Top Banner

of 50

Report of hotel management system

Feb 22, 2018

Download

Documents

Ashutosh Dubey
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
  • 7/24/2019 Report of hotel management system

    1/50

    Manage

    Group

    Of

    resorts

  • 7/24/2019 Report of hotel management system

    2/50

    ABSTRACTThe system aims at the maintenance and management of the different Hotels

    that are available in the different parts of the world. It mainly takes

    care of the Hotel management at the core area of the database. The

    system provides the information regarding the different Hotels that

    are available and their status specific to availability. The database

    also manages the atomic information regarding the different units

    that are available under one Hotel and the architectural details of the

    Unit facilities that are available. Each unit is well furnished and is well

    designed for the basic flexibility of the tourists who are expected to

    stay.

    The entire project has been develped keeping in view of the istributed client

    server computing technology in mind.The specification have been

    normali!ed upto "#$ to eliminate all the anomalies that may arise

    due to the database transactions that are executed by the actual

    administration and users.The user interfaces are browser specific to

    give distributed accessability for the overall system. The %ean

    components have been implemented for proper reusability and

    authenticity. The standards of security and date portative mechanism

    have been given a big choice for proper usage. The application takescare of different modules and their associated reports which re

    produced as per the applicable strategies and standards that are put

    forwarded by the administrative staff..

  • 7/24/2019 Report of hotel management system

    3/50

    introductionThe entire project has been develped keeping in view of the istributed client

    server computing technology in mind.The specification have been normali!ed

    upto "#$ to eliminate all the anomalies that may arise due to the database

    transactions that are executed by the actual administration and users.The

    total front end was dominated using HT&' standards applied with the

    dynamism of ()*) server pages. The communicating client was designed

    using servlets. )t all proper levels high care was taken to check that the

    system manages the date consistency with proper business validations.The

    database connectivity was planned using the (ava ata%ase +onnectivity,the

    authori!ation and authori!ation was cross checked at all stages.The user

    level accessabiity has been restricted into two !ones the administrative and

    the normal user !one.

  • 7/24/2019 Report of hotel management system

    4/50

    About the organisation ExistingProcess:

    Guest Visits any

    Nearest Hostel or

    Motel

    Raiser his

    Request at the

    Clerk for

    Accommoation

    Clerk !earches

    the require

    legers for

    a"aila#ility

    $f not A"aila#le

    $% a"aila#le &utthe info at the

    guest Vie'Guest may

    com&romise 'ith

    his requirment

    Guest Check therequire

    Parameters as&er his

    Con"enience

    Guest NotCom&romise

    $f Pro"ie &lanhis stay

    (ea"es fnAnother !ystem

  • 7/24/2019 Report of hotel management system

    5/50

    FeasibilityReport

    !ystem Analysis Concentration-

    ystem analysis is the process of collecting and interpreting facts, disposing

    problem and use the information about the existing system, which is also

    called as system study.

    ystem analysis is about understanding situation but not solving the

    problem.

    GENERA( RE)*$REMEN+!:

    The new system should be cost effective

    To improve productivity and service and service.

    To enhance user interface.

    To improve information presentation and durability.

    To upgrade systems reliability, availability and flexibility.

    To address human factors for better and uses acceptance.

    %easi#ility Re&ort

    +ECH$N$CA( %EA!$,$($+--

    Evaluating the technical feasibility is the trickiest part of a feasibility study.

    This is because, at this point in time, not too many detailed design of the

    system, making it difficult to access issues like performance, costs on /on

    account of the kind of technology to be deployed0 etc. ) number of issues

    have to be considered while doing a technicalanalysis.

  • 7/24/2019 Report of hotel management system

    6/50

    .PERA+$.NA( %EA!$,$($+--

    1roposed projects are beneficial only if they can be turned into information

    systems that will meet the organi!ations operating re2uirements. imply

    stated, this test of feasibility asks if the system will work when it is

    developed and installed. )re there major barriers to Implementation3 Here

    are 2uestions that will help test the operational feasibility of a project-

    Is there sufficient support for the project from management from users3 If

    the current system is well liked and used to the extent that persons will not

    be able to see reasons for change, there may be resistance.

    EC.N.M$C %EA!$,$($+--

    Economic feasibility attempts 4 weigh the costs of developing and

    implementing a new system, against the benefits that would accrue from

    having the new system in place. This feasibility study gives the top

    management the economic justification for the new system.

    a0 +echnical /escri&tion

    /ata#ases- The total number of databases that were identified to build the

    system is 56.The major part of the atabases is categori!ed as

    )dministrative components and the user components. The administrative

    components are useful in managing the actual master data that may7 be

    necessary to maintain the consistency of the system. The user components

    are designed to handle the transactional state that arise upon the system

    whenever the general client makes a visit onto the system for the sake of the

    report based information. The user components are scheduled to accept

    parametrical information for the user as per the systems necessity.

  • 7/24/2019 Report of hotel management system

    7/50

    G*$0s

    $or the flexibility of the user, the interface has been developed in graphical

    user interface mode. The normal interface is applied through browser.

    The 8UI9s at the top level has been categori!ed as-

    50 )dministrative user interface

    40 +ustomer or general user interface

    The administrative user interface concentrates on the consistent information

    that is practically, pact of the organi!ational activities and which needs

    proper authentication for the data collection. The interfaces help the visitorswith all the transactional states like ata insertion, ata deletion and ata

    updating with the data search capabilities.

    The general user interface helps the users upon the system in transactions

    through the re2uired services that are provided upon the system. The

    general user interface also helps the ordinary user is managing their own

    information in a customi!ed manner as per their flexibilities.

  • 7/24/2019 Report of hotel management system

    8/50

    Software Requirement

    Specication

    Require Har'are

    Pentium $V Processor1

    234 M, RAM1

    35G, Har /isk s&ace1

    Ethernet car 'ith an $nternet an $nternet

    6one1

    Require !oft'are

    7ino's 3555 Professional o&erating system1

    $nternet ex&lorer 815 an Netsca&e na"igator1.racle 4i1

    !er"lets 9!P

    +CP$P Protocol suite1

  • 7/24/2019 Report of hotel management system

    9/50

    Modules Description

    #umber of &odules-

    )ccommodation Information &odule

    Units Information &odule.

