CYBER HOTELIER (Documentation)
CYBER HOTELIER (Documentation)
CYBER HOTELIER (Documentation)
CHAPTER 1
INTRODUCTION
1.1 Problem Statement:
The current system is a manual system or a semi-automated system. Manual system
involves paper work in the form of maintaining various files and manuals. Maintenance of
critical information in the files and manuals is a risk involved and a tedious process. The
existing automated system is a stand alone system or a LAN based system and booking is
in the form of e-mail.
The Main Objective of this System is to design a system to accommodate the needs
of guests in the hotel. This application helps a customer to know about the hotel
information and can reserve rooms throughout the globe irrespective of the location. This
is a computerized system to make room reservations, keep room bookings and availability
details up-to-date.
1.2 Overview:
Cyber Hotelier is a web-based system focusing on automating the (manual way of
recording the Hotel details) hotel management system and providing room reservations
through online. To understand the current manual process, existing files and manuals were
referred. A literature survey is carried out in the initial phase of the project. The basic
process is divided into two steps
1. Understanding the Existing system.
2. Features of proposed system.
This System gives a brief description about the hotel i.e., about the total number of
rooms in the hotel, location of the hotel, route map of the city showing the route to the
hoteletc and also gives a brief description about the services offered by the hotel such as
the cab services, food services, laundry...etc.
Registered user can reserve a room through online and confirm his reservation by
paying the advance amount through credit card and receiving a reference number. User can
either cancel the reservation or can modify through amendment process. Receptionist can
effectively do all his activities through this system i.e, reserving a room for walk-in
customers and do all the check-in, check-out, billing and payment activities. Receptionist
can have all the services provided to guest, restaurant billing...etc everything in the system.
House Keeping Executive can schedule all the house keeping activities and to look after
the inventory management. Manager can know the monthly reports regarding the hotel and
its management, its maintenance, expenses and room occupancy details
CHAPTER 2
PROBLEM ANALYSIS
2.1 REQUIREMENT ANALYSIS
Feasibility study is an important phase in the software development process. It
enables the developer to have an assessment of the product being developed. It refers to the
feasibility study of the product in terms of out comes of our product, operational use and
technical support required for implementing it.
Feasibility study should be performed on the basis of various criteria and
parameters. The various feasibility studies are:
Economic feasibility
Operational feasibility
Technical feasibility
2.1.1 Economic feasibility
Time Based:
If the administrator or the subjective person has to know about the where about of
different customers and their calls info, then in the manual system a concentrated search
has to be applied through many registers or ledgers, which is time consuming. If within the
system some data has to be registered then all the referential registers have ton fill
sequentially which is a redundant process. With the designed database all these overheads
are eliminated, making the actual system faster in calculating the call amount, advance
payment and current balance, which keep the system in pace with the associated trends and
technologies.
Cost Based:
Within the manual system a perennial amount of the finance are incurred
continuously upon the extra staff, maintaining the data manually on paper for all the data-
integrated jobs. The information has put through many hands at proper time to apply the
consistency standards, which is the backbone for any company this application.
Consistency is increased with the designed software, which eliminates the actual
investment upon the employees salaries and purchasing the products.
2.1.2 Operational feasibility
It refers to the feasibility of the product to be operational. Some products may work
very well at design and implementation but many fail in the real time environment. It
includes the study of additional human resource required and their technical expertise.
2.1.3 Technical feasibility
The system is self explanatory and does not need any extra sophisticated training. As
the system has been built by concentrating on the graphical user interface concept, the
application can also be handled very easily with a now wise user.
The softwares that were used to develop the market are already used the customers.
The net time the customer should concentrate is on the installation time. Thats what we
are giving in the form of manual.
Use cases (system boundaries identifying what the system should do)
Interactions or relationships between actors and use cases in the system including
the associations, dependencies, and generalizations.
Use-case diagrams can be used during analysis to capture the system requirements
and to understand how the system should work. During the design phase, you can use usecase diagrams to specify the behavior of the system as implemented.
2.3.1 Identification of Actors:
Definition:
An actor is someone or something that:
Is external to the system and has no control over the use cases.
Graphical Representation:
Actor name
Usecase name
Questions to help to find use cases:
1. What are the tasks of each actor?
2. Will any actor create, store, change, remove or read information in the system?
3. What use cases will create, store, change, remove, or read this information?
4. Will any actor need to inform the system about sudden, external changes?
5. Does any actor need to be informed about certain occurrences in the system?
10
1. Basic flow.
2. Alternative flow.
3. Special requirements.
4. Pre conditions.
5. Post conditions.
6. Extension points.
2.3.4 Relations:
Association Relationship:
An association provides a pathway for communication. The communication can
be between use cases, actors, classes or interfaces.
By default, the association tool on the toolbox is unidirectional and drawn on a diagram
with a single arrow at one end of the association. The end with the arrow indicates who or
what is receiving the communication. Bidirectional communication is used to provide the
two way communication.
Graphical Depiction:
An association relationship is an orthogonal or straight solid line with an arrow at
one end:
Dependency Relationship:
A dependency is a relationship between two model elements in which a
change to one model element will affect the other model element. Use a dependency
relationship to connect model elements with the same level of meaning. Typically, on class
11
diagrams, a dependency relationship indicates that the operations of the client invoke
operations of the supplier.
