project report on abcx

Upload: jasmandeep-brar

Post on 08-Aug-2018

213 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/22/2019 project report on ABCX

    1/82

    1

    PROJECT REPORT

    On

    ROYAL INDIAN TOUR

    MASTER OF COMPUTER APPLICATIONS

    (Batch 2012-2013)

    Submitted to: Submitted by:

    Mr. ------------------ Name: jaswinder kaur(HOD-MCA) Semester: MCA 6th (LE)

    Roll No: 12205810112

    PUNJAB TECHNICAL UNIVERSITY (MCA 6-LE)

    JALANDHAR

  • 8/22/2019 project report on ABCX

    2/82

    2

    MAJOR PROJECT REPORT

    On

    ROYAL INDIAN TOUR

    At

    K Y COMPUTERS, RAJPURA

    Subm it ted in part ial ful f i l lment for th e award of the degree of

    MASTER OF COMPUTER APPLICATIONS

    (Batch 2012-2013)

    Submitted to: Submitted by:

    Mr. ------------------ Name: JASWINDER KAUR(HOD-MCA) Semester: MCA 6th (LE)

    Roll No: 12205810112

  • 8/22/2019 project report on ABCX

    3/82

    3

    ACKNOWLEDGEMENT

    Apart from the efforts of me, the success of my project depends largely on the

    encouragement and guidelines of many others. I take this opportunity to express

    my gratitude to the people who have been instrumental in the successful

    completion of this project.

    I would like to show my greatest appreciation to my project in-charge, MR.

    KRISHAN TULI . I cant say thank you enough for the tremendous support and

    help. I feel motivated and encouraged every time I attend his meeting. Without his

    encouragement and guidance this project work would not have materialized.

    Im highly grateful to MR. KRISHAN TULI, for his thorough guidance right from

    day 1 till the end of training. He actually laid the ground for conceptual

    understanding of technologies used in project.

    The guidance and support I received from my internal guide- MR. KRISHAN TULI,

    was equally vital for the success of the project. Im grateful for his constant

    support and help.

    JASWINDER KAUR

  • 8/22/2019 project report on ABCX

    4/82

    4

    DECLARATION

    I, JASWINDER KAURhereby declare that the report of the project entitled

    Royal Indian Tour has not presented as a part of any other academic work to

    get my degree or certificate except (PUNJAB TECHNICAL UNIVERSITY,

    JALANDHAR) for the fulfillment of the requirements for the degree of Master of

    Computer Application.

    jaswinder kaur (Roll No: 12205810112)

    (Session : 2012-2013)

  • 8/22/2019 project report on ABCX

    5/82

    5

    Table of ContentsObjective of the Project

    1. Project Profile:-

    1.1 Introduction

    1.2Purpose of Documents

    1.3Project Scope

    1.4Definitions, Acronyms and Abbreviations

    2. General Description:-

    2.1RIT Function2.2User Characteristics2.3Principal Actor2.4Operating Environment2.5User Documentations2.6Assumptions and Dependencies

    3. System Requirements:-

    3.1Software Tools:

    3.1.1 About ASP.NET

    3.1.2 About JAVA SCRIPT

    3.1.3 About HTML

    3.1.4 About MY-SQL

    3.2 Hardware Platform

  • 8/22/2019 project report on ABCX

    6/82

    6

    4. System Analysis

    4.1Existing System4.2 Need of a new system

    4.3 Proposed System

    4.4 Feasibility Study

    5. System Requirement Specification

    5.1 Introduction to SRS

    5.2 Software Engineering Paradigm

    6. System Design and Development:

    6.1 Introduction

    6.2 Steps of Design Process

    6.3 Data Flow Diagrams

    6.4 E-R Diagrams

    6.5 Data Base Design

    6.5.1 Database Table:

    6.5.1.1 CLIENT Table

    6.5.1.2 USERINFO Table

    6.5.1.3REGISTER USER Table

    6.5.1.4 HOTEL FACILITIES Table

    6.5.1.5 LOCATION Table

    6.5.1.6 HOTEL Table

    6.5.1.7 ADD TO CART Table

    6.5.1.8 CONTACT US Table

  • 8/22/2019 project report on ABCX

    7/82

    7

    6.5.1.9 RID Table

    6.5.1.10 TID Table

    7. Module Description

    7.1 Modules of Project & Descriptiom

    8. System Testing

    9. System Implementation and Maintenance

    10. Future Extension and Conclusion

    11. Bibliography.

  • 8/22/2019 project report on ABCX

    8/82

    8

    OBJECTIVES OF THE PROJECT:-Before Starting the project we should fully know about the meaning of project. There are

    seven letters in the word PROJECT each character has its own technical meaning.

    Planning

    This deal with the idea at thinking and which are required for the project.

    Resource

    The money problem will be solved and resources from which collected.

    Operating

    The procedure from which the getting job is prepared in a systematic way is

    known as operation.

    Joint effortThis is directly proper to a operation output is made of several person working

    sincerely is known as JOINT EFFORT.

    Engineering

    A well-educated engineer can do this work in a better way to find out better result.

    Hence the project is as engineering function.

    Co-operation

  • 8/22/2019 project report on ABCX

    9/82

    9

    To make the project successfully, it is necessary for its success and completion of

    project.

    Technique

    It must as it gives a better shape. It is not possible to complete the project without

    technique.

    The project is a system that gives the systematic way of planning and working.

  • 8/22/2019 project report on ABCX

    10/82

    10

    1)Project Profile:-1.1Introduction

    Project:-ROYAL INDIAN TOUR We have tried to design the Website in such a way that user

    may not have any difficulty in using this package & further expansion is possible without much

    effort. Even though we cannot claim that this work to be entirely exhaustive, the main purpose of

    our exercise is to gather information about places for vacations. We are confident that this

    website package can be readily used by non-programming personal avoiding human handled

    chance of error. This project is used by following types of users-

    Administrator can maintain daily updates . Administrator is must be an authorized user. He can

    further change the password. There is the facility for password recovery, logout etc.

    Unauthorised users can only acess the information about the locations.

    Some basic requirements of the Web-App:-

    1.2Purpose of Documents:

    Provide information about the famous locations and hotels in these areas

    We also provide theofferprice thats suits to the tourist budget

    Facility of booking and payment tranasaction

    Registration facilities.and contact us to be in touch with us

    The Software includes:-

    1. Information about locations and hotel2. Providing add to cart facilities3. Pay now and registration facilities

  • 8/22/2019 project report on ABCX

    11/82

    11

    4. Member Identification whether authorized or notTechnical Requirements

    There are some technical requirements which should be assured by every type of sites:-

    1. Range of work volumes2. Range of time.3. Database size and compatible softwares.4. Security requirements.

    1.3 Project Scope:

    The Software Requirements Specification captures all the requirements in a single document. It can

    be used in any tour and travel organization for maintaining member details and their existence.

    1.4Definitions, Acronyms and Abbreviations

    In Order to make any trip to any famous Locations And Hotels Royal Indian Tour is the best

    travel consultant in India..It makes your travel experience a memorable with our years of

    experience and trust of thousands of clients.

    Some Basic Functions Of WebApp

    Project is related to Royal Indian Tour The project maintains two levels of users:-

    Administrator Level-login , logout Unauthorized user:to acees only information about the locations

    Main facilities available in this project are:- Maintaining records of user like transaction id,email,phone no etc Providing different facilities to members.

