Hostel Managment System Report

download Hostel Managment System Report

of 40

Transcript of Hostel Managment System Report

  • 8/18/2019 Hostel Managment System Report

    1/40

    Acknowledgement

    I wish to express my heartiest gratitude to Mr. rupinder singh for his proper guidance,

    constant encouragement, constructive suggestions, thought provoking decisions and

    giving me full opportunity to practically handle the system without whose supervision

    this could not be possible.

    I pay deep regards to other employees of MIMT,Morinda who helped me in seeking the

    practical knowledge and expertise in my work.

    I also take the privilege to pay my deepest appreciation and heartiest thanks to

    Ms.Rupinder Kaur whose constant guidance is unbounded source of inspiration for me

    and invaluable expert suggestions at crucial unctures set my thinking on right track.

    !ame" #reeti $hardwa

    Roll !o%

    M&' III year

    (emester )I

  • 8/18/2019 Hostel Managment System Report

    2/40

    PREFACE

    *uring my M&' #rogramme, I oined MIMT,Morinda as a student in Ist (emester. My

    assignment could be defined as development of +Hotel Management System”. 

    Through this system it was proposed to computerie the various processes and

    procedures involved in the railway system.

    I used the interface provided by )$ .!et - as the front end and Microsoft 'ccess //0

    as a back end in this proect compilation.

    This report briefly describes the systematic approach adopted to develop the system by

    efficiently using the latest facilities. The report follows the se1uential actions of the

    different phases in the system development life cycle.

  • 8/18/2019 Hostel Managment System Report

    3/40

     

    About

    The

    Proect

    !"TR#$%CT!#""%

  • 8/18/2019 Hostel Managment System Report

    4/40

    Hotel management system

    2otel management system is a software application for the administration,

    documentation, tracking, and provide facilities to customers and different

    departments of hotel.

    2otel Management (ystem range from systems for managing user needs and

    department needs,  to software for distributing information about the hotel

    management system

    Character&st&cs

    2M(s cater to administrative, and deployment re1uirements. 3hile an 2M( for 

    corporate learning, for example, may share many characteristics with a )24, or 

    virtual 2otel environment, used by 2otels, they each meet uni1ue needs. The

    virtual 2otel environment used by people, allow instructors to manage their 

    duties regarding 2otel department and exchange information with other 2otels

    that in most cases will last several weeks and will meet several times during

    those weeks.

      The characteristics of 2M(s include"

      Manage users, roles, instructors, facilities, and generate reports

      2otel instructions

      'llocating rooms

      #ayment &ollection

      'ssessment and testing handling before and after testing

      *isplay status of rooms

    &haracteristics more specific to corporate organiation, which sometimes

    includes franchisees or other business partners.

     'uto enrollment

     Integration with performance tracking and management systems

     #lanning tools to identify skill gaps at departmental and individual level

  • 8/18/2019 Hostel Managment System Report

    5/40

    Techn&cal as'ects

    2M(s are based on a )$.!4T and usually employ the use of a database as back%end.

    (ome systems are commercially developed and have non%free software licenses or restrict access to their source code, other systems are free and open%source and

    fre1uently used. 5ther than the most simple, basic functionality, 2M(s cater to, and

    focus on, different administrative, and deployment re1uirements.

    $ES!(" #F S#)%T!#"

    *+T!ER ARCH!TECT%RE

    6%Tier architecture is a very well know bu word in the world of software development

    whether it web based or desktop based. In this article I am going to show how to design

    a web application based on 6%tier architecture.

    !ntroduct&on

    6%Tier architecture generally contains 7I or #resentation 8ayer, $usiness 'ccess 8ayer 

    9$'8: or $usiness 8ogic 8ayer and *ata 'ccess 8ayer 9*'8:.

    Presentat&on )ayer ,%!-

    #resentation layer cotains pages like .aspx or windows form where data is presented to

    the user or input is taken from the user.

    us&ness Access )ayer ,A)- or us&ness )og&c )ayer

    $'8 contains business logic, validations or calculations related with the data, if needed.

    I will call it $usiness 'ccess 8ayer in my demo.

    $ata Access )ayer ,$A)-

    *'8 contains methods that helps business layer to connect the data and perform

    re1uired action, might be returning data or manipulating data 9insert, update, delete etc:.

