Professional Documents
Culture Documents
Project Documents1.soni
Project Documents1.soni
CPU Pentium IV
RAM 256 MB
HDD 20 GB
PACKAGE MS-Word
2
3
TABLE OF CONTENTS
Chapter 1
Introduction
Project of objective
Chapter 2
Software Background
Study of window 7
About VB
Why SQL server
Chapter 3
Problem Analysis
Software requirement
System planning
Project estimation
Project Risk Analysis
Chapter 4
4
System Designing
Chapter 5
Implementation
Source code
Testing
Installation
Chapter 6
System Analysis
Feasibility study
Methodology Adopted
Detail Hardware and software
Chapter 7
Database security
Application security
Transaction security
System security
Conclusion
Bibliography
5
6
INTRODUCTION
Hotel needs to maintain the record of guests and rooms beforehand. Customers should be able to
know the availability of the rooms on a particular date. They should be able to reserve the available
rooms according to their need in advance. To make their stay comfortable, they are provided with
food other services.
The record of the food taken by each customer and the services availed by the customer should be
kept.
These records help in generating bill.
7
Chapter 1
Introduction
Project of objective
8
Objective of Project:-
Today every work is going to computerized. Manpower is used with computer system
to increase the efficiency and reliability of the work .it also provides a lot of time to do
that work with friendliness. This project are the major advantage of manage the agency
certain objective. The main objective of the project “Hotel Automation” on the
Computerization will have a great effect on the proper use of resource, thus
Contributing to the agency standard and to solve the complication that occur
This reduces the extra cost and efforts that are spend while performing all the
Tasks manually.
Chapter 2
Software Background
Study of window 7
Why vb.net
Study of window 7
Windows 7 is an operating system, that provides the high level of security because security in
windows 7 is assigned on a per user rather then per recourse basis, a user need to remember only
single windows 7 user account name and password log on and use local and network resources. With
windows 7 security, all resources and actions are protected by discretionary access control, means
that some users can be permitted access to resources or perform an action while other user can be
prevented form accessing the same resource or action security is very flexible for example-different
permission for different users. User can be set on different files in a directory. Windows 7 security
applies both to users working at the computer where the resource is located and to user accessing the
For windows 7, the basic unit of security and administration is realized in the domain name. A
domain name is a collection of computer that recognized a common security account database. Four
Servers.
Workstations.
Each domain has one PDC, which maintains the security account database for the
Domain. A domain can have any number of BDCs. Each BDCs receives a copy of domain security
accounts database and assists the PDC by sharing the load of authentication.
11
WHY VB.NET
Taken directly from VB .NET home, VB .NET , "VB .NET is an HTML-embedded scripting
language. Much of its syntax is borrowed from C, Java and Perl with a couple of unique
VB .NET -specific features thrown in. The goal of the language is to allow web developers to
write dynamically generated pages quickly."
This is generally a good definition of VB .NET . However, it does contain a lot of terms you
may not be used to. Another way to think of VB.NET is a powerful, behind the scenes
scripting language that your visitors won't see!
When someone visits your VB .NET webpage, your web server processes the VB .NET code. It
then sees which parts it needs to show to visitors (content and pictures) and hides the other
stuff(file operations, math calculations, etc.) then translates your VB.NET into HTML. After
the translation into HTML, it sends the webpage to your visitor's web browser.
It is also helpful to think of VB.NET in terms of what it can do for you. VB.NET will allow you
to:
Reduce the time to create large websites.
Create customized user experience for visitors based on information that you have gathered
from them.
Open up thousands of possibilities for online tools. Check out VB .NET - Hot Scripts for
examples of the great things that are possible with VB .NET .
Allow creation of shopping carts for e-commerce websites.
VB.NET 's syntax and semantics are similar to most other programming languages (C, Java,
Perl) with the addition that all VB .NET code is contained with a tag, of sorts.
12
customer order or maintaining bike information in Agency. If your database is not stored on a
computer or only part of it are we may be tracking information from a variety of sources that we
have to coordinate and organize yourself .Using Microsoft SQL-Server, we can manage all our
information from a single database file. Within the file, divide our data into separate storage
containers called table, view and update table data using offline forms, and retrieve just the data we
want using quires and analyze or print the data in a specific layout using report.