    Hotel room type facilities Facilities in hotels purchasing facilities online transaction facilities

  • 8/22/2019 project report on ABCX

    12/82

    12

    If guard user forgets his/her password then a message of unauthorized user will be displayed. In this project collection of data is from different residential areas. Members information will be automatically updated in the database. User or Administrator can search a members record by his/her transaction id. Member Id is also given to each member.

    2)GENERAL DESCRIPTION:-

    2.RIT Function

    RIT is web-app formed by groups of people from a specific geographic community who come

    together to gather information about tourists attraction locations. It provide facilities like:-

    Registeration Contact us On Line payment Add to cart Booking facility

    Various operational works that are done in our project are:-

    Recording information about the users that come. Generating on line bills. Maintenance of the list of user information.

    Keeping records of transaction id that is provided to each user who is authorized.

  • 8/22/2019 project report on ABCX

    13/82

    13

    Keeping information of member database.

    2.2 User Characteristics

    The project maintains two levels of users:- Administrator Level-Honours Unauthorized User Level- Permission of onlyData access

    Every user should be:

    Comfortable of working with computer.

    He must have knowledge in IT field.

    He must also have basic knowledge of English too.

    2.3 Principal Actor

    The main Principal Actor of this project Royal Indian Tour is a Dynamic web that are used to On-line

    Searching of famous locations & hotels in India as well as Fulfill the Needs of tourists and any one.

    2.4 Operating Environment

    Giving best in order to make tourists vacation fabulous.

    The system is operationally feasible as it very easy for the End users to operate it. It only needs basic

    information about Windows platform.

    2.5 User Documentation

    Eight steps involved in the user documentation are:

    Form a project team and appoint a project leader.

  • 8/22/2019 project report on ABCX

    14/82

    14

    Prepare system flowcharts. Enumerate potential proposed system. Define and identify characteristics of proposed system. Determine and evaluate performance and cost effective of each proposed system. Weight system performance and cost data. Select the best-proposed system. Prepare and report final project directive to management.

    2.6 Assumptions and Dependencies

    The users have sufficient knowledge of computers. Users should have Internet connection and Internet server capabilities. The users know the English language, as the user interface will be provided in English.

  • 8/22/2019 project report on ABCX

    15/82

    15

    3) System Requirements:-3.1 Software Tools>>

    3.1.1 Introduction to ASP.NET:-

    .NET Framework

    The .NET Framework (pronounced dot net) is a software framework developed by Microsoft that

    runs primarily on Microsoft Windows. It includes a large library and provides language

    interoperability (each language can use code written in other languages) across several

    programming languages. Programs written for the .NET Framework execute in a software

    environment (as contrasted to hardware environment), known as the Common Language

    Runtime (CLR), an application virtual machine that provides important services such as security,

    memory management, and exception handling. The class library and the CLR together constitute

    the .NET Framework.

    The .NET Framework's Base Class Library provides user interface, data access, database

    connectivity, cryptography, web application development, numeric algorithms, and network

    communications. Programmers produce software by combining their own source code with the

    .NET Framework and other libraries. The .NET Framework is intended to be used by most new

    applications created for the Windows platform. Microsoft also produces a popular integrated

    development environment largely for .NET software called Visual Studio.

    Contents

    1 History

    2 Design features

    3 Architecture

    3.1 Common Language Infrastructure (CLI)

    3.2 Security

    3.3 Class library

    3.4 Memory management

  • 8/22/2019 project report on ABCX

    16/82

    16

    4 Standardization and licensing

    5 Criticism

    6 Alternative implementations

    7 References

    8 External links

    History

    A more complete listing of the releases of the .NET Framework may be found on the List of .NET

    Framework versions.

    Design features

    Interoperability

    Because computer systems commonly require interaction between newer and older applications, the

    .NET Framework provides means to access functionality implemented in programs that execute

    outside the .NET environment. Access to COM components is provided in the

    System.Runtime.InteropServices and System.EnterpriseServices namespaces of the framework;access to other functionality is provided using the P/Invoke feature.

    Common Language Runtime Engine

    The Common Language Runtime (CLR) is the execution engine of the .NET Framework. All .NET

    programs execute under the supervision of the CLR, guaranteeing certain properties and

    behaviors in the areas of memory management, security, and exception handling.

    Language Independence

    The .NET Framework introduces a Common Type System, or CTS. The CTS specification defines

    all possible datatypes and programming constructs supported by the CLR and how they may or

    may not interact with each other conforming to the Common Language Infrastructure (CLI)

  • 8/22/2019 project report on ABCX

    17/82

    17

    specification. Because of this feature, the .NET Framework supports the exchange of types and

    object instances between libraries and applications written using any conforming .NET language.

    Base Class Library

    The Base Class Library (BCL), part of the Framework Class Library (FCL), is a library of

    functionality available to all languages using the .NET Framework. The BCL provides classes

    that encapsulate a number of common functions, including file reading and writing, graphic

    rendering, database interaction, XML document manipulation, and so on.

    Simplified Deployment

    The .NET Framework includes design features and tools which help manage the installation of

    computer software to ensure it does not interfere with previously installed software, and it

    conforms to security requirements.

    Security

    The design is meant to address some of the vulnerabilities, such as buffer overflows, which have

    been exploited by malicious software. Additionally, .NET provides a common security model for

    all applications.

    Portability

    While Microsoft has never implemented the full framework on any system except Microsoft

    Windows, the framework is engineered to be platform agnostic,[6] and cross-platform

    implementations are available for other operating systems (see Silverlight and the Alternative

    implementations section below). Microsoft submitted the specifications for the Common

    Language Infrastructure (which includes the core class libraries, Common Type System, and the

    Common Intermediate Language),[7][8][9] the C# language,[10] and the C++/CLI language[11]

    to both ECMA and the ISO, making them available as official standards. This makes it possible

    for third parties to create compatible implementations of the framework and its languages on

    other platforms.

    [edit]Architecture

  • 8/22/2019 project report on ABCX

    18/82

    18

    Visual overview of the Common Language Infrastructure (CLI)

    Common Language Infrastructure (CLI)

    Main article: Common Language Infrastructure

    The purpose of the Common Language Infrastructure (CL) is to provide a language-neutral platform

    for application development and execution, including functions for Exception handling, Garbage

    Collection, security, and interoperability. By implementing the core aspects of the .NET

    Framework within the scope of the CL, this functionality will not be tied to a single language but

    will be available across the many languages supported by the framework. Microsoft's

    implementation of the CLI is called the Common Language Runtime, or CL.

    Main article: .NET assembly

    The CIL code is housed in .NET assemblies. As mandated by specification, assemblies are stored in

    the Portable Executable (PE) format, common on the Windows platform for all DLL and EXE

    files. The assembly consists of one or more files, one of which must contain the manifest, which

    has the metadata for the assembly. The complete name of an assembly (not to be confused with

    the filename on disk) contains its simple text name, version number, culture, and public key

    token. Assemblies are considered equivalent if they share the same complete name, excluding

    the revision of the version number. A private key can also be used by the creator of the assembly

    for strong naming. The public key token identifies which public key an assembly is signed with.

    Only the creator of the keypair (typically the .NET developer signing the assembly) can sign

    assemblies that have the same strong name as a previous version assembly, since he is in

    possession of the private key. Strong naming is required to add assemblies to the Global

    Assembly Cache.