    %ookings Information &odule.

    8uests Information &odule.

    $acilities Information &odule.

    )++:&&:)TI:# I#$:;&)TI:#- This module maintains all the details of

    the )ccommodation location that are available and the units that are

    available under each location along with their reference unit types.

    U#IT I#$:;&)TI:#- This module maintains the information regarding all

    the units that are registered as per specifications and their reference unit

    types. The module also takes care of the system from the unit facilities andreference unit facilities that are available.

    %::

  • 7/24/2019 Report of hotel management system

    10/50

    This module helps in registering the reference unit facilities that may creep in

    into the system from time to time.

    #U&%E; :$ *IE=-

    )dministrative *iew

    8uest *iew

    Aministrati"e Vie'

    This view is designed for interacting with the absolute &eta ata, which

    becomes the ultimate repository to maintain the consistency.

    This view is accessible only to registered administrators who are recogni!ed

    by the =atershed evelopment central )dministration epartment.

    This &odule takes care of the responsibility of the major Table management

    for

    ata Insertion

    ata eletion

    ata Updating

    ata election

    )ll the activities are validated and authenticated to proper profile to avoid un

    authori!ed access.

    Guest Vie'- In this view the guest can view complete details of available

    accommodation list information.

  • 7/24/2019 Report of hotel management system

    11/50

    Analysis Report

    !.%+7ARE RE)*$REMEN+ !PEC$%$CA+$.N

    RE)*$REMEN+ !PEC$%$CA+$.N-

    $N+R./*C+$.N

    Pur&ose:The main purpose for preparing this document is to give a general

    insight into the analysis and re2uirements of the existing system or situation

    and for determining the operating characteristics of the system.

    !co&e:This ocument plays a vital role in the development life cycle /'+0

    as it describes the complete re2uirement of the system. It is meant for use

    by the developers and will be the basic during testing phase. )ny changes

    made to the re2uirements in the future will have to go through formal

    change approval process.

    /e"elo&ers Res&onsi#ilities ."er"ie':

    +he e"elo&er is res&onsi#le for:

    50 eveloping the system, which meets the ; and solving all the

    re2uirements of the system3

    40 emonstrating the system and installing the system at client>slocation after the acceptance testing is successful.

    "0 ubmitting the re2uired user manual describing the system

    interfaces to work on it and also the documents of the system.

    ?0 +onducting any user training that might be needed for using the

    system.

    @0 &aintaining the system for a period of one year after installation.

  • 7/24/2019 Report of hotel management system

    12/50

    %unctional Requirements:

    $n&uts:The major inputs for =eb %ased )ccommodation can be categori!ed

    moduleAwise. %asically all the information is managed by the software and in

    order to access the information one has to produce one>s identity by entering

    the userAid and password. Every user has their own domain of access beyond

    which the access is dynamically refrained rather denied.

    .ut&ut:The major outputs of the system are tables and reports. Tables are

    created dynamically to meet the re2uirements on demand. ;eports, as it is

    obvious, carry the gist of the whole information that flows across the

    institution. This application must be able to produce output at different

    modules for different inputs.

    /ocument Con"entions:

    The overall documents for this project use the recogni!ed modeling standards

    at the software industries level.

    E;A&odeling to concentrate on the relational states existing

    upon the system with respect to +ardinality.

    The 1hysical dispense, which state the overall data search for

    the relational key whereas a transactions is implemented on the

    wear entities.

    Unified modeling language concepts to give a generali!ed blue

    print for the overall system.

    The standards of flow charts at the re2uired states that are the

    functionality of the operations need more concentration.

  • 7/24/2019 Report of hotel management system

    13/50

    !co&e of +he /e"elo&ment Pro;ect:

    /ata#ase +ier: The concentration is applied by adopting the :racle Bi

    Enterprise versions. C' is taken as the standard 2uery language. The

    overall business rules are designed by using the power of 1'DC'

    components like stored procedures stored functions and database triggers.

    *ser +ier:The use interface is developed is a browses specific environment

    to have distributed architecture. The components are designed using HT&'

    standards and (ava server pages power the dynamic of the page design.

    /ata ,ase Connecti"ity +ier: The communication architecture is designed

    by concentrated on the standards of servlets and (19s. The database

    connectivity is established using the (ava atabase connectivity.

    Role .f .racle $n /ata#ase

    :;)+'E Bi is one of the many database services that plug into a client D

    server model. It works efficiently to manage resources, a database

    information, among the multiple clients re2uesting sending.

    !tructure )uery (anguage

    C' is an interAactive language used to 2uery the database and access datain database. C' has the following features-

    21 It is a unified language.

    31 It is a common language for relational database

    >1 It is a nonAprocedural language.

  • 7/24/2019 Report of hotel management system

    14/50

    $ntrouction +o .racle

    :;)+'E is a comprehensive operating environment that packs the power of a

    mainframe system into user microcomputer. It provides a set of functional

    programs that user can use as tools to build structures and perform tasks.%ecause application developed on oracle are completely portable to

    environment and then move it into a multi user platform.

    7hat is a Relational /ata#ase Management !ystem?

    ) relational database management system /;%&0 can perform a wide

    array of tasks. It acts as a transparent interface between the physical storage

    and a logical presentation of data. It provides a set of more or less flexible

    and sophisticates tools for handling information. User can use this tool to- Dene a database

    Query the database

    Add, edit and delete data

    Modify the structure of database

    Secure data from public access

    ommunicate !ithin the net!or"s

    #$port and %mport data

    %ecause it gives so much control over data, a relational %& can also save

    as the foundation for products that generate application and extract data.