We can provide here
1. Include Relationship.
2. Extend Relationship.
Include Relationship:
Include relationships are created between the new usecase and any other usecase
that "uses" its functionality.
An include relationship is a stereotyped relationship that connects a base use case
to an inclusion use case. An include relationship specifies how behavior in the inclusion
use case is used by the base use case.
<<include>>
BASE USE-CASE
INCLUSION USE-CASE
Extend Relationships:
An extend relationship is a stereotyped relationship that specifies how the
functionality of one use case can be inserted into the functionality of another use case.
Extend relationships between use cases are modeled as dependencies by using the Extend
stereotype.
An extend relationship is used to show
Optional behavior
Behavior that is run only under certain conditions such as triggering an alarm
12
Registration/Login
Reserv ation
administrator
Manager
cancellation/Modif ication
Serv ices
Receptionist
Front-desk
Restaurant
Guest
Billing
Check Report
House keeping
Inv entory
HouseKeeping
Executiv e
13
14
15
check in
[ no ]
restaurant?
[ yes ]
room
required?
room is already
reserved?
[ no ]
[ yes ]
[ yes ]
[ no ]
check
availability
[ yes ]
allot another
table
frontoffice
enquiry
[ no ]
allot reserved
table
reservation
[ no ]
check
availability?
[ no ]
[ yes ]
services
process is done
services
needed?
[ yes ]
inform to front
office
inform house
keeping
[ no ]
clean room
Is everything ok!
[ no ]
service
completed
[ yes ]
checkout
process
completed
paid bill is entered in
to the database
check the
details
[ yes ]
all rooms
[ no occupied?
]
KOT forwarded
amount is paid
by customer
room is alloted
place order
order processed
and billing is done
[ yes ]
[ yes ]
modification
needed?
inventory
16
checkout
final bill is
generated
guest pays the
bill
house keeping
services
inventory
if available?
[ yes ]
[ no ]
outward
generation
purchase order
generated
[ no ]
sent to front
office
check stock
availability?
[ yes ]
outward
complete
17
user login
front office
is it is online?
[ yes ]
[ no ]
[ no ]
administrator
login
valid
password?
[ yes ]
check for
options
[ yes ]
is this a valid
password?
[ yes ]
is cancellation
needed?
[ no ]
no. of days<3
[ no ]
cancellation
is done
[ yes ]
cancellation
not accepted
[ yes ]
check
availability?
[ no ]
85% of payment
is returned
all the required modifications are
done and database is updated
database is
updated
process is
completed
modifications are
not accepted
18
[ yes ]
[ yes ]
[ no ]
online
reservation?
frontoffice
new user?
[ no ]
administrator
login
user login
registration
process
[ no ]
validate
[ yes ]
[ no ]
[ yes ]
advance
reservation? [ no ]
validate
[ yes ]
changes room
type
[ no ]
room enquiry
check
availability
[ yes ]
[ yes ]
room is
available?
room available?
[ no ]
[ yes ]
changes the
room type
guest details
are entered
[ no ]
change room
type
Room is booked on
required dates
logout
process
completed
process is
completed
room is not
alloted
[ no ]
[ no ]
19
20
: Database
1: Start interface
2: Log in
4: login successful
5: opname( )
21
: Guest
: Receptionist : Administrator
Cancellation successful :
Administrator interface
1: Strat interface
: Database
2: Log in
3: Verify password
4: login successful
22
: Guest
: Receptionist
: Administrator
: Front-Desk interface
: Database
1: Start interface
2: Log in
5: Room enquiry
23
: HouseKeeping
Executive
: Administrator
: Administrator interface
: Database
1: Start interface
2: Log in
4: Login successful
9: Bill is generated
24
25
: HouseKeeping
Executive
: Administrator
: Administrator interface
: Database
1: Start interface
2: Login
4: Login successful
26
: Guest
: Administrator
: User interface
: Database
1: Start interface
2: Log in
3: Verify password
4: Login successful
9: Modification successful
27
: Guest
: HouseKeeping
Executive
: Receptionist
: Admin
: Registration form
1: start interface
: Manager
: Database
2: open registration
3: issue form
4: fill form
5: submission of form
6: check details
7: allot manager id
8: forward id
9: enters details
17: forward id
24: forward id
31: forward id
28
: Guest
: Receptionist
: Administrator
: Reservationform
: Database
4: Login successful
5: Request fro room occupancy details
6: Submit the details
29
: Guest
: Receptionist
: Administrator : Restaurant
manager
1: Start interface
2: log in
3: verify password
4: Login successful
6: Check availability
7: Allot table
8: Place order
9: Order processed
30
: Guest
: Receptionist
: HouseKeeping
Executive
: Restaurant : Administrator
manager
: Administrator interface
: Database
1: start Interface
2: Login
3: Check password
4: Login successful
8: Bill generated
31
: Manager
: Administrator
: Administrator interface
: Database
1: Start interface
2: Login
3: Checks password
4: Login successful
32
Messages shown as text and an arrow that points from the client to the supplier
Purpose:
1. Collaboration diagrams are very useful for drawing class diagrams.
2. These diagrams give the interactions between the classes and objects.
3. To find the operations of the classes.
4. Using command we can draw sequence diagram directly from the collaboration
diagrams.
