Professional Documents
Culture Documents
SYSTEM INTRODUCTION
1.1 PROJECT INTRODUCTION
When a Computer Software succeeds- when it meets the needs of the people
Who use it.When it performs flawlessly over a long period of time, when it is easy to modify
and even easier to use-it can and does change things for the better. But when Software fails,
when its users are dissatisfied, when it is error prone, when it is difficult to change and even
harder to use, bad things can and do happen.
We all want to build software that makes things better, avoiding the bad things that lurk in the
shadow of failed efforts. To succeed we need discipline when software is designed and built.
Many individuals and companies still develop software haphazardly, even as they build
systems to service the most advanced technologies of the day. As result, the quality of software
that we produce suffers and bad things happen.
HOSTEL MANAGEMENT
I have tried to follow the principles and rules as suggested by the software engineers as far as
possible, in order to make this software a successful one.
1|Page
marks them as qualified or disqualified. This module also offers variety of reports such
allocation list, fine report, joining report etc. to keep an eye on the entire functioning of hostel.
The hostel management system makes use of one lone centralized database running from a
central server. The most important benefit of implementing such a system is that it brings in
the transparency in the entire management which helps to induce discipline in the hostel and
develops a trust between the students and the management.
For admission into hostel, the following special features can be seen in respect of software
hostel management and they are automatic room allocation, saving of inmates particulars for
use at any time, financial management, mess management and all other benefits expected by
inmates.
This software is capable of managing inquiry details, student details, details of faculty
members, payment details and the like. The special features of this software hostel
management are managing of administration panel, information panel, hostel account panel,
student panel, hostel mess and food panel and more.
With this software, the administration is able to reduce employees as well as paper work and
to keep the records of the students and other inmates of the hostel such as allocation of rooms,
arrangement of meals, transfer of rooms, providing necessary facilities in the rooms,
maintaining discipline, maintaining records of visitors, looking after security aspects and other
essential facilities.
With the help of software hostel management, students are able to maintain separate hostel
account and rooms are allotted according to types and deciding on the number of occupants in
each room, waiting list maintenance, issuance of receipts to the fees collected and more.
2|Page
system will help you to check the mess bills of every student and the students hostel dues. The
students of the hostel will be recognized from the ID number allocated at the room rental time
PURPOSE:
This document describes the software requirements for the functioning of a hostel management.
It is intended for admin, hosteller and users.
SCOPE:
The function of HOSTEL MANAGMENT is to support the functioning provide hostel. The
advantage of hostel is that student is not required to go different rooms for living.
References:
1. IEEE Recommended practice for software development
specification-IEEE std8333-1993.
requirement
2. WIKIPEDIA
Overview:
The rest of this SRS document describes the various System Requirements, Interfaces,
Features, And Functionality in details.
ABHISHEK RATHORE 03215202012
3|Page
CHAPTER- 2
SYSTEM ANALYSIS AND FEASIBILITY STUDY
2.1 FUNCTIONAL AND NON FUNCTIONAL REQUIREMENTS
There are two types of requirements:
1. Functional requirements
2. Non- Functional requirements
FUNCTIONAL REQUIREMENTS
These are related to the expectations from the intended software. They describe what the
software has to do. They are also called product features. Sometimes, functional requirements
may also specify what the software should not do.
Functional Requirements should include:
MAIN PAGE:It contains various form like login, sign up by navigating these form customer can get desired
information.
USER LOGIN MODULE:In this module, existing user gives the user-name and password and then he\she can access the
other details and if he\she is current user then first he would have to register himself by option
Registration module.
REGISTRATION MODULE:This module gives a registration form to the user for the Registration. After a unique user-name
and password he would be registered by which he would be login.
NON-FUNCTIONAL REQUIREMENTS
In systems engineering and requirements engineering, a non-functional requirement is a
requirement that specifies criteria that can be used to judge the operation of a system, rather
than specific behaviors. This should be contrasted with functional requirements that define
specific behavior or functions. The plan for implementing functional requirements is detailed
in the system design. The plan for implementing non-functional requirements is detailed in the
system architecture.
4|Page
PRACTICALITY: The system is quite stable and can be operated by the people with
average intelligence.
COST: It is desirable to aim for the system with a minimum cost subject to the
condition that it must satisfy the entire requirement.
FLEXIBILITY: I have tried that the system should be modifiable depending on the
changing needs of the user. Such modifications should entail extensive reconstructing
or recreation of software. It should also be portable to different computer systems.
SECURITY: This is very important aspect which I followed in this designing phase and
tried to covers the areas of hardware reliability, fall-back procedures, and physical security of
data.