    ) atabase &anagement system may be called fully relational if it supports-

    Relational Databases and

    A language that is at least as po!erful as the

    relational algebra

  • 7/24/2019 Report of hotel management system

    15/50

    +he .racle En"ironment

    .RAC(E is modular system that consists of the :;)+'E database and

    several functional programs. :;)+'E tools had four kinds of

    works-

    /ata#ase management

    /ata access an mani&ulations

    Programming

    Connecti"ity

    /ata#ase Management +ools

    This is usually /known as ;%& by :;)+'E0 includes the core programs of

    :racle9s database management system, the :;)+'E database with its

    associated tables and views, which are stored in the :racle9s data dictionary

    and a group of helpful activities.

    Client !er"er7hat is a Client !er"er

    Two prominent systems in existence are client server and file server systems.

    It is essential to distinguish between client servers and file server systems.

    %oth provide shared network access to data but the comparison dens thereF

    The file server simply provides a remote disk drive that can be accessed by

    ')# applications on a fileAbyAfile basis. The clientserver offers full relational

    database services such as C'A)ccess, ;ecord modifying, Insert, elete with

    full relational integrity backupD restore performance for high volume of

    transactions, etc. the client server middleware provides a flexible interface

    between client and server, who does what, when and to whom.

  • 7/24/2019 Report of hotel management system

    16/50

    %ront en or *ser $nterface /esign

    +he entire user interface is &lanne to #e e"elo&e in #ro'ser s&ecific

    en"ironment 'ith a touch of $ntranet@,ase Architecture for

    achie"ing the /istri#ute Conce&t1

    The browser specific components are designed by using the HT&' standards,

    and the dynamism of the designed by concentrating on the constructs of the

    (ava erver 1ages.

    Communication or /ata#ase Connecti"ity +ier

    The +ommunication architecture is designed by concentrating on the

    tandards of ervlets and Enterprise (ava %eans. The database connectivity

    is established by using the (ava ata %ase +onnectivity.

    The standards of threeAtire architecture are given major concentration to

    keep the standards of higher cohesion and limited coupling for effectiveness

    of the operations.

    A#out 9a"a

    Initially the language was called as Goak but it was renamed as G(ava in

    5@. The primary motivation of this language was the need for a platformA

    independent /i.e., architecture neutral0 language that could be used to create

    software to be embedded in various consumer electronic devices.

    9a"a is a &rogrammer0s language1

    9a"a is cohesi"e an consistent1

    Exce&t for those constraints im&ose #y the $nternet

    en"ironment 9a"a gi"es the &rogrammer full control1

    %inally 9a"a is to $nternet &rogramming 'here C 'as to

    system &rogramming1

  • 7/24/2019 Report of hotel management system

    17/50

    $m&ortance of 9a"a to the $nternet

    (ava has had a profound effect on the Internet. This is because7 (ava

    expands the Universe of objects that can move about freely in +yberspace.

    In a network, two categories of objects are transmitted between the erver

    and the 1ersonal computer. They are- 1assive information and ynamic

    active programs. The ynamic, elfAexecuting programs cause serious

    problems in the areas of ecurity and probability. %ut, (ava addresses those

    concerns and by doing so, has opened the door to an exciting new form of

    program called the )pplet.

    9a"a can #e use to create t'o ty&es o f &rograms

    )pplications and )pplets- )n application is a program that runs on our

    +omputer under the operating system of that computer. It is more or less like

    one creating using + or +JJ. (ava9s ability to create )pplets makes it

    important. )n )pplet is an application designed to be transmitted over the

    Internet and executed by a (ava Kcompatible web browser. )n applet is

    actually a tiny (ava program, dynamically downloaded across the network,just like an image. %ut the difference is, it is an intelligent program, not just

    a media file. It can react to the user input and dynamically change.

    %eatures .f 9a"a !ecurity

    Every time you that you download a Gnormal program, you are risking a

    viral infection. 1rior to (ava, most users did not download executable

    programs fre2uently, and those who did scanned them for viruses prior to

    execution. &ost users still worried about the possibility of infecting theirsystems with a virus. In addition, another type of malicious program exists

    that must be guarded against. (ava answers both these concerns by

    providing a Gfirewall between a network application and your computer.

  • 7/24/2019 Report of hotel management system

    18/50

    =hen you use a (avaAcompatible =eb browser, you can safely download (ava

    applets without fear of virus infection or malicious intent.

    Porta#ility

    $or programs to be dynamically downloaded to all the various types ofplatforms connected to the Internet, some means of generating portable

    executable code is needed .)s you will see, the same mechanism that helps

    ensure security also helps create portability. Indeed, (ava9s solution to these

    two problems is both elegant and efficient.

    +he ,yte coe

    The key that allows the (ava to solve the security and portability problems is

    that the output of (ava compiler is %yte code. %yte code is a highly optimi!edset of instructions designed to be executed by the (ava runAtime system,

    which is called the (ava *irtual &achine /(*&0. That is, in its standard form,

    the (*& is an interpreter for byte code.

    Translating a (ava program into byte code helps makes it much easier to run

    a program in a wide variety of environments. The reason is, once the runA

    time package exists for a given system, any (ava program can run on it.

    9a"a Virtual Machine

  • 7/24/2019 Report of hotel management system

    19/50

    ."erall /escri&tion

    1icture showing the development process of ()*) 1rogram

    (ava programming uses to produce byte codes and executes them. The first

    box indicates that the (ava source code is located in a. (ava file that is

    processed with a (ava compiler called javac. The (ava compiler produces a

    file called a. class file, which contains the byte code. The. +lass file is then

    loaded across the network or loaded locally on your machine into the

    execution environment is the (ava virtual machine, which interprets and

    executes the byte code.

    9a"a Architecture

    (ava architecture provides a portable, robust, high performing environment

    for development. (ava provides portability by compiling the byte codes for

    the (ava *irtual &achine, which is then interpreted on each platform by the

    runAtime environment. (ava is a dynamic system, able to load code when

    needed from a machine in the same room or across the planet.

