7/24/2019 Report of hotel management system
1/50
Manage
Group
Of
resorts
7/24/2019 Report of hotel management system
2/50
ABSTRACTThe system aims at the maintenance and management of the different Hotels
that are available in the different parts of the world. It mainly takes
care of the Hotel management at the core area of the database. The
system provides the information regarding the different Hotels that
are available and their status specific to availability. The database
also manages the atomic information regarding the different units
that are available under one Hotel and the architectural details of the
Unit facilities that are available. Each unit is well furnished and is well
designed for the basic flexibility of the tourists who are expected to
stay.
The entire project has been develped keeping in view of the istributed client
server computing technology in mind.The specification have been
normali!ed upto "#$ to eliminate all the anomalies that may arise
due to the database transactions that are executed by the actual
administration and users.The user interfaces are browser specific to
give distributed accessability for the overall system. The %ean
components have been implemented for proper reusability and
authenticity. The standards of security and date portative mechanism
have been given a big choice for proper usage. The application takescare of different modules and their associated reports which re
produced as per the applicable strategies and standards that are put
forwarded by the administrative staff..
7/24/2019 Report of hotel management system
3/50
introductionThe entire project has been develped keeping in view of the istributed client
server computing technology in mind.The specification have been normali!ed
upto "#$ to eliminate all the anomalies that may arise due to the database
transactions that are executed by the actual administration and users.The
total front end was dominated using HT&' standards applied with the
dynamism of ()*) server pages. The communicating client was designed
using servlets. )t all proper levels high care was taken to check that the
system manages the date consistency with proper business validations.The
database connectivity was planned using the (ava ata%ase +onnectivity,the
authori!ation and authori!ation was cross checked at all stages.The user
level accessabiity has been restricted into two !ones the administrative and
the normal user !one.
7/24/2019 Report of hotel management system
4/50
About the organisation ExistingProcess:
Guest Visits any
Nearest Hostel or
Motel
Raiser his
Request at the
Clerk for
Accommoation
Clerk !earches
the require
legers for
a"aila#ility
$f not A"aila#le
$% a"aila#le &utthe info at the
guest Vie'Guest may
com&romise 'ith
his requirment
Guest Check therequire
Parameters as&er his
Con"enience
Guest NotCom&romise
$f Pro"ie &lanhis stay
(ea"es fnAnother !ystem
7/24/2019 Report of hotel management system
5/50
FeasibilityReport
!ystem Analysis Concentration-
ystem analysis is the process of collecting and interpreting facts, disposing
problem and use the information about the existing system, which is also
called as system study.
ystem analysis is about understanding situation but not solving the
problem.
GENERA( RE)*$REMEN+!:
The new system should be cost effective
To improve productivity and service and service.
To enhance user interface.
To improve information presentation and durability.
To upgrade systems reliability, availability and flexibility.
To address human factors for better and uses acceptance.
%easi#ility Re&ort
+ECH$N$CA( %EA!$,$($+--
Evaluating the technical feasibility is the trickiest part of a feasibility study.
This is because, at this point in time, not too many detailed design of the
system, making it difficult to access issues like performance, costs on /on
account of the kind of technology to be deployed0 etc. ) number of issues
have to be considered while doing a technicalanalysis.
7/24/2019 Report of hotel management system
6/50
.PERA+$.NA( %EA!$,$($+--
1roposed projects are beneficial only if they can be turned into information
systems that will meet the organi!ations operating re2uirements. imply
stated, this test of feasibility asks if the system will work when it is
developed and installed. )re there major barriers to Implementation3 Here
are 2uestions that will help test the operational feasibility of a project-
Is there sufficient support for the project from management from users3 If
the current system is well liked and used to the extent that persons will not
be able to see reasons for change, there may be resistance.
EC.N.M$C %EA!$,$($+--
Economic feasibility attempts 4 weigh the costs of developing and
implementing a new system, against the benefits that would accrue from
having the new system in place. This feasibility study gives the top
management the economic justification for the new system.
a0 +echnical /escri&tion
/ata#ases- The total number of databases that were identified to build the
system is 56.The major part of the atabases is categori!ed as
)dministrative components and the user components. The administrative
components are useful in managing the actual master data that may7 be
necessary to maintain the consistency of the system. The user components
are designed to handle the transactional state that arise upon the system
whenever the general client makes a visit onto the system for the sake of the
report based information. The user components are scheduled to accept
parametrical information for the user as per the systems necessity.
7/24/2019 Report of hotel management system
7/50
G*$0s
$or the flexibility of the user, the interface has been developed in graphical
user interface mode. The normal interface is applied through browser.
The 8UI9s at the top level has been categori!ed as-
50 )dministrative user interface
40 +ustomer or general user interface
The administrative user interface concentrates on the consistent information
that is practically, pact of the organi!ational activities and which needs
proper authentication for the data collection. The interfaces help the visitorswith all the transactional states like ata insertion, ata deletion and ata
updating with the data search capabilities.
The general user interface helps the users upon the system in transactions
through the re2uired services that are provided upon the system. The
general user interface also helps the ordinary user is managing their own
information in a customi!ed manner as per their flexibilities.
7/24/2019 Report of hotel management system
8/50
Software Requirement
Specication
Require Har'are
Pentium $V Processor1
234 M, RAM1
35G, Har /isk s&ace1
Ethernet car 'ith an $nternet an $nternet
6one1
Require !oft'are
7ino's 3555 Professional o&erating system1
$nternet ex&lorer 815 an Netsca&e na"igator1.racle 4i1
!er"lets 9!P
+CP$P Protocol suite1
7/24/2019 Report of hotel management system
9/50
Modules Description
#umber of &odules-
)ccommodation Information &odule
Units Information &odule.
