Hotel Room Booking Compress
Hotel Room Booking Compress
Hotel Room Booking Compress
1. Introduction
Hotel Room Booking is an offline hotel software and a hotel reservation software that
helps you manage reservations, bookings, room stays, room planning, guests,
accounts, agents, pricing plans, basically front office and back office hotel
operations.
Working with online services instead of installing the management system in stand
alone computer gives you quick and relevant advantages, first it is free, second you
do not need to install any system in your computer and last you do not need to worry
about software or hardware maintenance. The only thing which is required is the
internet connectivity which is very easy to find out now days. One of the most
interesting things about the online application is that the information availability.
Information about whatever thing you want you can get it at the click of a button. In
our Hotel Room Booking, the information maintained will be updated one. So the
customer will get the latest information about the pricing, status of the room, they
even can plan on about the number of days of staying in the hotel. One can also get
the information about what kind of food one gets in the hotel.
This system involves the management of small and medium sized hotel properties. It
will allow check-ins, check-outs, reservations, employee information handling,
product and supplier information handling. A user accesses the system by entering
his/her user name and password which were previously defined by the hotel
owner/manager. The clerk uses the system through a Graphical User Interface
(GUI).
The aim of the project is to design software which manages all the activities of the
hotels and rooms. It is a hotel record keeping system and user can easily see the hotel
information and other details
Visual Basic .NET has been updated to include many new and improved language
features that make it a powerful object-oriented programming language. These
features include inheritance, interfaces, and overloading, among others. Visual Basic
also now supports structured exception handling, custom attributes and also supports
multi-threading.
Visual Basic .NET is also CLS compliant, which means that any CLS-compliant
language can use the classes, objects, and components you create in Visual Basic
.NET. Managed Extensions for C++ and attributed programming are just some of the
enhancements made to the C++ language. Managed Extensions simplify the task of
migrating existing C++ applications to the new .NET Framework.
C# is Microsoft’s new language. It’s a C-style language that is essentially “C++ for
Rapid Application Development”. Unlike other languages, its specification is just the
grammar of the language. It has no standard library of its own, and instead has been
designed with the intention of using the .NET libraries as its own.
Active State has created Visual Perl and Visual Python, which enable .NET-aware
applications to be built in either Perl or Python. Both products can be integrated into
the Visual Studio .NET environment. Visual Perl includes support for Active State’s
Perl Dev Kit.
The pre-coded solutions that form the framework's Base Class Library cover a
large range of programming needs in a number of areas, including user interface, data
access, database connectivity, cryptography, web application development, numeric
algorithms, and network communications. The class library is used by programmers,
who combine it with their own code to produce applications.
Programs written for the .NET Framework execute in a software environment that
manages the program's runtime requirements. Also part of the .NET Framework, this
runtime environment is known as the Common Language Runtime (CLR). The CLR
provides the appearance of an application virtual machine so that programmers need
not consider the capabilities of the specific CPU that will execute the program. The
CLR also provides other important services such as security, memory management,
and exception handling. The class library and the CLR together compose the .NET
Framework.
Because interaction between new and older applications is commonly required, the
.NET Framework provides means to access functionality that is implemented in
programs that execute outside the .NET environment. Access to COM components is
provided in the System.Runtime.InteropServices and System.EnterpriseServices
namespaces of the framework; access to other functionality is provided using the
P/Invoke feature.
The Common Language Runtime (CLR) is the virtual machine component of the
.NET framework. All .NET programs execute under the supervision of the CLR,
guaranteeing certain properties and behaviors in the areas of memory management,
security, and exception handling.
The Base Class Library (BCL), part of the Framework Class Library (FCL), is a
library of functionality available to all languages using the .NET Framework. The
BCL provides classes which encapsulate a number of common functions, including
file reading and writing, graphic rendering, database interaction and XML document
manipulation.