    Security

    .NET has its own security mechanism with two general features: Code Access Security (CA), and

    validation and verification. Code Access Security is based on evidence that is associated with a

    specific assembly. Typically the evidence is the source of the assembly (whether it is installed on

    the local machine or has been downloaded from the intranet or Internet). Code Access Security

  • 8/22/2019 project report on ABCX

    19/82

    19

    uses evidence to determine the permissions granted to the code. Other code can demand that

    calling code is granted a specified permission. The demand causes the CL to perform a call stack

    walk: every assembly of each method in the call stack is checked for the required permission; if

    any assembly is not granted the permission a security exception is thrown.

    Class library

    The .NET Framework includes a set of standard class libraries. The class library is organized in a

    hierarchy of namespaces. Most of the built-in APIs are part of either System.* or Microsoft.*

    namespaces. These class libraries implement a large number of common functions, such as file

    reading and writing, graphic rendering, database interaction, and XML document manipulation,

    among others. The .NET class libraries are available to all CLI compliant languages. The .NET

    Framework class library is divided into two parts: the Base Class Library and the Framework

    Class Library

    The Base Class Library (BC) includes a small subset of the entire class library and is the core set of

    classes that serve as the basic API of the Common Language Runtime.[12] The classes in

    mscorlib.dll and some of the classes in System.dll and System.core.dll are considered to be a part

    of the BCL. The BCL classes are available in both .NET Framework as well as its alternative

    implementations including .NET Compact Framework, Microsoft Silverlight and Mono.

    The Framework Class Library (FCL) is a superset of the BCL classes and refers to the entire classlibrary that ships with .NET Framework. It includes an expanded set of libraries, including

    Windows Forms, ADO.NET, ASP.NET, Language Integrated Query, Windows Presentation

    Foundation, Windows Communication Foundation among others. The FCL is much larger in

    scope than standard libraries for languages like C++, and comparable in scope to the standard

    libraries of Java.

    Memory management

    The .NET Framework CL frees the developer from the burden of managing memory (allocating and

    freeing up when done); it handles memory management itself by detecting when memory can be

    safely freed. Memory is allocated to instantiations of .NET types (objects) from the managed

    heap, a pool of memory managed by the CL. As long as there exists a reference to an object,

    which might be either a direct reference to an object or via a graph of objects, the object is

  • 8/22/2019 project report on ABCX

    20/82

    20

    considered to be in use. When there is no reference to an object, and it cannot be reached or used,

    it becomes garbage, eligible for collection. NET Framework includes a garbage collector which

    runs periodically, on a separate thread from the application's thread, that enumerates all the

    unusable objects and reclaims the memory allocated to them.

    The .NET Garbage Collector (GC) is a non-deterministic, compacting, mark-and-sweep garbage

    collector. The GC runs only when a certain amount of memory has been used or there is enough

    pressure for memory on the system. Since it is not guaranteed when the conditions to reclaim

    memory are reached, the GC runs are non-deterministic. Each .NET application has a set of

    roots, which are pointers to objects on the managed heap (managed objects). These include

    references to static objects and objects defined as local variables or method parameters currently

    in scope, as well as objects referred to by CPU registers.[13] When the GC runs, it pauses the

    application, and for each object referred to in the root, it recursively enumerates all the objects

    reachable from the root objects and marks them as reachable. It uses .NET metadata and

    reflection to discover the objects encapsulated by an object, and then recursively walk them. It

    then enumerates all the objects on the heap (which were initially allocated contiguously) using

    reflection. All objects not marked as reachable are garbage.[13] This is the mark phase.[14]

    Since the memory held by garbage is not of any consequence, it is considered free space.

    However, this leaves chunks of free space between objects which were initially contiguous. The

    objects are then compacted together to make used memory contiguous again.[13][14] Any

    reference to an object invalidated by moving the object is updated by the GC to reflect the new

    location.[14] The application is resumed after the garbage collection is over.

    The GC used by .NET Framework is actually generational.[15] Objects are assigned a generation;

    newly created objects belong to Generation 0. The objects that survive a garbage collection are

    tagged as Generation 1, and the Generation 1 objects that survive another collection are

    Generation 2 objects. The .NET Framework uses up to Generation 2 objects.[15] Higher

    generation objects are garbage collected less frequently than lower generation objects. This helpsincrease the efficiency of garbage collection, as older objects tend to have a larger lifetime than

    newer objects.[15] Thus, by removing older (and thus more likely to survive a collection) objects

    from the scope of a collection run, fewer objects need to be checked and compacted.[15]

  • 8/22/2019 project report on ABCX

    21/82

    21

    3.1.2About Java Script

    JavaScript is a programming language that is used to make web pages interactive. It runs on your

    visitors computer and so does not require constant downloads from your web site.

    JavaScript supports all the structured programming syntax

    in C (e.g., if statements, while loops, switch statements, etc.). One partial exception is scoping:

    C-style block-level scoping is not supported. JavaScript 1.7, however, supports block-level

    scoping with the let keyword. Like C, JavaScript makes a distinction

    between expressions and statements.

    3.1.3About HTML

    HTML is a computer language devised to allow website creation. These websites can then be viewed

    by anyone else connected to the Internet. It is relatively easy to learn, with the basics being

    accessible to most people in one sitting; and quite powerful in what it allows you to create.

    It is constantly undergoing revision and evolution to meet the demands and requirements of the

    growing Internet audience under the direction of the W3C, the organization charged with

    designing and maintaining the language.

    The definition of HTML is Hypertext Markup Language.

    Hypertextis the method by which you move around on the webby clicking on special textcalled hyperlinks which bring you to the next page. The fact that it is hyper just means it is not

    lineari.e. you can go to any place on the Internet whenever you want by clicking on links

    there is no set order to do things in.

    Markup is what HTML tags do to the text inside them. They mark it as a certain type of text(italicizedtext, for example).

    HTML is aLanguage, as it has code-words and syntax like any other language.

    http://en.wikipedia.org/wiki/Structured_programminghttp://en.wikipedia.org/wiki/C_(computer_language)http://en.wikipedia.org/wiki/Scope_(computer_science)http://en.wikipedia.org/wiki/Expression_(programming)http://en.wikipedia.org/wiki/Statement_(programming)http://www.w3.org/http://www.w3.org/http://www.w3.org/http://www.w3.org/http://en.wikipedia.org/wiki/Statement_(programming)http://en.wikipedia.org/wiki/Expression_(programming)http://en.wikipedia.org/wiki/Scope_(computer_science)http://en.wikipedia.org/wiki/C_(computer_language)http://en.wikipedia.org/wiki/Structured_programming
  • 8/22/2019 project report on ABCX

    22/82

    22

    How HTML Works

    HTML consists of a series of short codes typed into a text-file by the site authorthese are the

    tags. The text is then saved as a html file, and viewed through a browser, like Internet

    ExplorerorNetscape Navigator. This browser reads the file and translates the text into a visibleform, hopefully rendering the page as the author had intended. Writing your own HTML entails

    using tags correctly to create your vision. You can use anything from a rudimentary text-editor to

    a powerful graphical editor to create HTML.

    3.1.4My-SQL

    MySQL is a relational database management system (RDBMS) that runs as a server providing multi-

    user access to a number of databases. The MySQL development project has made its source code

    available under the terms of the GNU General Public License, as well as under a variety of

    proprietary agreements. MySQL is owned and sponsored by a single for-profit firm, the Swedish

    company MySQL AB, now owned by Sun Microsystems, a subsidiary ofOracle Corporation.