%ookings Information &odule.
8uests Information &odule.
$acilities Information &odule.
)++:&&:)TI:# I#$:;&)TI:#- This module maintains all the details of
the )ccommodation location that are available and the units that are
available under each location along with their reference unit types.
U#IT I#$:;&)TI:#- This module maintains the information regarding all
the units that are registered as per specifications and their reference unit
types. The module also takes care of the system from the unit facilities andreference unit facilities that are available.
%::
7/24/2019 Report of hotel management system
10/50
This module helps in registering the reference unit facilities that may creep in
into the system from time to time.
#U&%E; :$ *IE=-
)dministrative *iew
8uest *iew
Aministrati"e Vie'
This view is designed for interacting with the absolute &eta ata, which
becomes the ultimate repository to maintain the consistency.
This view is accessible only to registered administrators who are recogni!ed
by the =atershed evelopment central )dministration epartment.
This &odule takes care of the responsibility of the major Table management
for
ata Insertion
ata eletion
ata Updating
ata election
)ll the activities are validated and authenticated to proper profile to avoid un
authori!ed access.
Guest Vie'- In this view the guest can view complete details of available
accommodation list information.
7/24/2019 Report of hotel management system
11/50
Analysis Report
!.%+7ARE RE)*$REMEN+ !PEC$%$CA+$.N
RE)*$REMEN+ !PEC$%$CA+$.N-
$N+R./*C+$.N
Pur&ose:The main purpose for preparing this document is to give a general
insight into the analysis and re2uirements of the existing system or situation
and for determining the operating characteristics of the system.
!co&e:This ocument plays a vital role in the development life cycle /'+0
as it describes the complete re2uirement of the system. It is meant for use
by the developers and will be the basic during testing phase. )ny changes
made to the re2uirements in the future will have to go through formal
change approval process.
/e"elo&ers Res&onsi#ilities ."er"ie':
+he e"elo&er is res&onsi#le for:
50 eveloping the system, which meets the ; and solving all the
re2uirements of the system3
40 emonstrating the system and installing the system at client>slocation after the acceptance testing is successful.
"0 ubmitting the re2uired user manual describing the system
interfaces to work on it and also the documents of the system.
?0 +onducting any user training that might be needed for using the
system.
@0 &aintaining the system for a period of one year after installation.
7/24/2019 Report of hotel management system
12/50
%unctional Requirements:
$n&uts:The major inputs for =eb %ased )ccommodation can be categori!ed
moduleAwise. %asically all the information is managed by the software and in
order to access the information one has to produce one>s identity by entering
the userAid and password. Every user has their own domain of access beyond
which the access is dynamically refrained rather denied.
.ut&ut:The major outputs of the system are tables and reports. Tables are
created dynamically to meet the re2uirements on demand. ;eports, as it is
obvious, carry the gist of the whole information that flows across the
institution. This application must be able to produce output at different
modules for different inputs.
/ocument Con"entions:
The overall documents for this project use the recogni!ed modeling standards
at the software industries level.
E;A&odeling to concentrate on the relational states existing
upon the system with respect to +ardinality.
The 1hysical dispense, which state the overall data search for
the relational key whereas a transactions is implemented on the
wear entities.
Unified modeling language concepts to give a generali!ed blue
print for the overall system.
The standards of flow charts at the re2uired states that are the
functionality of the operations need more concentration.
7/24/2019 Report of hotel management system
13/50
!co&e of +he /e"elo&ment Pro;ect:
/ata#ase +ier: The concentration is applied by adopting the :racle Bi
Enterprise versions. C' is taken as the standard 2uery language. The
overall business rules are designed by using the power of 1'DC'
components like stored procedures stored functions and database triggers.
*ser +ier:The use interface is developed is a browses specific environment
to have distributed architecture. The components are designed using HT&'
standards and (ava server pages power the dynamic of the page design.
/ata ,ase Connecti"ity +ier: The communication architecture is designed
by concentrated on the standards of servlets and (19s. The database
connectivity is established using the (ava atabase connectivity.
Role .f .racle $n /ata#ase
:;)+'E Bi is one of the many database services that plug into a client D
server model. It works efficiently to manage resources, a database
information, among the multiple clients re2uesting sending.
!tructure )uery (anguage
C' is an interAactive language used to 2uery the database and access datain database. C' has the following features-
21 It is a unified language.
31 It is a common language for relational database
>1 It is a nonAprocedural language.
7/24/2019 Report of hotel management system
14/50
$ntrouction +o .racle
:;)+'E is a comprehensive operating environment that packs the power of a
mainframe system into user microcomputer. It provides a set of functional
programs that user can use as tools to build structures and perform tasks.%ecause application developed on oracle are completely portable to
environment and then move it into a multi user platform.
7hat is a Relational /ata#ase Management !ystem?
) relational database management system /;%&0 can perform a wide
array of tasks. It acts as a transparent interface between the physical storage
and a logical presentation of data. It provides a set of more or less flexible
and sophisticates tools for handling information. User can use this tool to- Dene a database
Query the database
Add, edit and delete data
Modify the structure of database
Secure data from public access
ommunicate !ithin the net!or"s
#$port and %mport data
%ecause it gives so much control over data, a relational %& can also save
as the foundation for products that generate application and extract data.