    Com&ilation of coe

    =hen you compile the code, the (ava compiler creates machine code /called

    byte code0 for a hypothetical machine called (ava *irtual &achine /(*&0. The

    (*& is supposed to execute the byte code. The (*& is created for overcoming

    the issue of portability. The code is written and compiled for one machine and

    interpreted on all machines. This machine is called (ava *irtual &achine.

    Java Source Java byte code JavaVM

    Java Class

  • 7/24/2019 Report of hotel management system

    20/50

    Compiling and interpreting Java Source Code

    uring runAtime the (ava interpreter tricks the byte code file into thinking

    that it is running on a (ava *irtual &achine. In reality this could be a Intel

    1entium =indows @ or un);+ station running olaris or )pple &acintosh

    running system and all could receive code from any computer through

    Internet and run the )pplets.

    Simple

    (ava was designed to be easy for the 1rofessional programmer to learn and

    to use effectively. If you are an experienced +JJ programmer, learning (ava

    will be even easier. %ecause (ava inherits the +D+JJ syntax and many of the

    object oriented features of +JJ. &ost of the confusing concepts from +JJ

    are either left out of (ava or implemented in a cleaner, more approachable

    manner. In (ava there are a small number of clearly defined ways to

    accomplish a given task.

    Source

    Code

    ..

    ..

    ..

    PC Compiler

    Macintosh

    Compiler

    SPARC

    Compiler

    Java

    Byte code

    (Platform

    Indepen

    dent)

    JavaInterpreter

    (PC)

    Java

    Interpreter

    (Macintosh)

    Java

    Interpreter

    (Spare)

  • 7/24/2019 Report of hotel management system

    21/50

    MySQL

    What Is MySQL?

    My!)(, the most popular :pen ource C' database, is developed,

    distributed, and supported by My!)( )%. &yC' )% is a commercial

    company, founded by the My!)( developers, that builds its business

    providing services around the &yC'database.

    My!)(is a database management system.

    ) database is a structured collection of data. It may be anything from a

    simple shopping list to a picture gallery or the vast amounts of

    information in a corporate network. To add, access, and process datastored in a computer database, you need a database management system

    such as &yC'erver.

    My!)(is a relational database management system.

    ) relational database stores data in separate tables rather than putting all

    the data in one big storeroom. This adds speed and flexibility. The C'

    part of LL&yC'>> stands for LLtructured Cuery 'anguage>>. C' is the most

    common standardised language used to access databases and is defined

    by the )#IDI: C' tandard

    !)( software is :pen ource.

    :pen ourcemeans that it is possible for anyone to use and modify the

    software. )nybody can download the &yC' software from the Internet

    and use it without paying anything.

    7hy use the My!)( /ata#ase !er"er?

    The &yC' atabase erveris very fast, reliable, and easy to use. If that is

    what you are looking for, you should give it a try. &yC' erveralso has a

    practical set of features developed in close cooperation with our users.

    &yC' erverwas originally developed to handle large databases much

    faster than existing solutions and has been successfully used in highly

    demanding production environments for several years.

    http://e/java%20orientd%20softwares/MySQL/DOCS/manual_toc.html#What-ishttp://e/java%20orientd%20softwares/MySQL/DOCS/manual_toc.html#What-is
  • 7/24/2019 Report of hotel management system

    22/50

    +he Main %eatures of My!)(:

    The following list describes some of the important characteristics of the

    &yC' atabase oftware.

    $nternals an Porta#ility:

    =ritten in + and +JJ. Tested with a broad range of different

    compilers.

    =orks on many different platforms. on :perating ystems

    upported by &yC'.

    Uses 8#U )utomake, )utoconf, and 'ibtool for portability.

    )1Is for +, +JJ, Eiffel, (ava, 1erl, 1H1, 1ython, ;uby, and Tcl. ee

    section B &yC' )1Is.

    $ully multiAthreaded using kernel threads. This means it can easily

    use multiple +1Us if available.

    Transactional and nonAtransactional storage engines.

    *ery fast %Atree disk tables /&yI)&0 with index compression.

    ;elatively easy to add another storage engine. This is useful if you

    want to add an C' interface to an inAhouse database.

    ) very fast threadAbased memory allocation system.

    *ery fast joins using an optimised oneAsweep multiAjoin.

    InAmemory hash tables which are used as temporary tables.

    C' functions are implemented through a highly optimised class

    library and should be as fast as possible. Usually there isn>t any

    memory allocation at all after 2uery initialisation.

    The &yC' code gets tested with 1urify /a commercial memory

    leakage detector0 as well as with *algrind, a 81' tool

    /http-DDdeveloper.kde.orgDMsewardjD0.)vailable as clientDserver or embedded /linked0 version.

    http://e/java%20orientd%20softwares/MySQL/DOCS/manual_toc.html#Featureshttp://e/java%20orientd%20softwares/MySQL/DOCS/manual.html#Which_OShttp://e/java%20orientd%20softwares/MySQL/DOCS/manual.html#Which_OShttp://e/java%20orientd%20softwares/MySQL/DOCS/manual.html#Clientshttp://developer.kde.org/~sewardj/http://e/java%20orientd%20softwares/MySQL/DOCS/manual_toc.html#Featureshttp://e/java%20orientd%20softwares/MySQL/DOCS/manual.html#Which_OShttp://e/java%20orientd%20softwares/MySQL/DOCS/manual.html#Which_OShttp://e/java%20orientd%20softwares/MySQL/DOCS/manual.html#Clientshttp://developer.kde.org/~sewardj/
  • 7/24/2019 Report of hotel management system

    23/50

    Commans an %unctions:

    $ull operator and function support in the E'E+T and

    =HE;Eclauses of 2ueries. $or example-

    mys2lN E'E+T +:#+)T/firstOname, P P, lastOname0

    $;:& tblOname

    =HE;E incomeDdependents N 56666 )# age N "67

    $ull support for C' 8;:U1 %Q and :;E; %Q clauses.

    upport for group functions /+:U#T/0,

    +:U#T/ITI#+T ...0, )*8/0, T/0, U&/0, &)R/0, &I#/0,

    and 8;:U1O+:#+)T/00.

    upport for 'E$T :UTE; (:I#and ;I8HT :UTE; (:I#with

    both standard C' and :%+ syntax.upport for aliases on tables and columns as re2uired by

    C'A4.