Simplified Deployment
Installation of computer software must be carefully managed to ensure that it does not
interfere with previously installed software, and that it conforms to security
requirements. The .NET framework includes design features and tools that help
address these requirements.
Security
The design is meant to address some of the vulnerabilities, such as buffer overflows,
that have been exploited by malicious software. Additionally, .NET provides a
common security model for all applications.
Portability
Windows, Windows CE, and the Xbox 360. In addition, Microsoft submits the
specifications for the Common Language Infrastructure (which includes the core class
libraries, Common Type System, and the Common Intermediate Language), the C#
language, and the C++/CLI language to both ECMA and the ISO, making them
available as open standards. This makes it possible for third parties to create
compatible implementations of the framework and its languages on other platforms.
Architecture
The core aspects of the .NET framework lie within the Common Language
Infrastructure, or CLI. The purpose of the CLI is to provide a language-neutral
platform for application development and execution, including functions for exception
handling, garbage collection, security, and interoperability. Microsoft's
implementation of the CLI is called the Common Language Runtime or CLR.
Assemblies
more files, one of which must contain the manifest, which has the metadata for the
assembly. The complete name of an assembly (not to be confused with the filename
on disk) contains its simple text name, version number, culture, and public key token.
The public key token is a unique hash generated when the assembly is compiled, thus
two assemblies with the same public key token are guaranteed to be identical from the
point of view of the framework. A private key can also be specified known only to the
creator of the assembly and can be used for strong naming and to guarantee that the
assembly is from the same author when a new version of the assembly is compiled
(required to add an assembly to the Global Assembly Cache).
Metadata
All CLI is self-describing through .NET metadata. The CLR checks the metadata to
ensure that the correct method is called. Metadata is usually generated by language
compilers but developers can create their own metadata through custom attributes.
Metadata contains information about the assembly, and is also used to implement the
reflective programming capabilities of .NET Framework.
Security
.NET has its own security mechanism with two general features: Code Access
Security (CAS), and validation and verification. Code Access Security is based on
evidence that is associated with a specific assembly. Typically the evidence is the
source of the assembly (whether it is installed on the local machine or has been
downloaded from the intranet or Internet). Code Access Security uses evidence to
determine the permissions granted to the code. Other code can demand that calling
code is granted a specified permission. The demand causes the CLR to perform a call
stack walk: every assembly of each method in the call stack is checked for the
required permission; if any assembly is not granted the permission a security
exception is thrown.
When an assembly is loaded the CLR performs various tests. Two such tests are
validation and verification. During validation the CLR checks that the assembly
contains valid metadata and CIL, and whether the internal tables are correct.
Verification is not so exact. The verification mechanism checks to see if the code does
anything that is 'unsafe'. The algorithm used is quite conservative; hence occasionally
code that is 'safe' does not pass. Unsafe code will only be executed if the assembly has
the 'skip verification' permission, which generally means code that is installed on the
local machine.
Class library
Microsoft .NET Framework includes a set of standard class libraries. The class
library is organized in a hierarchy of namespaces. Most of the built in APIs are part of
either System.* or Microsoft.* namespaces. It encapsulates a large number of
common functions, such as file reading and writing, graphic rendering, database
interaction, and XML document manipulation, among others. The .NET class libraries
are available to all .NET languages. The .NET Framework class library is divided into
two parts: the Base Class Library and the Framework Class Library.
The Base Class Library (BCL) includes a small subset of the entire class library and
is the core set of classes that serve as the basic API of the Common Language
Runtime. The classes in mscorlib.dll and some of the classes in System.dll and
System.core.dll are considered to be a part of the BCL. The BCL classes are available
in both .NET Framework as well as its alternative implementations including .NET
Compact Framework, Microsoft Silverlight and Mono.
The Framework Class Library (FCL) is a superset of the BCL classes and refers to
the entire class library that ships with .NET Framework. It includes an expanded set
of libraries, including WinForms, ADO.NET, ASP.NET, Language Integrated Query,
Windows Presentation Foundation, Windows Communication Foundation among
others. The FCL is much larger in scope than standard libraries for languages like C+
+, and comparable in scope to the standard libraries of Java.
