You are on page 1of 79

College Roll No- IT/11/11827

University Roll No- IT/11/1145990

ACKNOWLEDGEMENT
I am highly grateful to Prof. Rajbir Singh HOD, Information Technology, IET Bhaddal,
Ropar for providing me this opportunity to carry out the four months Industrial training at
PicNframes. He has been of great help in carrying out the project work and is acknowledged
with reverential thanks.

I would like to express a deep sense of gratitude and thanks profusely to Mr. Sumit Sethi
Director/CEO of Company. Without the wise counsel and able guidance, it would have been
impossible to complete the report in this manner.
The help rendered by (Mr. Baljeet Singh) for experimentation is greatly acknowledged.
I also express gratitude to other faculty members of the Department of Information
Technology, IET Bhaddal, Ropar for their intellectual support throughout the course of this
work.
Finally, I am indebted to all whosoever have contributed in this report work and friendly stay
at PicNframes.

Tania Bagal
College Roll No- IT/11/11827
Univ. Roll No- IT/11/1145990

College Roll No- IT/11/11827

University Roll No- IT/11/1145990

INDEX
1.

CONTENTS
OVERVIEW OF THE ORGANIZATION
1.1 COMPANY PROFILE

1.2 VARIOUS TECHNOLOGIES


2. PROJECT DETAILS

PAGE NO.
4
5

2.1 TRAVEL AROUND THE WORLD

2.2 OBJECTIVES OF THE PROJECT

8-9

2.3 MODULES AND THEIR DESCRIPTION

2.4 SCOPE OF THE PROJECT

10-12
13

3. SYSTEM REQUIREMENTS
3.1 PROCESSING ENVIRONMENT
3.2 FEASIBILITY STUDY
3.3 PROJECT PLAN
3.4 PROGRAMMING AND DEVELOPMENT TOOLS
3.4.1 INTRODUCTION TO PHP
3.4.2 INTRODUCTION TO JAVA SCRIPT
3.4.3 INTRODUCTION TO HTML
3.4.4 INTRODUCTION TO CSS
3.4.5 INTRODUCTION TO DATABASE
3.4.6 INTRODUCTION TO SERVER

15
16-17
18
19-26

4. SYSTEM REQUIREMENT SPECIFICATION


4.1 External Interfaces and Data Flow

27

4.2 Development, Operation and Maintenance Environments

28

4.3 Methodology/Flow chart or Algorithm implemented

4.4 PLANNING

29-30
31-32

5. DESIGN
5.1 SYSTEM DESIGN

34

5.2 Data Flow Diagram

35-38

5.3 DATABASE FORMS

39-45

6. TESTING
6.1 Testing Methods

47-49

6.2 TESTING CASES

50-53
2

College Roll No- IT/11/11827

7. SNAPSHOTS OF PROJECT
8. INSTALLATION (CONVERSION)
9. CURRENT STATUS
10. REMAINING AREA OF CONCERN
11.CONCLUSION
12.REFERENCES

University Roll No- IT/11/1145990

55-70
71
72
73
74
75

College Roll No- IT/11/11827

University Roll No- IT/11/1145990

1. OVERVIEW OF THE
ORGANIZATION

1.1 Company Profile


Name of the company: PIC N FRAMES TECHNOLOGIES
Address :-SCO 85-86 SECTOR 34A CHANDIGARH
Phone: +91-172-5065723-24-25,+91-8054336474
4

College Roll No- IT/11/11827

University Roll No- IT/11/1145990

Email: sumit@picnframes.com
www.picnframes.com

We cater to all the web based needs of our clients with powerful web solutions right from the
conception to the completion of the project. The internet promotion services make sure that
the websites rank well on the popular search engines and gets maximum exposure over the
internet. This is the reason why PIC N FRAMES Technologies is called the 'One Stop Shop'
for all your business needs.
When PIC N FRAMES Technologies web professionals do their job, results speak
themselves. Feel free to check our web site design portfolio and see the quality yourself. We
do web sites which make your visitors think about you: "Those guys are good!"Our
competent graphic designers provide creative designs for your logos, brochures, corporate
identity and presentations to your utmost satisfaction.
We won't leave you alone if you need us after your project is complete. We realize you may
need additions, updates and enhancements at a later time. At time, we will be always with
you to help in your project additions.

1.2 PICNFRAMES excels in the following Technologies:


Java technologies EJB, JSP, J2EE, STRUTS, Eclipse, AJAX.
Microsoft Technologies - .Net Framework 4.0, ASP.Net, Silverlight.

College Roll No- IT/11/11827

University Roll No- IT/11/1145990

Oracle Solutions 10g DBA, PLSQL.


Operating System Windows 7, XP, LINUX, Solaris.
Designing Flash, Adobe Photoshop, Dreamweaver, GIF Animator.
Open Source Technologies PHP/MYSQL.

College Roll No- IT/11/11827

University Roll No- IT/11/1145990

2.PROJECT DETAILS

2.1TRAVEL AROUND THE WORLD

College Roll No- IT/11/11827

University Roll No- IT/11/1145990

The Project entitled "TRAVEL AROUND THE WORLD" (Travel and Tourism) is a webbased application Software developed in PHP as front end and MYSQL as a back end. The
main aim of "TRAVEL AROUND THE WORLD is to improve the services of Customers
and travel agents. It maintains the details of customer payments, addition of new customers,
tour packages and also updating, deletion for the same. It also stores the details of
invoicesgenerated by customer and give them notifications through smsservices. Secure
source of payments made by them credit or debit card. The primary features of the project
entitled TRAVEL AROUND THE WORLD" is high accuracy, design flexibility and easy
availability. And also it uses database tables Representing entities and relationships between
entities.
The travel industry is still one of the largest single businesses in world commerce and its
importance is widely recognized. The tourism industry is now one of the largest sectors
earning foreign exchange. In the face of many benefits, many countries have started assigning
due weight age to the tourism industry in their national development agenda. Tourism is an
industry that operates on a massively broad scale: it embraces activities ranging from the
smallest sea-side hotel; to air-lines, multi-national hotel chains and major international tour
operators. Originally, non-traditional industries such as tourism emerged as a solution to
strike a balance between ecology and industry
Tourism is one of the world's fastest growing industries at present and holds the status.
Spending on tourism amounts to 5%-10% of total consumer, spending in a year
worldwide.The industry creates a job every 2.4 seconds with every one of those direct jobs
creating another eleven indirect ones.The tourism industry as a whole is presently estimated
to earn over US$ 3.5 trillion worldwide. India's share of the total market is a pittance at
0.51%. The non-tourist countries like Malaysia and Indonesia get much more tourists than
India.The Tourism industry's foreign exchange earnings in India are around $3.2 billion.
Tourism is the highest foreign exchange earner if we consider the fact that net value addition
in Gems and jewelers is less than 30 % whereas, in tourism it is more than 90%.The Around
the world web application is intended to provide complete solutions for vendors as well as
customers through a single get way using the internet as the sole medium.