5|Page
Feasibility criteria
Technical Feasibility
This evaluation determines whether
The technology needed for the
Proposed system is available and
How it can be applied within the
Organisation. Technical evaluation
Must also assess whether the
organisation had expertise to use it.
ECONOMIC FEASIBILITY
6|Page
Note:
1. Space requirements can be reduced or increased depending on the features that you install.
2. Additional disk space is required if you download the product package to install this product.
Display - 1024 x 768 resolution minimum using 256 Colours (or higher for the best results).
Other-Hardware-Microsoft mouse or compatible pointing device.
SOFTWARE REQUIREMENTS
Platforms:
Operating system - Windows 8, 7 Ultimate, XP.
Environment:
Visual Basic.Net 2010
SQL Server 2008
Front-end used
The .Net Framework (pronounced Dot Net) is a software framework that runs primarily on
Microsoft Windows. It includes a large library and supports several programming languages
which allows language interoperability (each language can use code written in the other
ABHISHEK RATHORE 03215202012
7|Page
languages). Programs written for the .NET Frame execute in a software environment (as
contrasted to hardware environment), known as the Common Language Runtime (CLR), an
application virtual machine that provides important services such as security, memory
management, and exception handling. The class library and the CLR together constitute the
.NET Framework.
The .Net Framework's Base Class Library provides user interface, data access, database
connectivity, cryptography, web application development, numeric algorithms, and network
communications. Programmers produce software by combining their own source code with the
.NET Framework and other libraries. The .NET Framework is intended to be used by most new
applications created for the windows platform. Microsoft also products a popular integrated
environment largely for .NET software called Visual Studio.
DESIGN FEATURES
Interoperability:
Because computer system commonly require interaction between new and older applications,
the .Net Framework provides means to access functionality that is implemented in programs
that execute outside the .NET environment. Access to COM components is provided in the
system. Runtime, Interop services and System. Enterprise services namespaces of the
framework, access to other functionality is provided using P/Invoke feature.
Language independence:
The .NET Framework introduces a Common Type System (CTS). The CTS specification
defines all possible data types and programming constructs supported by the CLR and how
they may or may not interact with each
other conforming to the Common Language
Infrastructure (CLI) specifications. Because of this feature .NET Framework supports the
exchange of types and object instances between libraries and applications written using any
conforming .NET language.
8|Page
which encapsulate a number of common functions, including file reading and writing, graphic
rendering, database interaction, XML document manipulation and so on.
Simplified deployment:
The .NET Framework includes design features and tools that help manage the installation of
computer software to ensure that it does not interface with previously installed software, and
that it conforms to security requirements.
Security:
The design is meant to address some of the vulnerabilities, such as buffer overflows, that have
been exploited by malicious software. Additionally .NET provides a common security model
for all applications.
Portability:
While Microsoft has never implemented the full framework on any system except Microsoft
Windows, the framework is engineered to be platform agnostic, and cross platform
implementation are available for other operating systems (see silver light and the alternative
implementations section below). Microsoft submitted the specifications for the Common
Language Infrastructure (which includes the core class libraries, Common Type System, and
the Common Intermediate Language), the C# language, and the C++/CLI language to both
ECMA and the ISO, making them available as open standards. This makes it possible for the
third parties to create compatible implementations of the framework and its languages on other
platforms.
Architecture:
The purpose of Common Language Infrastructure (CLI) is to provide a language neutral
platform for application development and execution, including functions for Exception
handling, Garbage Collection, security, and interoperability. By implementing the core aspects
of the .NET framework within the scope of the CLI, this functionality will not be tied to a
single language but will be available across the many languages supported by the framework.
Microsoft's implementation of CLI is called the Common Language Runtime (CLR).
9|Page
Security:
.NET has its own security mechanism with two general features: Code Access Security (CSA)
and validation and verification. Code Access Security is based on evidence that is associated
with a specific assembly. Typically the evidence is the source of the assembly (whether it is
installed on the local machine or has been downloaded from the intranet or internet). Code
Access Security uses evidence to determine the permissions granted to the code. Other code
can demand the calling code is granted a specified permission. The demand causes the CLR to
perform a call stack walk: every assembly of each method in the call stack is checked for the
required permission, if any assembly is not granted the permission a security exception is
thrown.
Class library:
The .NET Framework includes a set of class libraries. The class library is organised in a
hierarchy of namespaces. Most of the built APIs are the part of either System.* or Microsoft.*
namespaces. These class libraries implement in large number of common functions, such as
file reading and writing, graphic rendering, database interaction, and XML document
manipulation, among others. The .Net class libraries are available to all CLI complaint
languages. The .NET Framework class library is divided into two parts: the Base Class Library
and the Framework Class Library.