Differences between Sequence and Collaboration Diagrams:
1. Sequence diagrams are time oriented where as collaboration diagrams shows the
static connections among the objects.
2. Sequence diagram is very easy to read where as collaboration diagram is some
what complex to read.
33
1: Start interface
4: login succes...
5: opnam...
2: Log in
entry successful : Administrator
13: Request for all hotel bill details
interface
: Receptionist
3: Verify password
2: Log in
4: login succes...
: Database
Cancellation successful :
Administrator interface
1: Strat interface
: Administrator
34
8: Check in
10: Submit the details
15: Check out
18: Pay the bill
: Guest
2: Log in
5: Room enquiry
: Receptionist
4: Login succes...
: Administrator
1: Start interface
6: Requset for required details
: Front-Desk interface
: Database
2: Log in
: HouseKeeping
Executive
: Administrator
4: Login successful
5: Request for room status
10: Enter the bill details
1: Start interface
: Administrator interface
: Database
35
2: Login
: Administrator
4: Login succes...
: HouseKeeping
Executive
5: Request for inventory details
10: Enter the bill details
1: Start interface
: Database
: Administrator interface
: Database
9: Modification succes...
15: Successful cancella...
4: Login successful
12: Advance payment is returned
: Guest
2: Log in
5: Request for modification
10: Request for cancellation
: Administrator
1: Start interface
: User interface
36
: Receptionist
29: fill form
: Guest
6: check details
7: allot manager id
15: check details
16: allot receptionist id
22: check details
23: allot house keeping id
28: check details
30: allot guest id
2: open registration
5: submission of form
8: forward id
: Admin
9: enters details
32: enters details
1: start interface
21: submission of form
3: issue form
18: open registration
: Manager
: Registration form
: HouseKeeping
Executive
37
: Administrator
22: Request for the room details
32: Enter the guest details
19: Log in
28: Submit the form
2: Log-in
5: Request fro room occupancy details
7: Request for reservation
10: Submit the form,
14: Give the creditcard details
4: Login successful
6: Submit the details
13: Ask the advance
16: Room is reserved
: Reservationform
: Guest
38
6: Check availability
9: Order processed
10: Bill is generated
: Guest
: Administrator interface
3: verify password
7: Allot table
8: Place order
11: Forward the bill
1: Start interface
: Restaurant manager
4: Login succes...
2: log in
: Database
: Administrator
22: Request for the room details
32: Enter the guest details
19: Log in
28: Submit the form
2: Log-in
5: Request fro room occupancy details
7: Request for reservation
10: Submit the form,
14: Give the creditcard details
4: Login successful
6: Submit the details
13: Ask the advance
16: Room is reserved
: Reservationform
: Guest
39
: Guest
: Receptionist
: HouseKeeping
Executive
4: Login succes...
3: Check password
11: Update the details
18: Update the details
23: Update the details
: Restaurant manager
1: start Interface
: Administrator
: Administrator interface
: Database
3: Checks password
2: Login
: Manager
4: Login succes...
: Administrator
1: Start interface
: Database
40
addres
s
name
Status
Dept
Date
Room
no
Ref no
nnono.
Guest
Amount
Room service
Requ
est
Reservation
Make
s
Ref no
todate
room no
Pays
room type
advance
Payment
Room no
fromdat
e
Payment
mode
Total due
Bill no
Paid amount
Payment date
Table no
Quantit
y
Item
name
Vender
name
Item
name
Date
KOT no
Quantit
y
Date
PO no
Amount
Amoun
t
Purchase order
Restaurant
Year
Dept
Month
Amoun
t
Expenses
41
CHAPTER 3
SYSTEM REQUIREMENT SPECIFICATION
3.1 Purpose:
The purpose of the project is to automate the entire hotel management in an
effective way and to provide an option for room reservation through online.
3.2 Scope:
This system is used in the hotels, to manage the day to day activities i.e., check-in,
check-out, payment, billing, services provided, restaurant management, expenses,
reportsetc by using this computerized system.
Registration
2.
Reservation
3.
Cancellation
4.
Front desk
5.
Services
6.
Restaurant
7.
Billing
8.
House keeping
9.
Inventory
10.
Reports
42
Registration:
For a guest to reserve a room through online, he must be a registered user. This
feature helps the guest to get registered into the system. This feature also allows the
administrator to give roles i.e., manger, receptionist, house keeping executive and a user.
Reservation:
For a guest to reserve a room in the hotel, he can follow 2 procedures.
1) Online reservation:
This feature enables the guest to reserve a room through internet from anywhere in
the world. When the guest wants to use this feature, he has to select the room type, mention
the check-in and check-out details and must check for the availability. If the room required
is available during that period then he has to enter all the personal details that are required
and also has to pay certain amount with the help of credit card. The reference number of
the reservation is noted and the reservation is completed. If the room required is not
available then he has to choose another type of room based on his requirement.