) atabase &anagement system may be called fully relational if it supports-
Relational Databases and
A language that is at least as po!erful as the
relational algebra
7/24/2019 Report of hotel management system
15/50
+he .racle En"ironment
.RAC(E is modular system that consists of the :;)+'E database and
several functional programs. :;)+'E tools had four kinds of
works-
/ata#ase management
/ata access an mani&ulations
Programming
Connecti"ity
/ata#ase Management +ools
This is usually /known as ;%& by :;)+'E0 includes the core programs of
:racle9s database management system, the :;)+'E database with its
associated tables and views, which are stored in the :racle9s data dictionary
and a group of helpful activities.
Client !er"er7hat is a Client !er"er
Two prominent systems in existence are client server and file server systems.
It is essential to distinguish between client servers and file server systems.
%oth provide shared network access to data but the comparison dens thereF
The file server simply provides a remote disk drive that can be accessed by
')# applications on a fileAbyAfile basis. The clientserver offers full relational
database services such as C'A)ccess, ;ecord modifying, Insert, elete with
full relational integrity backupD restore performance for high volume of
transactions, etc. the client server middleware provides a flexible interface
between client and server, who does what, when and to whom.
7/24/2019 Report of hotel management system
16/50
%ront en or *ser $nterface /esign
+he entire user interface is &lanne to #e e"elo&e in #ro'ser s&ecific
en"ironment 'ith a touch of $ntranet@,ase Architecture for
achie"ing the /istri#ute Conce&t1
The browser specific components are designed by using the HT&' standards,
and the dynamism of the designed by concentrating on the constructs of the
(ava erver 1ages.
Communication or /ata#ase Connecti"ity +ier
The +ommunication architecture is designed by concentrating on the
tandards of ervlets and Enterprise (ava %eans. The database connectivity
is established by using the (ava ata %ase +onnectivity.
The standards of threeAtire architecture are given major concentration to
keep the standards of higher cohesion and limited coupling for effectiveness
of the operations.
A#out 9a"a
Initially the language was called as Goak but it was renamed as G(ava in
5@. The primary motivation of this language was the need for a platformA
independent /i.e., architecture neutral0 language that could be used to create
software to be embedded in various consumer electronic devices.
9a"a is a &rogrammer0s language1
9a"a is cohesi"e an consistent1
Exce&t for those constraints im&ose #y the $nternet
en"ironment 9a"a gi"es the &rogrammer full control1
%inally 9a"a is to $nternet &rogramming 'here C 'as to
system &rogramming1
7/24/2019 Report of hotel management system
17/50
$m&ortance of 9a"a to the $nternet
(ava has had a profound effect on the Internet. This is because7 (ava
expands the Universe of objects that can move about freely in +yberspace.
In a network, two categories of objects are transmitted between the erver
and the 1ersonal computer. They are- 1assive information and ynamic
active programs. The ynamic, elfAexecuting programs cause serious
problems in the areas of ecurity and probability. %ut, (ava addresses those
concerns and by doing so, has opened the door to an exciting new form of
program called the )pplet.
9a"a can #e use to create t'o ty&es o f &rograms
)pplications and )pplets- )n application is a program that runs on our
+omputer under the operating system of that computer. It is more or less like
one creating using + or +JJ. (ava9s ability to create )pplets makes it
important. )n )pplet is an application designed to be transmitted over the
Internet and executed by a (ava Kcompatible web browser. )n applet is
actually a tiny (ava program, dynamically downloaded across the network,just like an image. %ut the difference is, it is an intelligent program, not just
a media file. It can react to the user input and dynamically change.
%eatures .f 9a"a !ecurity
Every time you that you download a Gnormal program, you are risking a
viral infection. 1rior to (ava, most users did not download executable
programs fre2uently, and those who did scanned them for viruses prior to
execution. &ost users still worried about the possibility of infecting theirsystems with a virus. In addition, another type of malicious program exists
that must be guarded against. (ava answers both these concerns by
providing a Gfirewall between a network application and your computer.
7/24/2019 Report of hotel management system
18/50
=hen you use a (avaAcompatible =eb browser, you can safely download (ava
applets without fear of virus infection or malicious intent.
Porta#ility
$or programs to be dynamically downloaded to all the various types ofplatforms connected to the Internet, some means of generating portable
executable code is needed .)s you will see, the same mechanism that helps
ensure security also helps create portability. Indeed, (ava9s solution to these
two problems is both elegant and efficient.
+he ,yte coe
The key that allows the (ava to solve the security and portability problems is
that the output of (ava compiler is %yte code. %yte code is a highly optimi!edset of instructions designed to be executed by the (ava runAtime system,
which is called the (ava *irtual &achine /(*&0. That is, in its standard form,
the (*& is an interpreter for byte code.
Translating a (ava program into byte code helps makes it much easier to run
a program in a wide variety of environments. The reason is, once the runA
time package exists for a given system, any (ava program can run on it.
9a"a Virtual Machine
7/24/2019 Report of hotel management system
19/50
."erall /escri&tion
1icture showing the development process of ()*) 1rogram
(ava programming uses to produce byte codes and executes them. The first
box indicates that the (ava source code is located in a. (ava file that is
processed with a (ava compiler called javac. The (ava compiler produces a
file called a. class file, which contains the byte code. The. +lass file is then
loaded across the network or loaded locally on your machine into the
execution environment is the (ava virtual machine, which interprets and
executes the byte code.
9a"a Architecture
(ava architecture provides a portable, robust, high performing environment
for development. (ava provides portability by compiling the byte codes for
the (ava *irtual &achine, which is then interpreted on each platform by the
runAtime environment. (ava is a dynamic system, able to load code when
needed from a machine in the same room or across the planet.