    E'ETE, I#E;T, ;E1')+E, and U1)TEreturn the number

    of rows that were changed /affected0. It is possible to

    return the number of rows matched instead by setting a

    flag when connecting to the server.

    The &yC'Aspecific H:= command can be used to

    retrieve information about databases, tables, and

    indexes. The ER1')I#command can be used to determine

    how the optimiser resolves a 2uery.

    $unction names do not clash with table or column names.

    $or example, )% is a valid column name. The only

    restriction is that for a function call, no spaces are

    allowed between the function name and the L/> that

    follows it. ee section S.5. Is &yC' 1icky )bout

    ;eserved =ords3.

    Qou can mix tables from different databases in the same

    2uery /as of *ersion ".440.

    http://e/java%20orientd%20softwares/MySQL/DOCS/manual.html#Reserved_wordshttp://e/java%20orientd%20softwares/MySQL/DOCS/manual.html#Reserved_wordshttp://e/java%20orientd%20softwares/MySQL/DOCS/manual.html#Reserved_wordshttp://e/java%20orientd%20softwares/MySQL/DOCS/manual.html#Reserved_words
  • 7/24/2019 Report of hotel management system

    24/50

    !ecurity:

    ) privilege and password system that is very flexible and secure, and

    allows hostAbased verification. 1asswords are secure because all password

    traffic is encrypted when you connect to a server.

    Connecti"ity:

    +lients may connect to the &yC' server using T+1DI1

    ockets, Unix ockets /Unix0, or #amed 1ipes /#T0.

    :%+/:penAata%aseA+onnectivity0 support for =in"4 /with

    source0. )ll :%+ 4.@ functions are supported, as are many

    others. $or example, you can use & )ccess to connect to

    your &yC'server. ee section B.4 &yC' :%+ upport.

    SERVLETS

    Introduction

    The (ava web server is (avaoft>s own web erver. The (ava web server is

    just a part of a larger framework, intended to provide you not just with a web

    server, but also with tools. To build customi!ed network servers for any

    Internet or Intranet clientDserver system. ervlets are to a web server, how

    applets are to the browser.

    About Servlets

    ervlets provide a (avaAbased solution used to address the problems

    currently associated with doing serverAside programming, including

    inextensible scripting solutions, platformAspecific )1Is, and incomplete

    interfaces.

    ervlets are objects that conform to a specific interface that can be plugged

    into a (avaAbased server. ervlets are to the serverAside what applets are to

    the clientAside A object byte codes that can be dynamically loaded off the net.

    They differ from applets in that they are faceless objects /without graphics or

    a 8UI component0. They serve as platform independent, dynamically

    http://e/java%20orientd%20softwares/MySQL/DOCS/manual.html#ODBChttp://e/java%20orientd%20softwares/MySQL/DOCS/manual.html#ODBC
  • 7/24/2019 Report of hotel management system

    25/50

    loadable, plugable helper byte code objects on the server side that can be

    used to dynamically extend serverAside functionality.

    $or example, an HTT1 ervlets can be used to generate dynamic HT&'

    content. =hen you use ervlets to do dynamic content you get the following

    advantages-

    They9re faster and cleaner than +8I scripts

    They use a standard )1I /the ervlets )1I0

    They provide all the advantages of (ava /run on a variety of

    servers without needing to be rewritten0.

    A"antages of the !er"let AP$

    :ne of the great advantages of the ervlet )1I is protocol independence. It

    assumes nothing about-

    The protocol being used to transmit on the net

    How it is loaded

    The server environment it will be running in

    These 2ualities are important, because it allows the ervlet )1I to be

    embedded in many different kinds of servers. There are other advantages to

    the ervlet )1I as well. These include-

    It9s extensible A you can inherit all your functionality from the base

    classes made available to you.

    It9s simple, small, and easy to use.

    %eatures of !er"lets

    ervlets are persistent. ervlet are loaded only by the web server

    and can maintain services between re2uests.

    ervlets are fast. ince ervlets only need to be loaded once, they

    offer much better performance over their +8I counterparts.

  • 7/24/2019 Report of hotel management system

    26/50

    ervlets are platform independent.

    ervlets are extensible. (ava is a robust, objectAoriented

    programming language, which easily can be extended to suit your

    needs

    ervlets are secure.

    ervlets can be used with a variety of clients.

    Loading Servlets

    Servlets can be loaded from three places

    $rom a directory that is on the +')1)TH. The +')1)TH of the(ava=eberver includes service rootDclassesD which is where the system

    classes reside.

    $rom the E;*I+EO;::T DervletsD directory. This is VnotV in the

    server9s class path. ) class loader is used to create ervlets from this

    directory. #ew ervlets can be added A existing ervlets can be recompiled

    and the server will notice these changes.

    $rom a remote location. $or this a code base like http- DD nine.eng D classes Dfoo D is re2uired in addition to the ervlets class name. ;efer to the admin

    8UI docs on ervlet section to see how to set this up.

    Loading Remote Servlets

    ;emote ervlets can be loaded by-

    5. +onfiguring the )dmin Tool to setup automatic loading of remote

    ervlets

    4. etting up server side include tags in. shtml files

    ". efining a filter chain configuration

    9a"a!cri&t

  • 7/24/2019 Report of hotel management system

    27/50

    (avacript is a scriptAbased programming language that was developed by

    #etscape +ommunication +orporation. (avacript was originally called 'ive

    cript and renamed as (avacript to indicate its relationship with (ava.

    (avacript supports the development of both client and server components of

    =ebAbased applications. :n the client side, it can be used to write programs

    that are executed by a =eb browser within the context of a =eb page. :n

    the server side, it can be used to write =eb server programs that can process

    information submitted by a =eb browser and then updates the browser9s

    display accordingly

    Even though (avacript supports both client and server =eb programming,

    we prefer (avacript at +lient side programming since most of the browsers

    supports it. (avacript is almost as easy to learn as HT&', and (avacript

    statements can be included in HT&' documents by enclosing the statements

    between a pair of scripting tags

    +;I1TN.. D+;I1TN.