2) Central reservation:
This feature enables the guest to book the room by coming directly to the reception
for either the advance reservation or to check-in the hotel at that point of time. The details
of the guest are entered into the system by the receptionist. Based on the availability the
receptionist gives the room to the guest and marks the check-in time. The guest has to pay
certain amount in advance. After the reservation the vacant rooms based on the reserved
dates are updated in the database by default.
Cancellation:
This feature enables the guest to cancel the room reservation which is done either
by the online process or by coming directly to the reception. When the cancellation is
done, certain percentage of the advance money which is paid by the guest during the
reservation is returned to the guest. After the cancellation the vacant rooms based on the
reserved dates are updated in the database by default
43
Front Desk:
When the guest comes to the hotel for stay, he has to say the receptionist his
reference number and the receptionist gives the room and marks the check- in time. This
feature enables the receptionist to look after the check-in, check-out, payment details,
occupancy summary, guest information, expected departures for that day, search guests,
view the status of rooms and to change the status i.e., vacant, occupied, dirty and blocked.
Services:
This feature enables the receptionist to provide the services requested by the guest.
Receptionist attends the guest call and forwards the requests to the respective departments
and enters the details of the services provided to keep the bills up-to-date.
Restaurant:
This feature enables the receptionist to keep the KOT bills and also the room
service bills up-to-date in the system.
Billing:
After the stay period of the guest, in the check-out process he has to pay the money
due at the reception. This feature shows all the payment details.
This feature enables the receptionist to keep the details of the administration
expenses up-to-date. This includes the staff salaries, electricity bill, telephone bill,
maintenance bill etc.
House Keeping:
This feature enables the house keeping executive to manage the house keeping
activities i.e., scheduling the timings for house keeping services, billing the house keeping
activities.
44
Inventory:
This feature enables the house keeping executive to look after the inventory
management i.e., to maintain the list of articles taken from the stores such as soaps, cloth
materialsetc that are required for maintenance of the hotel.
Reports:
This feature enables the manager to know all the reports regarding the hotel and its
management, its maintenance, expenses and room occupancy details.
The main roles involved in this system are :
1. Manager
2. Receptionist
3. House keeping executive
4. Guest
5. Administrator
Manager:
A hotel manager is responsible for the day-to-day management of a hotel and its
staff and has commercial accountability for planning, organizing and directing all hotel
services, including front-of-house (reception, concierge, and reservation), banqueting and
housekeeping. He plays a major role in financial management i.e., preparing budgets and
marketing strategies and achieving targets for the business
Receptionist:
Hotel receptionist is responsible in dealing with room bookings and cancellations
and handling general requests made by guests during their stay. His main duties are dealing
with reservations and cancellations by phone, e-mail, letter, fax or face-to-face; checking
guests into the hotel, allocating rooms and handing out keys; checking guests out of the
45
hotel, preparing bills and taking payments; answering questions about facilities in the
hotel and the surrounding area dealing with complaints or problems.
House keeping executive:
A house-keeping executive is responsible in scheduling the house keeping activities
i.e., cleaning, laundry, room service etc. He is also responsible for inventory
management i.e., to purchase the order, checking the stock availabilityetc.
Guest:
A guest can reserve the rooms on online or can come to the hotel reception to
reserve the rooms. Guests can make special requests which are to be carried out during
their stay and trigger notifications for hotel staff to complete the tasks. During the checkout process, he has to settle the payments.
Administrator:
Administrator assigns the roles to the users, manager, receptionist and house
keeping executive and registers them to the system
46
SP
SDK 2.0
(service pack)
Windows NT4.6
Windows 2000
Windows XP
Windows 2003
Front End
IIS
(Internet Information Services)
Back End
Client Details:
Any web browser to compatible to run front-end programs.
Hardware Requirements:
Processor
: P3+ or AMD
: 256 MB or 512 SD
: min 10 GB
Monitor
: VGA (Color)
Keyboard
: 105 Standards
Mouse
47
CHAPTER 4
SYSTEM DESIGN
4.1 SYSTEM DESIGN
4.1.1 Object oriented design
The UML language is for
Visualizing
Specifying
Constructing
Documenting
These are the artifacts of a software-intensive system.
A conceptual model of the UML:
The three major elements of UML are
The UMLs basic building blocks
The rule that dictate how those building blocks may be
put together.
Some common mechanisms that apply throughout the UML.
Basic building blocks of the UML
The vocabulary of UML encompasses three kinds of building blocks:
Things
Relationships
Diagrams
Thing are the abstractions that are first-class citizens in a model.
Relationships tie these things together, Diagrams group the interesting
collection of things.
Things in UML
There are four kinds of things in the UML
1.
2.
3.
4.
Structural things,
Behavioral things,
Grouping things,
Annotational things.
These are things are the basic object oriented building blocks of
48
Class diagrams
Describe the static structure of the system: Objects, Attributes, and
Associations.
49
Object diagrams
Shows set of objects and their relationships. These are static snap
shots of instances of the things found in the class diagram.
Component diagrams
Shows set of components and their relationships.
