing the necessary basic training on the computer awareness, the users will

    have to be trained on the new application software. This will give the underlying philosophy of

    the use of the new system such as the screen flow, screen design, type of help on the screen,

    type of errors while entering the data, the corresponding validation check at each entry and the

    ways to correct the data entered. This training may be different across different user groups and

    across different levels of hierarchy.

  • 7/28/2019 Hotel_MGT

    70/74

  • 7/28/2019 Hotel_MGT

    71/74

    Preventive Maintenance

    The fourth maintenance activity occurs when software is changed to improve future

    maintainability or reliability, or to provide a better basis for future enhancements. Often called

    preventive maintenance, this activity is characterized by reverse engineering and re-engineering

    techniques.

  • 7/28/2019 Hotel_MGT

    72/74

    CONCLUSION

    5.1 Scope for Future Enhancement

    The growth of any organization leads to enhancements, in future the system can be enhanced

    according to requirements. In order to become an effective system, the developed system should

    provide room for improvement and enhancement.

    Hotel Management System is a software system where the management of entire hotel is

    computerized. The reservation process of reserving rooms for the customers, canceling the

    reserved rooms, booking the rooms, vacating the rooms, the restaurant management, billing

    process, etc all are computerized and the management is done without any difficulty. The reports

    can be viewed completely and the head of the management daily or weekly or monthly can

    review it. For company auditing it will be more useful.

    In future employee details, attendance maintenance and salary calculations can also be

    incorporated.

  • 7/28/2019 Hotel_MGT

    73/74

    5.2 Bibliography

    Books

    1. Professional VB.net 2nd Edition

    Fried Barwell, Richard Blair, Richard Case, Jonathan Crossland, Bill Forgey, Whitney Hankison,

    Billy S .Hollis, Rockford Lhotka, Tim McCarthy, Jan D.Narkiewicz, Jonathan Pinnock,RamaRamachandran, Mathew Reynolds, John Roth, Bill Sempf, Bill Sheldon.

    2. Visual Basic.NET:The Complete Reference

    Jeffrey R.Shapiro

    3. Comdex .NET Programming Course KitVikas Gupta,Kogent Solutions Inc

    4. Software Engineering

    Roger S. Pressman., Tata McGraw Hill Publishing Company Limited

    5. System Analysis and Design

    Elias. M Award., Tata McGraw Hill Publishing Company Limited

  • 7/28/2019 Hotel_MGT

    74/74

    SAMPLE SOURCE CODE