    SQL ( sometimes referred to as Structured Query Language) is a programming language designed for

    managing data in relational database management systems (RDBMS).

    Originally based upon relational algebra and tuple relational calculus, its scope includes data insert,

    query, update and delete, schema creation and modification, and data access control.

    3.2Hardware Required>>

    1. Intel Pentium IV2. 512 MB RAM3. 80 GB Hard Disk

    http://www.yourhtmlsource.com/starthere/glossary.html#BROWSERhttp://www.yourhtmlsource.com/starthere/glossary.html#BROWSERhttp://en.wikipedia.org/wiki/Relational_database_management_systemhttp://en.wikipedia.org/wiki/Source_codehttp://en.wikipedia.org/wiki/GNU_General_Public_Licensehttp://en.wikipedia.org/wiki/Proprietary_softwarehttp://en.wikipedia.org/wiki/Businesshttp://en.wikipedia.org/wiki/Swedenhttp://en.wikipedia.org/wiki/MySQL_ABhttp://en.wikipedia.org/wiki/Sun_Microsystemshttp://en.wikipedia.org/wiki/Subsidiaryhttp://en.wikipedia.org/wiki/Oracle_Corporationhttp://en.wikipedia.org/wiki/Oracle_Corporationhttp://en.wikipedia.org/wiki/Subsidiaryhttp://en.wikipedia.org/wiki/Sun_Microsystemshttp://en.wikipedia.org/wiki/MySQL_ABhttp://en.wikipedia.org/wiki/Swedenhttp://en.wikipedia.org/wiki/Businesshttp://en.wikipedia.org/wiki/Proprietary_softwarehttp://en.wikipedia.org/wiki/GNU_General_Public_Licensehttp://en.wikipedia.org/wiki/Source_codehttp://en.wikipedia.org/wiki/Relational_database_management_systemhttp://www.yourhtmlsource.com/starthere/glossary.html#BROWSER
  • 8/22/2019 project report on ABCX

    23/82

    23

    4) SYSTEM ANALYSIS:-4.1 Existing System: -

    The existing system does not use any computer based system. All the jobs are done

    manually. The job such as maintaining the information about the various authorized users like

    name,phone no,e mail id,date of arrival,credit cart information,DOB & many more.

    Informing the authorized member manually which is very time consuming process.

    Information about the various famous locations in India that has to be searched manually that

    takes time and consume many resources.

    The existing system had following Drawbacks:

    It was very time consuming Recording Information generated manually. The Activities are often prone to errors. The speed of processing of data is very slow. The information required was not readily available. Lots of paper work was there.

    4.2Need for System:-

    At present, all the operations are carried out manually. Sometimes, information is

    duplicated, filled incorrectly or missed. A new computerized system is needed to handle all these

    data integrity and consistency problems that arise when system is handled manually.

    (a) To improve quality of work and accuracy

    (b) To improve work speed and accuracy

    I To provide the easy and user friendly environment

  • 8/22/2019 project report on ABCX

    24/82

    24

    (d) Get instant and detail information at single terminal

    (e) The project would help in effective and systematic record keeping that is storing and

    retrieving of useful data.

    4.3 Proposed System: -

    The proposed system objectives are drawn to avoid the drawbacks of the

    Manual Gathering Of Information .The proposed system replaces inefficient process and time-

    consuming task of the current system to be a simple, accurate and effective proposed system. The

    objective of this project is To make your travel experience a memorable with our years of experience

    and trust of thousand of clients..

  • 8/22/2019 project report on ABCX

    25/82

    25

    Figure : Context data flow diagram for the proposed system

    Modules of the project : -

    AdministratorThis module is prepared for the administrator who is the only userhaving the authority to add, delete and modify the database. The administrator can avail

    these facilities only after proper login mechanism built in the system.

  • 8/22/2019 project report on ABCX

    26/82

    26

    RegistrationThis module is developed for new user can open an account with the website to become a registered user. Through this module, personal information of users is

    gathered to allow them signing into the system. Once their username and password is

    created they can login into the system through login module.

    LoginThis module is developed to allow the visitors and administrators to login intothe system.

    Through the I/O/Update facility one can easily maintain the records in the

    file. Moreover, the user will be able to get variety of reports, which is the most important part of this

    system like any other. A lot of effort and care has been taken in designing format. Most of the time, it is

    not possible to computerize the manual system completely and some things have to be left out.

    The system deals right from entering the records in the database to

    generation of the reports. The major advantage is the increase in the speed and efficiency of the

    work. Much of the tedious jobs in the old system are reduced.

    4.4 Feasibility Study:-

    A Feasibility Study is a test of system proposal regarding to its workability;

    impact on the organization; an effective use of resources.

    4.4.1 Technical Feasibility: -

    This application is technically feasible.

    Hardware Requirements:-

    Processor Pentium IV 512 MB RAM 80 GB HDD LAN card Modem Internet Connection Monitor

  • 8/22/2019 project report on ABCX

    27/82

    27

    Keyboard and MouseSoftware Requirements: -

    For Development Purpose:

    MICROSOFT VISUAL STUDIO 2008(ASP.NET) MS-ACCESS

    For Work Station:

    Internet Explorer. Internet Connection Mail Server Windows Operating System

    4.4.2 Economical feasibility:

    Economic justification is generally the Bottom Line consideration for most systems.

    Economic justification includes a broad range of concerns that includes cost benefit analysis. In

    this we weight the cost and the benefits associated with the candidate system and if it suits the

    basic purpose of the organization i.e. profit making, the project is making to the analysis and

    design phase.

    4.4.3 Operational Feasibility:

    It is mainly related to human organizations and political aspects. The points to be

    considered are:

    What changes will be brought with the system? What organization structures are disturbed? What new skills will be required? Do the existing staff members have these

    skills? If not, can they be trained in due course of time?

    The system is operationally feasible as it very easy for the End users to operate it. It only needs basic

    information about Windows platform.

  • 8/22/2019 project report on ABCX

    28/82

    28

    5)System Requirement Specification:-5.1 Introduction to SRS:-

    The Software Requirements Specifications presents the overall information about the

    interface, flow of data and constraints for the products.

    An SRS is a document that completely describes what the proposed software should

    do without describing how the software will do it. Therefore it describes the complete external

    behavior of proposed software. An SRS is used to define needs and expectations of the users. It

    serves as a contract document between customer and developer. It is produced at the culmination

    of analysis task.

    The function and performance allocated to software as part of Software Engineeringis refunded by:

    Establishing a complete introduction General description Information description A detailed functional description, and Other information pertinent to requirement.

    This document, that is, software requirements specifications describes the overall

    requirement that will be satisfied by the final product development. It serves as the foundation

    for subsequent software engineering activities. It describes the function of computer-based

    system and the constraints that will govern the development.

  • 8/22/2019 project report on ABCX

    29/82

    29

    5.2 Software Engineering Paradigm Applied: -

    Project Planning

    The key to a successful project is in the planning. Creating a project plan is the first thing you

    should do when undertaking any kind of project.

    Often project planning is ignored in favor of getting on with the work. However, many people

    fail to realize the value of a project plan in saving time, money and many problems.

    Project Planning Objective: -

    Coordinate the various interrelated processes of the project. Ensure project includes all the work required, and only the work required, to complete the

    project successfully.