Deployment diagrams
Shows a set of nodes and their relationships
Collaboration diagrams
Focuses on the structural organization of objects that send and received
messages.
State chart diagrams
Describe the dynamic behavior of an individual object as a finite state machine.
Class diagrams are used
During requirements analysis to model problem domain concepts,
During system design to model subsystems and interfaces,
During object design to model classes.
Purpose
Name and model concepts in the system
Specify logical database schemas
Represent the structure of the system.
A class represents a concept and encapsulates state (attributes) and
behavior (operations).
50
guest
name
address
fromdate
todate
phoneno
email
username
password
restaurant manager
username
password
billno
username
password
bill generated()
process the request()
forward the request()
1..n
1..n
1..n
Administrator
username
password
1..n
receptionist
username
password
process is generated()
bill is requested()
request for food service()
request for cleaning()
request for other services()
forward the bill()
login successful()
check in()
check out()
submit details()
prepares the final bill()
1..n
Open registration()
login()
verify password()
Submission the form()
Check the details()
Allot the manager id()
Open registration()
Submission the form()
Check the details()
Allot the Housekeeping id()
allot receptionist id()
allot guest id()
request for modification()
request for cancellation()
1
administrator interface
start interface()
login()
room enquiry()
Registration form
name
address
phoneno
email
username
password
start interface()
Interfaces
user interface
Manager
start interface()
username
password
Issue the form()
Fill the form()
Forward id()
frontdesk interface
start interface()
Reservation form
start interface()
51
VB
C++
C#
JSCRIPT
WINDOW FORMS
J#
52
Data Type
Varchar(50)
Varchar(50)
Varchar(50)
Constraints
Primary key
Not null
Not null
Column Name
Username
Password
Dob
Email
Address
Phone
Secques
Secans
Data type
Varchar(50)
Varchar(50)
Varchar(50)
Varchar(50)
Varchar(MAX)
Varchar(50)
Varchar(50)
Varchar(50)
Constraints
Primary key
Not null
Not null
Not null
Not null
Not null
Not null
Not null
Data Type
Varchar(50)
Varchar(50)
Varchar(50)
Float
Varchar(50)
Constraints
Primary key
Not null
Not null
Not null
Not null
53
Column Name
Refno
Name
Address
Phone
Mobile
Email
Camefrom
Goingto
Adults
Child
Data type
Constraints
Int
Varchar(50)
Varchar(MAX)
Varchar(50)
Varchar(50)
Varchar(50)
Varchar(50)
Varchar(50)
Int
Int
Primary key
Not null
Not null
Not null
Not null
Not null
Not null
Not null
Not null
Not null
Data Type
Constraints
Column Name
Refno
Roomno
Roomtype
Fromdate
Todate
Username
Int
Varchar(50)
Varchar(50)
Varchar(50)
Varchar(50)
Varchar(50)
Primary key
Not null
Not null
Not null
Not null
Not null
54
Column Name
Roomno
Bno
Refno
Name
Paymentdate
Paymentmode
Paymodedetails
Paidamount
Totaldue
Data type
Varchar(50)
Int
Int
Varchar(50)
Varchar(50)
Varchar(50)
Varchar(MAX)
Float
Float
Constraints
Not null
Primary key
Not null
Not null
Not null
Not null
Not null
Not null
Not null
Column Name
Month
Year
Dept
Amount
Data Type
Varchar(50)
Varchar(50)
Varchar(50)
Float
Constraints
Primary key
Primary key
Primary key
Not null
55
Column Name
Roomno
Dept
Service
Servicestatus
Date
Amount
Data Type
Varchar(50)
Varchar(50)
Varchar(50)
Varchar(50)
Varchar(50)
Float
Constraints
Not null
Not null
Not null
Not null
Not null
Not null
Column Name
Roomno
Description
Cleanstatus
Date
Time
Data Type
Varchar(50)
Varchar(50)
Varchar(50)
Varchar(50)
Varchar(50)
Constraints
Not null
Not null
Not null
Not null
Not null
Column Name
Kotno
Date
Tableno
Item
Quantity
Amount
Data Type
Varchar(50)
Varchar(50)
Varchar(50)
Varchar(50)
Int
Float
Constraints
Primary key
Not null
Not null
Not null
Not null
Not null
Column Name
Pono
Itemname
vendername
Quantity
Date
Data type
Varchar(50)
Varchar(50)
Varchar(50)
Varchar(50)
Varchar(50)
Constraints
Primary key
Not null
Not null
Not null
Not null
56
Amount
Float
Not null
57
CHAPTER 5
AN OVERVIEW OF .NET
5.1 Overview of .Net:
.Net is the combining of smaller technologies into a singular unit. Introduced in
July 10 2000 officially by Microsoft company that is why this is also called as . Net is the
Microsoft technology. Up to now there are four versions of the. Net technologies is 1.0in
the 2003 supports up to 13 languages, then 1.1in the 2003 supports up to 17 languages,
then 2.0in the 2006 supports up to 23 languages, then finally now which are running in the
market is 3.0 supports more than 40 languages. That fourth version is also called as
ORCAS.