1. To store our data create one table for each type of information we track. To
bring the from multiple tables together I a query, form or report, we define the
2. To find the retrieve just the data that meets conditions we specify, including
data from multiple tables, create a query. A query can also update or delete
single records at the one time, and perform built-in or custom calculations on
Chapter 3
Problem Analysis:-
Software requirement
System planning
Project estimation
During our analysis of the project, we referred various books and manuals and conduct questionnaire
with various administrators. The job of system administrator involves the maintains the new entry
broker who are wanted to do testing, getting detail knowledge ofthe testing own Bikes, searching
Bike Information who was tested, searching about testing , and also done the modify any test and bike
or staff information and so on . This task is usually entrusted to a single person, the system
administrator, also known as the super user. He has vest powers, having access to practically
everything.
15
System planning
Scheduling of a software project does not differ greatly from System administrator in window 7 is not
quite demanding and requires form the administrator an in depth knowledge of the different
components. The above stated task of a system administration is considered as routine duties of an
administrator. But system problem can be quite grave and unexpected By identify the system
which makes it a cumbersome job. We identified a need of “graphical tool for the task of system
administration as its menu and screens will guide him through the whole process.” scheduling of any
multitask engineering effort. Therefore, generalized project scheduling tool and techniques can be
applied with little modification to software projects. Program evaluation and review Technique (PERT)
and critical path method (CPM) are two project scheduling method that can be applied to software
development. Both techniques are driven by information already development in project planning
activities:
Estimates of Effort
Decomposition of tasks
16
Project Estimation:-
The project size is another important factor for the project estimation that can affect
accuracy and efficacy of estimations. As size increase, the interdependency among
various elements of the software grown rapidly.
Risk Analysis:-
Risk analysis and management are a series of steps that help a software team to
understand and manage uncertainty. Many problems can infect a software project. A
risk is a potential problem-it might happen it might not. But regardless of the outcome,
it’s a really good idea of identify it, assess its probability of occurrence, estimate its
impact, and establish a possibility plan should the problem actually occur.
For Risk analysis firstly recognizing what can go wrong that is called “risk Identification
“.Next, each risk is analyzed to determine the probability that it will occur and the
damage that will do if it does occur. Once this information is established, risks are
ranked, by probability and impact. Finally a plan is developed to manage those risks with
Chapter 4
System Designing
0-LEVEL DFD
Input Output
Process
Database
19
Mdi
Registration
Information
Out
Detail
Log Out
20
21
Customer Detail
Customer Id
Check In Date
Room No.
Room Type
Status
Detail
Rate
Total Room
Amount Service Tax
Total
Amount
Check Out Bill Payment
Check Out
Date
Check In
Date
Room Type
Check In
Date Customer Id
Check Out
No. Of Days
22
Employee Id Name
Father Name
Address
Country
Employee Registration
Gender
DOB
Employee
Education Type
Joining Date
23
24
Login form
25
MDI FORM
26
EMPLOYEE REGISTRATION
27
CHECK IN
28
ROOM INFORMATION
29
BILL
31
CHEK IN DETAIL
32
EMPLOYEE REGISTRATION
34
CHECK IN
35
ROOM INFORMATION
36
CHECK OUT
37
BILL
38
login
End Sub
39
MDI
End Sub
Form3.Show()
End Sub
End Sub
EMPLOYEE RAJISTRATION
Public Class emply
Dim con As New SqlClient.SqlConnection
Dim cmd As New SqlClient.SqlCommand
Dim dr As SqlClient.SqlDataReader
Dim da As New SqlClient.SqlDataAdapter
Dim ds As New DataSet
Dim s As String
Private Sub ListBox1_SelectedIndexChanged(ByVal sender As System.Object,
ByVal e As System.EventArgs)
End Sub
End Sub
End Sub
End Sub
If RadioButton1.Checked Then
s = RadioButton1.Text
End If
42
End Sub
End Sub
If RadioButton1.Checked Then
s = RadioButton1.Text
End If
If RadioButton2.Checked = True Then
s = RadioButton2.Text
End If
End Sub
End Sub
End Sub
End Sub
End Sub
dr.Read()