Memory management
The .NET Framework CLR frees the developer from the burden of managing memory
(allocating and freeing up when done); instead it does the memory management itself.
To this end, the memory allocated to instantiations of .NET types (objects) is done
contiguously from the managed heap, a pool of memory managed by the CLR. As
long as there exists a reference to an object, which might be either a direct reference
to an object or via a graph of objects, the object is considered to be in use by the CLR.
When there is no reference to an object, and it cannot be reached or used, it becomes
garbage. However, it still holds on to the memory allocated to it. .NET Framework
includes a garbage collector which runs periodically, on a separate thread from the
application's thread, that enumerates all the unusable objects and reclaims the memory
allocated to them.
Versions
Microsoft started development on the .NET Framework in the late 1990s originally
under the name of Next Generation Windows Services (NGWS). By late 2000 the
first beta versions of .NET 1.0 were released.
The .NET Framework stack.
This model provides you with all the features of the common language
runtime and class library while gaining the performance and scalability of the host
server.
C#.NET
One important thing to make clear is that C# is a language in its own right.
Although it is designed to generate code that targets the .NET environment, it is not
itself part of .NET. There are some features that are supported by .NET but not by C#,
and you might be surprised to learn that there are actually features of the C# language
that are not supported by .NET like Operator Overloading.
However, since the C# language is intended for use with .NET, it is important for
us to have an understanding of this Framework if we wish to develop applications in
C# effectively. So, in this chapter
However, before it can be executed by the CLR, any source code that we develop (in
C# or some other language) needs to be compiled. Compilation occurs in two steps
in .NET:
At first sight this might seem a rather long-winded compilation process. Actually,
this two-stage compilation process is very important, because the existence of the
Microsoft Intermediate Language (managed code) is the key to providing many of the
benefits of .NET. Let's see why.
Platform Independence
First, it means that the same file containing byte code instructions can be
placed on any platform; at runtime the final stage of compilation can then be easily
accomplished so that the code will run on that particular platform. In other words, by
compiling to Intermediate Language we obtain platform independence for .NET, in
much the same way as compiling to Java byte code gives Java platform independence.
You should note that the platform independence of .NET is only theoretical at
present because, at the time of writing, .NET is only available for Windows.
However, porting .NET to other platforms is being explored (see for example the
Performance Improvement
This explains why we can expect that execution of managed IL code will be
almost as fast as executing native machine code. What it doesn't explain is why
Microsoft expects that we will get a performance improvement. The reason given for
this is that, since the final stage of compilation takes place at run time, the JIT
compiler will know exactly what processor type the program will run on. This means
that it can optimize the final executable code to take advantage of any features or
particular machine code instructions offered by that particular processor.
Traditional compilers will optimize the code, but they can only perform
optimizations that will be independent of the particular processor that the code will
run on. This is because traditional compilers compile to native executable before the
software is shipped. This means that the compiler doesn't know what type of
processor the code will run on beyond basic generalities, such as that it will be an
Language Interoperability
How the use of IL enables platform independence, and how JIT compilation
should improve performance. However, IL also facilitates language interoperability.
Simply put, you can compile to IL from one language, and this compiled code should
then be interoperable with code that has been compiled to IL from another language.
Intermediate Language
Working with .NET means compiling to the Intermediate Language, and that
in turn means that you will need to be programming using traditional object-oriented
methodologies. That alone is not, however, sufficient to give us language
interoperability. After all, C++ and Java both use the same object-oriented paradigms,
but they are still not regarded as interoperable. We need to look a little more closely at
the concept of language interoperability.