Com&ilation of coe
=hen you compile the code, the (ava compiler creates machine code /called
byte code0 for a hypothetical machine called (ava *irtual &achine /(*&0. The
(*& is supposed to execute the byte code. The (*& is created for overcoming
the issue of portability. The code is written and compiled for one machine and
interpreted on all machines. This machine is called (ava *irtual &achine.
Java Source Java byte code JavaVM
Java Class
7/24/2019 Report of hotel management system
20/50
Compiling and interpreting Java Source Code
uring runAtime the (ava interpreter tricks the byte code file into thinking
that it is running on a (ava *irtual &achine. In reality this could be a Intel
1entium =indows @ or un);+ station running olaris or )pple &acintosh
running system and all could receive code from any computer through
Internet and run the )pplets.
Simple
(ava was designed to be easy for the 1rofessional programmer to learn and
to use effectively. If you are an experienced +JJ programmer, learning (ava
will be even easier. %ecause (ava inherits the +D+JJ syntax and many of the
object oriented features of +JJ. &ost of the confusing concepts from +JJ
are either left out of (ava or implemented in a cleaner, more approachable
manner. In (ava there are a small number of clearly defined ways to
accomplish a given task.
Source
Code
..
..
..
PC Compiler
Macintosh
Compiler
SPARC
Compiler
Java
Byte code
(Platform
Indepen
dent)
JavaInterpreter
(PC)
Java
Interpreter
(Macintosh)
Java
Interpreter
(Spare)
7/24/2019 Report of hotel management system
21/50
MySQL
What Is MySQL?
My!)(, the most popular :pen ource C' database, is developed,
distributed, and supported by My!)( )%. &yC' )% is a commercial
company, founded by the My!)( developers, that builds its business
providing services around the &yC'database.
My!)(is a database management system.
) database is a structured collection of data. It may be anything from a
simple shopping list to a picture gallery or the vast amounts of
information in a corporate network. To add, access, and process datastored in a computer database, you need a database management system
such as &yC'erver.
My!)(is a relational database management system.
) relational database stores data in separate tables rather than putting all
the data in one big storeroom. This adds speed and flexibility. The C'
part of LL&yC'>> stands for LLtructured Cuery 'anguage>>. C' is the most
common standardised language used to access databases and is defined
by the )#IDI: C' tandard
!)( software is :pen ource.
:pen ourcemeans that it is possible for anyone to use and modify the
software. )nybody can download the &yC' software from the Internet
and use it without paying anything.
7hy use the My!)( /ata#ase !er"er?
The &yC' atabase erveris very fast, reliable, and easy to use. If that is
what you are looking for, you should give it a try. &yC' erveralso has a
practical set of features developed in close cooperation with our users.
&yC' erverwas originally developed to handle large databases much
faster than existing solutions and has been successfully used in highly
demanding production environments for several years.
http://e/java%20orientd%20softwares/MySQL/DOCS/manual_toc.html#What-ishttp://e/java%20orientd%20softwares/MySQL/DOCS/manual_toc.html#What-is7/24/2019 Report of hotel management system
22/50
+he Main %eatures of My!)(:
The following list describes some of the important characteristics of the
&yC' atabase oftware.
$nternals an Porta#ility:
=ritten in + and +JJ. Tested with a broad range of different
compilers.
=orks on many different platforms. on :perating ystems
upported by &yC'.
Uses 8#U )utomake, )utoconf, and 'ibtool for portability.
)1Is for +, +JJ, Eiffel, (ava, 1erl, 1H1, 1ython, ;uby, and Tcl. ee
section B &yC' )1Is.
$ully multiAthreaded using kernel threads. This means it can easily
use multiple +1Us if available.
Transactional and nonAtransactional storage engines.
*ery fast %Atree disk tables /&yI)&0 with index compression.
;elatively easy to add another storage engine. This is useful if you
want to add an C' interface to an inAhouse database.
) very fast threadAbased memory allocation system.
*ery fast joins using an optimised oneAsweep multiAjoin.
InAmemory hash tables which are used as temporary tables.
C' functions are implemented through a highly optimised class
library and should be as fast as possible. Usually there isn>t any
memory allocation at all after 2uery initialisation.
The &yC' code gets tested with 1urify /a commercial memory
leakage detector0 as well as with *algrind, a 81' tool
/http-DDdeveloper.kde.orgDMsewardjD0.)vailable as clientDserver or embedded /linked0 version.
http://e/java%20orientd%20softwares/MySQL/DOCS/manual_toc.html#Featureshttp://e/java%20orientd%20softwares/MySQL/DOCS/manual.html#Which_OShttp://e/java%20orientd%20softwares/MySQL/DOCS/manual.html#Which_OShttp://e/java%20orientd%20softwares/MySQL/DOCS/manual.html#Clientshttp://developer.kde.org/~sewardj/http://e/java%20orientd%20softwares/MySQL/DOCS/manual_toc.html#Featureshttp://e/java%20orientd%20softwares/MySQL/DOCS/manual.html#Which_OShttp://e/java%20orientd%20softwares/MySQL/DOCS/manual.html#Which_OShttp://e/java%20orientd%20softwares/MySQL/DOCS/manual.html#Clientshttp://developer.kde.org/~sewardj/7/24/2019 Report of hotel management system
23/50
Commans an %unctions:
$ull operator and function support in the E'E+T and
=HE;Eclauses of 2ueries. $or example-
mys2lN E'E+T +:#+)T/firstOname, P P, lastOname0
$;:& tblOname
=HE;E incomeDdependents N 56666 )# age N "67
$ull support for C' 8;:U1 %Q and :;E; %Q clauses.
upport for group functions /+:U#T/0,
+:U#T/ITI#+T ...0, )*8/0, T/0, U&/0, &)R/0, &I#/0,
and 8;:U1O+:#+)T/00.
upport for 'E$T :UTE; (:I#and ;I8HT :UTE; (:I#with
both standard C' and :%+ syntax.upport for aliases on tables and columns as re2uired by
C'A4.