'TextBox1.Text = dr.Item("employee_id ")
TextBox2.Text = dr.Item("name")
TextBox3.Text = dr.Item("father_name")
TextBox4.Text = dr.Item("address")
TextBox5.Text = dr.Item("country")
TextBox6.Text = dr.Item("state")
TextBox7.Text = dr.Item("dob")
TextBox8.Text = dr.Item("emplyee_type")
TextBox9.Text = dr.Item("education")
TextBox10.Text = dr.Item("joining_date")
TextBox11.Text = dr.Item("age")
dr.Close()
MsgBox("record find")
End Sub
End Sub
End Sub
45
CHECK IN
Public Class Form6
Dim con As New SqlClient.SqlConnection
Dim cmd As New SqlClient.SqlCommand
Dim dr As SqlClient.SqlDataReader
Dim da As New SqlClient.SqlDataAdapter
Dim ds As New DataSet
Dim s As String
End Sub
End Sub
47
End Class
48
ROOM INFORMATION
End Sub
End Sub
dr = cmd.ExecuteReader()
dr.Read()
TextBox2.Text = dr.Item("room_type")
TextBox3.Text = dr.Item("status")
TextBox4.Text = dr.Item("rate")
dr.Close()
MsgBox("record find")
End Sub
End Sub
End Sub
End Sub
End Class
50
CHECK OUT
con.Open()
MsgBox("connection established")
End Sub
End Sub
End Sub
End Sub
BILL
Public Class Form7
Dim con As New SqlClient.SqlConnection
Dim cmd As New SqlClient.SqlCommand
Dim dr As SqlClient.SqlDataReader
Dim da As New SqlClient.SqlDataAdapter
Dim ds As New DataSet
Dim s As String
End Sub
TextBox9.Text = dr.Item("no_OF_child")
dr.Close()
MsgBox("record find")
End Sub
MsgBox("RECORD SAVED")
End Sub
CHECK IN DETAIL
Testing
Testing Techniques:-
The time dependent asynchronous nature of many real-time application adds anew and potential
difficult element of mix time. Not only does the test case designer have to consider white-box
testing black-box testing cases but also event handling (i.e. interrupt processing) the timing of the
data, and the parallelism of the tasks (process) that handle the data.
Comprehensive test case design methods for real-time system have yet to
Task Testing
Behavioral Testing
System Testing
Task Testing:-
The first step in the testing of real time software is to test each task
independently. That is white box testing and black box testing are designed and
executed for each task. Each task is executed independently during these tests.
Task testing uncovers error in logic and function but not timing or behavioral.
57
Behavioral Testing:-
Using system models created with CASE tools, it is possible to simulate the
external events. These analysis activities can serve as the basic for the design of
test case that is conducted when the real time software has been built. Using a
control signals) are categorized for testing. For example, events for the
(e.g., paper jammed), system interrupts (e.g., toner low), and failure mode (e.g.,
roller overhead). Each of these events tested individually and the behavioral of
of processing associated with these events. The behavior of system model and
communicate with one another are tested with different data rates and
that communicate via a message queue or data store are tested to uncover errors
System Testing:-
Software and hardware are integrated and a full range of the system test are
interface. Most real-time system process interrupts. The tester develops a list of
all possible interrupts and the processing that occurs as a consequence of the
interrupts. Tests are then designed to asses the following system characteristics:
requirements?
Function of performance?
59
1. White-Box Testing:-
It is also called glass box testing. It is a test case design method that uses the
control structure of the procedural design to derive test cases. In this all
statement in the program has been executed at least once during testing that all
logical conditions have been exercised. Using white box testing methods ,
Guarantee that all independent paths within a module have been exercised at least once.
Exercise all loops at their boundaries and within their operational bounds.
Basic path testing, a white box technique, makes use of program graphs to drive
the set of linearly independent tests that will insure coverage. Conditional and
data flow testing further exercise program logic, and loop testing complements
enables the software engineer to derive sets of input condition that will fully
exercise all functional requirements for a program. Black box Testing is not
The testing process which we have followed for our software is black box
testing. In this type of testing we test the software looking it as a black box
testing without considering the internal details. A required set of inputs are to
be supplied depending upon the software and we get our desired outputs.