The Base Class Library (BCL) includes a small subset of the entire class library and is the
core set of classes that serve as the basic API of common language runtime. The classes in the
mscrolib.dll and some of the classes in System.dll and System.core.dll are considered to be a
part of BCL. The BCL classes are available in both .Net Framework, Microsoft Silver Light
and Mono.
The Framework Class Library (FCL) is a superset of BCL classes and refers to the entire
class library that ships with .Net Framework. It includes an expanded set of libraries, including
Windows Forms, Foundation, and Windows Communication Foundation among others. The
FCL is much larger in scope than standard libraries for languages like C++ and comparable in
scope to the standard libraries of java.
Memory management
The .NET Framework CLR frees the developer from the burden of managing memory
(allocating and freeing up when done), instead it does the memory management itself by
detecting when the memory can be safely freed. Memory is allocated to instantiations of .NET
ABHISHEK RATHORE 03215202012
10 | P a g e
types (objects) from the managed heap, a pool of memory managed by CLR. As long as there
exists a reference to an object, which might be either a direct reference to an object, which
might be either a direct reference to an object via a graph of objects, the object is considered to
be in use. When there is no reference to an object, and it cannot be reached or used, it becomes
garbage, eligible for collection .NET Framework includes a garbage which runs periodically,
on a separate thread from the applications thread, that enumerates all the unusable objects and
reclaims the memory allocated to them.
The .NET Garbage Collector (GC) is a non-deterministic, compacting, mark and sweep
garbage collector. The GC runs only when a certain amount of memory has been used or there
is enough pressure for memory on the system. Since it is not guaranteed when the conditions
is to reclaim memory are reached, the GC runs are non-deterministic. Each .NET Applications
has a set of roots, which are pointers to objects on the managed heap (Managed objects). These
includes references to static objects and objects defined as local variables or method parameters
currently in scope, as well as objects referred to by CPU Registers. When GC runs, it pauses
the application, and for each object reachable. It uses .NET Metadata and reflection to discover
the objects encapsulated by an object, and then recursively walk them. It then enumerates all
the objects on the heap (which are initially allocated contiguously) using reflection. All objects
are not marked as reachable are garbage. This is the mark phase. Since the memory held by
garbage is not any consequence, it is considered free space. However, this leaves chunks of
free space between objects which are initially contiguous. The objects are then compacted
together to make used memory contiguous again. Any reference to an object invalidated by
moving the objects is updated by the GC to reflect the new location. The application is resumed
after the garbage collection is over.
The GC used by .NET Framework is actually generational. Objects are assigned a generation,
newly created objects belong to Generation 0. The objects that survive a garbage collection are
tagged as Generation 1, and the Generation 1 objects that survive another collection are
Generation 2 objects. The .NET Framework uses up to Generation 2 objects. Higher generation
objects are garbage collected less frequently than lower collection, as older objects tend to have
a larger lifetime than newer objects. Thus, by removing older (and thus more likely to survive
a collection) objects from the scope of a collection run, fewer objects need to be checked and
compacted.
Assemblies: An EXE or a DLL file that forms the basis of deployment, version control,
reuse, and security permissions of an application.
11 | P a g e
Adding references: You need to add a reference to the external object that you want to
use in your current application.
Attributes: The tags that are used to provide additional information about the elements
defined in a Visual Basic .NET program. Some of the most common uses of attributes are
To explain assemblies
Inheritance: Enables you to create classes that are derived from some other classes known
as base classes. Inheritance provides you the advantage of defining a class only once. You
can then reuse this functionality by deriving new classes from this class.
Windows Forms: With a new forms package called Windows Forms, Visual Basic .NET
allows the developers to inherit a form from an existing form.
Structured exception handling: Enables you to create more efficient and robust error
handlers by using structured exception handling, which allows you to detect and remove
errors at runtime.
Backend
Ms sql server 2008
SQL SERVER 2008 (formerly condemned "KATMAI") was released on august6, 2008 and
aims to make data management self tuning, self-organizing, and self-maintaining with the
development of SQL SERVER always on technologies, to provide near-zero downtime. SQL
SERVER 2008 also includes support for structured and semi-structured data, including digital
media formats for pictures, audio, video, and other multimedia data. In current version, such
multimedia data can be stored as BLOBs(binary large objects),but they are generic bit streams
.Intrinsic awareness of multimedia data will allow specialized functions to be performed on
them. According to Paul Flessner, senior Vice President, Server Applications, Microsoft Corp.,
SQL SERVER 2008 can be data storage backend for different varieties of data: XML, email,
time/calendar, file, document, spatial, etc. as well as perform search, query, analysis, sharing
and synchronization across all data types.