    ;or this demo application, I have taken a very simple example. I am assuming that I

  • 8/18/2019 Hostel Managment System Report

    6/40

  • 8/18/2019 Hostel Managment System Report

    7/40

    #bect&/e o0 Proect

    - 4asy to store information and fast accessing of information.

    - 'de1uate reporting to each division.

    -  'ccurate and timely control program.

    - To make it easy for fast processing and modification.

    - 4asy retrieval of information

    Pro0&le o0 the 'roblem1+

    5ne must know what the problem is before it can be solved. The basis for a system is

    recognition of a need for improving an information system. This leads to a preliminary

    survey or an initial investigation to determine whether an alternative system can solve

    the problem.

    The idea for change originate in the environment or from within the firm. 4nvironment

    based ideas originate from the customers, vendors, govt. sources, company employees,

    and the like.

    Ideas for the change may also come from within the organiation%top management, the

    user, and the analyst. 's an organiation changes its operations or face advances in

    computer technology, someone within the organiation may feel the need to update

    existing applications.

    Ad/antages o0 com'uter&2ed system1+

    In computeried system the data is stored on external storage 9hard disk:

    which eliminates the use of paper files.

    The computer can retrieve and change data far faster than a human can.

    This computeried system provides accurate, up%to%date information on

    demand at any time.

  • 8/18/2019 Hostel Managment System Report

    8/40

     

    Problem

    Analys&s

  • 8/18/2019 Hostel Managment System Report

    9/40

    System Analys&s1 +

    (ystem 'nalysis is the application of the system approach to the study and solution of 

    the problems using computer%based system. 'n activity encompasses most of the tasks

    collectively called as =&omputer (ystem 4ngineering>.

     'nalysis is a detailed study of the various operation performed by a system and their 

    relationship within and outside of the system. This involves gathering information and

    using structured tool for analysis such as *;* 9data flow diagram:, *ecision Tree

    ,4R*94ntity Relationship *iagram: etc.

    *uring analysis data are collected on the available files, decision points and

    transactions handled by the present system. The fact finding and information gatheringfor proposed system is the key part of system analysis. Information is gathered from

    sources both internal and external to the organiation. The external sources include

    vendors, supplier professional ournals and other similar systems. The primary internal

    sources include the system users, system documentation existing programs, and

    reports.

     'nalysis is the process of diagnosing situations, done with a defiant aim, with the

    system kept in mind to produce a report based on the findings. 'nalysis is a fact of 

    finding techni1ue where studies like the system re1uirement specifications< boundaries

    of feasibility analysis and cost benefit analysis are carried out. The re1uirements of both

    the system and the software are document and reviewed with the user.

    Manual database has the 0ollow&ng l&m&tat&ons1

    ?: #aper work is very bulky and has no symmetry.

    : *ata retrieval is very slow and sometimes very tough.

    6: It is very laborious.

    @: (etting up 1ueries is difficult and slow process.

    A: It is not easy to get decision support data.

    -: 3hen database grows in sie, it becomes unmanageable.

    0: It doesnBt support strongly the features like security and constraints.

  • 8/18/2019 Hostel Managment System Report

    10/40

    C: 4xisting system is not reliable and user friendly.

    3- 4ven if a single register is lost, it creates a big problem.  

    #bect&/es o0 'ro'osed system

    ;ollowing are some of the obectives, which I have considered in the proposed system"

    ?. The database should be totally exhaustive and redundancy should be avoided.

    . The system should be totally divided into modules, so that anyone can change

    according to the re1uirement. The system has to be flexible enough to

    accommodate a lot many changes.

    6. 4asy handling of information for employees.

    @. !ew system is totally centralied due to the use of database administrator 9*$':.

    A. 8ong waiting 1ueues can be shortened.

    -. The new systemBs performance depends upon the security i.e. in this system,

    security and privacy are given utmost importance during the development of 

    system.