    Ensure that the project is completed on time and within budget. Ensure that the project will satisfy the needs for which it was undertaken. Ensure the most effective use of the people involved with the project. Promote effective communication between the projects team members and key members. Ensure that project risks are identified, analyzed, and responded.

    Need and Importance: -

    Quality delivery Customer satisfaction Structured Managing the manpower

  • 8/22/2019 project report on ABCX

    30/82

    30

    6)System Design & development:-6.1Introduction:-

    System design provides the understandings and procedural details necessary for

    implementing the system recommended in the system study. Emphasis is on the translating the

    performance requirements into design specifications. The design phase is a transition from a

    user-oriented document (System proposal) to a document oriented to the programmers or

    database personnel.

    System design goes through two phases of development:

    1) Logical Design

    2) Physical Design

    A data flow diagram shows the logical flow of the system. For a system it describes

    the input (source), output (destination), database (data stores) and procedures (data flows) all in a

    format that meets the users requirement. When analysis prepares the logical system design, they

    specify the user needs at a level of detail that virtually determines the information flow into an

    out of the system and the required data resources. The logical design also specifies input forms

    and screen layouts.

    The activities following logical design are the procedure followed in the physical design e.g.,

    producing programs, software, file and a working system. Design specifications instruct the user

    about what the system should do.

    6.2Logical and Output Design:-

    The logical design of an information system is analogous to an engineering blue print of

    an automobile. It shows the major features and how they are related to one another. The detailed

    specification for the new system was drawn on the bases of users requirement data. The outputs

    inputs and databases are designed in this phase.

  • 8/22/2019 project report on ABCX

    31/82

    31

    Output design is one of the most important features of the information system. When the outputs is

    not of good quality the users will be averse to use the newly designed system and may not use

    the system. There are many types of output, all of which can be either highly useful or can be

    critical to the users, depending on the manner and degree to which they are used.

    Outputs from computer system are required primarily to communicate the results of

    processing to users, They are also used to provide a permanent hard copy of these results for later

    consultation. Various types of outputs required can be listed as below:

    External Outputs, whose destination is outside the organization Internal outputs, whose destination is with the organization Operational outputs, whose use is purely within the computer department e.g., program-

    listing etc.

    Interactive outputs, which involve the user is communicating directly with the computer, Itis particularly important to consider human factor when designing computer outputs. End

    user must find outputs easy to use and useful to their jobs, Without quality output, user may

    find the entire system unnecessary and avoid using it. The term Output in any

    information system may apply to either printer or displayed information. During the

    designing the output for this system, it was taken into consideration, whether the

    information to be presented in the form of query of report or to create documents etc.

    Other important factors that were taken into consideration are:

    The End user, who will use the output.

    The actual usage of the planned information The information that is necessary for presentation When and how often output and their format is needed. While designing output for project

    based Attendance Compilation System, the following aspects of outputs designing were

    taken into consideration.

    The outputs (i.e., well formatted table outputs in the screen itself) designed are simple toread and interpret.

  • 8/22/2019 project report on ABCX

    32/82

  • 8/22/2019 project report on ABCX

    33/82

    33

    Output Definition:The output should be defined in terms of:

    Types of outputs

    Content-headings, numeric, alphanumeric, etc., Format-hardcopy, screen, microfilm, etc., Location-local, remote, transmitted, etc., Frequency-daily, weekly, hourly, etc., Response-immediate with in a period, etc., Data items

    The name given to each data item should be recorded and its characteristics described clearly in a

    standard form:

    Whether alphanumeric or numeric Legitimate and specific range of characteristics Number of characters Positions of decimal point, arithmetic design, etc., I nput Design:The input design is the link that ties the information system into the users world. Input

    specifications describe the manner in which data enters the system for processing. Input design

    features can ensure the reliability of the system and produce results from accurate data, or they

    can result in the production of erroneous information.

    Input Design consists of

    developing specifications and procedures for data preparation Steps necessary to put data into a usable form for processing. Data entry, the activity of putting data into the computer processing.

  • 8/22/2019 project report on ABCX

    34/82

    34

    Objectives of Input design

    Five objectives of design input focus on

    Controlling the amount of input required Avoid delay Avoiding errors in data Avoiding extra steps. Keeping the process simple.

    Input stages several activities have to be carried out as part of te overall input process.

    They include some or all of the following.

    Data recording (i.e., collection of data)

    Data encapsulation (i.e., transfer of data)

    Data conversion (i.e.,controlling the flow of data)

    Data transmission(i.e., transporting the data)

    Data validation(i.e., checking the input data)

    Data correction(i.e.,correcting the errors)

    Input Performa were designed, after a careful discussion with users. It was attempted to

    cover all user requirements. Designed Performa were given to user for any suggestion and final

    approval.

    Various data items were identified and wherever necessary were recorded.

    Input designs are aimed at reducing the chances of mistakes of errors. As the human beings are

    prone to errors there is always a possibility of occurrence of chance of errors. Adequate

    validation checks are incorporated to ensure error free data storage. Some of the data validation

    checks applied are as following:

    Redundancy of data is checked. It means the records of primary key do not occur twice. Primary key field of any table must not be left blank.

  • 8/22/2019 project report on ABCX

    35/82

    35

    Wherever items are coded, input code is checked for its validly with respect to severalchecks.

    Utmost care has been taken to incorporate the validation at each stage of the system. E.g.when entering records into employee information table for employee, it is checked thatwhether the corresponding employee exists in the employee information table etc.,

    Enough messages and dialogue boxes are provided while design screen, which does

    guide user at the time of any errors, or at time of entry. This feature provides a user-friendly

    interface to native users. It can be emphasized that input deigns of CRM is so designed that it

    ensures easy and error free data entry mechanism. Once one is sure of input data the output

    formatting becomes an routine work.

    SOFTWARE DESIGNThe purpose of this phase is to plan a solution for the problem specified by the

    requirement document. This is first step in moving from the problem domain to solution domain.

    Designing activity is divided into two parts.

    a) System Design It aims to identify the modules that should be in the system, the specification

    of these modules and how they interact with each other to produce the desired result.

    b) Detailed Design The internal goal of each of the modules specified in the system design is

    decided

    DATABASE DESIGNA database is a collection of inter-related data stored with a minimum of redundancy to serve

    many applications. It minimizes the artificiality embedded in using separate files. The primary

    objectives are fast response time to enquires, more information at low cost, control of

    redundancy, clarity and ease of use, accuracy and fast recovery. The organization of data in a

    database aims to achieve three major objectives, they are data integration, data integrity and data

    independence.

  • 8/22/2019 project report on ABCX

    36/82

    36

    During the design of the database at most care has been taken to keep up the objectives of the

    database design.

    CODE DESIGNThe process of code is to facilitate the identification and retrieve of items of information. The

    code should be simple and easy to understandable. The codes were designed in such a way that

    the features such as optimum humanoriented use and machine efficiency are unaffected.

    For the code to be designed effectively, the following characteristics were also considered while

    designing the code.

    Uniqueness Versatility Stability Simplicity ConsciousnessThe code should be adequate for present and anticipated data processing for machine and human

    use. Care was taken to minimize the clerical effort and computer time required to continue

    operation.

    PROCESS DESIGNThe process can be conceptualized in such a way to keep the methodology of main module

    process along with some auxiliary task, which will run concurrently with the main program.

    The top-down approach is maintained so as to keep track of the process, which satisfies the

    maintenance reliability testing requirements. The concurrency of the data is checked during data

    entry, by means of validation check for data in each field.