An associated problem was that, when debugging, you would still have to
independently debug components written in different languages. It was not possible to
step between languages in the debugger. So what we really mean by language
interoperability is that classes written in one language should be able to talk directly
to classes written in another language. In particular:
The class can contain an instance of another class, no matter what the
languages of the two classes are
An object can directly call methods against another object written in
another language
Objects (or references to objects) can be passed around between
methods
When calling methods between languages we can step between the
method calls in the
Debugger, even where this means stepping between source code
written in different languages
This is all quite an ambitious aim, but amazingly, .NET and the Intermediate
Language have achieved it. For the case of stepping between methods in the
debugger, this facility is really offered by the Visual Studio .NET IDE rather than
from the CLR itself.
pointers in your code will immediately cause it to fail the memory type safety checks
performed by the CLR.
You should note that some languages compatible with .NET, such as
VB.NET, still allow some laxity in typing, but that is only possible because the
compilers behind the scenes ensure the type safety is enforced in the emitted IL.
Language Interoperability
Garbage Collection
Security
Application Domains
This data type problem is solved in .NET through the use of the Common
Type System (CTS). The CTS defines the predefined data types that are available in
IL, so that all languages that target the .NET framework will produce compiled code
that is ultimately based on these types.
The CTS doesn't merely specify primitive data types, but a rich hierarchy of
types, which includes well-defined points in the hierarchy at which code is permitted
to define its own types. The hierarchical structure of the Common Type System
reflects the single-inheritance object-oriented methodology of IL, and looks like this:
The Common Language Specification works with the Common Type System
to ensure language interoperability. The CLS is a set of minimum standards that all
compilers targeting .NET must support. Since IL is a very rich language, writers of
most compilers will prefer to restrict the capabilities of a given compiler to only
support a subset of the facilities offered by IL and the CTS. That is fine, as long as the
compiler supports everything that is defined in the CLS.
Garbage Collection
The .NET runtime relies on the garbage collector instead. This is a program whose
purpose is to clean up memory. The idea is that all dynamically requested memory is
allocated on the heap (that is true for all languages, although in the case of .NET, the
CLR maintains its own managed heap for .NET applications to use). Every so often,
when .NET detects that the managed heap for a given process is becoming full and
therefore needs tidying up, it calls the garbage collector. The garbage collector runs
through variables currently in scope in your code, examining references to objects
stored on the heap to identify which ones are accessible from your code – that is to
say which objects have references that refer to them. Any objects that are not referred
to are deemed to be no longer accessible from your code and can therefore be
removed. Java uses a similar system of garbage collection to this.
Security
Role-based security is based on the identity of the account under which the
process is running, in other words, who owns and is running the process. Code-based
security on the other hand is based on what the code actually does and on how much
the code is trusted. Thanks to the strong type safety of IL, the CLR is able to inspect
code before running it in order to determine required security permissions. .NET also
offers a mechanism by which code can indicate in advance what security permissions
it will require to run.
The .NET base classes are a massive collection of managed code classes that
have been written by Microsoft, and which allow you to do almost any of the tasks
that were previously available through the Windows API. These classes follow the
same object model as used by IL, based on single inheritance. This means that you
can either instantiate objects of whichever .NET base class is appropriate, or you can
derive your own classes from them.
The great thing about the .NET base classes is that they have been designed to
be very intuitive and easy to use. For example, to start a thread, you call the Start ()
method of the Thread class. To disable a Textbox, you set the Enabled property of a
Textbox object to false. This approach will be familiar to Visual Basic and Java
developers, whose respective libraries are just as easy to use. It may however come as
a great relief to C++ developers, who for years have had to cope with such API
functions as GetDIBits (), RegisterWndClassEx (), and IsEqualIID (), as well as a
whole plethora of functions that required Windows handles to be passed around.
Name Spaces
Namespaces are the way that .NET avoids name clashes between classes.
They are designed, for example, to avoid the situation in which you define a class to
represent a customer, name your class Customer, and then someone else does the
same thing (quite a likely scenario – the proportion of businesses that have customers
seems to be quite high).