  • 8/18/2019 Hostel Managment System Report

    11/40

     

    Feas&b&l&ty

    Study

  • 8/18/2019 Hostel Managment System Report

    12/40

    Feas&b&l&ty Study1+

    The feasibility study must be done before actually going on to the preparation of the

    system. ;easibility of the system concerns with the constraints of the systems which

    are as follows"

    Econom&c Feas&b&l&ty1+The above feasibility study deals with the actual cost

    to be incurred on the proect. The concern for which the proect is to be made

    is able to bear the charges and is financial sound enough to make the system

    viable. The financial resources are checked and they are kept as a base to

    the making of the system. Thus this feasibility is reduced and is under control

    and we can go in for the proect.

    Techn&cal Feas&b&l&ty1+This feasibility deals with the technical know how of 

    the people who are going to work on the system. !ormally there are always

    chances of the strong opposition for the computeriation, because people are

    not interested in accepting the changes in their work culture so easily and

    moreover they resist also. $ut in the concern, the people are having very

    proper technical know and how and they are ready to accept the future

    changes of their working. (o if a person making manual transactions is ready

    to accept the changes within the proposed system, then this feasibility is also

    covered.

     

  • 8/18/2019 Hostel Managment System Report

    13/40

    HAR$4ARE5

    S#FT4ARERE6%!REME"TS

  • 8/18/2019 Hostel Managment System Report

    14/40

    Hardware Re7u&rements1+

    The system will run on a Microsoft 3indows D# with 6 bit R'M. The following are the

    minimum re1uirement of the #&.

    #& #entiumE&eleron, 666 M2F

    A?M$ R'M

    ?G$ 2**

    Keyboard

    Mouse

    So0tware Re7u&rements1+

    ?. 5perating (ystem" 3indows D#E3indow )ista

    . 'pplication (oftwareBs" )isual (tudio.!et //C, (H8 (erver //A

  • 8/18/2019 Hostel Managment System Report

    15/40

    Tools

    AndTechnolog&es

    %sed

  • 8/18/2019 Hostel Managment System Report

    16/40

    RE6%!REME"TS F#R $E8E)#PME"T1+

    T##)S 5 TECH"#)#(!ES T# E %SE$"

    Front+End1

    8 ."ET

    )$.!4T is a webE3indow application framework developed and marketed by Microsoft

    to allow programmers to build dynamic web sites, webE3indows applications and web

    services. It was first released in anuary // with version ?./ of the .!4T ;ramework,

    is built on the &ommon 8anguage Runtime  9&8R:, allowing programmers to write

    )$.!4T code using any supported .!4T languages.

    ack+End1

    Relat&onal $atabase Management System ,R$MS-

     ' R*$M( is a *atabase (ystem that is used to store and manage data. (ince all good

    software at some point handle data given by users a R*$M( nowadays has become a

    re1uirement for software%development. ;or this #roect M( '&&4(( //0 is used.

    http://en.wikipedia.org/wiki/Web_application_frameworkhttp://en.wikipedia.org/wiki/Microsofthttp://en.wikipedia.org/wiki/Programmerhttp://en.wikipedia.org/wiki/Web_sitehttp://en.wikipedia.org/wiki/Web_applicationhttp://en.wikipedia.org/wiki/Web_servicehttp://en.wikipedia.org/wiki/Web_servicehttp://en.wikipedia.org/wiki/.NET_Frameworkhttp://en.wikipedia.org/wiki/Common_Language_Runtimehttp://en.wikipedia.org/wiki/.NET_Languageshttp://en.wikipedia.org/wiki/Web_application_frameworkhttp://en.wikipedia.org/wiki/Microsofthttp://en.wikipedia.org/wiki/Programmerhttp://en.wikipedia.org/wiki/Web_sitehttp://en.wikipedia.org/wiki/Web_applicationhttp://en.wikipedia.org/wiki/Web_servicehttp://en.wikipedia.org/wiki/Web_servicehttp://en.wikipedia.org/wiki/.NET_Frameworkhttp://en.wikipedia.org/wiki/Common_Language_Runtimehttp://en.wikipedia.org/wiki/.NET_Languages

  • 8/18/2019 Hostel Managment System Report

    17/40

    ."ET Framework1+

    .!4T framework is a set of classes, libraries, functions, reusable code to develop

    applications for windows and web platform with the help of any language.

    C)R ,Common )anguages Runt&me-1+

    &8R is a common language runtime environment that provides the necessary

    infrastructure to work with an application. It acts as a resource manager which

    will manage your code for its smooth execution.