Other new data types include specialized date and time types and a spatial data type for
location-dependent data. Better support for unstructured and semi-structured data is provided
ABHISHEK RATHORE 03215202012
12 | P a g e
using the new FILESTREAM data type, which can be used to reference any file stored on the
file system. Structured data and metadata about the file is stored in SQL Server database,
whereas the unstructured component is stored in the file system .Such files can be accessed
both via Win32 file handling APIs as well as via SQL SERVER using T-SQL; doing the latter
accesses the file data as a BLOB. Backing up and restoring the database backs up or restores
the referenced files as well. SQL SERVER 2008 also natively supports hierarchical data, and
includes T-SQL constructs to directly deal with them, without using recursive queries.
The full-text search functionality has been integrated with the database engine. According to a
Microsoft technical article, this specifies management and improves performance.
Spatial data will be stored in two types. A "Flat Earth"(geometry or planar) data type
Represents geospatial data which has been projected from its native, spherical, coordinate
system into a plane. A "Round Earth" data type (Geography) uses an ellipsoidal model which
the Earth is defined as a single continuous entity which does not suffer from the singularities
such as the international dateline, poles or map projection zone "edges"
Approximately 70 methods are available to represent spatial operation for the Open Geospatial
Consortium Simple Features for SQL, Version 1.1
SQL Server includes better compression features, which also helps in improving scalability .It
enhanced the indexing algorithms and introduced the notion of filtered indexes. It also includes
RESOURCE GOVERNOR that allows reserving resources for certain users or workflows .It
also includes capabilities for transparent encryption of data (TED) as well as compression of
Backups.
The version SQL SERVER management studio included with SQL SERVER 2008 supports
intelligence for SQL queries against a SQL SERVER 2008 Database engine .SQL SERVER
2008 also makes the database available via windows PowerShell providers and management
functionality available as CMDLT, so that the server and all the running instances can be
managed from windows PowerShell.
13 | P a g e
Primary key
Every table in SQL Server has a field or a combination of fields that uniquely identifies each
record in the table .The unique identifier is called the Primary key, or Simply the Key. The
Primary Key provides the means to distinguish one record from all other in a table. It allows
the user and the database system to identify, locate and refer to one particular record in the
database.
Relational database
Sometime all the information of interest to a business operation can be stored in a table. SQL
SERVER makes it very easy to link the data in multiple tables. Matching an employee to the
department in which they work is one example. This is what makes SQL server a relational
database management system, or RDBMS. It stores data in two or more tables and enables you
to define relationships between the tables and enables you to define relationships between the
tables
FOREIGN KEY
When a field is one table matches the primary key of another field is referred to as foreign key.
A foreign key is a field or a group of fields in one table whose values match those of the primary
key of another table.
Referential integrity
Not only dose SQL Server allow you to link multiple table, it also maintains consistency
between them .Ensuring that the data among related tables is correctly matched is referred to
as maintaining referential integrity.
Data abestraction
A major purpose of a database system is to provide users with an abstract view of the data. This
system hides certain details of how data is stored and maintained .Data abstraction is divided
into three levels.
Physical level: This is the level of abstraction at which one describes how the data are actually
stored.
ABHISHEK RATHORE 03215202012
14 | P a g e
Conceptual level: At this level of database abstraction all the attributed and what data are
actually stored is described and entries relationship among them.
View level: This is the highest level of abstraction at which one describes only part of the
database.
Advantages of rdbms
- Redundancy can be avoided
-Inconsistency can be eliminated
-Data can be shared
-Standards can be enforced
-Security restrictions can be applied
-Integrity can be maintained
-Conflicting requirements can be balanced
-Data independence can be achieved
Disadvantage of rdbms
A significant disadvantage of the DBMS system is cost. In addition to the cost of purchasing
of developing the software, the hardware has to be upgraded to allow for the extensive
programs and the workspace required for their execution and storage. While centralization
backed reduces duplication, the lack of duplication requires that the database be adequately
backed up so that in case of failure the data can be recovered.
15 | P a g e
DSS and OLTP access to the same critical data, SQL Server leads the industry in both
performance and capability SQL Server is a truly portable ,distributed ,and open DBMS that
delivers unmatched performance, continuous operation and support for every database.
SQL SERVER RDBMS is high performance fault tolerant DBMS which is specially designed
for online transaction processing and for handling large database application.
SQL SERVER with transaction processing option offers two features which contribute to very
high level of transaction processing throughput, which are
-The row level lock manage
Portability
SQL SERVER is fully portable to more than 80 distinct hardware and operating system
platforms, including UNIX, MSDOS, OS/2, Macintosh and dozens of proprietary platforms.
This portability gives complete freedom to choose the database server platform that meets the
system requirements.
Open system
SQL SERVER offers a leading implementation of industry- standard SQL .SQL Server's open
architecture integrates SQL SERVER and non- SQL SERVER DBMS with industrys most
comprehensive provides transparent access to data from other relational database and even nonrelational database.