In the testing phase of our software we have followed the approach where testing is done in step:-
First we have tested all the function individually by executing then with the
required inputs. If these functions are called by some other functions then it is
checked that the functions returning the correct value, then it is checked that
these objects are created in the desired format. We had to test the functions by
making changes in the code itself so that their returning value can be printed,
61
giving us the idea about their being correct. This is approach is time consuming
but the functionality of each and every function can be best tested using it. The
function is also tested for its syntax and if some syntactical errors was present
then it was also removed and the function was made correct this is called
testing.
Installation:-
To install the network management software on your computer network. Some follows the
instructions of step to step:-
Insert the setup CD in CD-Drive of a computer and double click the setup.
Feasibility:-
Feasibility of project can project can be explained in two terms below:
Technical Feasibility:-
Our project is technically feasible, as we have taken visual basic as our front end.
Economical Feasibility:-
62
1. Before creation of this project all the database and function were managed
manually by persons but after creation there is a need of just a single operator
2. Our project is quite affordable in term of using of any level and provides
complete functionality as desired.
Methodology Adopted
63
method and tool and generic phase. This strategy is often referred to as a
software engineering is chosen base on the nature of the project and application,
the methods and tools to used, and the controls and deliverables that are required.
which four distinct stages are encounters. Status quo “represents the current
technology, and the solution integration delivers the result those who requested
Technical
Status
Developments
Quo
Solution
Integration
There is a verity of different process model for software engineering. Each
important to remember that each of model of the models has been categories.
Some linear sequential some time called classic life cycle waterfall model. The
development that begins system at the level and progresses through analysis,
design, coding, testing and support. Below figure illustrate the linear sequential
model for the software engineering the linear sequential model encompasses
following activities:-
established requirement for all system element the allocating some subset of
these requirements to software. This system view essential when software must
interact with other element such as hardware, people and database. System
engineer must understand the information domain for the software as well as
Design
Software design is actually multi step process that focuses on four distinct
attribute of program; datastructre, software architecture, interface representation
representation of the software that can be accessed for quality before coding
begins.
o Coding:
o Testing:-
Once code has been generated program testing being. The testing process
focuses on the logical internals of the software, ensuring that all statements
have been tested and on functional externals; that is conducting tests to uncover
error and ensure that the defined input will produce the actual results that agree
o Supports :-
Software will under go change after it is delivered to the customer, change will
occur because error have been encountered, because the software must to
System / in
an unimaginable speed. The end user is concerned about security along with
manager must consider measures for marinating data and controlling secret at
all time. This involves built in hardware feature, programs procedures to protect
the sensitivity of the data, the reliability of the user, & the complexity of the
type wrong password and user name then he/she cannot enter inside the project,
if the users want to users want to use or run the project then he/she must enter
the correct user name and password. If the user type three times wrong
password and click three times enter then our project will close and he/she not
Transaction Security:-
In this project, several kinds of transaction securities have been provided such as: -
B. We can change the login and password code if we know user name and password.
Database security:-
The database security is most essential to avoid theft or leakage of confidential
68
data. A control must be kept over the issue of data file, so that possibilities of
destruction are minimized. Any person not open database. If he/she know
at time it is being established rather then being added later on. Security is like
sheet belt it does not guarantee there will be not accident. However, when
accident does occur it may be found too much cheaper, it may records. The
System security:-
Hardware security
Hardware security includes arrangement for detection of fire fighting
Software security:-
Software security may need striker control on person an access to the
processing center, the data file storage and the programs file. A copy of all
program May be file stored away from the computer installation as a security
measure.
69
Limitation:-
We invested lots of time & effort to develop present system but still few short
coming are their. Reason might be lack of time or lack of expertise a VB.net.
Bike Agency very vast & to development it completely within a six months
Any from which will directly close may loss database information.
CONCLUSION
I have tried my best to do each and every aspect of the “Hotel automation Information”.
I go to survey to the entire the hotel facility. This was a great activity which was performed
by me my project provides me really a grate thing which I have achieve in my study period.
71
BIBLIOGRAPHY
Visual Basic .net JEFFREY R.SHAPISO
College notes