.Net supporting languages:
Visual Basic. Net
Visual C#. Net
Visual J#. Net
Visual COBOL. Net
These are four common languages which are mostly used by the visual studio.Net, this
visual studio. Net (VS. Net) is the integrated development environment (IDE). That is Tool
through which these 40+ languages are to be run as front end.
5.1.1 Type of applications using .Net:
Windows application
Console application
Web application
Mobile application
Crystal reports
Control libraries
58
Windows application:
This is the application which are applies in the run time and design time, this
application are used in the designing of forms in the new projects these windows
application can be used by any Vs. Net supporting languages.
Console application:
This is also one of the application which are applies in the dos prompt and run time
application are used in the designing of forms in the new projects these windows
application can be used by any Vs. Net supporting languages.
Code window is available with <name.vb>for Vb. Net and <name.cs>for c#. Net
Web application:
This is also one of the application which are applies in the runtime and design time,
this application are used in the designing of web forms or Web pages in the new websites
these web application can be used by any Vs. Net supporting languages.
Crystal reports:
This is also one of the application which are applies in the creating of tabular
column. Generally this crystal reports are ignored by Vs. Net. These applications are used
in the generating of the tabular column in the new projects these windows application can
be used by any Vs. Net supporting languages.
Control libraries:
This is also one of the application which are applies in the creating of assemblies.
That is the combination of one or more .dll and .exe files. These applications are used in
the assemblies in the new projects these windows application can be used by any Vs. Net
supporting languages. The assemblies having two types are as single file assemblies and
multi files assemblies.
5.1.2 VB. Net Advantages:
Not case sensitive.
Faster in execution while compare to other .Net languages.
It has migrated.
The future is newly adopted technology from the existing Vb 6.0
59
60
Root name space: - System .windows. Form developing for the windows application.
61
Reflection:
The process of reading the metadata of information is called as reflection. Metadata
is an open standard environment.
Tool box:
It is GUI container that contains all the needed development controls like textbox
(input of the data), button (to rise on event), label (Description), link etc.
Solution explorer:
It is GUI container that shows the various forms or webwofms or list of various
items that are used in the project.
Link label:
It is similar to label but with an under linking format (blue color).We cant execute
label in the runtime where link can be execute in the runtime. It is used for hyper linking
62
interface to the. Net. but it has some disadvantages that can only opened the defined
location by the users.
ADO. Net:
ADO .NET Stands for activeX data object.
Dataset is an in-memory content of the Ado. Net and is disconnected architecture of
Ado. Net.
The connection between back end (database) and front end (dataset) is called as
data adaptor. In back end creates a table with table name and column and required data
types.
Main database used in. Net
Oracle
Sql server
Ms access
To established connection in Sql.
[Sql Connection cn = New Sql Connection (connection string);]
As
User id= sivaji;
Password=rvrjc;
Database=mdf;
Server=.;
To established connection in oracle
[Oracle Connection cn = New Oracle (connection string);]
As
User id= sivaji;
Password=rvrjc;
Database=mdf;
Server=.;
Command object:
Syntax
[Sql Command<obj> = New Sql Command (Sql Statements, cn)]
63
64
5.3 ASSEMBLY:
Logical collection of one or more .exe and .dll files is called as assembly and the
compile source code of. Net architecture. There are two types of assemblies are categories.
Single assemblies and,
Multi file assemblies.
.EXE: Self execution files and not reusable.
.DLL: Not self execution files and reusable.
Assemblies of single file Content:
1. Manifest- metadata of assembly
2. Type metadata-data about assembly class
3. Msil-microsoft integrated language
4. Resource- external resource.
Microsoft integrated language is divided into four parts according to the versions:
Version 6.0 major
Version 3.0 minor
Version 0.0 build
Version 1.0 revision
Assemblies of multi file Content:
1. Manifest- metadata of assembly
2. Type metadata-data about assembly class
3. Msil-microsoft integrated language
These are myassembly.dll
1. Metadata
2. Msil-microsoft integrated language
Before Microsoft intermediate language (MSIL) can be executed, it must be
converted by a .NET Framework just-in-time (JIT) compiler to native code, which is CPUspecific code that runs on the same computer architecture as the JIT compiler.
Rather than using time and memory to convert all the MSIL in a portable executable
(PE) file to native code, it converts the MSIL as it is needed during execution and stores
the resulting native code so that it is accessible for subsequent calls.
65
66
we want to compare a specific control with an other control we need set the
ControlToCompare property to specify the ControlToCompare with.
Range Validator:
Range Validators are used to test if the value of a control is inside a specificied
range of values.The three property of this control are the ControlToValidate property,
which contains the control of validate and maximum and minimum values which hold the
maximum and minimum values of the valid range.
Regular Expression Validator:
Regular Expression Validators are used to check if the value in a control matches a
pattern defined by the regular expression. Notable property for this control is the Validation
Expression property, which allow us to select a predefined expression which we want to
match with the data enter in a control.
Custom Validator:
Custom Validator are used to our own Validation for the data in a control. For
example, you can check the value entered by a user is even or odd, with this control which
is not possible with any of the above mentions validation controls. You write the script for
the validation for JavaScript or vbscript and associate that script function to the
ClientValidationFunction property of this control.