16 | P a g e
Unmatched performance
The most advance architecture in the industry allows SQL SERVER BBMS to deliver
unmatched performance.
Beginners can create application by learning just a few of the key words, yet the power of the
language allows professional to accomplish using any other windows programming language.
The visual basic programming language is not unique to visual basic. The visual basic
programming language is not unique to visual basic. The visual basic programming system,
Application addition included in the Microsoft excel and many windows application using the
same language, the visual basic system scripting edition control's.
17 | P a g e
Menu bar
Displays the commands you used to work with the visual basic. Besides the standard file, edit,
view, window and help menus are provided to access function specific to programming such
as project, format or debug.
Context menus
Contains short cut to frequently performed action.
Tool bars
Provide quick access to the commonly use in the programming environment.
Tool box
Provide a set of tools that is used at design time to place control on a form in addition to the
default tool box layout, custom layout can also be created by selecting add tab from the context
menu and adding controls to the resulting tab.
Properties window
Lists the properties setting for the selecting for m or control a property is a character stick of
an object. Such as size, caption, colour.
Object browser
Lists object available for use in the project and gives a quick way to navigate through code.
The object browser can be used to explorer in the Visual Basic and other application. See what
methods and properties are available for those objects, and paste code procedures into your
application.
18 | P a g e
Form designer
Serves as a window that is customized to design the interface of the application. Controls
graphics and pictures can be added to a form to create the look wanted. Each form in the
application has its own form designer window.
Single document interface (sdi) or multiple document interface (mdi) with the
SDI option. All of the ID windows are free to be moved anywhere on the screen: as long as
visual basic is the current application they will remain on the of any other application with the
MDI option, all of the IDE windows are contains with a single resize able parent window.
Docking windows
Many of the windows in the IDE can be docked, or connected to each other or to the edge of
the screen. These include the tool box form layout window, project explorer, properties
window, colour, palette and immediate locals and watch windows.
With the MDI option, windows can be docked to any size of the parent windows, with the SDI
they can only be docked beneath the menu bars. Docking application can be table and on off.
For are given window by selecting the application check box on the docking tabs of the option
dialogue box, available from the option command on the tool and menus.
ABHISHEK RATHORE 03215202012
19 | P a g e
20 | P a g e
21 | P a g e
Practically, this methodology may increase the complexity of the system as scope of the
system may expand beyond original plans.
Incomplete application may cause application not to be used as the full system was
designed
Incomplete or inadequate problem analysis.
Prototype model should be used when the desired system needs to have a lot of interaction
with the end users.
Typically, online systems, web interfaces have a very high amount of interaction with end
users, are best suited for Prototype model. It might take a while for a system to be built
that allows ease of use and needs minimal training for the end user.
Prototyping ensures that the end users constantly work with the system and provide a
feedback which is incorporated in the prototype to result in a useable system. They are
excellent for designing good human computer interface systems.
22 | P a g e
CHAPTER 3
SYSTEM DESIGN
Introduction
System Design is an essential activity in the system Development life cycle. System design
is the general detailed specification of the computer based solution that was selecting during
system analysis. In the end, user requirement were translated into specification for the computer
based information System.
Three phases of System Design:
1.) Physical design
2.) Database Design
3.) Interface Design
DATA TYPE
Username
Varchar
Password
Varchar
1. User login
COLUMN NAME
DATA TYPE
Username
Varchar
Password
Varchar
23 | P a g e
2. Registration
COLUMN NAME
DATA TYPE
Roll_no
Varchar
Hosteler_name
Char
Gender
Varchar
Date_of_joining
Char
Date_of_completion
Char
Address
Integer
Phone_no
Varchar
Email_id
Varchar
Stream
Varchar
Hosteler_picture
Image
3. hosteler profile
COLUMN NAME
DATA TYPE
Roll_no
Varchar
Father_name
Char
Mother_name
Float
address
DATA TYPE
5. Payment
COLUMN NAME
DATA TYPE
Roll_no
Varchar
Room_type
Varchar
Furniture_charges
Varchar
24 | P a g e
Food_prefrences
Varchar
Payament_type
Varchar
Draft/cheque
Varchar
6. User registration
COLUMN NAME
DATA TYPE
Username
Varchar
Password
Varchar
Re-enter password
Varchar
Date_of_birth
Varchar
Email_id
Varchar
Address
Varchar
25 | P a g e
ultimately has an effect upon the structure of the whole system from order to dispatch to report.
Symbols used in DFD:-
Function
File/Database
Flow
Source
Her processes will operate in sequence or in parallel. It is quite diff from flowchart.