E'ETE, I#E;T, ;E1')+E, and U1)TEreturn the number
of rows that were changed /affected0. It is possible to
return the number of rows matched instead by setting a
flag when connecting to the server.
The &yC'Aspecific H:= command can be used to
retrieve information about databases, tables, and
indexes. The ER1')I#command can be used to determine
how the optimiser resolves a 2uery.
$unction names do not clash with table or column names.
$or example, )% is a valid column name. The only
restriction is that for a function call, no spaces are
allowed between the function name and the L/> that
follows it. ee section S.5. Is &yC' 1icky )bout
;eserved =ords3.
Qou can mix tables from different databases in the same
2uery /as of *ersion ".440.
http://e/java%20orientd%20softwares/MySQL/DOCS/manual.html#Reserved_wordshttp://e/java%20orientd%20softwares/MySQL/DOCS/manual.html#Reserved_wordshttp://e/java%20orientd%20softwares/MySQL/DOCS/manual.html#Reserved_wordshttp://e/java%20orientd%20softwares/MySQL/DOCS/manual.html#Reserved_words7/24/2019 Report of hotel management system
24/50
!ecurity:
) privilege and password system that is very flexible and secure, and
allows hostAbased verification. 1asswords are secure because all password
traffic is encrypted when you connect to a server.
Connecti"ity:
+lients may connect to the &yC' server using T+1DI1
ockets, Unix ockets /Unix0, or #amed 1ipes /#T0.
:%+/:penAata%aseA+onnectivity0 support for =in"4 /with
source0. )ll :%+ 4.@ functions are supported, as are many
others. $or example, you can use & )ccess to connect to
your &yC'server. ee section B.4 &yC' :%+ upport.
SERVLETS
Introduction
The (ava web server is (avaoft>s own web erver. The (ava web server is
just a part of a larger framework, intended to provide you not just with a web
server, but also with tools. To build customi!ed network servers for any
Internet or Intranet clientDserver system. ervlets are to a web server, how
applets are to the browser.
About Servlets
ervlets provide a (avaAbased solution used to address the problems
currently associated with doing serverAside programming, including
inextensible scripting solutions, platformAspecific )1Is, and incomplete
interfaces.
ervlets are objects that conform to a specific interface that can be plugged
into a (avaAbased server. ervlets are to the serverAside what applets are to
the clientAside A object byte codes that can be dynamically loaded off the net.
They differ from applets in that they are faceless objects /without graphics or
a 8UI component0. They serve as platform independent, dynamically
http://e/java%20orientd%20softwares/MySQL/DOCS/manual.html#ODBChttp://e/java%20orientd%20softwares/MySQL/DOCS/manual.html#ODBC7/24/2019 Report of hotel management system
25/50
loadable, plugable helper byte code objects on the server side that can be
used to dynamically extend serverAside functionality.
$or example, an HTT1 ervlets can be used to generate dynamic HT&'
content. =hen you use ervlets to do dynamic content you get the following
advantages-
They9re faster and cleaner than +8I scripts
They use a standard )1I /the ervlets )1I0
They provide all the advantages of (ava /run on a variety of
servers without needing to be rewritten0.
A"antages of the !er"let AP$
:ne of the great advantages of the ervlet )1I is protocol independence. It
assumes nothing about-
The protocol being used to transmit on the net
How it is loaded
The server environment it will be running in
These 2ualities are important, because it allows the ervlet )1I to be
embedded in many different kinds of servers. There are other advantages to
the ervlet )1I as well. These include-
It9s extensible A you can inherit all your functionality from the base
classes made available to you.
It9s simple, small, and easy to use.
%eatures of !er"lets
ervlets are persistent. ervlet are loaded only by the web server
and can maintain services between re2uests.
ervlets are fast. ince ervlets only need to be loaded once, they
offer much better performance over their +8I counterparts.
7/24/2019 Report of hotel management system
26/50
ervlets are platform independent.
ervlets are extensible. (ava is a robust, objectAoriented
programming language, which easily can be extended to suit your
needs
ervlets are secure.
ervlets can be used with a variety of clients.
Loading Servlets
Servlets can be loaded from three places
$rom a directory that is on the +')1)TH. The +')1)TH of the(ava=eberver includes service rootDclassesD which is where the system
classes reside.
$rom the E;*I+EO;::T DervletsD directory. This is VnotV in the
server9s class path. ) class loader is used to create ervlets from this
directory. #ew ervlets can be added A existing ervlets can be recompiled
and the server will notice these changes.
$rom a remote location. $or this a code base like http- DD nine.eng D classes Dfoo D is re2uired in addition to the ervlets class name. ;efer to the admin
8UI docs on ervlet section to see how to set this up.
Loading Remote Servlets
;emote ervlets can be loaded by-
5. +onfiguring the )dmin Tool to setup automatic loading of remote
ervlets
4. etting up server side include tags in. shtml files
". efining a filter chain configuration
9a"a!cri&t
7/24/2019 Report of hotel management system
27/50
(avacript is a scriptAbased programming language that was developed by
#etscape +ommunication +orporation. (avacript was originally called 'ive
cript and renamed as (avacript to indicate its relationship with (ava.