A namespace is no more than a grouping of data types, but it has the effect
that the names of all data types within a namespace automatically get prefixed with
the name of the namespace. It is also possible to nest namespaces within each other.
For example, most of the general-purpose .NET base classes are in a namespace
called System. The base class Array is in this namespace, so its full name is System.
Array.
Although C# and .NET are particularly suited to web development, they still
offer splendid support for so-called "fat client" apps, applications that have to be
installed on the end-user's machine where most of the processing takes place. This
support is from Windows Forms.
Windows Control
Although Web Forms and Windows Forms are developed in much the same
way, you use different kinds of controls to populate them. Web Forms use Web
Controls, and Windows Forms use Windows Controls.
It is very easy to write services in C#. There are .NET Framework base classes
available in the System.ServiceProcess namespace that handle many of the boilerplate
tasks associated with services, and in addition, Visual Studio .NET allows you to
create a C# Windows Service project, which starts you out with the Framework C#
source code for a basic Windows service.
2. System analysis
2.1 Introduction
Current system is a manual one in which traveler and business people who travel a lot
to different places has to submit their request for the room booking by calling or after going to
the hotel which is not a best way of doing room booking, here time will be wattage and if
room is not available then lot of problem will arise.travellers has to follow up regularly with
hotel personnel to know the status of their requests which is time consuming and hectic.
Disadvantages:
The proposed system of the room booking is online, where a traveller need not
to go the hotel for the purpose of the room booking it can be done with the help of a
click of button if you have the internet connection. Room availability of the different
hotels with the cost is known very easily and no time is wastage for ther travelling
purpose.
Advantages:
1. The application gives the facility to view the status of the rooms without
visiting the hotels
2. Time is saved as it is done online form travelers home
3. The application gives easy interface which allows a common user also to
understand the flow of the procedure
4. The application is secured and scalable.
typically, there are between three and six task regions. Below figure depicts a spiral
model that contains six task regions:
Construction and release—tasks required to construct, test, install, and provide user
support (e.g., documentation and training
The spiral model demands a direct consideration of technical risks at all stages
of the project and, if properly applied, should reduce risks before they become
problematic. But like other paradigms, the spiral model is not a panacea. It may be
difficult to convince customers (particularly in contract situations) that the
evolutionary approach is controllable. It demands considerable risk assessment
expertise and relies on this expertise for success. If a major risk is not uncovered and
managed, problems will undoubtedly occur. Finally, the model has not been used as
widely as the linear sequential or prototyping paradigms. It will take a number of
years before efficacy of this important paradigm can be determined with absolute
certainty.
Technical Feasibility
Operational Feasibility
Economical Feasibility
TECHNICAL FEASIBILITY
Since the project is designed with ASP.NET with C# as Front end and SQL
Server 2000 as Back end, it is easy to install in all the systems wherever needed. It is
more efficient, easy and user-friendly to understand by almost everyone. Huge
amount of data can be handled efficiently using SQL Server as back end. Hence this
project has good technical feasibility
OPERATIONAL FEASIBILITY
People are inherently instant to change and computers have been known to facilitate
change. An estimate should be made to how strong a reaction the user staff is likely to
have towards the development of the computerized system.
ECONOMICAL FEASIBILITY
The role of interface design is to reconcile the differences that prevail among
the software engineer’s design model, the designed system meet the end user
requirement with economical way at minimal cost within the affordable price by
encouraging more of proposed system. Economic feasibility is concerned with
comparing the development cost with the income/benefit derived from the developed
system. In this we need to derive how this project will help the management to take
effective decisions.
Processor : Pentium
Main Memory : 4 RAM
Hard Disk Drive : 500 GB
Monitor :15’’ Preferably Color Monitor
Keyboard : Standard Multimedia keyboard
Mouse : Optical Mouse
4. System Design
4.1 Introduction
1. Clients:
2. Rooms
3. Status
4. Order processing with tables
5. Enquiry details
6. Employee Details
7. Login Modules
1. Clients module: The advantage with the keeping details of the customer is to care
of the customers who visit the hotel often. So all the details like address and
anything that is related to the customer can be kept in the database permanently.