26 | P a g e
O_level
1_level
27 | P a g e
2_level
2. The use cases are mainly composed of narrative text. Hence, unlike many other modelling
techniques, the non-technical stake holders (e.g. customers etc.) are also able to understand the
model for the software system. This means that feedback can be obtained at a very early stage
of the development from the customers.
3. The use case model can be utilized in several other aspect of software development as well,
e.g. Cost Estimation, Project Planning, Test Case Preparation and User Documentation.
28 | P a g e
S No.
Name
1.
Actor
2.
Use Case
3.
Relationship
Symbol
Description
29 | P a g e
USECASE
3.2.3SEQUENCE DIAGRAM
Sequence Diagrams Represent the objects participating the interaction horizontally and time
vertically. A Use Case is a kind of behavioural classifier that represents a declaration of an
offered behaviour. Each use case specifies some behaviour, possibly including variants that the
subject can perform in collaboration with one or more actors. Use cases define the offered
behaviour of the subject without reference to its internal structure. These behaviours, involving
interactions between the actor and the subject, may result in changes to the state of the subject
and communications with its environment. A use case can include possible variations of its
basic behaviour, including exceptional behaviour and error handling.
30 | P a g e
31 | P a g e
32 | P a g e
Initial State
States
Transition
Final State
STATE CHART DIAGRAM
33 | P a g e
3.3DATABASE DESIGN
3.3.1 ENTITY RELATIONSHIP(ER) DIAGRAM
Definition: An entity-relationship (ER) diagram is a specialized graphic that illustrates
the relationships between entities in a database. ER diagrams often use symbols to represent
three different types of information.
1. Boxes are commonly used to represent entities.
2. Diamonds are normally used to represent relationships
3. Ovals are used to represent attributes...
Also Known As: ER Diagram, E-R Diagram, entity-relationship model
Entity - Relationship(ER) Modelling
ER Model Concepts
--Entities and Attributes -- Entity Types, Value Sets, and Key Attributes - -Relationships and
Relationship Types -- Weak Entity Types--Roles and Attributes in Relationship Types
->A database can be modeled as:
a collection of entities,
i.
Entity: -A real-world object that can be distinctly identified may represent some real
physical object. E.g., Satish is a government employee; Kareena Kapoor is an actress; my
car is a Honda City
ii.
An entity set - Entity set is a set of entities of the same type that share the same
properties.
Example: set of all persons, companies, trees, holidays.
An Entity should be:
An Object that will have many instances in the
ABHISHEK RATHORE 03215202012
34 | P a g e
DB
An Object that will have multiple attributes
An Object that we are trying to model.
v.
Attribute types:
Simple and composite attributes.
Single-valued and multi-valued attributes 'Null attributes
Derived attributes
Identifiers (Key) attribute
35 | P a g e
SYMBOLS OF ER DIAGRAM
36 | P a g e
E_R DIAGRAM
User analyses of the potential users of the system either through discussion with the
people question involve
37 | P a g e
How technically savvy is the user & what similar system does the user already use.
What interface look & field styles appeal to the user.
Registration
38 | P a g e
Payment
Hosteler_profile
Admin_login
39 | P a g e
40 | P a g e
41 | P a g e
42 | P a g e
CHAPTER 4
SYSTEM
TESTING,
MAINTENANCE
IMPLEMENTATION
AND
Source code clarity is enhanced by structured coding techniques, by good coding style, by
appropriate supporting documents, by good internal comments, and by feature provided in
modern languages.
The implementation team should be provided with a well-defined set of software requirement,
an architectural design specification, and a detailed design description .Each team member
misunderstand the objectives of implementation
-FAULT: fault is a condition but causes to fail in performing its required function. A fault is a
basic reason for software malfunction and is synonymous with the commonly used term Bug.
43 | P a g e
TESTING OBJECTIVES:
1. Testing is a process of executing a program with the intent of finding an error.
2. A good test case is one that has a high probability of finding an as yet undiscovered error.
3. A successful test is one that uncovers an as yet undiscovered error.
Testing should systematically uncover different classes of errors in a minimum amount of time
and with a minimum amount of effort. A secondary benefit of testing is that it demonstrates
that the software appears to be working as stated in the specifications. The data collected
through testing can also provide an indication of the software's reliability and quality. But,
testing cannot show the absence of defect -- it can only show that software defects are present.
TESTING PRINCIPLES
Before applying methods to design effective test cases, a software engineer must understand
the basic principles that guide software testing.
1. All tests should be traceable to customer requirements. As we have seen, the objective
of software testing is to uncover errors. It follows that the most severe defects (from the
customers point of view) are those that cause the program to fail to meet its
requirements.