(avacript supports the development of both client and server components of
=ebAbased applications. :n the client side, it can be used to write programs
that are executed by a =eb browser within the context of a =eb page. :n
the server side, it can be used to write =eb server programs that can process
information submitted by a =eb browser and then updates the browser9s
display accordingly
Even though (avacript supports both client and server =eb programming,
we prefer (avacript at +lient side programming since most of the browsers
supports it. (avacript is almost as easy to learn as HT&', and (avacript
statements can be included in HT&' documents by enclosing the statements
between a pair of scripting tags
+;I1TN.. D+;I1TN.
+;I1T ')#8U)8E W G(avacriptN
(avacript statements
D+;I1TN
Here are a few things we can do with (avacript-
*alidate the contents of a form and make calculations.
)dd scrolling or changing messages to the %rowser9s status line.
)nimate images or rotate images that change when we move
the mouse over them.
etect the browser in use and display different content for
different browsers.
etect installed plugAins and notify the user if a plugAin is
re2uired.
=e can do much more with (avacript, including creating entire application.
7/24/2019 Report of hotel management system
28/50
Hy&er +ext Marku& (anguage
Hypertext &arkup 'anguage /HT&'0, the languages of the =orld =ide =eb
/===0, allows users to produces =eb pages that include text, graphics and
pointer to other =eb pages /Hyperlinks0. Hyperlinks are underlined or emphasi!ed works that load to other
documents or some portions of the
,asic H+M( +ags :
B @@ @@D pecifies comments
BAD1BAD +reates hypertext links
B,D1B,D $ormats text as bold
B,$GD1B,$GD $ormats text in large font.
B,./-DB,./-D +ontains all tags and text in the HT&'
document
BCEN+ERD111BCEN+ERD +reates text
B//DB//D efinition of a term
B/(D111B/(D +reates definition list
B%.N+DB%.N+D $ormats text with a particular font
B%.RMD111B%.RMD Encloses a fillAout form
B%RAMED111B%RAMED efines a particular frame in a set of framesBHFDBHFD +reates headings of different levels
BHEA/D111BHEA/D +ontains tags that specify information about
a document
BHRD111BHRD +reates a hori!ontal rule
BH+M(DBH+M(D +ontains all other HT&' tags
BME+AD111BME+AD 1rovides metaAinformation about a document
B!CR$P+DB!CR$P+D +ontains clientAside or serverAside script
B+A,(EDB+A,(ED +reates a table
B+/DB+/D Indicates table data in a table
B+RDB+RD esignates a table row
B+HDB+HD +reates a heading in a table
7/24/2019 Report of hotel management system
29/50
A"antages
) HT&' document is small and hence easy to send over the net.
It is small because it does not include formatted information.
HT&' is platform independent.
HT&' tags are not caseAsensitive.
9a"a /ata#ase Connecti"ity
7hat $s 9/,C?
(%+ is a (ava )1I for executing C' statements. /)s a point of interest,
(%+ is a trademarked name and is not an acronym7 nevertheless, (%+ is
often thought of as standing for (ava atabase +onnectivity. It consists of a
set of classes and interfaces written in the (ava programming language. (%+
provides a standard )1I for toolDdatabase developers and makes it possible
to write database applications using a pure (ava )1I.
Using (%+, it is easy to send C' statements to virtually any relational
database. :ne can write a single program using the (%+ )1I, and the
program will be able to send C' statements to the appropriate database.
The combinations of (ava and (%+ lets a programmer write it once and run
it anywhere.
7hat /oes 9/,C /o?
imply put, (%+ makes it possible to do three things-
Establish a connection with a database
end C' statements
1rocess the results.
9/,C "ersus ./,C an other AP$s
)t this point, &icrosoft>s :%+ /:pen atabase +onnectivity0 )1I is that
probably the most widely used programming interface for accessing relational
7/24/2019 Report of hotel management system
30/50
databases. It offers the ability to connect to almost all databases on almost
all platforms.
In the threeAtier model, commands are sent to a Pmiddle tierP of services,
which then send C' statements to the database. The database processes
the C' statements and sends the results back to the middle tier, which thensends them to the user. &I directors find the threeAtier model very
attractive because the middle tier makes it possible to maintain control over
access and the kinds of updates that can be made to corporate data. )nother
advantage is that when there is a middle tier, the user can employ an easyA
toAuse higherAlevel )1I which is translated by the middle tier into the
JAVA
Application
JDBC
DBMS
Client machine
DBMS-proprietary protocol
Database server
Java applet or
Html browser
Application
Server (Java)JDBC
DBMS
Client machine (GUI)
HTTP, RMI, or CORBA calls
Server machine (business Logic)DBMS-proprietary protocol
Database server
7/24/2019 Report of hotel management system
31/50
appropriate lowAlevel calls. $inally, in many cases the threeAtier architecture
can provide performance advantages.
&D'(OD' 'ridge
If possible, use a 1ure (ava (%+ driver instead of the %ridge and an
:%+ driver. This completely eliminates the client configuration re2uired
by :%+. It also eliminates the potential that the (ava *& could be
corrupted by an error in the native code brought in by the %ridge /that is,
the %ridge native library, the :%+ driver manager library, the :%+
driver library, and the database client library0.
What Is the JDBC- DBC Bridge!
The (%+A:%+ %ridge is a (%+ driver, which implements (%+
operations by translating them into :%+ operations. To :%+ it appears
as a normal application program. The %ridge implements (%+ for any
database for which an :%+ driver is available. The %ridge is
implemented as the
un.jdbc.odbc (ava package and contains a native library used to access:%+. The %ridge is a joint development of Innersole and (ava oft.