2.2 OBJECTIVES OF THE PROJECT


8

College Roll No- IT/11/11827

University Roll No- IT/11/1145990

This project is aimed at developing a web-based system, which manages the activity of
Travel Around The World. This system will manage the database and maintain a list of all
student groups that have registered on this site, conduct their online test and shortlist those
students who have passed the eligibility criteria as set by the professors.

Local group leaders/staff welfare local group leaders are employed on more than
90% of our trips, and we aim to use local guides and support staff where possible, providing
employment for local communities. We are committed to developing long-term relationships
with our local suppliers, by working closely with them to develop new products/services and
providing staff training to ensure that the economic benefit is ongoing.

Use local services by using local transport and as many local businesses as possible,
money stays in-country and local enterprise is encouraged. We work closely with local
restaurants, shops and equipment providers, and also choose locally-owned accommodation,
25% of our trips now feature a home stay, giving money to local families to accommodate
our guests.

Information within our brochure and trip notes we provide our customers with
information on how they can act responsibly whilst on holiday, including details of local
projects they may visit whilst away. Our local group leaders help our customers gain an
insight into the culture of the country they are visiting.

Environment we audit all of our trips according to their environmental impact and then
work to minimize this. This means making sure local trekking guidelines are followed, no
litter is left behind, water sources are environmentally friendly and responsible cooking fuels
are used, if applicable. We also have guidelines in place for specific excursions, like
snorkeling and tiger viewing, so awareness is raised on how to protect, and not disturb,
fragile environments.

Itinerary Development when planning our trips, we consider how each one can run
responsibly. Can we source a homestay? Where can we use local transport, instead of a
charter bus? Is there a project we can support, or is there a visit where fees paid will go
towards environmental development?

College Roll No- IT/11/11827

University Roll No- IT/11/1145990

Once the trip is operating, it is audited on these things and many more. The trip is then given
a score to assess its responsibility and its an on-going process to increase that. We aim to
ensure our trips are as responsible as they possibly can be.

Projects we have a number of partnerships with charities and projects, which we support
by

donating

money

for

every

customer

that

travels

on

specific

trips.

We have ask each of our customers for a 1 donation to our Adventure Company Foundation.
These donations are collected over a three month period and then sent to a local project voted
for by you.
It is also important we get it right at home as well.

Local Community we link schools in our destinations with schools in the UK to foster
mutual education benefits. So far we have links in India, Tanzania and Sri Lanka. This
involves UK school children writing to pupils in other countries, in a pen-pal scheme. This
enables children in countries worldwide to practice their English and UK children to gain a
cultural understanding of other countries through friendship and education.
The suppliers we use and the practices we adopt in our offices in the UK are constantly
reviewed. However, we recognise theres always more we can do, and were working on that.
All of our initiatives are monitored by a team of staff dedicated to Responsible Travel at The
Adventure Company, who meet monthly to review current practices and develop new
projects.

10

College Roll No- IT/11/11827

University Roll No- IT/11/1145990

2.3MODULES AND THEIR DESCRIPTION


1.)

Administrator Module

2.)

Agents Module

3.)

Member Module

4.)

End User Module

Administrator Module: - As its name suggests, in this module admin manages all
administrative level work.

Agents Module: - This module works basically on the agents who provide the hotels
facilities and tour guidance to the End User as well as the Member Module.

Member Module: - This module works when the end user becomes the member of
our site. As soon as the end user becomes member they can get more benefits as
compared to the end user module.

End User Module: - In this module, the end user get the information as per own
requirements.

Details about Administrator Module:-I focused more on the administrator


module, because it is assigned to me. In this module the admin can add, update, delete
the data, check the update performed by the agents, verify the agents etc. Administrator
have all the rights to perform all the tasks. I listed some of the pages names that comes
under Administrator Module:-

11

College Roll No- IT/11/11827

University Roll No- IT/11/1145990

1) Countryfrm: - To add, update, delete country data.


2) Statefrm: - To add, update, delete state data.
3) Cityfrm: - To add, update, delete city data.
4) AddFaqfrm: - To add, update, delete frequently asked questions.
5) GuestReviewfrm :- To add, update, delete the reviews given by the guests

12

College Roll No- IT/11/11827

University Roll No- IT/11/1145990

Details about Agents Module


I focused more on the agents module, because it is assigned to me. In this module the agents,
works as hotels manager, that represents their hotels for the booking. In this module, the
agents can add, update, and delete the information related to their hotels. It can also provides
the facilities to the tour guide, for touring the visitors. I listed some of the pages names that
comes under agents Module:-

1) AddDayWiseTourPlacefrm: - This form provides facilities to the agent to add day


wise tour so that end user came to know that per day where they will be visit.
2) ChangePasswordfrm: - To change their password.
3) Packagefrm.aspx :- It provides packages to the end users for various places.
4) EditProfile: - To edit the details or add the new information.
5) Hotelfrm: - This web form helps agents to add their hotels.

Details about Member Module:I focused more on the member module, because it is assigned to me. In this module the
member can change their password, describe their requirements and get regular updates
happens on this site and get discount on the tour charges. In this site, there is a points system,
means the member who get as number of point, they get prize from our site. We include this
type of system, so that the end user get attract to our site.
1) Loginfrm: - To login the users for view his details.
2) GuestReviewfrm:- It provides facilities to the member to send his review to the
admin.
3) QuickQuery: - To query to the admin regarding any kind of doubt related to tour.
4) ChangePasswordfrm: - Facilitates to change password.
13

College Roll No- IT/11/11827

University Roll No- IT/11/1145990

14

College Roll No- IT/11/11827

University Roll No- IT/11/1145990

2.4 SCOPE OF THE PROJECT


The scope of the project must also be evaluated. Benefits may be categorized as tangible or
intangible. Tangible benefits which are measured in money terms consist of the saving of

Time

Certain operating costs.