2. Tests should be planned long before testing begins. Test planning can begin as soon as
the requirements model is complete. Detailed definition of test cases can begin as soon
as the design model has been solidified. Therefore, all tests can be planned and designed
before any code has been generated.
3. The Pareto principle applies to software testing. Stated simply, the Pareto principle
implies that 80 percent of all errors uncovered during testing will likely be traceable to
20 percent of all program components. The problem, of course, is to isolate these
suspect components and to thoroughly test them.
4. Testing should begin in the small and progress toward testing in the large. The first
tests planned and executed generally focus on individual components. As testing
progresses, focus shifts in an attempt to find errors in integrated clusters of components
and ultimately in the entire system
5. Exhaustive testing is not possible. The number of path permutations for even a
moderately sized program is exceptionally large. For this reason, it is impossible to
execute every combination of paths during testing. It is possible, however, to adequately
cover program logic and to ensure that all conditions in the component-level design
have been exercised. To be most effective, testing should be conducted by an
independent third party. By most effective, we mean testing that has the highest
probability of finding errors (the primary objective of testing).
44 | P a g e
4. Unit Testing
Unit testing is the testing of an individual unit or group of related units. It falls
Under the class of white box testing. It is often done by the programmer to test that the unit
he/she has implemented is producing expected output against given input.
4. Integration Testing
Integration testing is testing in which a group of components are combined to
Produce output. Also, the interaction between software and hardware is tested in Integration
testing if software and hardware components have any relation. It may fall under both white
box testing and black box testing.
5. System Testing
System testing is the testing to ensure that by putting the software in different environments
(e.g., Operating Systems) it still works. System testing is done with full system implementation
and environment. It falls under the class of black box testing.
6. Acceptance Testing
Acceptance testing is often done by the customer to ensure that the delivered product meets
the requirements and works as the customer expected. It falls under the class of black box
testing.
7. Regression Testing
Regression testing is the testing after modification of a system, component, or a group of
related units to ensure that the modification is working correctly and is not damaging or
imposing other modules to produce unexpected results. It falls under the class of black box
testing.
8. Beta Testing
Beta testing is the testing which is done by end users, a team outside development, or publicly
releasing full pre-version of the product which is known as beta version. The aim of beta testing
is to cover unexpected errors. It falls under the class of black box testing.
45 | P a g e
Created
by:
saurabh kumar
Creation Date:
06/11/2014
Feature/Function/Requirements to Test:
Data or Activities Required to Test
Expected Results
Username
Password
Accepted
User Verification
User Verified
Project/System/Component : Login
&
are
Created by:
saurabh kumar
Creation Date:
06/10/2014
Feature/Function/Requirements to Test:
Data or Activities Required to Test
Expected Results
Username
&
Password are not
Accepted
User Verification
46 | P a g e
Created by:
saurabh kumar
Creation Date:
10/10/2014
Feature/Function/Requirements to Test:
Data or Activities Required to Test
Expected Results
User successfully
registered
Error
displays
Project/System/Component : registration
Created
by:
saurabh kumar
Creation Date:
message
15/10/2014
Feature/Function/Requirements to Test:
Data or Activities Required to Test
Expected Results
User successfully
registered
Error
displays
message
47 | P a g e
Created
by:
saurabh kumar
Creation Date:
16/10/2014
Feature/Function/Requirements to Test:
Data or Activities Required to Test
Expected Results
Submit
Error
displays
Project/System/Component : payament
Created
by:
saurabh kumar
Creation Date:
message
17/10/2014
Feature/Function/Requirements to Test:
Data or Activities Required to Test
Expected Results
Submit payment
Error
displays
message
SYSTEM DEBUGGING
The goal of testing is to identify errors (bugs) in the program. The process of testing generates
symptoms and a program's failure is a clear symptom of the presence of an error. After getting
a symptom, we began to investigate the cause and the place of that error .After identification
of place, we examine that portion to identify the cause of the problem.
This process is called DEBUGGING.
48 | P a g e
DEBUGGING TECHNIQUES:
PRESSMAN explained the few characteristics of bugs that provide some clues:
1. "The symptom and the cause may be geographically remote. That is the symptom may appear
in one part of a program, while the cause may actually be located in other part. Highly coupled
program structures may complicated this situation.
2. The symptom may disappear (temporarily) when another error is corrected.
3. The symptom may actually be caused by non-errors (e.g. round off inaccuracies).
4. The symptom may be caused by human error that is not easily traced.
5. The symptom may be result of timing problems rather than processing problems.
6. It may be difficult to accurately reproduce input conditions (eg. a real time application in
which input ordering is indeterminate).
7. The symptom may be intermittent. This is particularly common in embedded system that
couple hardware with the software inextricably.