Java Server "ages #JS"$
(ava server 1ages is a simple, yet powerful technology for creating and
maintaining dynamicAcontent web pages. %ased on the (ava programming
language, (ava erver 1ages offers proven portability, open standards,
and a mature reAusable component model .The (ava erver 1ages
architecture enables the separation of content generation from contentpresentation. This separation not eases maintenance headaches7 it also
allows web team members to focus on their areas of expertise. #ow, web
page designer can concentrate on layout, and web application designers
on programming, with minimal concern about impacting each other9s
work.
7/24/2019 Report of hotel management system
32/50
Features of JSP
"ortabilit%&
(ava erver 1ages files can be run on any web server or webAenabled
application server that provides support for them. ubbed the (1 engine,this support involves recognition, translation, and management of the
(ava erver 1age lifecycle and its interaction components.
Components
It was mentioned earlier that the (ava erver 1ages architecture can
include reusable (ava components. The architecture also allows for theembedding of a scripting language directly into the (ava erver 1ages file.
The components current supported include (ava %eans, and ervlets.
"rocessing
) (ava erver 1ages file is essentially an HT&' document with (1
scripting or tags. The (ava erver 1ages file has a (1 extension to the
server as a (ava erver 1ages file. %efore the page is served, the (ava
erver 1ages syntax is parsed and processed into a ervlet on the serverside. The ervlet that is generated outputs real content in straight HT&'
for responding to the client.
.
JDBC connectivit%
The (%+ provides databaseAindependent connectivity between the (4EE
platform and a wide range of tabular data sources. (%+ technology allows
an )pplication +omponent 1rovider to-
1erform connection and authentication to a database server
&anager transactions
&ove C' statements to a database engine for preprocessing and
execution
Execute stored procedures
7/24/2019 Report of hotel management system
33/50
Inspect and modify the results from elect statements
"urpose
The generated application is the first version upon the system. The overall
system is planned to be in the formal of distributed architecture withhomogeneous database platform. The major objective of the overall system
is to keep the following components intact.
ystem consistency ystem integrity :verall security of data ata
reliability and )ccuracy User friendly name both at administration and user
levels +onsidering the fact of generality and clarity To cross check that the
system overcomes the hurdles of the version specific standards
7/24/2019 Report of hotel management system
34/50
!esign !ocument
The entire system is projected with a physical diagram which specifics
the actual storage parameters that are physically necessary for anydatabase to be stored on to the disk. The overall systems existential
idea is derived from this diagram.
The relation upon the system is structure through a conceptual E;A
iagram, which not only specifics the existential entities but also the
standard relations through which the system exists and the
cardinalities that are necessary for the system state to continue.
The content level $ is provided to have an idea of the functional
inputs and outputs that are achieved through the system. The
system depicts the input and out put standards at the high level of
the systems existence.
/ata %lo' /iagrams
This iagram server two purpose.
1rovides an indication of how date is transformed as it moves
through the system.
isputes the functions and sub functions that transforms the
dataflow.
The ata flow diagram provides additional information that is
used during the analysis of the information domain, and server as
a basis for the modeling of functions.
The description of each function presented in the $ is contained
is a process specifications called as 11E+
7/24/2019 Report of hotel management system
35/50
7E, ,A!E/
ACC.M./A+$.
N *PH.(/$NG!-!+EM
*nits $nfo
Amin
Guest
Accommoation $nfo
,ooking $nfo
Guests
%acilities $nfo
7/24/2019 Report of hotel management system
36/50
*nits %acilities Registration %lo'
"#
$enerate %!&'
""
(alidateRefunt
)acilities
*nit )acilities + Ref *nit )acilities
*nit )acilities
Scope out ifnotgenerated
*nit)acilities
Registration
Commit&'
Returnif
not
found
,#
$enerate %!&'
,"
(alidateRef
$ender
$uest
+ Ref *nit )acilities
$uest
Registration
)pdateDataba
se)alse
%f )ailed
7/24/2019 Report of hotel management system
37/50
Guest Registration %lo'
ER@/iagrams
The entity ;elationship iagram /E;0 depicts the relationship
between the data objects. The E; is the notation that is used
to conduct the date modeling activity the attributes of each data
object noted is the E; can be described resign a data object
descriptions.
The set of primary components that are identified by the E;
are
ata object ;elationships
)ttributes *arious types of indicators.
The primary purpose of the E; is to represent data objects and
their relationships.
-#
$enerate %!&'
-"
(alidateAccom
.ocation
*nits
*nit
Registration
/rocess )alse
-,
(alidateRef *nitType
D'
Accommodation.ocation
%f )ailed
Commit&'
7/24/2019 Report of hotel management system
38/50
)se ase Diagrams
Use cases model the system from the end users point of view, with the
following objectives
+o efine the functional an o&erational requirements
of the system #y efining a scenario of usage1
+o &ro"ie a class an unam#iguous escri&tion of
ho' the en user an the system interact 'ith one
another1
+o &ro"ie a #asis for "aliation testing1
*nits ,ooking
@ *#ook $/
0 *nit %!0 $uest %!