Intangible benefits are more difficult to estimate and justify. They are often impossible to
give a money value to.
These may include

Satisfaction of the students

Efficiency.

15

College Roll No- IT/11/11827

University Roll No- IT/11/1145990

3.SYSTEM REQUIREMENTS

16

College Roll No- IT/11/11827

University Roll No- IT/11/1145990

3.1 Processing Environment


In our project, there are very simple requirements in the computer. To achieve our purpose
hardware and software requirements one as follows: -

HARDWARE REQUIREMENTS
PROCESSOR: Intel core i3
RAM: 2 GB
HARD DISK: 320 GB
CD ROM

SOFTWARE REQUIREMENTS
Operating System :- WINDOWS 7,XP
Web Browser :- Google Chrome,Mozilla Firefox
Database :- MySQL
WAMP, XAMPP
Netbeans, Dreamweaver

17

College Roll No- IT/11/11827

University Roll No- IT/11/1145990

3.2 Feasibility Study


The objective of initial investigation is to determine whether the request is valid and feasible
before a recommendation is reached to do nothing, improves, or modify the existing system
or a build a new one. Depending on the results of initial investigation, the survey is expanded
to a more detailed feasibility study. A feasibility study is a test of a system proposal according
to its workability, impact on the organization, ability to meet user needs and effective use of
racemes.

3.2.1Economic Feasibility:
The above feasibility study deals with the actual cost to be incurred on the project. The
concern for which the project is to be made is able to bear the charges and is financial sound
enough to make the system viable. The financial resources are checked and they are kept as a
base to the making of the system. Thus this feasibility is reduced and is under control and we
can go in for the project. Our project is economical feasible because it is not so much costly to
develop. It can run in high as well as low graded systems as per its requirements.

3.2.2 Technical Feasibility:


Technical feasibility centers on the existing computer system and to what extent it can
support the proposed addition. For example, if the current computer is operating at
18

College Roll No- IT/11/11827

University Roll No- IT/11/1145990

80% capacity- and arbitrary ceiling- then running another application could overload
the system or require additional hardware. This involves financial consideration to
accommodate technical enhancement. If the budget is a serious constraint, then the
project is judged not feasible.

3.2.3 Social Feasibility:


It is important to study that the social implications when a new system is introduced.
People are inherently resistant to change and computers have been known to facilitate
change. An estimate was made of how strong reaction user staff is likely to have
towards the development of a computerized system.

3.2.4 Schedule Feasibility:


It is the project deadline reasonable. Some projects are initiated with specific deadline
you need to determine whether the deadline are mandatory or desirable. It is
preferable to deliver a properly functioning system two months later than to deliver an
error prone useless system on time. Inadequate system is worse. Its a choice between
the lesser of to evils. So keeping in view the above statement we decided to keep my
deadline mandatory. We extended our deadline to give an error free software package.

3.2.5 Motivational Feasibility:


To achieve the desired objective it is necessary to motivate the developer group.
Motivational feasibility means to coach and direct individual to overcome difference
and achieve project goals as a team.

3.2.6 Behavioral Feasibility:


People are inherently resistant to change and computers have been known the
facilitate change. An estimate should be made of how strong a reaction the user staff
is likely to have towards the development of a computerized system.

19

College Roll No- IT/11/11827

University Roll No- IT/11/1145990

3.3 PROJECT PLAN


TEAM STRUCTURE:

(i)

Tania Bagal

DEVELOPMENT SCHEDULE:
(i)

Core PHP

(ii)

Database Design Of Project

(iii)

Interface Designing

(iv)

Coding

(v)

Validations

20

College Roll No- IT/11/11827

University Roll No- IT/11/1145990

3.4 PROGRAMMING AND DEVELOPMENT TOOLS


3.4.1 Introduction to PHP:
The first version of what came to be known as PHP was created in 1995 by a man named
RasmusLerdof. Rasmus, now an engineer at Yahoo!, needed something to make it easier to
create content on his web site, something that would work well with HTML, yet give him
power and flexibility beyond what HTML could offer him. Essentially, what he needed was
an easy way to write scripts that would run on his web server both to create content, and
handle data being passed back to the server from the web browser. Using the Perl language,
he created some technology that gave him what he needed and decided to call this technology
"Personal Home Page/Forms Interpreter". The technology provided a convenient way to
process web forms and create content.

21

College Roll No- IT/11/11827

University Roll No- IT/11/1145990

What exactly is PHP?


PHP is an intuitive server side scripting language. Like any other scripting language it allows
developers to build logic into the creation of web page content and handle data returned from
a web browser. PHP also contains a number of extensions that make it easy to interact with
databases, extracting data to be displayed on a web page and storing information entered by a
web site visitor back into the database.
How Does PHP Work?
To develop an understanding of how PHP works it is helpful to first explore what happens
when a web page is served to a user's browser. When a user visits a web site or clicks on a
link on a page the browser sends a request to the web server hosting the site asking for a copy
of the web page. The web server receives the request, finds the corresponding web page file
on the file system and sends it back over the internet to the user's browser.

Characteristics of PHP
PHP is about providing the programmer with the necessary tools to get the job done in a
quick and efficient fashion. Five important characteristics make
PHPs practical nature possible:

Familiarity

Simplicity

Efficiency

Security

Flexibility

One final characteristic makes PHP particularly interesting: its free!

