Cyber networking hotel
Post on 08-Oct-2015
2 Views
Preview:
DESCRIPTION
Transcript
Presentation on MiniprojectCyber Hotelier
Mahaveer Institute of Science & Technology L. RajaSekhar K. Mahesh Kumar 07E35A1201 06E31A1218 IT IV Year IT IV Year.
Cyber Hotelier Introduction Past Decades Semi-automated System Proposed System Requirements Design Snapshots Conclusion.
Introduction
A literature survey is carried out in the initial phase of the project. The basic process is divided into two steps.
1. Understanding the Existing system. 2. Features of proposed system.
Cyber Hotelier Introduction Past Decades Semi-automated System Proposed System Requirements Design Snapshots Conclusion.
Past Decades There existed only manual system. Manual system involves paper work in the form of maintaining various files and manuals. Reservation, Billing, Cancellation, Maintenance is a Manual process and a lot of risk involved.
Cyber Hotelier Introduction Past Decades Semi-automated System Proposed System Requirements Design Snapshots Conclusion.
Next Semi-automatedSemi-automated system is a stand alone system or a LAN based system Booking is in the form of e-mail. Email contains the requested booking dates and the number of rooms required, along with the customer contact details.
Disadvantages of Manual ProcessTime consuming.
No instantaneous updates of i. room status. ii. user details. Communication was not clear. risk of loosing it easily.
Authentication and authorization.
No validations.
Disadvantages of Semi-automated Sys.
Reservation through email.
Room amendment is not an easy task.
Cyber Hotelier Introduction Past Decades Semi-automated System Proposed System Requirements Design Snapshots Conclusion.
Proposed SystemSome system is required to know about the hotel information and can reserve rooms throughout the globe irrespective of the location.
Cyber Hotelier is a web-based system focusing on automating the hotel management system and providing room reservations through online.
Project ModelOur project follows Waterfall Model.
It is divided into 6 phases. 1. Requirements phase. 2. Analysis phase. 3. Design phase. 4. Coding phase. 5. Testing phase. 6. Deployment phase.
Cyber Hotelier Introduction Past Decades Semi-automated System Proposed System Requirements Design Snapshots Conclusion.
Requirements customer perspective:Registration. Reservation: Online and Central.Cancellation.Services.Restaurant.Billing.
Software Requirements OS ServicePack Windows NT4.6 6 Windows 2000 4 Windows XP 2 Windows 2003 1
Microsoft visual studio 2005.
Front End (ASP. Net with c# language) Back End SQL server 2000
Hardware Requirements
Processor : P3+ or AMDPrimary Memory (RAM) : 256 MB or 512 SDSecondary Memory (Hard Disk) : min 10 GBMonitor : VGA (Color)Keyboard : 105 StandardsMouse : Any Compatible
Cyber Hotelier Introduction Past Decades Semi-automated System Proposed System Requirements Design Snapshots Conclusion.
DesignObject oriented design
The UML language is forVisualizingSpecifyingConstructingDocumenting.
Class Diagram
Use case Diagram
ER DIAGRAM
Cyber Hotelier Introduction Past Decades Semi-automated System Proposed System Requirements Design Snapshots Conclusion.
Home page:
Login page:
Registration page:
User Login page:
Room Reservation page:
Room Reservation page: (contd)
Receptionist Login page:
Guests Information page:
Receptionist Login page:
House Keeping Executive Login Page:
Manager Login page:
Admin Registration page:
5.4. DATA BASE DESIGNS
5.4.2 Registered Users Table:
5.4.1 Login Details Table:
Column NameData TypeConstraintsUsernameVarchar(50)Primary keyPasswordVarchar(50)Not nullRolesVarchar(50)Not null
Column NameData typeConstraintsUsernameVarchar(50)Primary keyPasswordVarchar(50)Not nullDobVarchar(50)Not nullEmailVarchar(50)Not nullAddressVarchar(MAX)Not nullPhoneVarchar(50)Not nullSecquesVarchar(50)Not null
5.4.3 Room Details Table: 5.4.4 Guest Information Table:
Column NameData TypeConstraintsRoomnoVarchar(50)Primary keyFloorVarchar(50)Not nullRoomtypeVarchar(50)Not nullChargeFloatNot nullStatusVarchar(50)Not null
Column NameData typeConstraintsRefnoIntPrimary keyNameVarchar(50)Not nullAddressVarchar(MAX)Not nullPhoneVarchar(50)Not nullMobileVarchar(50)Not nullEmailVarchar(50)Not nullCamefromVarchar(50)Not nullGoingtoVarchar(50)Not nullAdultsIntNot nullChildIntNot null
Cyber Hotelier Introduction Past Decades Semi-automated System Proposed System Requirements Design Snapshots Conclusion.
ConclusionReduces the manual work & minimizes time.The system is secured as it provides restricted access to various user types by authentication. We expect in future to implement this system in wireless Communication.Ex: In Mobiles.
-----Queries??
*
top related