    CTS ,Common Ty'e System-1+

    &T( is one of the important system which provides interoperability between two

    languages.

     

    C)S ,Common )anguage S'ec&0&cat&on-1+

    &8( are going to be one of the base area which uses a minimum set of standard

    for any language to work with .!4T.

    ase class )&brary1+

    The ase Class )&brary 9C): is a standard library available to all languages

    using the .!4T ;ramework. .!4T includes the $&8 in order to encapsulate a

    large number of common functions, such as file reading and writing, graphic

    rendering, database interaction, and DM8 document manipulation, which makes

    the programmerJs ob easier. It is much larger in scope than standard libraries for 

    most other languages, including &, and would be comparable in scope to

    http://en.wikipedia.org/wiki/Standard_libraryhttp://en.wikipedia.org/wiki/.NET_Frameworkhttp://en.wikipedia.org/wiki/Databasehttp://en.wikipedia.org/wiki/XMLhttp://en.wikipedia.org/wiki/XMLhttp://en.wikipedia.org/wiki/C%2B%2Bhttp://en.wikipedia.org/wiki/C%2B%2Bhttp://en.wikipedia.org/wiki/Standard_libraryhttp://en.wikipedia.org/wiki/.NET_Frameworkhttp://en.wikipedia.org/wiki/Databasehttp://en.wikipedia.org/wiki/XMLhttp://en.wikipedia.org/wiki/C%2B%2B

  • 8/18/2019 Hostel Managment System Report

    18/40

    the standard libraries of ava. The $&8 is sometimes incorrectly referred to as

    the ;ramework &lass 8ibrary 9;&8:, which is a superset including the Microsoft.L

    namespaces.

     ack End ,MS Access 9::;-1+

    !ntroduct&on to M&croso0t Access 9::;

    Microsoft 'ccess //0 is a full%featured relational database management system

    9R*$M(: that offers a variety of administrative tools to ease the burdens of database

    development, maintenance and administration.

    4nterprise Manager is the main administrative console for 'ccess installations. It

    provides you with a graphical +birds%eye+ view of all of the 'ccess installations on your 

    network. ou can perform high%level administrative functions that affect one or more

    servers, schedule common maintenance tasks or create and modify the structure of 

    individual databases.

    Huery 'nalyer offers a 1uick and dirty method for performing 1ueries against any of 

    your 'ccess databases. ItJs a great way to 1uickly pull information out of a database in

    response to a user re1uest, test 1ueries before implementing them in other applications,

    createEmodify stored procedures and execute administrative tasks.

     'ccess #rofiler provides a window into the inner workings of your database. ou can

    monitor many different event types and observe database performance in real time.

     'ccess #rofiler allows you to capture and replay system +traces+ that log various

    activities. ItJs a great tool for optimiing databases with performance issues or 

    troubleshooting particular problems.

    *ata Transformation (ervices 9*T(: provide an extremely flexible method for importing

    and exporting data between a Microsoft 'ccess and a large variety of other formats.

    The most commonly used *T( application is the +Import and 4xport *ata+ wiard found

    http://en.wikipedia.org/wiki/Java_Class_Libraryhttp://en.wikipedia.org/wiki/Framework_Class_Libraryhttp://en.wikipedia.org/wiki/Java_Class_Libraryhttp://en.wikipedia.org/wiki/Framework_Class_Library

  • 8/18/2019 Hostel Managment System Report

    19/40

    E+R $&agrams

    E+R $&agrams1+

    The 4ntity relationship model allows the representation of explicit constraints as well as

    relationship in the diagrammatically form. It is basically useful in the design and

    communication of the logical model.

    In this model, obects of similar structure are collected in the similar set represented by

    a rectangle. The attributes which are shown as oval are connected to the entities by

    lines which are labeled. The relationship among the entities is represented by diamond

    box.

    The relationship among entity set is represented by mapping one entity set to another 

    which can be either ?"? 9one to one:, ?"M 9one to many:, M" ? 9many to one:.

    The type of relationship existing between the entities is represented by giving the

    cardinality of the relationship on the line oining the relationship to the entities.