22

College Roll No- IT/11/11827

University Roll No- IT/11/1145990

o Familiarity
Programmers from many backgrounds will find themselves already accustomed to the PHP
language. Many of the languages constructs are borrowed from C and Perl, and in many
cases PHP code is almost indistinguishable from that found in the typical C or Pascal
program. This minimizes the learning curve considerably.
o Simplicity
A PHP script can consist of 10,000 lines or one line: whatever you need to get the job done.
There is no need to include libraries, special compilation directives, or anything of the sort.
The PHP engine simply begins executing the code after the first escape sequence (<?) and
continues until it passes the closing escape sequence (?>). If the code is syntactically correct,
it will be executed exactly.
o Efficiency
Efficiency is an extremely important consideration for working in a multi-user environment
such as the WWW. PHP 4.0 introduced resource allocation mechanisms and more
pronounced support for object-oriented programming, in addition to session management
features. Reference counting has also been introduced in the latest version, eliminating
unnecessary memory allocation.
o Security
PHP provides developers and administrators with a flexible and efficient set of security
safeguards. These safeguards can be divided into two frames of reference: system level and
application level.
o System-Level Security Safeguards
PHP furnishes a number of security mechanisms that administrators can manipulate,
providing for the maximum amount of freedom and security when PHP is properly
configured. PHP can be run in what is known as safe mode, which can limit users attempts to
exploit the PHP implementation in many important ways. Limits can also be placed on
maximum execution time and memory usage, which if not controlled can have adverse
affects on server performance. Much as with a cgi-bin folder, administrators can also place
restrictions on the locations in which users can view and execute PHP scripts and use PHP
scripts to view guarded server information, such as the password file. Application-Level
Security Safeguards Several trusted data encryption options are supported in PHPs
predefined function set. PHP is also compatible with many third-party applications, allowing
for easy-integration with secure ecommerce technologies. Another advantage is that the PHP
23

College Roll No- IT/11/11827

University Roll No- IT/11/1145990

source code is not viewable through the browser because the script is completely parsed
before it is sent back to the requesting user. This benefit of PHPs server-side architecture
prevents the loss of creative scripts to users.

Flexibility

Because PHP is an embedded language, it is extremely flexible towards meeting the needs of
the developer. Although PHP is generally touted as being used in conjunction solely with
HTML, it can also be integrated alongside languages like JavaScript, WML, XML, and many
others. Additionally, as with most other mainstream languages, wisely planned PHP
applications can beeasily expanded as needed. Browser dependency is not an issue because
PHP scripts are compiled entirely on the server side before being sent to the user. In fact, PHP
scripts can be sent to just about any kind of device containing a browser, including cell
phones, personal digital assistant (PDA) devices, pagers, laptops, not to mention the
traditional PC. People who want to develop shell-based applications can also execute PHP
from the command line.

3.4.2 INTRODUCTION TO JAVA SCRIPT


Todays world need much more than simple HTML. There is a definite need to allow
user to not only browse but interact with web site too. This is traditionally done with the help
of forms, to satisfy such needs java script is a great tool. Moreover it helps in event driven
programs; all these facilities and even more are available with java Script.
Java Script is an object oriented language that allows creation of interactive web
pages. Java Script allows user entries which are loaded into an HTML form to be processed
as required. This empowers a web site to return site information according to a users
requests.

24

College Roll No- IT/11/11827

University Roll No- IT/11/1145990

Java Script offers a great advantage to web developers as a short development cycle,
easy of learning, small size script and so on. It needs a browser that is to be java compatible.
The most commonly used is Netscape Communicator, and even the newer versions of
windows browser.
Syntax:
<SCRIPT LANGUAGE= Java Script >
// Java Script code snippet written here
</SCRIPT>
Advantages:
The main advantages of Java Script are:

Can be used as embedded with HTML.

Minimal syntax, easy to learn.

Good performance, procedural qualities, designed for simple, small programs.

Easy debugging and testing.

Designed for programming user events.

3.4.3 INTRODUCTION TO HTML


Hyper Text Markup Language is very effective language to develop the site. Our
project is prepared in HTML. It also includes the important codes that are used while we
coding a site. It supports the d-html and script languages like VB-Script and Java Script; here
in this project we have used the later one.
HTML is a very simple language, easy to learn and user friendly. It is as popular as it
can use any text editor for coding purposes, and developing web pages is a easy task here.
25

College Roll No- IT/11/11827

University Roll No- IT/11/1145990

HTML is the language interpreted by browsers. Web pages are also called HTML documents.
HTML is a set of special Codes that can be emended in text to add formatting and linking
Information. HTML is specified as tags in an HTML documents i.e the Web page.
HTML TAGS
PARED TAGS:
Tags are instructions that are emended directly into the text of Pair tags called closed
tags because it begin <>and close</>.
SINGLAR TAGS :
A singular tags not have a companion tag e.g<BR>Some tags that we used in our
project describe in brief given below:<HTML>it is used to start.
<HEAD> it is used to place the information about the program.
<TITLE>it is used to give the title of the information.
<BR>it is used to break a line.
<H1> to <H6>it is used to give the size of the specific heading.

3.4.4 INTRODUCTION TO CSS

Cascading Style Sheets (CSS) is a style sheet language used for describing the
presentation semantics(the look and formatting) of a document written in a markup language.
Its most common application is to style web pages written in HTML and XHTML, but the
language can also be applied to any kind of XML document, including plain XML.
CSS is designed primarily to enable the separation of document content (written in
26

College Roll No- IT/11/11827

University Roll No- IT/11/1145990

HTML or a similar markup language) from document presentation, including elements such
as the layout, colors, and fonts.[1] This separation can improve content accessibility, provide
more flexibility and control in the specification of presentation characteristics, enable
multiple pages to share formatting, and reduce complexity and repetition in the structural
content (such as by allowing for tableless web design).
CSS can also allow the same markup page to be presented in different styles for different
rendering methods, such as on-screen, in print, by voice (when read out by a speech-based
browser or screen reader) and on Braille-based, tactile devices. It can also be used to allow
the web page to display differently depending on the screen size or device on which it is
being viewed.
Simple definition of CSS:
CSS stands for Cascading Style Sheets
Styles define how to display HTML elements
Styles were added to HTML 4.0 to solve a problem
External Style Sheets can save a lot of work
External Style Sheets are stored in CSS files
An "external" CSS style sheet file, as described below, can be associated with an HTML
document using the following syntax:
Syntax:
<link href="path/to/file.css" rel="stylesheet">

3.4.5 INTRODUCTION TO DATABASE

MySQL is a fast, easy-to-use RDBMS used being used for many small and big
businesses. MySQL is developed, marketed, and supported by MySQL AB, which is a
Swedish company. MySQL is becoming so popular because of many good reasons.

27

College Roll No- IT/11/11827

University Roll No- IT/11/1145990

MySQL is released under an open-source license. So you have nothing to pay to use
it.