2. Rooms Module: The details like single room or double room and weather rooms
are vacant or not can be kept in the database. It is very important to maintain the
details of availability of the rooms, because some times in good season its become
very hard to maintain the records of availability of the rooms. We also keep how
many single and double rooms are available at present instance.
3. Order Processing Module: The details like orders that has been placed by the
customer as per the tables can be recorded in the database. Order processing table
will maintain the records like which table has asked for what type of food and this
can be useful to see availability of the items.
4. Enquiry Details Module : Contains the details like rooms are vacant or not as per
the date can be viewed by the customer. This table contains all the enquire which
the customer has posed. The table will help in answering the online like questions
to the customer through phone or through emails.
5. Employee Details: The details like servers and waiters can be placed in this
module. The employee table contains the bio data of the employee, we can also
keep the salary details the shift timings.
6. Login: Authentication module. This module is used for the security reason for the
software.
A data flow diagram is graphical tool used to describe and analyze movement
of data through a system. These are the central tool and the basis from which the
other components are developed. The transformation of data from input to output,
through processed, may be described logically and independently of physical
components associated with the system. These are known as the logical data flow
diagrams. The physical data flow diagrams show the actual implements and
movement of data between people, departments and workstations. A full description
of a system actually consists of a set of data flow diagrams. Using two familiar
notations Yourdon, Gane and Sarson notation develops the data flow diagrams. Each
component in a DFD is labeled with a descriptive name. Process is further identified
with a number that will be used for identification purpose. The development of
DFD’S is done in several levels. Each process in lower level diagrams can be broken
down into a more detailed DFD in the next level. The lop-level diagram is often
called context diagram. It consists a single process bit, which plays vital role in
studying the current system. The process in the context level diagram is exploded
into other process at the first level DFD.
The idea behind the explosion of a process into more process is that understanding at
one level of detail is exploded into greater detail at the next level. This is done until
further explosion is necessary and an adequate amount of detail is described for
analyst to understand the process.
A DFD is also known as a “bubble Chart” has the purpose of clarifying system
requirements and identifying major transformations that will become programs in
system design. So it is the starting point of the design to the lowest level of detail. A
DFD consists of a series of bubbles joined by data flows in the system.
DFD SYMBOLS:
Data flow
Data Store
Booking Table
Offers Table
Restaurant Table
User Table
4.6.1 Introduction
5. System Implementations
5.1 Introduction
5.2 Web Design and Screen Shorts
6. Sample coding
Source Code:
<%@ Page Language="C#" AutoEventWireup="true" CodeFile="home.aspx.cs"
Inherits="_Default" %>
<td align="center">
<a href="users.aspx">users</a>
</td>
<td align="center">
<a href="Booking.aspx">booking</a>
</td>
<td align="center">
<a href="offers.aspx">offers</a>
</td>
<td align="center">
<a href="RestaurantsInfo.aspx">Restaurants</a>
</td>
<td align="center">
<a href="StatusInfo.aspx">Status</a>
</td>
<td align="center">
<a href="admin/home.aspx">Admin</a>
</td>
</tr>
</table>
<br />
<br />
<br />
<table cellpadding="10" width="70%" align="right" style="border-width:
4px; border-style: double;
border-color: Green;" bgcolor="#eeeeee">
<tr>
<td>
Hotel Room Booking is an offline hotel software and a hotel
reservation software
that helps you manage reservations, bookings, room stays,
room planning, guests,
accounts, agents, pricing plans, basically front office and
back office hotel operations.
Working with online services instead of installing the
management system in stand
alone computer gives you quick and relevant advantages,
first it is free, second
you do not need to install any system in your computer and
last you do not need
to worry about software or hardware maintenance. The only
thing which is required
is the internet connectivity which is very easy to find out
now days. One of the
most interesting things about the online application is
that the information availability.