     

  • 8/18/2019 Hostel Managment System Report

    20/40

    *atabase

    *esign

  • 8/18/2019 Hostel Managment System Report

    21/40

    Structures o0 $ata ase1+

     The various attributes of the tables that serve as the storehouse for the data that are

    used for various processing and report generation are defined. The tables are designed

    in 'ccess and are as listed below"

    $atabase $es&gn 0or ackend1

    - $atabase "ame1 ra&lway

    ook&ng Table

    F&eld "ame F&eld Ty'e Constra&nt

    &ustNno !umber #rimary Key

    &ustNname Text

    &ustN'ddress Text

    &ustNphone Text

    &ustNroomno !umber  

    &heckNindate *atetime

    &ustNidproof Text

  • 8/18/2019 Hostel Managment System Report

    22/40

  • 8/18/2019 Hostel Managment System Report

    23/40

    )og&n

    F&eld "ame F&eld Ty'e Constra&nt

    7name Text primary Key, foreign Key9register9username::

    #wd Text

    Rooms

    F&eld "ame F&eld Ty'e Constra&nt

    Room!o !umber #rimary Key

    (tatus esE!o

    Type Text

  • 8/18/2019 Hostel Managment System Report

    24/40

     

    TEST!

    "(

  • 8/18/2019 Hostel Managment System Report

    25/40

    Test&ng1+

    Testing is the maor 1uality control measure used during software development. The

    basic function of testing is to detect errors in the software. 'fter the coding phase,

    computer programs are available that can be executed for testing purposes. Testing not

    only has to uncover errors included during coding, but also errors introduced during the

    previous phases. The goal of the testing is to uncover re1uirement, design and coding

    errors in the programs. Moreover, all validations are also checked in the testing stage.

    3e perform the proper testing of each module

    Through running the proect at !IIT

    "EE$ F#R TEST!"("%

    Testing is vital to the success of the system. Testing makes a logical assumption that if 

    all parts of the system are correct, the goal will be successfully achieved. Inade1uate

    testing or non%testing may leads to errors. ' small system error can conceivably explode

    into a much larger problem. (econd reason for testing is its utility as a user%oriented

    vehicle before implementation.

    ;inally testing leads to software reliability. Identifying and removing faults during testing

    can make the software more reliable. This increases userBs confidence in the system.

    *uring the #roect *evelopment entitles

  • 8/18/2019 Hostel Managment System Report

    26/40

    • 'cceptance Testing

     

    %n&t Test&ng1 

    The first level of testing is unit testing. In unit testing, a module is tested separately and

    is often performed by the coder himself simultaneously along with the coding of the

    module. The purpose is to exercise the different parts of the module code to detect

    coding errors. 7nit testing is essential for verification of the code produced during the

    coding phase and hence the goal is to test the internal logic of the modules. (o, during

    the development of the +'irtel Telecom 5perator ,Sales 5 $&str&but&on Management

    System-+ we tested each ;orm to check whether it generates correct output as re1uired

    by inputting different values.

    !ntegrat&on Test&ng1

    The next level of testing is often called Integration Testing. 'fter unit testing, the

    modules are gradually integrated into subsystems, which are then integrated to

    eventually form the entire system.

    *uring integration of modules, integration testing is performed to detect design errors by

    focusing on testing the interconnection between modules. This activity can beconsidered as testing the design, and hence the emphasis on testing module

    interactions.

    System Test&ng1

    The next level of testing is (ystem Testing. 'fter the system is put together, (ystem

    testing is performed. In system testing, the system is tested against the system

    re1uirements to see if all the re1uirements are met and if the system performs as

    specified by the re1uirements. This is essentially a validation exercise.

    Acce'tance Test&ng1 

    The last level of testing is the 'cceptance Testing. 'cceptance testing is performed to

    demonstrate to the client, on the real life data of the client, the operation of the system.

    Testing here focuses on the external behavior of the system.

  • 8/18/2019 Hostel Managment System Report

    27/40

     

    SE)ECT!#" #F TEST CASES

    ;or Testing to be successful, proper selection of test cases is essential. There are two

    different approaches to select cases%;unctional Testing and (tructural Testing.