67
CHAPTER 6
SCREEN DESIGN/GRAPHICAL USER INTERFACE
The system uses a very user-friendly interface developed using extended markup
language (XML) and hyper text markup language (HTML). Which most users are
acquitted with and is broadly used on the World Wide Web (WWW). The controls are
placed on the forms in an easily accessible manner so that user strain is minimized to the
maximum extent.
Whenever a user enters any from the system also states the action to be performed
is an easily understandable and pleasant speech. The navigation of the user from one area
of the system to another is very easy using easy to access and properly placed hyperlinks
which user can access on the click of a button.
The system also posses a unique format for each type of employee; this ensures that
employee is presented with options he has access to. This ensures a great deal of security
to the system and to the organization as an employee is not given an option to carryout
unauthorized activity.
68
HOME PAGE:
69
LOGIN PAGE:
70
71
72
REGISTRATION PAGE:
73
74
75
76
77
78
79
80
81
82
83
84
CHECK-IN PAGE:
85
PAYMENT PAGE:
86
CHECK-OUT PAGE:
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
CHAPTER 7
TESTING
7.1 Testing Concepts for Web Applications:
Testing is the process of exercising software with the intent of finding
(and ultimately correcting) errors. In fact, because Web-based systems and applications
reside on a network and interoperate with many different operating systems and
applications reside on a network and interoperate with many different operating systems,
browsers (or other interface devices as PDAs or mobile phones), hardware platforms,
communications protocols, and backroom applications, the search for errors represents a
significant challenge.
7.1.1 Dimensions of Quality:
Quality is incorporated into a web application as a consequence of
good design. It is evaluated by applying a series of technical reviews that assess various
elements of the design model and by applying a testing process. Both reviews and testing
examine one or more of the following quality dimensions.
Content
Function
Structure
Usability
Navigability
Performance
Compatibility
Interoperability
Security
102
The interface model is reviewed to ensure that all use-cases can be accommodated.
The design model for the WebApp is reviewed to uncover navigation errors.
103
The WebApp is tested by a controlled and monitored population of end users; the
results of their interaction with the system are evaluated for content and navigation
errors, usability concerns, compatibility concerns, and WebApp reliability and
performance.
104
Content testing
Interface testing
Navigation testing
User
Interface
design
Component testing
Aesthetic design
Content design
Configuration
testing
Navigation design
Architecture design
Component design
Performance
testing
Security
testing
Technology
105
Is the layout of the content object easy for the user to understand?
Have proper references been provided for all information derived from other
sources?
Does the content contain internal links that supplement existing content? Are the
links correct?
Does the aesthetic style of the content conflict with the aesthetic style of the
interface?
106
107
requirements and to other elements of the analysis model. During design, the interface
model reviewed to ensure that generic quality criteria established for all user interfaces
have been achieved and that application-specific interface design issues have been properly
addressed. During testing, the following shifts to the execution of application-specific
aspects of user interactions as they are manifested by interface syntax and semantics. In
addition, testing provides final assessment usability.
7.4.1 Interface Testing Strategy:
Interface features like colors, frames, images, borders, tables, and related elements
that are generated as WebApp execution proceeds, are tested to ensure the design
rules.
Each interface mechanism is tested within the context of a use case for a specific
user category.
108
6. Browser auto-fill features do not lead to data input errors. In our system, the
Arrival date and Departure date are initially none, no default date is provided there,
if tourist did not select those fields an error message will be displayed.
7. The tab key (or some other key) initiates proper movement between form fields. In
our system, in the reservation and booking forms, initially we have 3 text boxes and
they are placed into the form in different order then we faced a problem there, the
fields are first name, then email id and then address like that, they are looking in
that format in the form but while designing the form we placed textbox2 for the
address textbox, if we pressed tab after name filed it would go to the address
textbox without going to the email textbox. We have resolved the problem by
placing the textbox2 against email.
Pop-up windows: A series of tests ensure that
Scroll bars and other control mechanisms appended to the pop-up work, are
properly located, and function as required.
109
Fail:
Test Case# : 2
Priority(H,L): High
Test Objective: Correct Registration
Test Description: Username is checked
Requirements Verified: Username is checked in the database
Test Environment: Internet Explorer
Test setup or Pre-conditions: User initiates any control mechanism like Submit button.
Actions
Expected Results
If the username already exists
A
message
Username
already
exists.Enter another name and try again
is displayed.
If the username is valid
Pass: Yes
PrP Problems or issues: Nil
110
Test Case# : 3
Priority(H,L): High
Test Objective: To let the user enter all the required fields
Test Description: All the necessary fields are checked
Requirements Verified: All the necessary fields should be entered
Test Environment: Internet Explorer
Test setup or Pre-conditions: User initiates any control mechanism like Submit or Go
buttons
Actions
Expected Results
Conditional Pass:
Fail:
111
Test Case# : 4
Priority(H,L): High
Test Objective: Correct logins
Test Description: Username and password are checked
Requirements Verified: Username and password are checked in the database
Test Environment: Internet Explorer
Test setup or Pre-conditions: User initiates any control mechanism like Submit or Go buttons
Actions
Incorrect login
Expected Results
A message Invalid username / password will be
displayed and allows the user to reenter the information.