    +;I1T ')#8U)8E W G(avacriptN

    (avacript statements

    D+;I1TN

    Here are a few things we can do with (avacript-

    *alidate the contents of a form and make calculations.

    )dd scrolling or changing messages to the %rowser9s status line.

    )nimate images or rotate images that change when we move

    the mouse over them.

    etect the browser in use and display different content for

    different browsers.

    etect installed plugAins and notify the user if a plugAin is

    re2uired.

    =e can do much more with (avacript, including creating entire application.

  • 7/24/2019 Report of hotel management system

    28/50

    Hy&er +ext Marku& (anguage

    Hypertext &arkup 'anguage /HT&'0, the languages of the =orld =ide =eb

    /===0, allows users to produces =eb pages that include text, graphics and

    pointer to other =eb pages /Hyperlinks0. Hyperlinks are underlined or emphasi!ed works that load to other

    documents or some portions of the

    ,asic H+M( +ags :

    B @@ @@D pecifies comments

    BAD1BAD +reates hypertext links

    B,D1B,D $ormats text as bold

    B,$GD1B,$GD $ormats text in large font.

    B,./-DB,./-D +ontains all tags and text in the HT&'

    document

    BCEN+ERD111BCEN+ERD +reates text

    B//DB//D efinition of a term

    B/(D111B/(D +reates definition list

    B%.N+DB%.N+D $ormats text with a particular font

    B%.RMD111B%.RMD Encloses a fillAout form

    B%RAMED111B%RAMED efines a particular frame in a set of framesBHFDBHFD +reates headings of different levels

    BHEA/D111BHEA/D +ontains tags that specify information about

    a document

    BHRD111BHRD +reates a hori!ontal rule

    BH+M(DBH+M(D +ontains all other HT&' tags

    BME+AD111BME+AD 1rovides metaAinformation about a document

    B!CR$P+DB!CR$P+D +ontains clientAside or serverAside script

    B+A,(EDB+A,(ED +reates a table

    B+/DB+/D Indicates table data in a table

    B+RDB+RD esignates a table row

    B+HDB+HD +reates a heading in a table

  • 7/24/2019 Report of hotel management system

    29/50

    A"antages

    ) HT&' document is small and hence easy to send over the net.

    It is small because it does not include formatted information.

    HT&' is platform independent.

    HT&' tags are not caseAsensitive.

    9a"a /ata#ase Connecti"ity

    7hat $s 9/,C?

    (%+ is a (ava )1I for executing C' statements. /)s a point of interest,

    (%+ is a trademarked name and is not an acronym7 nevertheless, (%+ is

    often thought of as standing for (ava atabase +onnectivity. It consists of a

    set of classes and interfaces written in the (ava programming language. (%+

    provides a standard )1I for toolDdatabase developers and makes it possible

    to write database applications using a pure (ava )1I.

    Using (%+, it is easy to send C' statements to virtually any relational

    database. :ne can write a single program using the (%+ )1I, and the

    program will be able to send C' statements to the appropriate database.

    The combinations of (ava and (%+ lets a programmer write it once and run

    it anywhere.

    7hat /oes 9/,C /o?

    imply put, (%+ makes it possible to do three things-

    Establish a connection with a database

    end C' statements

    1rocess the results.

    9/,C "ersus ./,C an other AP$s

    )t this point, &icrosoft>s :%+ /:pen atabase +onnectivity0 )1I is that

    probably the most widely used programming interface for accessing relational

  • 7/24/2019 Report of hotel management system

    30/50

    databases. It offers the ability to connect to almost all databases on almost

    all platforms.

    In the threeAtier model, commands are sent to a Pmiddle tierP of services,

    which then send C' statements to the database. The database processes

    the C' statements and sends the results back to the middle tier, which thensends them to the user. &I directors find the threeAtier model very

    attractive because the middle tier makes it possible to maintain control over

    access and the kinds of updates that can be made to corporate data. )nother

    advantage is that when there is a middle tier, the user can employ an easyA

    toAuse higherAlevel )1I which is translated by the middle tier into the

    JAVA

    Application

    JDBC

    DBMS

    Client machine

    DBMS-proprietary protocol

    Database server

    Java applet or

    Html browser

    Application

    Server (Java)JDBC

    DBMS

    Client machine (GUI)

    HTTP, RMI, or CORBA calls

    Server machine (business Logic)DBMS-proprietary protocol

    Database server

  • 7/24/2019 Report of hotel management system

    31/50

    appropriate lowAlevel calls. $inally, in many cases the threeAtier architecture

    can provide performance advantages.

    &D'(OD' 'ridge

    If possible, use a 1ure (ava (%+ driver instead of the %ridge and an

    :%+ driver. This completely eliminates the client configuration re2uired

    by :%+. It also eliminates the potential that the (ava *& could be

    corrupted by an error in the native code brought in by the %ridge /that is,

    the %ridge native library, the :%+ driver manager library, the :%+

    driver library, and the database client library0.

    What Is the JDBC- DBC Bridge!

    The (%+A:%+ %ridge is a (%+ driver, which implements (%+

    operations by translating them into :%+ operations. To :%+ it appears

    as a normal application program. The %ridge implements (%+ for any

    database for which an :%+ driver is available. The %ridge is

    implemented as the

    un.jdbc.odbc (ava package and contains a native library used to access:%+. The %ridge is a joint development of Innersole and (ava oft.

    Java Server "ages #JS"$

    (ava server 1ages is a simple, yet powerful technology for creating and

    maintaining dynamicAcontent web pages. %ased on the (ava programming

    language, (ava erver 1ages offers proven portability, open standards,

    and a mature reAusable component model .The (ava erver 1ages

    architecture enables the separation of content generation from contentpresentation. This separation not eases maintenance headaches7 it also

    allows web team members to focus on their areas of expertise. #ow, web

    page designer can concentrate on layout, and web application designers

    on programming, with minimal concern about impacting each other9s

    work.