0 Boo1ing StatusC!
$nsert
7/24/2019 Report of hotel management system
39/50
Accommoation
@ (ocation $/
0 .ocation 2ame0 .ocation )ull 2ame
0 .ocation !esc
$nsert
7/24/2019 Report of hotel management system
40/50
Guest
@ Guest $/
0 $ender Code
$nsert
7/24/2019 Report of hotel management system
41/50
:%(E+T I)8;)&
Ref Gen .# : Ref Gener
*nits o# : *nits
Ref *nit o# : Ref *nits +y&es
All (oc .# : All (ocations
*nit felt o# : *nit %acilites
*nits o# : *nits
*nit ,kng .# : *nit ,ooking
Guest .# : Guest
*nits o# : *nits
Guest o# : Guest
*nit ,ooking o# : *nit ,ookings
(ocation .# : (ocation
C(A!! C.((A,.RA+$.N
: Guest : Ref Gener"
: *nit ,ookings : Guest : Ref Gener
: *nits
,
7/24/2019 Report of hotel management system
42/50
: *nits : Accommoation (ocation
: *nit %acilites
-
: Ref *nit %acilits
: Ref *nit +y&es
: *nit ,ookings : *nits : (ocations
: Guest
4
: Vie' *nit !tatus : *nits : (ocations
: *nit ,kng $/
54
: Ref ,kng !tatus
: Guests
: Ref Gener
7/24/2019 Report of hotel management system
43/50
2= ECUE#+E I)8;)&
40 8UET ;E8IT;)TI:# ECUE#+E
: unit Fac Ref Frm : *nit %acilities : Ref *nit %acilites
R
R
Amin
%ail if not %oun
7/24/2019 Report of hotel management system
44/50
>0 U#IT ;E8IT;)TI:# ECUE#+E
?0 U#IT %::
7/24/2019 Report of hotel management system
45/50
Program /esign (anguage
The program design language is also called as structured English
or pseudopodia. 1' is a generic reference for a design
language 1' looks like a modern language. The difference
between 1' and real programming language lies in the
narrative text embedded directly within 1' statements.
+he characteristics require #y a esign language are:
) fixed system of keywords that provide for all structured
constructs date declaration and modularity characteristics.
) free syntax of natural language that describes processing
features.
ate declaration facilities that should include both simple and
complex data structures.
ubprogram definition and calling techni2ues that support
various nodes of interface description.
1' syntax should include constructs for subprogram definition, interface
description date declaration techni2ues for structuring, conditions constructs,
repetition constructs and ID: constructs.
1' can be extended to include keywords for multitasking andDor concurrent
processing interrupt handling, interposes synchroni!ation the application
design for which 1' is to be used should dictate the final form for the design
language1
7/24/2019 Report of hotel management system
46/50
Testing
Testing is the process of detecting errors. Testing performs a very critical role
for 2uality assurance and for ensuring the reliability of software. The results
of testing are used later on during maintenance also.
1sychology of Testing
The aim of testing is often to demonstrate that a program works by showing
that it has no errors. The basic purpose of testing phase is to detect the
errors that may be present in the program. Hence one should not start
testing with the intent of showing that a program works, but the intent
should be to show that a program doesn9t work. Testing is the process of
executing a program with the intent of finding errors.
+e.els of esting
In order to uncover the errors present in different phases we have the
concept of levels of testing. The basic levels of testing are as shown
belowX+lient #eeds
Requirements
!esign
Code
AcceptanceTesting
System Testing
Integration Testing
Unit Testing
7/24/2019 Report of hotel management system
47/50
System esting
The philosophy behind testing is to find errors. Test cases are devised with
this in mind. ) strategy employed for system testing is code testing.
ode esting*
This strategy examines the logic of the program. To follow this method we
developed some test data that resulted in executing every instruction in the
program and module i.e. every path is tested. ystems are not designed as
entire nor are they tested as single systems. To ensure that the coding is
perfect two types of testing is performed or for that matter is performed or
that matter is performed or for that matter is performed on all systems.
ypes Of esting
)nit esting
+in" esting
)nit esting
Unit testing focuses verification effort on the smallest unit of software i.e. the
module. Using the detailed design and the process specifications testing is
done to uncover errors within the boundary of the module. )ll modules must
be successful in the unit test before the start of the integration testing
begins.
+in" esting
'ink testing does not test software but rather the integration of each module
in system. The primary concern is the compatibility of each module. The
1rogrammer tests where modules are designed with different parameters,
length, type etc.
%ntegration esting
7/24/2019 Report of hotel management system
48/50
)fter the unit testing we have to perform integration testing. The goal here is
to see if modules can be integrated properly, the emphasis being on testing
interfaces between modules. This testing activity can be considered as
testing the design and hence the emphasis on testing module interactions.
System esting
Here the entire software system is tested. The reference document for this
process is the re2uirements document, and the goal os to see if software
meets its re2uirements.
Acceptance esting
)cceptance Test is performed with realistic data of the client to demonstrate
that the software is working satisfactorily. Testing here is focused on
external behavior of the system7 the internal logic of program is not
emphasi!ed.
7/24/2019 Report of hotel management system
49/50
conclusions An Recommenations
The entire project has been developed and deployed as per the re2uirements
stated by the user, it is found to be bug free as per the testing standards that
are implemented. )ny specification untraced errors will be concentrated in
the coming versions, which are planned to be developed in near future. The
system at present does not take care off the money payment methods, as
the consolidated constructs need ' standards and are critically to be
initiated in the first face, the application of the credit card transactions is
applied as a developmental phase in the coming days. The system needs
more elaborative technicality for its inception and evolution.
7/24/2019 Report of hotel management system
50/50
,i#liogra&hy-
;eferences for the 1roject evelopment =ere Taken $rom the following
,ooks an 7e# !ites.
:racle
1'DC' 1rogramming by cott Urman
C' complete reference by 'ivion
()*) Technologies
()*) +omplete ;eference
(ava cript 1rogramming by Qehuda hiran
&astering ()*) ecurity
Head $irst E(% ierra %ates
(4EE 1rofessional by hadab siddi2ui()*) server pages by 'arne 1ekowsley
()*) erver pages by #ick Todd
HT&'
HT&' %lack %ook by Hol!ner
(%+
(ava atabase 1rogramming with (%+ by 1atel moss.
oftware Engineering by ;oger 1ressman