Check and his account is opened which consists of the
Correct Login
Pass: Yes
Test Case# : 5
Conditional Pass:
Test Objective: To let the guest enter the arrival and departure dates only after the present
date.
Test Description: Arrival and departure dates are tested
Requirements Verified: Those dates should be after the present date.
Test Environment: Internet Explorer
Test setup or Pre-conditions: User should enter some thing
Actions
Expected Results
Arrival and departure dates are before the A message Invalid entry of dates is
present date.
displayed.
Correct Dates
Pass: Yes
PrP Problems or issues: Nil
Fail:
Test Case# : 6
Priority(H,L): High
Test Objective: User is allowed to cancel or modify his own booking details
Test Description: Accessing permissions
Requirements Verified: Login username must be verified
Test Environment: Internet Explorer
Test setup or Pre-conditions: If user tries to cancel the reservation made by another
user
Actions
If correct username
Expected Results
Guest is allowed to access those pages
If incorrect username
112
Pass: Yes
PrP Problems or issues: Nil
Conditional Pass:
Fail:
113
Test Case# : 7
Priority(H,L): High
Test Objective: Correct Check-in to the hotel
Test Description: Reference number is checked
Requirements Verified: Reference number, arrival date, departure date, check-in date and
the room number are verified from the database.
Test Environment: Internet Explorer
Test setup or Pre-conditions: If receptionist enters the incorrect reference number
Actions
Expected Results
If the reference number is not confirmed A message Invalid reference number is
after the payment.
displayed.
If the check-in date is after the departure A message Check-in is not accepted as
date given during reservation
If the check-in date is before the arrival date A message Check-in is not accepted as
given during reservation
If everything is correct
message
Check-in
successfully
Test Case# : 8
Priority(H,L): High
Test Objective: Correct Check-out from the hotel
Test Description: Room number is checked
Requirements Verified: Room number and the payment details are verified from the
114
database.
Test Environment: Internet Explorer
Test setup or Pre-conditions: If receptionist enters the incorrect room number
Actions
Expected Results
If the room number is not checked-in
A message Invalid Room number is
displayed.
If the Payment is not made by the guest.
If everything is correct
message
Check-Out
successfully
Pass: Yes
PrP Problems or issues: Nil
Minimum value
1 character
6 characters
Present date
Maximum Value
30characters
30characters
-
Departure Date
Telephone number
10
14
To ensure that the mechanisms that allow the WebApp user to travel through the
WebApp are all functional and
To validate that each navigation semantic unit can be achieved by the appropriate
user category.
115
Navigation links: Internal links within the WebApp, external links to other WebApps and
anchors within a specific Web page should be tested to ensure that proper content or
functionality is reached when the link is chosen.
Redirects: these links come into play when a user requests a nonexistent URL or selects a
link whose destination has been changed. We have tested this by accessing the incorrect
internal links and the test is completed successfully.
Sitemaps: Entries should be tested to ensure that the link takes the user to the proper
content or functionality.
7.7 Configuration Testing: this attempt to uncover errors that are specific to a
particular client or server environment. A cross-reference matrix that defines all probable
operating systems, browsers, hardware platforms, and communication protocols is created.
Tests are then conducted to uncover errors associated with each possible configuration.
7.9 Performance Testing: It encompasses a series of tests that are designed to assess
(1) How the WebApp response time and reliability are affected by increased user traffic,
(2) Which WebApp components are responsible for performance degradation and what
usage characteristics cause degradation to occur, and (3) how performance degradation
impacts overall WebApp objectives and requirements.
116
CHAPTER 8
MAINTENANCE
Corrective maintenance
This acts to correct errors that are uncovered after the software is in use.
Adaptive maintenance
This is applied when changes is the external environment precipitate modifications
to software.
Preventive maintenance
This improves future maintainability and reliability and provides basis for future
enhancements.
117
CHAPTER 9
CONCLUSION
The existing system is a manual system. It involves paper work in the form of
maintaining various files and manuals. Maintaining critical information in the files and
manuals is full of risk and a tedious process. A positive solution to ease the burden is
Automation of Hotel Management.
The existing automated system is a stand alone system or a LAN based system and
booking is in the form of email.
This project reduces the manual work and minimizes time spent for administration.
Cyber Hotelier is developed to increase the performance of the existing system and is
beneficial for the organization as it provides an option of reserving rooms through online.
The system has fulfilled all the requirements outlined in the problem definition.
The system is secured because it provides restricted access to various user types by
user authentication. Various trend reports would facilitate the process of decision-making.
This system has been tested using all possible test data that can work in any conditions.
118
CHAPTER 10
FUTURE ENHANCEMENTS
119
CHAPTER 11
REFERENCES
Ali Bahrami (2003),Object Oriented Analysis and Design using UML, 2nd
Edition Tata McGraw-Hill.
http://www.asp.net/
http://www.lifecyclestep.com/open/410.0Analysis.htm
http://www.hotelmanagementsystem.co.in/
http://www.download.com/Hotel-Management-System/3000-2078_410803780.html