  • 7/24/2019 Report of hotel management system

    32/50

    Features of JSP

    "ortabilit%&

    (ava erver 1ages files can be run on any web server or webAenabled

    application server that provides support for them. ubbed the (1 engine,this support involves recognition, translation, and management of the

    (ava erver 1age lifecycle and its interaction components.

    Components

    It was mentioned earlier that the (ava erver 1ages architecture can

    include reusable (ava components. The architecture also allows for theembedding of a scripting language directly into the (ava erver 1ages file.

    The components current supported include (ava %eans, and ervlets.

    "rocessing

    ) (ava erver 1ages file is essentially an HT&' document with (1

    scripting or tags. The (ava erver 1ages file has a (1 extension to the

    server as a (ava erver 1ages file. %efore the page is served, the (ava

    erver 1ages syntax is parsed and processed into a ervlet on the serverside. The ervlet that is generated outputs real content in straight HT&'

    for responding to the client.

    .

    JDBC connectivit%

    The (%+ provides databaseAindependent connectivity between the (4EE

    platform and a wide range of tabular data sources. (%+ technology allows

    an )pplication +omponent 1rovider to-

    1erform connection and authentication to a database server

    &anager transactions

    &ove C' statements to a database engine for preprocessing and

    execution

    Execute stored procedures

  • 7/24/2019 Report of hotel management system

    33/50

    Inspect and modify the results from elect statements

    "urpose

    The generated application is the first version upon the system. The overall

    system is planned to be in the formal of distributed architecture withhomogeneous database platform. The major objective of the overall system

    is to keep the following components intact.

    ystem consistency ystem integrity :verall security of data ata

    reliability and )ccuracy User friendly name both at administration and user

    levels +onsidering the fact of generality and clarity To cross check that the

    system overcomes the hurdles of the version specific standards

  • 7/24/2019 Report of hotel management system

    34/50

    !esign !ocument

    The entire system is projected with a physical diagram which specifics

    the actual storage parameters that are physically necessary for anydatabase to be stored on to the disk. The overall systems existential

    idea is derived from this diagram.

    The relation upon the system is structure through a conceptual E;A

    iagram, which not only specifics the existential entities but also the

    standard relations through which the system exists and the

    cardinalities that are necessary for the system state to continue.

    The content level $ is provided to have an idea of the functional

    inputs and outputs that are achieved through the system. The

    system depicts the input and out put standards at the high level of

    the systems existence.

    /ata %lo' /iagrams

    This iagram server two purpose.

    1rovides an indication of how date is transformed as it moves

    through the system.

    isputes the functions and sub functions that transforms the

    dataflow.

    The ata flow diagram provides additional information that is

    used during the analysis of the information domain, and server as

    a basis for the modeling of functions.

    The description of each function presented in the $ is contained

    is a process specifications called as 11E+

  • 7/24/2019 Report of hotel management system

    35/50

    7E, ,A!E/

    ACC.M./A+$.

    N *PH.(/$NG!-!+EM

    *nits $nfo

    Amin

    Guest

    Accommoation $nfo

    ,ooking $nfo

    Guests

    %acilities $nfo

  • 7/24/2019 Report of hotel management system

    36/50

    *nits %acilities Registration %lo'

    "#

    $enerate %!&'

    ""

    (alidateRefunt

    )acilities

    *nit )acilities + Ref *nit )acilities

    *nit )acilities

    Scope out ifnotgenerated

    *nit)acilities

    Registration

    Commit&'

    Returnif

    not

    found

    ,#

    $enerate %!&'

    ,"

    (alidateRef

    $ender

    $uest

    + Ref *nit )acilities

    $uest

    Registration

    )pdateDataba

    se)alse

    %f )ailed

  • 7/24/2019 Report of hotel management system

    37/50

    Guest Registration %lo'

    ER@/iagrams

    The entity ;elationship iagram /E;0 depicts the relationship

    between the data objects. The E; is the notation that is used

    to conduct the date modeling activity the attributes of each data

    object noted is the E; can be described resign a data object

    descriptions.

    The set of primary components that are identified by the E;

    are

    ata object ;elationships

    )ttributes *arious types of indicators.

    The primary purpose of the E; is to represent data objects and

    their relationships.

    -#

    $enerate %!&'

    -"

    (alidateAccom

    .ocation

    *nits

    *nit

    Registration

    /rocess )alse

    -,

    (alidateRef *nitType

    D'

    Accommodation.ocation

    %f )ailed

    Commit&'

  • 7/24/2019 Report of hotel management system

    38/50

    )se ase Diagrams

    Use cases model the system from the end users point of view, with the

    following objectives

    +o efine the functional an o&erational requirements

    of the system #y efining a scenario of usage1

    +o &ro"ie a class an unam#iguous escri&tion of

    ho' the en user an the system interact 'ith one

    another1

    +o &ro"ie a #asis for "aliation testing1

    *nits ,ooking

    @ *#ook $/

    0 *nit %!0 $uest %!

    0 Boo1ing StatusC!

    $nsert

  • 7/24/2019 Report of hotel management system

    39/50

    Accommoation

    @ (ocation $/

    0 .ocation 2ame0 .ocation )ull 2ame

    0 .ocation !esc

    $nsert

  • 7/24/2019 Report of hotel management system

    40/50

    Guest

    @ Guest $/

    0 $ender Code

    $nsert

  • 7/24/2019 Report of hotel management system

    41/50

    :%(E+T I)8;)&

    Ref Gen .# : Ref Gener

    *nits o# : *nits

    Ref *nit o# : Ref *nits +y&es

    All (oc .# : All (ocations

    *nit felt o# : *nit %acilites

    *nits o# : *nits

    *nit ,kng .# : *nit ,ooking

    Guest .# : Guest

    *nits o# : *nits

    Guest o# : Guest

    *nit ,ooking o# : *nit ,ookings

    (ocation .# : (ocation

    C(A!! C.((A,.RA+$.N

    : Guest : Ref Gener"