MySQL is a very powerful program in its own right. It handles a large subset of the
functionality of the most expensive and powerful database packages.

MySQL uses a standard form of the well-known SQL data language.

MySQL works on many operating systems and with many languages including PHP,
PERL, C, C++, JAVA etc.

MySQL works very quickly and works well even with large data sets.

MySQL is very friendly to PHP, the most appreciated language for web development.

MySQL supports large databases, up to 50 million rows or more in a table. The


default file size limit for a table is 4GB, but you can increase this (if your operating
system can handle it) to a theoretical limit of 8 million terabytes (TB).

MySQL is customizable. The open source GPL license allows programmers to modify
the MySQL software to fit their own specific environments.

3.4.6 INTRODUCTION TO SERVER

WAMP Server is a Windows web development environment. It allows you to create web
applications with Apache2, PHP and a MySQL database. Alongside, PHPMyAdmin allows
you to manage easily your databases.
28

College Roll No- IT/11/11827

University Roll No- IT/11/1145990

ACRONYM FOR:
W- Windows
A- Apache http server
M-MySQL
P-PHP

Functionalities
WAMP Servers functionalities are very complete and easy to use so we wont explain here
how to use them.
With a left click on WAMPServers icon, you will be able to:

manage your Apache and MySQL services

switch online/offline (give access to everyone or only localhost)

install and switch Apache, MySQL and PHP releases

manage your servers settings

access your logs

access your settings files

create alias

With a right click :

change WAMPServers menu language

access this page

29

College Roll No- IT/11/11827

University Roll No- IT/11/1145990

4. SYSTEM REQUIREMENT
SPECIFICATIONS

30

College Roll No- IT/11/11827

University Roll No- IT/11/1145990

4.1 External Interfaces and Data Flow

This heading specifies the externally observable characteristics of the software product.
Several graphical tools are used to express the requirements of a system rather than writing
long lines of text. These are very effective tools for use during the system analysis phase.

User Displays
These are extremely useful tools for interactive applications where fast response is
needed. The user displays consist of screens that help in designing a menu driven system. The
menus attached to the screens help in making a system interactive and user friendly by
providing an easy to use point and click interface to the application. These menus consist of a
list of options from which the user can choose an action depending on the task to be
performed. So these forms or so called user displays is the key to the success of the entire
system.

31

College Roll No- IT/11/11827

University Roll No- IT/11/1145990

4.2 Development, Operation and Maintenance Environments

Development Environment
Having constant interaction with the users as well as management aids in the system
development. The logical user suggestions sure certainly welcomed and considered.
There is a multi-user environment in the organization. For the development of new
system mysql, rdbms package, tomcat server for server side programming will be
used and Microsoft front page, java server pages and java script for client side
programming and will be used to provide GUI to system.

Operating Environment
The input data required are obtained from the documents, which contains all the
details of the transactions. After validation and relevant processing, the data is to be
stored in the database. The user selects the desired database table on after which the
query is formulated. The query is generated by filtering the database based on the user
defined conditions and constraints. The formulated query is executed on the database
to obtain the required information.

Maintenance Environment
The proper maintenance of the new system is very important for its smooth working.
The maintenance of the software is to be done by the system analyst and programmers
in the organization. But for hardware maintenance engineer may be called from where
hardware was purchased.

User Characteristics

The users of the new system will be the users of the website of the organization. The system
is developed with the participation of users, which will help them to understand the system
easily.

Sources of Information

32

College Roll No- IT/11/11827

University Roll No- IT/11/1145990

Primary sources of the information involve direct interaction with the employees of the
organization working in the development department.

Interviews: interviews are the main source of gathering data and to get acquainted
with the existing system. Almost all the information about the present system was
gathered with the help of interviews. The questions are pre-planned and asked
according to the designation of the users.

Observations: Observations were personally made of what data is desired and how it
is to be graphically represented or in a tabular manner and how it is to be saved. The
observation of crucial information, data flows and functioning of the entire system
was made carefully. This helped to obtain the additional knowledge about the system
and to view the system more deeply. So all the aspects of the existing system are
thoroughly observed which includes how people perform their tasks, noting the things
that they do, how they do it and how much time they take. The records being
manipulated and their frequency of updating and flow of documentation and
important business transactions are also observed. Observations were personally made
of how data can be possibly queried and represented by the user.

Objectives of the Proposed System


The development of the proposed system is done keeping in view the problems in the existing
system. The proposed system will not only overcome the limitations of the present system but
will also provide the following characteristics.

To reduce the paper work involved in managing the information regarding different
accounts.

To reduce the time constraint that is just wasted because of manual work.

To centralize all the data regarding accounts at one place.

To maintain all steps involved from opening the account from its manager to make it
available to use anywhere by the client.

To generate various reports required by the administrator regarding accounts.

33

College Roll No- IT/11/11827

University Roll No- IT/11/1145990

4.3 Methodology/Flow chart or Algorithm implemented


Qualitative and Quantitative research methodologies were used for this project. This linear
sequential model suggests a systematic, sequential approach to software development that
begins at the system level and progress through analysis, design, coding, testing and
maintenance.

Recognition of
need

Feasibility Study

Requirement
Analysis

Design

Coding

Testing
Implementation &
Maintainance

System Development Life


Cycle

The linear sequential model encompasses the following activities:


System / information engineering and modeling.
Software requirement analysis.
Design.
Code generation.
Testing.
34

College Roll No- IT/11/11827

University Roll No- IT/11/1145990

Maintenance.

4.4 PLANNING
Problem Recognition
A problem is well defined very rarely. It corps out with a vague feeling of some statements
that lead to vague conclusions. So the first task is to get more crucial information by
interviewing and meeting concerned people. It clarifies how the problem is felt, how often it
occurs, how it affects the business and which departments are suffering with this. This phase
consists of the following tasks.