Information about whatever thing you want you can get it at
the click of a button.
In our Hotel Room Booking, the information maintained will
be updated one. So the
customer will get the latest information about the pricing,
status of the room,
they even can plan on about the number of days of staying
in the hotel. One can
also get the information about what kind of food one gets
in the hotel.
</td>
</tr>
</table>
<img src="Images/banner_travel_right.gif" width="28%" height="30%" />
<img src="Images/Travel-agents.gif" width="28%" height="30%" />
</div>
</form>
</body>
</html>
Booking:
</asp:DetailsView>
</td>
</tr>
<tr>
<td>
<asp:SqlDataSource ID="SqlDataSource2" runat="server" ConnectionString="<%$
ConnectionStrings:ConnectionString %>"
DeleteCommand="DELETE FROM [booking] WHERE [bookingid] = @bookingid"
InsertCommand="INSERT INTO [booking] ([username], [HotelName], [FromDate], [TillDate],
[DateofBooking], [amount]) VALUES (@username, @HotelName, @FromDate, @TillDate,
@DateofBooking, @amount)"
SelectCommand="SELECT * FROM [booking]"
AdminRestarants:
<html xmlns="http://www.w3.org/1999/xhtml">
<head runat="server">
<title></title>
</head>
<body>
<form id="form1" runat="server">
<div>
<table cellpadding="10" width="100%" style="border-color: Green; border-style: groove;
border-width: 6px; font-size: 25px; font-weight: bolder; color: Red;">
<tr>
<td>
REASTAURANTS INFORMATION SYSTEM
</td>
</tr>
</table>
<hr size="10" color="purple" />
<p align="right">
<a href="home.aspx">HOME</a></p>
<br />
<br />
Adminstatus:
<DeleteParameters>
<asp:Parameter Name="SNo" Type="Int32" />
</DeleteParameters>
<UpdateParameters>
<asp:Parameter Name="BookId" Type="Int32" />
<asp:Parameter Name="Status" Type="String" />
<asp:Parameter Name="RoomNo" Type="String" />
<asp:Parameter Name="SNo" Type="Int32" />
</UpdateParameters>
<InsertParameters>
<asp:Parameter Name="BookId" Type="Int32" />
<asp:Parameter Name="Status" Type="String" />
<asp:Parameter Name="RoomNo" Type="String" />
</InsertParameters>
</asp:SqlDataSource>
</td>
</tr>
</table>
</div>
</form>
</body>
</html>
Sample Coding C#
using System;
using System.Collections.Generic;
using System.Linq;
using System.Web;
using System.Web.UI;
using System.Web.UI.WebControls;
}
protected void DetailsView1_ItemInserted(object sender,
DetailsViewInsertedEventArgs e)
{
GridView1.DataBind();
}
}
7. System Testing
SYSTEM TESTING AND IMPLEMENTATION
INTRODUCTION
A strategy for software testing integrates software test case design methods
into a well-planned series of steps that result in the successful construction of
software. Testing is the set of activities that can be planned in advance and conducted
systematically. The underlying motivation of program testing is to affirm software
quality with methods that can economically and effectively apply to both strategic to
both large and small-scale systems.
A strategy for software testing may also be viewed in the context of the spiral.
Unit testing begins at the vertex of the spiral and concentrates on each unit of the
software as implemented in source code. Testing progress by moving outward along
the spiral to integration testing, where the focus is on the design and the construction
of the software architecture. Talking another turn on outward on the spiral we
encounter validation testing where requirements established as part of software
requirements analysis are validated against the software that has been constructed.
Finally we arrive at system testing, where the software and other system elements are
tested as a whole.
UNIT TESTING
MODULE TESTING
SYSTEM TESTING
Integration Testing
ACCEPTANCE TESTING
User Testing
Unit testing focuses verification effort on the smallest unit of software design,
the module. The unit testing we have is white box oriented and some modules the
steps are conducted in parallel.