  • 8/22/2019 project report on ABCX

    37/82

    37

    6.3DATA FLOW DIAGRAM:-

    Data Flow Diagramming is a means of representing a system at any level of detail with a

    graphic network of symbols showing data flows, data stores, data processes, and datasources/destination.

    DFD OF PROJECT

    DFD: Level 0

  • 8/22/2019 project report on ABCX

    38/82

    38

    DFD: Level 1

  • 8/22/2019 project report on ABCX

    39/82

    39

    DFD: Level 2

  • 8/22/2019 project report on ABCX

    40/82

    40

    6.4Entity Relationship Diagram:-

  • 8/22/2019 project report on ABCX

    41/82

    41

    6.5 Database Design:-

    The most important aspect of the system is data design . The data must be organized according to the

    system requirements. The database approach is used to store and organize the data in developing

    the system . The database is an integrated collection of data stored in different types of tables.

    Some general objectives in establishing a database are as follows:

    Integrating all data Incorporate updations easily Provide data security unauthorized users

    6.5.1 Database Tables:-

    6.5.1.1 CLIENT TABLE>>

    TID TEXT

    CLID AUTONO.

    CNAME TEXT

    CADD. TEXT

    CPHONENO. TEXT

    CCREDIT TEXT

  • 8/22/2019 project report on ABCX

    42/82

    42

    6.5.1.2 USER INFO TABLE>>

    UNAME TEXT

    UPASS TEXT

    6.5.1.3 REGISTER USER TABLE>>

    ID TEXT

    UNAME TEXT

    UPASS TEXT

    RNAME TEXT

    REMAIL TEXT

    RADD. TEXT

    RMOBNO. TEXT

    RAPPROVED TEXT

    CEXPIRY TEXT

    CEMAIL TEXT

    DATEOFTRAVEL TEXT

  • 8/22/2019 project report on ABCX

    43/82

    43

    6.5.1.4 HOTEL FACILITIES TABLE>>

    HOTELID TEXT

    FACILITIESID TEXT

    FACILITIESTYPE TEXT

    CHARGES CURRENCY

    6.5.1.5 LOCATION TABLE>>

    LID TEXT

    MAININFO MEMO

    MAINPIC TEXT

    CITY TEXT

    STATE TEXT

    PIC1 TEXT

    PIC2 TEXT

    PIC3 TEXT

    PIC4 TEXT

    INFO1 MEMO

    INFO2 MEMO

    INFO3 MEMO

    INFO4 MEMO

    PRICE CURRENCY

    OFFERPRICE CURRENCY

  • 8/22/2019 project report on ABCX

    44/82

    44

    6.5.1.6 HOTEL TABLE>>

    HOTELID TEXT

    LID TEXT

    HOTELNAME TEXT

    HOTELADD. TEXT

    MAINPICHOTEL TEXT

    PIC1 TEXT

    PIC2 TEXT

    PIC3 TEXT

    PIC4 TEXT

    HOTELMAININFO. MEMO

    6.5.1.7 ADD TO CART TABLE>>

    TID TEXT

    PRODUCTNAME TEXT

    PRODUCTTYPE TEXT

    PRODUCTID TEXT

    PRODUCTPRICE TEXT

    PAID TEXT

  • 8/22/2019 project report on ABCX

    45/82

    45

    6.5.1.8 CONTACT US TABLE>>

    6.5.1.9 RID TABLE>>

    6.5.1.10 TID TABLE>>

    CID AUTONO.

    NAME TEXT

    MESSAGE TET

    TE TEXT

    PHONENO. TEXT

    RID TEXT

    TID TEXT

  • 8/22/2019 project report on ABCX

    46/82

    46

    7) Module Description:-Graphical User Interface

    MVC Model

    This section gives an overview of the MVC Model to assist the Employees / HR Admin to

    better understand the working on HRMS. HRMS is designed on the Eclipse.

    MVC Environment

    Model-view-controller(MVC) is an architectural pattern used in software engineering. Successful

    use of the pattern isolates business logic from user interface considerations, resulting in an

    application where it is easier to modify either the visual appearance of the application or the

    underlying business rules without affecting the other.

    In MVC, the model represents the information (the data) of the applications; the view corresponds to

    elements of the user interface such as text, checkbox items, and so forth; and the controller

    manages the communication of data and the business rules used to manipulate the data to and

    from the model.

  • 8/22/2019 project report on ABCX

    47/82

    47

    7.1Modules of Project and Description:-

    HomePage>>

    Menu Descriptions:-

    Home PageThis is a home page specifying the details of famous locations in india with search facilities

    provided and checking of authorized users.

  • 8/22/2019 project report on ABCX

    48/82

    48

    View pointsIn this page all the information about locations are available and information about the

    hotels to stay..

    RegisterIn this page user can register by giving their details.

    Add To cartIn this page ,the information about the type of product that has been purchased by the user

    with our offerprice and total bill will be shown.

    Contact UsIn this Page Honour shows the Address and contact no. to .ontact with us.

    About UsIn this page the information about Our Royal Indian Tour is mentioned

  • 8/22/2019 project report on ABCX

    49/82

    49

    LOCATION INFO >>

    In this page information about the locations that has been provided by us will be shown:

  • 8/22/2019 project report on ABCX

    50/82

    50

  • 8/22/2019 project report on ABCX

    51/82

    51

    LOCATION INFO WITH OFFER PRICE>>

  • 8/22/2019 project report on ABCX

    52/82

    52

    HOTEL INFO>>

  • 8/22/2019 project report on ABCX

    53/82

    53

    FI ND HOTEL & ADD LOCATION TO ADD TO CART>>

  • 8/22/2019 project report on ABCX

    54/82

    54

    ADD HOTEL TO ADD TO CART>>

  • 8/22/2019 project report on ABCX

    55/82

    55

    About us>>

  • 8/22/2019 project report on ABCX

    56/82

    56

    ADD TO CART>>

  • 8/22/2019 project report on ABCX

    57/82

    57

    PAY NOW>>

  • 8/22/2019 project report on ABCX

    58/82

    58

    BOOKING>>

  • 8/22/2019 project report on ABCX

    59/82

    59

    CONTACT US>>

  • 8/22/2019 project report on ABCX

    60/82

    60

    REGISTER>>

  • 8/22/2019 project report on ABCX

    61/82

    61

    WELCOME & THANKS AFTER REGISTERATION>>

  • 8/22/2019 project report on ABCX

    62/82

    62

    MAIN ADMIN>>

    Description:-

    This is the home Page of Admin panel .when the admin login he/she will enter in the Home page of

    Admin side. Admin can navigate through this Home page.

  • 8/22/2019 project report on ABCX

    63/82

    63

    Welcome to the Administrator Section of www.abktour.com

    The Admin Panel has Some Menus:-

    Login Logout Add location Update location Add hotel Update hotel Hotel facilities Paid Check mails

  • 8/22/2019 project report on ABCX

    64/82

    64

    Add location: -

    Description:

    This page is used to add information about location like information about

    particular location & various view points to visit within that location.

  • 8/22/2019 project report on ABCX

    65/82

    65

    UPDATE LOCATION:-

    Description:

    This page is used to update information about location like information about

    particular location & various view points to visit within that location.

  • 8/22/2019 project report on ABCX

    66/82

    66

    ADD HOTEL:-

    Description:

    This page is used to add information about hotel like information about particular

    hotel & various facilities.

    .