Problem Definition And Initial Investigation


This was a preliminary investigation done with a view to have a feel of the working of the
proposed system. This phase has been identified the end-user directly involved in the system
who were the managers, assistant officer and database administrator, and the development
department. By understanding the working of database, its flow and also after conducting
meetings and interviews with the concerned persons of the department, a clear idea about the
working was obtained. A flexible approach is adapted towards people who are interviewed.
Short hand written notes are prepared based on the response of the employees. The interviews
are preferably conducted at the work place of the person being interviewed. Detailed
investigation is done in order to define the scope of the problem .The interview is concluded
with a quick resume of the ground covered during the interview .The Questionnaire technique
is combined with interviews to get the best result. Proper care has been taken in the design of
such questionnaires so that the persons answering these questions dose not feel hesitant. An
explanatory note that serves to gain cooperation and avoid misunderstanding by setting out
the purpose of the exercise clearly accomplishes each questionnaire.
Observation technique is also used for fact finding. The work described at the time of
interview is observed personally ads it reduces the chances of misunderstanding and
omissions. Some important things observed are like the flow of information through the
system and important data transactions, the data being maintained and the frequency of their

35

College Roll No- IT/11/11827

University Roll No- IT/11/1145990

updating.By the end of this phase, idea as to how the information enters the system, how it is
stored, how it is processed, how information changes affects the working of the system.

5.DESIGN

36

College Roll No- IT/11/11827

University Roll No- IT/11/1145990

5.1 System Design

System design is the first step in moving from the problem domain to solution domain. In
other words, starting with what is needed, design takes us toward how to satisfy the needs,
the design of a system is perhaps the most critical factor affecting the quality of software; it
has major impact on the later phase, particularly Testing and implementation. The output of
this phase is design document. The design of a system is essentially a blueprint or a plan for a
solution for the system.
The design process for software systems often has two levels. At the first level the
focus is on the deciding which modules are needed for the system, the specification of these
modules, and how the modules should be interconnected? This is what is called the system
design or top-level design.
In the second level, the internal design of the modules, or how the specification of the
modules can be satisfied, is decided. This design is often called detailed design or logic
design. A design methodology is a systematic approach to creating a design by applying of set
of techniques and guidelines. Most design methodologies focus on the system design. System
design is a process of developing specification for a candidate system. That make the criteria
establishes in system Analysis. A major step in design is the preparation of input and design
of output report in a form acceptable to the user.
It also includes determining the record media, method of input and entering into the
system. In output design emphasis is on producing a hard copy of the information displaying
the output of a screen in a pre-define format. Input Design is process of converting useroriented input into a computer-based format.
In accurate input data is the most common cause of errors in data processing. Errors
entered by data entering operations can be controlled by input Design. Input data collected
and organized into groups of similar data.

37

College Roll No- IT/11/11827

University Roll No- IT/11/1145990

5.2 Data Flow Diagram


A DFD also known as bubble chart has the purpose of clarifying system requirement and
identifying major transformations that will become programs in system design. So, itis
starting point of the design phase that functionally decomposes the requirement specifications
down to the lowest level of detail. A DFD consists of a series of bubbles joined by lines. The
bubbles represent data transformations and the lines represent data flows in the system. A
DFD describes what data flow rather than how they are processed so it does not depend on
the hardware, software, and data structure or file organization.

Steps of Constructing a DFD


Process should be named and numbered for easy reference. The direction of flow is
from top to bottom and left to right. Data traditionally flow from source to destination,
although they may flow back to source. When a process is exploded into lower level
details, they are numbered. The names of data stores, sources and destinations are
written in capital letters. Process and data flow names have the first letter of each
word in capital forms.

DFD Symbols:

i.

A square defines a

source or a destination of the system data.

ii.

An arrow identifies data flow-data in motion.

iii.

A circle or a bubble represents a process that transforms


Incoming data flows into outgoing data flows.
38

College Roll No- IT/11/11827

iv.

University Roll No- IT/11/1145990

An open rectangle is a data store-data at rest, or a temporary repository of data.

Advantages of Using Data

Flow Diagrams

1. DFDs are easier to understand May technical and non-technical audiences.


2. DFDs can provide a high-level system overview, complete with boundaries and
connections to other systems.
3. DFDs can provide a detailed representation of system components. DFDs help
system designers and other during initial analysis stage visualize a current system
or one that may be necessary to meet new requirements.

39

College Roll No- IT/11/11827

University Roll No- IT/11/1145990

Data Flow Diagram: Level 0

Member
Members
s

Agent

Admin

Add Hotels and tour place

View Booking Details

Manage Website Settings


Website

Register Tour Place and Hotels

End User

40

College Roll No- IT/11/11827

University Roll No- IT/11/1145990

Data Flow Diagram: Level 1

View Videos

Add FAQ
Login

Admin

Change Password

Member

Add Country, State, City


Post Review
Query

View Booking

Add Hotels Rating


Add Videos

Register

Website
View Guest Review

News Letter
View Videos

Booking Hotels
Booking Tour Place
Booking Packages
Add Tour Place

Add Hotels

Login

News
Letter

Agent

Add Package

End Users

41

College Roll No- IT/11/11827

University Roll No- IT/11/1145990

CITY TABLE

COUNTRY TABLE

42

College Roll No- IT/11/11827

University Roll No- IT/11/1145990

STATE TABLE

REGISTRATION TABLE
43

College Roll No- IT/11/11827

University Roll No- IT/11/1145990

DAYWISETOUR TABLE

DISTANCEINFORMATION TABLE
44

College Roll No- IT/11/11827

University Roll No- IT/11/1145990

FAQ TABLE

FLIGHT TABLE
45

College Roll No- IT/11/11827

University Roll No- IT/11/1145990

FLIGHTBOOKING TABLE

FLIGHT TYPE TABLE


46

College Roll No- IT/11/11827

University Roll No- IT/11/1145990

GUESTREVIEW TABLE

HOTEL TABLE
47

College Roll No- IT/11/11827

University Roll No- IT/11/1145990

HOTELBOOKING TABLE

HOTEL RATING TABLE


48

College Roll No- IT/11/11827

University Roll No- IT/11/1145990

6.TESTING

49

College Roll No- IT/11/11827

University Roll No- IT/11/1145990

TESTING
During earlier development phases, an attempt is made to build software from an Abstract
concept to a tangible implementation. Software testing is a critical element of Software quality
assurance and represents ultimate review of specifications; design and Coding nation of
"correctness" of the software just developed and overcome a conflict pf interest that occurs when
errors are recovered. A thorough testing of system before any implementation is mandatory, as
regards its individual program, the system as a whole, user acceptance of the system etc. this is
because implementing a new system is a major job, which requires a lot of man-hours and other
resources, so an error not detected before implementation may cost a lot. Effective testing early in
a process is also necessary because in some cases, a small error not detected and corrected early
before installation may explore into much larger problems.
After programming and testing comes the stage of installing the computerized system. Actual
implementation of the system can be begin at this point using either of parallel or direct change
over plan, or a blend of the two.