Established technique of flow graph with Cyclomatic complexity was used to derive
test cases for all the functions. The main steps in deriving test cases were:
Use the design of the code and draw correspondent flow graph.
V(G)=E-N+2 or
V(G)=P+1 or
3. CONDITIONAL TESTING
In this part of the testing each of the conditions were tested to both true and
false aspects. And all the resulting paths were tested. So that each path that may be
generate on particular condition is traced to uncover any possible errors.
This type of testing selects the path of the program according to the location of
definition and use of variables. This kind of testing was used only when some local
variable were declared. The definition-use chain method was used in this type of
testing. These were particularly useful in nested statements.
5. LOOP TESTING
In this type of testing all the loops are tested to all the limits possible. The
following exercise was adopted for all loops:
All the loops were tested at their limits, just above them and just below them.
All the loops were skipped at least once.
For nested loops test the inner most loop first and then work outwards.
For concatenated loops the values of dependent loops were set with the help of
connected loop.
Unstructured loops were resolved into nested loops or concatenated loops and
tested as above.
Test Pass
Test Case Expected
Case / Actual Results
Description Results
# Fail
It should be
It has opened
open login
Click on login proper login
01 page without Pass
button page, by clicking
missing any
the login button
themes
Click on login It has showing
It should be
button without error message
ask for enter
02 giving Pass for “enter
username &
username & username &
password
password password”
Enter It has displayed
It should be
username error message
03 ask for enter Pass
without for “enter
password
password password”
Enter It has displayed
It should be
password error message
04 ask for enter Pass
without for “enter
username
username username”
It should be
It has displayed
show
Enter invalid error message
message for
05 username & Pass for “please enter
invalid
password valid username
username &
& password”
password
Test
Test Case Expected Pass /
Case Actual Results
Description Results Fail
#
It has tallied
It should tally with the values
with the values in the database
Click on
01 in the database Pass and showed it’s
check button
and show it’s correct by
correct or not. clicking check
button.
Click on
It has showing
check button It should ask
error message
02 without for enter all Pass
for “enter all
filling few the details.
data”
fields
It should ask
It has displayed
for Email id
Enter wrong error message
03 incorrect after Pass
email id that “Enter valid
clicking check
Email”
button.
It should ask
It has displayed
Enter Same for Username
error message
04 User name exist after Pass
that “This user
twice clicking check
already exist”.
button.
Click on
submit It has displayed
It should ask
button error message
05 for enter all Pass
without for “enter all
details.
entering all details”.
details.
It has saved all
It should save
Click on the data and
all the data
submit showed the
and show
06 button Pass message
Member
entering all “Member
registered
details. registered
successfully.
successfully”.
9. System Maintains
We have to maintain the software until the software handover to the client. within
the estimation of cost only we have to over the project according to the user
requirements. Software maintenance is widely accepted part of SDLC now a days. It
stands for all the modifications and updating done after the delivery of software
product. There are number of reasons, why modifications are required, some of them
are briefly mentioned below:
Market Conditions - Policies, which changes over the time, such as taxation
and newly introduced constraints like, how to maintain bookkeeping, may
trigger need for modification.
Client Requirements - Over the time, customer may ask for new features or
functions in the software.
10. Conclusion
The system of the room booking is online; where a traveler needs not to go the hotel
for the purpose of the room booking it can be done with the help of a click of button if
you have the internet connection. Room availability of the different hotels with the
cost is known very easily and no time is wastage for their travelling purpose.
The hotel management web application of computer technology has more features,
which gives a lot of advances facilities. The tool should be able to manage all the rooms and
hotel customers details maintain effectively and ensure that payment cycle goes on smoothly
and they are completed on time. While accepting customer details, all necessary validations
should be performed.
References
http://www.wikepedia.com
http://aps.net
http://www.google.co.in