  • 8/22/2019 project report on ABCX

    67/82

    67

    UPDATE HOTEL: -

    Description :-

    This page is used to update information about hotel like information about

    particular hotel & various facilities.

  • 8/22/2019 project report on ABCX

    68/82

    68

    HOTEL FACILITIES:-

    Description :-

    This page provides all the facilities available in hotel.

  • 8/22/2019 project report on ABCX

    69/82

    69

    CHECK MAILS:-

    Description :-

    This page is used to check the mail sent by user .

  • 8/22/2019 project report on ABCX

    70/82

    70

    PAID:-

    Description :-

    This page is used to check whether the payment has been done or not.

    8)System Testing:-

    1) Introduction:

    System testing of software or hardware is testing conducted on a complete, integrated system

    to evaluate the system's compliance with its specified requirements. System testing falls within the

    scope of black box testing, and as such, should require no knowledge of the inner design of the code

    or logic.

  • 8/22/2019 project report on ABCX

    71/82

    71

    As a rule, system testing takes, as its input, all of the "integrated" software components that

    have successfully passed integration testing and also the software system itself integrated with any

    applicable hardware system(s). The purpose of integration testing is to detect any inconsistencies

    between the software units that are integrated together (called assemblages) or between any of the

    assemblages and the hardware. System testing is a more limiting type of testing; it seeks to detect

    defects both within the "inter-assemblages" and also within the system as a whole.

    2) Testing Objective:-

    Testing is the process of executing a program with the intent of finding an error.

    A good test case is the one that has a high probability of finding an as-yet-undiscovered error.

    A successful test is one that uncovers an as-yet-undiscovered error.

    The objective of testing are: -

    Software quality improvement.

    Verification and Validation.

    Software Reliability Estimation.

    These objectives imply dramatic change in viewpoint. They move counter to the commonly

    held view that a successful test is one in which no errors are found. Our objective is to design tests

    that systematically uncover different classes of errors and to do so with minimum amount of time

    and effort. If testing is conducted successfully (according to the objective stated previously), it will

    uncover errors in the software.

    As a secondary benefit, testing demonstrates that software functions appear to be the

    working according to the specification, that behavioral and performance requirements appear to have

    been met. In addition, data collected as testing conducted provide a good indication of software

    reliability and some indication of software quality as a whole but testing cannot show the absence of

    errors and defects, it can show only that software errors and defects are present. It is important to

    keep this (rather gloomy) statement in mind as testing is being conducted.

  • 8/22/2019 project report on ABCX

    72/82

    72

    3)Types of Testing: -

    They are various types of testing as follows:

    Black box testing - Internal system design is not considered in this type of testing. Tests are based on

    requirements and functionality.

    White box testing - This testing is based on knowledge of the internal logic of an applications code.

    Also known as Glass box Testing. Internal software and code working should be known for this type

    of testing. Tests are based on coverage of code statements, branches, paths, conditions.

    Unit testing - Testing of individual software components or modules. Typically done by the

    programmer and not by testers, as it requires detailed knowledge of the internal program design and

    code. may require developing test driver modules or test harnesses.

    Incremental integration testing - Bottom up approach for testing i.e continuous testing of an

    application as new functionality is added; Application functionality and modules should be

    independent enough to test separately. done by programmers or by testers.

    Integration testing - Testing of integrated modules to verify combined functionality after integration.

    Modules are typically code modules, individual applications, client and server applications on a

    network, etc. This type of testing is especially relevant to client/server and distributed systems.

    Functional testing - This type of testing ignores the internal parts and focus on the output is as perrequirement or not. Black-box type testing geared to functional requirements of an application.

    System testing - Entire system is tested as per the requirements. Black-box type testing that is based on

    overall requirements specifications, covers all combined parts of a system.

    End-to-end testing - Similar to system testing, involves testing of a complete application environment

    in a situation that mimics real-world use, such as interacting with a database, using network

    communications, or interacting with other hardware, applications, or systems if appropriate.

    Sanity testing - Testing to determine if a new software version is performing well enough to accept it

    for a major testing effort. If application is crashing for initial use then system is not stable enough for

    further testing and build or application is assigned to fix.

  • 8/22/2019 project report on ABCX

    73/82

    73

    Regression testing - Testing the application as a whole for the modification in any module or

    functionality. Difficult to cover all the system in regression testing so typically automation tools are

    used for these testing types.

    Acceptance testing -Normally this type of testing is done to verify if system meets the customerspecified requirements. User or customer do this testing to determine whether to accept application.

    Load testing - Its a performance testing to check system behavior under load. Testing an application

    under heavy loads, such as testing of a web site under a range of loads to determine at what point the

    systems response time degrades or fails.

    Stress testing - System is stressed beyond its specifications to check how and when it fails. Performed

    under heavy load like putting large number beyond storage capacity, complex database queries,

    continuous input to system or database load.

    Performance testing -Term often used interchangeably with stress and load testing. To check

    whether system meets performance requirements. Used different performance and load tools to do

    this.

    Usability testing - User-friendliness check. Application flow is tested, Can new user understand the

    application easily, Proper help documented whenever user stuck at any point. Basically system

    navigation is checked in this testing.

    Install/uninstall testing - Tested for full, partial, or upgrade install/uninstall processes on different

    operating systems under different hardware, software environment.

    Recovery testing - Testing how well a system recovers from crashes, hardware failures, or other

    catastrophic problems.

    Security testing - Can system be penetrated by any hacking way. Testing how well the system protects

    against unauthorized internal or external access. Checked if system, database is safe from external

    attacks.

    Compatibility testing - Testing how well software performs in a particular hardware/software/operating

    system/network environment and different combination s of above.

  • 8/22/2019 project report on ABCX

    74/82

    74

    Comparison testing - Comparison of product strengths and weaknesses with previous versions or other

    similar products.

    Alpha testing - In house virtual user environment can be created for this type of testing. Testing is done

    at the end of development. Still minor design changes may be made as a result of such testing.

    Beta testing - Testing typically done by end-users or others. Final testing before releasing application

    for commercial purpose.

    Software Testing Life Cycle

    Software testing life cycle identifies what test activities to carry out and when (what is the best time)

    to accomplish those test activities. Even though testing differs between organizations, there is a

    testing life cycle.

    Software Testing Life Cycle consists of six (generic) phases:

    Test Planning, Test Analysis, Test Design, Construction and verification, Testing Cycles, Final Testing and Implementation and Post Implementation.

    Software testing has its own life cycle that intersects with every stage of the SDLC. The basic

    requirements in software testing life cycle is to control/deal with software testingManual,

    Automated and Performance.

    Test Planning

    This is the phase where Project Manager has to decide what things need to be tested, do I have the

    appropriate budget etc. Naturally proper planning at this stage would greatly reduce the risk of low

    quality software. This planning will be an ongoing process with no end point.

  • 8/22/2019 project report on ABCX

    75/82

    75

    The plan must identify the items to be tested, the features to be tested, the types of testing to be

    performed, the personnel responsible for testing, the resources and schedule required to complete

    testing, and the risks associated with the plan.). Almost all of the activities done during this stage

    are included in this software test plan and revolve around a test plan.

    Test Analysis

    Once test plan is made and decided upon, next step is to delve little more into the project and decide

    what types of testing should be carried out at different stages of SDLC, do we need or plan to

    automate, if yes then when the appropriate time to automate is, what type of specific

    documentation I need for testing.