8. The symptom may be due to causes that are distributed across a number of task running on
different processors.
49 | P a g e
CHAPTER 5
MAINTENANCE
Copy the HOSTEL MANAGEMENT PROJECT to the local drive of the machine.
Execute SQL server.
Copy file hm.txt from the project folder to the query analyser and execute.
Create database HM .Use HM
Copy the path of the database and change the path in each and every form of the project.
Execute the project.
50 | P a g e
Perfective Maintenance
It means improving processing efficiency or performance or restricting the software to
improve changeability. This may include enhancement of existing system functionality,
computational efficiency etc. It improves software performance, maintainability and can
extend the functionality of the application.
Preventive maintenance
It is done to detect or to correct latent before they become effective faults. This simply
means the prevention of future problems. In this changes are made to the system in order
to prevent further faults and to improve the structure and maintainability of the software.
51 | P a g e
CHAPTER 6
SCOPE OF IMPROVEMENT & CONCLUSION
6.1 Scope of improvement, summary & conclusion
It has been a great pleasure for me to work on this exciting and challenging project.
This project proved good for me as it provided practical knowledge of not only programming
in ASP.NET and vb.NET web based application and no some extent Windows Application and
SQL Server, but also about all handling procedure related with hostel management syatem.
It also provides knowledge about the latest technology used in developing web enabled
application and client server technology that will be great demand in future. This will provide
better opportunities and guidance in future in developing projects independently.
Benefits:
The project is identified by the merits of the system offered to the user. The merits of this
project are as follows:
This project offers user to enter the data through simple and interactive forms. This is very
helpful for the client to enter the desired information through so much simplicity.
The user is mainly more concerned about the validity of the data, whatever he is entering.
There are checks on every stages of any new creation, data entry or updating so that the
user cannot enter the invalid data, which can create problems at later date.
Sometimes the user finds in the later stages of using project that he needs to update some
of the information that he entered earlier. There are options for him by which he can update
the records. Moreover there is restriction for his that he cannot change the primary data
field. This keeps the validity of the data to longer extent.
User is provided the option of monitoring the records he entered earlier. He can see the
desired records with the variety of options provided by him.
From every part of the project the user is provided with the links through framing so that
he can go from one option of the project to other as per the requirement. This is bound to
be simple and very friendly as per the user is concerned. That is, we can sat that the project
is user friendly which is one of the primary concerns of any good project.
52 | P a g e
Data storage and retrieval will become faster and easier to maintain because data is stored
in a systematic manner and in a single database.
Allocating of sample results becomes much faster because at a time the user can see the
records of last years.
Easier and faster data transfer through latest technology associated with the computer and
communication.
Through these features it will increase the efficiency, accuracy and transparency,
6.2 Limitation:
The size of the database increases day-by-day, increasing the load on the database back up and
data maintenance activity.
system.
Future Scope
This System being web-based and an undertaking of Cyber Security Division, needs to
be thoroughly tested to find out any security gaps.
A console for the data centre may be made available to allow the personnel to monitor
on the sites which were cleared for hosting during a particular period.
Moreover, it is just a beginning; further the system may be utilized in various other
types of auditing operation viz. Network auditing or similar process/workflow based
applications...
Future Possibilities
Retail Store Manager is a well-designed software .Considering needs of different entrepreneurs
its working team organized its functionalities, so that new updating can be made without
altering the current structure of the software .It is also possible to do Maintenance with least
ABHISHEK RATHORE 03215202012
53 | P a g e
possible efforts. There are different needs of each entrepreneur and no one software can
possibly fulfil them at their prices i.e. each functionality cost build software cost. Keeping all
this in mind Retail Store manager is build. Functionalities that can be added up in future are:
6.3. CONCLUSION
This project is successfully implemented in Visual Basic 2010 and SQL Server 2008 and was
seen all respect of specification. Any Number of records can be maintained according to given
schedule Of HOSTEL MANAGEMENT.
Till now it is successfully working. As far as the modification in this project is considered, this
facility is built in this project. You can become user and take advantage of special offers.
It is granted that this project will work as it is at present and also in the future as all specification
are along the time and frame Of the department. Also this project can be successfully
implemented in any of hotel management system for online.
54 | P a g e
BIBLIOGRAPHY
BOOKS:
1. Charles Hampfed (2000) Visual Basic University of
Toronto
2. Herbert Schildt (2000) Visual Basic 6.0 Tata McGraw Hill
3. John Zukowski (2000) Visual Basic 6.0 BPB Publications
4. Jamie Jaworsky Visual Basic 6.0Techmedia
5. Stefen Denninger Visual Basic 6.0Authors Press
ONLINE REFERENCE:
www.w3schools.com
www.theserverside.com
www.visual.com
55 | P a g e