Steps followed in Testing

Testing can be done with two types of data and Test data.

Live data is the data actually to be used in the proposed system.

Test Data is previously designed sample input to achieve predictable results.

50

College Roll No- IT/11/11827

University Roll No- IT/11/1145990

Testing Objectives

Testing is a process of execution a program with the intent of finding and error.

A good test case is one that has a high portability of finding an undiscovered error

A successful test is one that uncovers an as yet discovered error.

Testing Principles

ATI Test should be traceable to customer requirements.

Test should be planned long before testing begins.

Testing should begin "in small" and progress towards testing "in the large".

Exhaustive testing is completely possible.

To be most effective, an independent third party should conduct testing.


6.1Testing Methods

White Box Testing:


White box testing of software is predicted on close examination of procedural detail. Providing
test cases that exercise specific sets of condition and or loops tests logical paths through the
software .White box testing, sometime called glass box testing , is a test case design method that
used the control structure of the procedural design to derive test cases. Using white box testing
methods, following test cases can be derived.Guarantee that all independent paths within module
have been exercised at least once.

Exercise all logical decisions in their true and false sides. Execute all lops at their boundaries and
within their operational bounds.

Exercise internal data structure to assure their validity.

The errors that can be encountered while conducting white box testing are

Logic errors and incorrect assumptions.

Typographical errors.

Black Box Testing:

51

College Roll No- IT/11/11827

University Roll No- IT/11/1145990

Black box testing is carried out to check the functionality of the various modules. Although
they are designed to uncover errors, black box tests are used to demonstrate that software
functions are optional; that input is properly accepted and output is correctly produced; and
that the integrity of external information is maintained, a black box test examines some
fundamental aspects of the system with little regard for the internal logical structure of the
software. Black box testing focuses on the functional requirements of the software.

Black box testing attempts to find errors in the following categories.

Incorrect of missing functions.

Interface errors.

Errors in data structure of external database access

Performance errors,

Initialization and termination

errors.

Unlike white box testing, which is performed early in the testing process, black box tends to
apply during later stages of testing. Because Black box testing purposely disregards control
structure, attention is focused on the information domain.

Software Testing Strategies

A strategy for software testing integrates software test case design methods into a well
planned series of steps that result in the successful construction of software. An important,
software testing strategy provides a road map. Testing is a set of activities that can be planned
in advance and conducted systematically - Various strategies are given below:

Unit Testing: unit Testing focuses verification efforts on the smallest unit of software
design i.e. Module. Using the procedural design description as a guide, important control
paths are test to uncover errors within the boundary of the module.

Integration Testing: Integration testing is a systematic technique for constructing the


program structure while conducting tests to uncover errors associated with interfacing.

52

College Roll No- IT/11/11827

University Roll No- IT/11/1145990

Acceptance Testing: To ensure that the final system, as it will be delivered, compiles
with all the Client's requirements of the system , as detailed in the SRS. If minor
alterations are required , then some form of regression testing may also have to be used.

Validation Testing: At the culmination of integration testing, software is completely


assembled as a package; Interfacing errors have been uncovered and corrected and a final
series of software test validation testing may begin.

System Testing: Software is incorporated with other system element and a series of
system integration and validation test are conducted .The various types of system testing
are:

Recovery Testing: many computer based system must recover from faults and
resume processing within a pre specified time.

Security Testing: Security testing attempts to verity that protection mechanism built into a
system will in fact protect it from improper penetration.

Stress Testing: Stress tests are designed to confront programs with abnormal
situations.

Performance Testing: Performance Testing is designed to test runtime performance


of software within the context of an integrated system.

All the above mentioned testing principles have been applied to all the modules have passed
the tests successfully.

6.2Test cases
Verification and Validation Of all the fields
Check for the invalid data type for each of the fields.
Check for the maximum and minimum field length. Also the null status

53

College Roll No- IT/11/11827

University Roll No- IT/11/1145990

Format of all the date fields and values of all the look up tables
Enable/disable status of the fields and also their mandatory status

Query and Search Functioning


Try making query on each of the specified field one by one.
Now make query on all the fields at one go
Make a query without entering any data for any field
Try out the same cases for making the search

LOGIN FORM:
Test case Condition being tested

Input

Excepted Result

No

Actual
Result

Enter valid name and password & Valid

Website should display main Successful

click on login button

window

Input

Enter invalid

Invalid
Input

website should not display main UnSucessfu


window

REGISTRATION FORM:
Test

Condition

Input

Excepted Result

Actual

54

College Roll No- IT/11/11827

University Roll No- IT/11/1145990

Case No

being tested

Result

On the click of

.Filling

insert Button

Valid

At first user have to fill all fields with

Successful

proper data , if any Error like entering


text data instead of number or
entering number instead of text..is

Data

found then it gives proper message


otherwise

Adds

Record

To

the

Database
2

On the Click of
Insert Button

Filling

At first user have to fill all fields with

Unsuccessf

invalid data

proper data , if any Error like entering

ul

text data instead of number or


entering number instead of text..is
found then it gives proper message
otherwise

Adds

Record

To

the

Database

CITY FORM:
Test

case Condition

No

tested

On the

.Filling At first user have to update the desired Successfu

click

Valid

of

submit number or entering number instead of

submit

data

button

being Input Excepted Result

Test
Result

fields with proper data , if any Error l


like entering text data instead of
text..is found then it gives proper
message otherwise updates Record To
the Database

55

College Roll No- IT/11/11827

On the
Click of
submit

University Roll No- IT/11/1145990

Filling At first user have to update the desired Unsucces


invalid fields with proper data , if any Error sful
submit like entering text data instead of
data

number or entering number instead of


text..is found then it gives proper

Button

message otherwise updates Record To


the Database

STATE FORM:
Test

case Condition

being Input Excepted Result

No

tested

On the

.Filling At first user have to update the desired Successf

click

Valid

of

submit number or entering number instead of

submit

data

Result

button
2

On the
Click of
submit
Button

Test

fields with proper data , if any Error ul


like entering text data instead of
text..is found then it gives proper
message otherwise updates Record To
the Database