    Proper and regular meetings should be held between testing teams, project managers, development

    teams, Business Analysts to check the progress of things which will give a fair idea of the

    movement of the project and ensure the completeness of the test plan created in the planning phase,

    which will further help in enhancing the right testing strategy created earlier. We will start creating

    test case formats and test cases itself. In this stage we need to identify which test cases to automate,

    begin review of documentation, i.e. Functional Design, Business Requirements, Product

    Specifications, Product Externals etc. We also have to define areas for Stress and Performance

    testing.

    Test Design

    Test plans and cases which were developed in the analysis phase are revised. Functional validation

    matrix is also revised and finalized. In this stage risk assessment criteria is developed. If you have

    thought of automation then you have to select which test cases to automate and begin writing

    scripts for them. Test data is prepared. Standards for unit testing and pass / fail criteria are defined

    here. Schedule for testing is revised (if necessary) & finalized and test environment is prepared.

    Construction and verification

    In this phase we have to complete all the test plans, test cases, complete the scripting of the automated

    test cases, Stress and Performance testing plans needs to be completed. We have to support the

  • 8/22/2019 project report on ABCX

    76/82

    76

    development team in their unit testing phase. And obviously bug reporting would be done as when

    the bugs are found. Integration tests are performed and errors (if any) are reported.

    Testing Cycles

    In this phase we have to complete testing cycles until test cases are executed without errors or a

    predefined condition is reached. Run test cases --> Report Bugs --> revise test cases (if needed) -->

    add new test cases (if needed) --> bug fixing --> retesting (test cycle 2, test cycle 3.).

    Final Testing and Implementation

    In this we have to execute remaining stress and performance test cases, documentation for testing is

    completed / updated, provide and complete different matrices for testing. Acceptance, load and

    recovery testing will also be conducted and the application needs to be verified under production

    conditions.

    Post Implementation

    In this phase, the testing process is evaluated and lessons learnt from that testing process are

    documented. Line of attack to prevent similar problems in future projects is identified. Create plans

    to improve the processes. The recording of new errors and enhancements is an ongoing process.

    Cleaning up of test environment is done and test machines are restored to base lines in this stage.

    Testing is usually performed for the following purposes:

    To improve quality.

    As computers and software are used in critical applications, the outcome of a bug can be severe.

    Bugs can cause huge losses. Bugs in critical systems have caused airplane crashes, allowed space

    shuttle missions to go awry, halted trading on the stock market, and worse. In a computerized

    embedded world, the quality and reliability of software is a matter of life and death..Quality

    means the conformance to the specified design requirement. Being correct, the minimum

    requirement of quality, means performing as required under specified circumstances.

    Debugging, a narrow view of software testing, is performed heavily to find out design defects by

    the programmer. The imperfection of human nature makes it almost impossible to make a

  • 8/22/2019 project report on ABCX

    77/82

    77

    moderately complex program correct the first time. Finding the problems and get them fixed , is

    the purpose of debugging in programming phase.

    For Verification & Validation (V&V)

    Just as topic Verification and Validation indicated, another important

    purpose of testing is verification and validation (V&V). Testing can serve as

    metrics. It is heavily used as a tool in the V&V process. Testers can make

    claims based on interpretations of the testing results, which either the product

    works under certain situations, or it does not work. We can also compare the

    quality among different products under the same specification, based on

    results from the same test.

    Good testing provides measures for all relevant factors. Any system where

    human lives are at stake must place extreme emphasis on reliability and

    integrity. In the typical business system usability and maintainability are the

    key factors, while for a one-time scientific program neither may be

    significant.

    We cannot test quality directly, but we can test related factors to make

    quality visible. Quality has three sets of factors -- functionality, engineering,

    and adaptability. A testable design is a design that can be easily validated,

    falsified and maintained.

    For reliability estimation

    Software reliability has important relations with many aspects of software,

    including the structure, and the amount of testing it has been subjected to.

    Based on an operational profile (an estimate of the relative frequency of

    use of various inputs to the program), testing can serve as a statistical

    sampling method to gain failure data for reliability estimation.

    http://www.ece.cmu.edu/~koopman/des_s99/verification/index.htmlhttp://www.ece.cmu.edu/~koopman/des_s99/verification/index.html
  • 8/22/2019 project report on ABCX

    78/82

    78

    9)System Implementation:-

    Introduction

    System implementation is the stage when the user has thoroughly tested the

    system and approves all the features provided by the system. The various

    tests are performed and the system is approved only after all the

    requirements are met and the user is satisfied.

    The new system may be totally new, replacing an existing manual or

    automated system, or it may be a major modification to an existing

    system. In either case, proper implementation is essential to provide a

    reliable system to meet organizational requirements. Successful

    implementation may not guarantee improvement in the organization using

    the new system (that is a design question), but improper will prevent it.

    Implementation is the process of having systems personnel check out and put

    new equipment into use, train users, install the new application and

    construct any files of data needed to use it. This phase is less creative than

    system design. Depending on the size of the organization that will be

    involved in using the application and the risk involved in its use, systems

    developers may choose to test the operation in only one area of the firm

    with only one or two persons. Sometimes, they will run both old and new

    system in parallel way to com-pare the results. In still other situations,

    system developers stop using the old system one day and start using the

    new one the next.

    The implementation of the web based or LAN based networked project has

    some extra steps at the time of implementation. We need to configure the

    system according the requirement of the software.

  • 8/22/2019 project report on ABCX

    79/82

    79

    MAINTENANCE:-

    Maintenance or enhancement can be classified as: -

    Corrective Adaptive

    PerfectiveCorrective maintenance means repairing processing or performance

    failures or making changes because of previously uncorrected

    problems or false assumptions.

    Adaptive maintenance means changing the program function

    Perfective maintenance means enhancing the performance or modifying

    the program(s) to respond to the users additional or changing needs.

    Maintenance is actually the implementation of the post implementation

    review plan.

    As important as it is, many programmers and analysts are reluctant to perform

    or identify themselves with the maintenance effort. There are

    psychological, personality and professional reasons for this. In any case, a

    first class effort must be made to ensure that software changes are made

    properly and in time to keep the system in tune with user specifications

  • 8/22/2019 project report on ABCX

    80/82

    80

    10)FUTURE EXTENSION:-

    The project ROYAL INDIAN TOUR is to make your travel experience a memorable with our

    years of experience & trust of thousands of clients. The software takes care of presenting the

    best our country has to offer which not only reflects clients needs but also reveal the beauty of

    the country and culture and is capable to provide easy and effective storage of information

    related to members that are authorized.

    It provide members details including their name., Contact no., and about their on line information.

    .

    Conclusion

    This projectwww.abktour.comdeveloped as per the requirement and necessities of tourists...

    The main feature of this project is providing user-friendly interface for managing the information of

    members and keep Information about their date of arrival . Each activity is performed in computerized

    way rather than manually which is time consuming.

    http://www.abktour.com/http://www.abktour.com/http://www.abktour.com/http://www.abktour.com/
  • 8/22/2019 project report on ABCX

    81/82

    81

    11) BIBLIOGRAPHY:-

    SYSTEM ANALYSIS AND DESIGN

    SOFTWARE ENGINEERING

    E-COMMERCE

    ASP.NET

    MS-ACCESS

    WWW.GOOGLE.COM

    WWW.YAHOO.COM

    http://www.google.com/http://www.google.com/
  • 8/22/2019 project report on ABCX

    82/82