    In Funct&onal Test&ng, the software or the module to be tested is treated as a $lack

    $ox and the test cases are decided based on the specifications of the system or the

    module. ;or this reason, this type of testing is also called =$8'&K $5D T4(TI!G =. The

    focus here is on testing the external behavior of the system.

    In Structural Test&ng, the test cases are decided based on the logic of the module to

    be tested. ' common approach here is to achieve some type of coverage of the

    statements in the code. 5ne common coverage criteria is statement coverage, which

    re1uires that test cases be selected so that together they execute each statement

    exactly once.

    TEST P)A"1 

    Testing is an extremely critical and a time consuming activity. It re1uires proper planning

    of the overall testing process. Testing process starts with a test plan. The test plan

    specifies conditions that should be tested, different units to be tested and the manner in

    which the modules will be integrated together.

    In this proect, we will perform two type of testing"

    • %n&t Test&ng1 Testing based on branch coverage criteria will be used. 3e

    tested each form with a number of values.

    • System Test&ng1 It is largely functional in nature. The focus is on the valid

    and invalid cases. 3e examined the behavior of the (oftware entitled 'irtel

    Telecom 5perator with the invalid set of values.

  • 8/18/2019 Hostel Managment System Report

    28/40

    )#(!" PA(E

    MA!" PA(E

  • 8/18/2019 Hostel Managment System Report

    29/40

    (eneral $escr&'t&on

  • 8/18/2019 Hostel Managment System Report

    30/40

  • 8/18/2019 Hostel Managment System Report

    31/40

    PA>ME"T PA(E

  • 8/18/2019 Hostel Managment System Report

    32/40

    Ma&n Page )&nks

  • 8/18/2019 Hostel Managment System Report

    33/40

    R##M STAT%S PA(E

  • 8/18/2019 Hostel Managment System Report

    34/40

  • 8/18/2019 Hostel Managment System Report

    35/40

  • 8/18/2019 Hostel Managment System Report

    36/40

    !MP)EME"TAT!#"

    !m'lementat&on1+

    The Implementation process for newly designed information system, involves variety of 

    ac1uisition, testing, documentation, installation and conversion activities. It also involves

    the training of end users in the operation and use of the new information system. Thus,

  • 8/18/2019 Hostel Managment System Report

    37/40

    implementation is a vital step in ensuring the success of new systems. 4ven a well%

    designed system can fail if it is not properly implemented.

      To' 0&/e reasons 0or success1

    • 7ser involvement

    • 4xecutive management support

    • &lear statement of re1uirements

    • Realistic expectations

    • #roper planning

      Post+!m'lementat&on Re/&ew &n/ol/es two subtasks1

    • E/aluate thee o'erat&onal system O *oes it fulfill the goals and obectives set

    outP *oes it ade1uately support transaction processing, management

    reportingP 2ow do end users feel about the systemP (hould there be any

    enhancementsP 3hen should they be implementedP

    • E/aluate the system de/elo'ment 'rocesses  O did system costs match

    budgeted amountsP 3as system completed on timeP 3hat was the

    performance of each individual on the proectP 3hat problems did we

    encounterP

  • 8/18/2019 Hostel Managment System Report

    38/40

    MA!"TE"A"CE

    Ma&ntenance1+

    5nce the (oftware is launched, it enters the maintenance phase. 'll systems need

    maintenance. Maintenance is re1uired because there are often some residual errors

  • 8/18/2019 Hostel Managment System Report

    39/40

    remaining in the system that must be removed as they are discovered. Maintenance

    involves understanding the effects of the change, making the changes to both the code

    and the documents, testing the new parts and retesting the old parts that were not

    changed. Maintenance is mainly of two types"

    • &orrective Maintenance

    •  'daptive Maintenance

     

    Correct&/e Ma&ntenance1

     'lmost all software that is developed has residual errors or bugs in them. Many of these

    surfaces only after the system have been in operation, sometimes for a long time.These errors once discovered need to be removed, leading to the software to be

    changed. This is called &orrective Maintenance.

    Ada't&/e Ma&ntenance1

    4ven without bugs, software fre1uently undergoes change. The software often must be

    upgraded and enhanced to include more features and provide more services. This

    re1uires modification of the software. This type of maintenance is known as the

     'daptive Maintenance

  • 8/18/2019 Hostel Managment System Report

    40/40