    : *nit ,ookings : Guest : Ref Gener

    : *nits

    ,

  • 7/24/2019 Report of hotel management system

    42/50

    : *nits : Accommoation (ocation

    : *nit %acilites

    -

    : Ref *nit %acilits

    : Ref *nit +y&es

    : *nit ,ookings : *nits : (ocations

    : Guest

    4

    : Vie' *nit !tatus : *nits : (ocations

    : *nit ,kng $/

    54

    : Ref ,kng !tatus

    : Guests

    : Ref Gener

  • 7/24/2019 Report of hotel management system

    43/50

    2= ECUE#+E I)8;)&

    40 8UET ;E8IT;)TI:# ECUE#+E

    : unit Fac Ref Frm : *nit %acilities : Ref *nit %acilites

    R

    R

    Amin

    %ail if not %oun

  • 7/24/2019 Report of hotel management system

    44/50

    >0 U#IT ;E8IT;)TI:# ECUE#+E

    ?0 U#IT %::

  • 7/24/2019 Report of hotel management system

    45/50

    Program /esign (anguage

    The program design language is also called as structured English

    or pseudopodia. 1' is a generic reference for a design

    language 1' looks like a modern language. The difference

    between 1' and real programming language lies in the

    narrative text embedded directly within 1' statements.

    +he characteristics require #y a esign language are:

    ) fixed system of keywords that provide for all structured

    constructs date declaration and modularity characteristics.

    ) free syntax of natural language that describes processing

    features.

    ate declaration facilities that should include both simple and

    complex data structures.

    ubprogram definition and calling techni2ues that support

    various nodes of interface description.

    1' syntax should include constructs for subprogram definition, interface

    description date declaration techni2ues for structuring, conditions constructs,

    repetition constructs and ID: constructs.

    1' can be extended to include keywords for multitasking andDor concurrent

    processing interrupt handling, interposes synchroni!ation the application

    design for which 1' is to be used should dictate the final form for the design

    language1

  • 7/24/2019 Report of hotel management system

    46/50

    Testing

    Testing is the process of detecting errors. Testing performs a very critical role

    for 2uality assurance and for ensuring the reliability of software. The results

    of testing are used later on during maintenance also.

    1sychology of Testing

    The aim of testing is often to demonstrate that a program works by showing

    that it has no errors. The basic purpose of testing phase is to detect the

    errors that may be present in the program. Hence one should not start

    testing with the intent of showing that a program works, but the intent

    should be to show that a program doesn9t work. Testing is the process of

    executing a program with the intent of finding errors.

    +e.els of esting

    In order to uncover the errors present in different phases we have the

    concept of levels of testing. The basic levels of testing are as shown

    belowX+lient #eeds

    Requirements

    !esign

    Code

    AcceptanceTesting

    System Testing

    Integration Testing

    Unit Testing

  • 7/24/2019 Report of hotel management system

    47/50

    System esting

    The philosophy behind testing is to find errors. Test cases are devised with

    this in mind. ) strategy employed for system testing is code testing.

    ode esting*

    This strategy examines the logic of the program. To follow this method we

    developed some test data that resulted in executing every instruction in the

    program and module i.e. every path is tested. ystems are not designed as

    entire nor are they tested as single systems. To ensure that the coding is

    perfect two types of testing is performed or for that matter is performed or

    that matter is performed or for that matter is performed on all systems.

    ypes Of esting

    )nit esting

    +in" esting

    )nit esting

    Unit testing focuses verification effort on the smallest unit of software i.e. the

    module. Using the detailed design and the process specifications testing is

    done to uncover errors within the boundary of the module. )ll modules must

    be successful in the unit test before the start of the integration testing

    begins.

    +in" esting

    'ink testing does not test software but rather the integration of each module

    in system. The primary concern is the compatibility of each module. The

    1rogrammer tests where modules are designed with different parameters,

    length, type etc.

    %ntegration esting

  • 7/24/2019 Report of hotel management system

    48/50

    )fter the unit testing we have to perform integration testing. The goal here is

    to see if modules can be integrated properly, the emphasis being on testing

    interfaces between modules. This testing activity can be considered as

    testing the design and hence the emphasis on testing module interactions.

    System esting

    Here the entire software system is tested. The reference document for this

    process is the re2uirements document, and the goal os to see if software

    meets its re2uirements.

    Acceptance esting

    )cceptance Test is performed with realistic data of the client to demonstrate

    that the software is working satisfactorily. Testing here is focused on

    external behavior of the system7 the internal logic of program is not

    emphasi!ed.

  • 7/24/2019 Report of hotel management system

    49/50

    conclusions An Recommenations

    The entire project has been developed and deployed as per the re2uirements

    stated by the user, it is found to be bug free as per the testing standards that

    are implemented. )ny specification untraced errors will be concentrated in

    the coming versions, which are planned to be developed in near future. The

    system at present does not take care off the money payment methods, as

    the consolidated constructs need ' standards and are critically to be

    initiated in the first face, the application of the credit card transactions is

    applied as a developmental phase in the coming days. The system needs

    more elaborative technicality for its inception and evolution.

  • 7/24/2019 Report of hotel management system

    50/50

    ,i#liogra&hy-

    ;eferences for the 1roject evelopment =ere Taken $rom the following

    ,ooks an 7e# !ites.

    :racle

    1'DC' 1rogramming by cott Urman

    C' complete reference by 'ivion

    ()*) Technologies

    ()*) +omplete ;eference

    (ava cript 1rogramming by Qehuda hiran

    &astering ()*) ecurity

    Head $irst E(% ierra %ates

    (4EE 1rofessional by hadab siddi2ui()*) server pages by 'arne 1ekowsley

    ()*) erver pages by #ick Todd

    HT&'

    HT&' %lack %ook by Hol!ner

    (%+

    (ava atabase 1rogramming with (%+ by 1atel moss.

    oftware Engineering by ;oger 1ressman