Filling At first user have to update the desired Unsucce


invalid fields with proper data , if any Error ssful
submit like entering text data instead of
data

number or entering number instead of


text..is found then it gives proper
message otherwise updates Record To
the Database

COUNTRY FORM:

56

College Roll No- IT/11/11827

University Roll No- IT/11/1145990

Test

case Condition

being Input Excepted Result

No

tested

On the

.Filling At first user have to update the desired Successf

click

Valid

of

submit number or entering number instead of

submit

data

Result

button
2

On the
Click of
submit
Button

Test

fields with proper data , if any Error ul


like entering text data instead of
text..is found then it gives proper
message otherwise updates Record To
the Database

Filling At first user have to update the desired Unsucce


invalid fields with proper data , if any Error ssful
submit like entering text data instead of
data

number or entering number instead of


text..is found then it gives proper
message otherwise updates Record To
the Database

57

College Roll No- IT/11/11827

University Roll No- IT/11/1145990

7.SNAPSHOTS

SNAPSHOTS OF PROJECT

58

College Roll No- IT/11/11827

University Roll No- IT/11/1145990

59

College Roll No- IT/11/11827

University Roll No- IT/11/1145990

60

College Roll No- IT/11/11827

University Roll No- IT/11/1145990

61

College Roll No- IT/11/11827

University Roll No- IT/11/1145990

62

College Roll No- IT/11/11827

University Roll No- IT/11/1145990

63

College Roll No- IT/11/11827

University Roll No- IT/11/1145990

64

College Roll No- IT/11/11827

University Roll No- IT/11/1145990

ADMIN LOGIN

65

College Roll No- IT/11/11827

University Roll No- IT/11/1145990

66

College Roll No- IT/11/11827

University Roll No- IT/11/1145990

67

College Roll No- IT/11/11827

University Roll No- IT/11/1145990

68

College Roll No- IT/11/11827

University Roll No- IT/11/1145990

69

College Roll No- IT/11/11827

University Roll No- IT/11/1145990

70

College Roll No- IT/11/11827

University Roll No- IT/11/1145990

71

College Roll No- IT/11/11827

University Roll No- IT/11/1145990

72

College Roll No- IT/11/11827

University Roll No- IT/11/1145990

73

College Roll No- IT/11/11827

University Roll No- IT/11/1145990

74

College Roll No- IT/11/11827

University Roll No- IT/11/1145990

Installation (Conversion)
It is the process of changing from the old system to the new one. There are various methods
of handling conversion. However the pros and cons of each method should be evaluated
before deciding on the final approach. This precaution is very necessary because the success
or failure of entire project depends on it. The methods of conversion are:

Direct Conversionas all user stop using the old system and at the same time being
using new system. The option is fast disruptive. This software of TRAVEL
AROUND THE WORLD is also made according to direct conversion.
Parallel Conversionas in this user continues to use the old system while an
increasing amount of data is processed through the new system. The output from the
two systems is compared and switch is made.
Phased conversionas personnel in single plot site use the new system and then entire
organization makes the switch. Although this approach takes ,more time then other
types of conversion, it gives opportunity to test user response to system thoroughly

75

College Roll No- IT/11/11827

University Roll No- IT/11/1145990

Current Status
This project has been concluded with the help of my teacher and friends. I am deeply obliged to them
their unstinted cooperation and help The project is a computerized version of the existing Institute
system. The project is website capable of conducting computerized handle the
system viz. company information, job detail

etc. The data access using this

project is very fast.

This project includes all the features needed for effective and accurate working of TRAVEL
AROUND THE WORLD. All these features make it powerful management system.The
website mainly reduces the limitation of existing system and tends to accurate manual
processing, eliminate the paper work and fundamentally change the basic method of
operating. Due to the speed of processing, accuracy of results produced and user friendly is
easy to use and maintain. The project environment is so user friendly that even a beginner to
computers can run this project and handle all the transactions included in this project.
Provision for each and every condition is given in this project, so even if the user does some
thing wrong, the database maintained by it remains unchanged as high level of validation
checks have been used to avoid the wrong entry. The message boxes used in this project to
guide the user when any error occurs or when he is going through some transaction are so
clear that there can never be any problem while using the website.

76

College Roll No- IT/11/11827

University Roll No- IT/11/1145990

Remaining Area of Concern


This website can be made more secure by using advance password security. There is also
upgraded version of MySQL available in the market, so that you should get so many options
to apply different queries. Which will make this website more user friendly and it will be easy
for the user to understand the different operations in the website. To provide more
advancement in this website it should be implemented in the form of TRAVEL AROUND
THE WORLDwith which the users can access the information about the Company and
their jobs.

77

College Roll No- IT/11/11827

University Roll No- IT/11/1145990

CONCLUSION

The system has been developed for the given condition and is found working effectively. The
developed system is flexible and changes whenever can be made easy. Using the facilities
and functionalities of .Net, the software has been developed in a neat and simple manner,
thereby reducing the operators work.
The speed and accuracy are maintained in proper way. The user friendly nature of this
software developed in .Net framework is very easy to work with both for the higher
management as well as other employees with little knowledge of computer. The
results obtained were fully satisfactory from the user point of view.
The system was verified with valid as well as invalid data in each manner. the system
is run with an insight into the necessary modifications that may require in the future.
Hence the system can be maintained successfully without much network.

78

College Roll No- IT/11/11827

University Roll No- IT/11/1145990

REFERENCES:

BOOKS REFERRED: WELLING,L.,THOMSON,L. PHP AND MYSQL WEB DEVELOPMENT Addison


Wisley(4TH EDITION)
HOLZER,S. BLACK BOOK HTML WILEY DREAMTECH
RANKIN,PAUL & JENSEN MS SQL SERVER 2000 Sams
WEBSITES REFERRED : PHP tutorial URL: http://www.php.net/manual/en/manual.php
PHP functions URL: http://www.w3schools.com/php/php functions.asp
Introduction URL: https://en.wikipedia.org/wiki/PHP
Web programming URL: http://www.phpmoot.com/web-programming-with-php
Php forms URL: http://www.w3schools.com/PHP/php forms.asp

79

You might also like