Professional Documents
Culture Documents
BOOKING IN AAI
SUBMITTED BY:
AKSHAY
BHAVYA SATIJA
DRON KAPIL
HARSH SRIVASTAVA
KARTIK CHUGH
NEERAJ
NISHANT SRIVASTAVA
SHASHANK MISHRA
SHIVAM KWATRA
TARUN GUPTA
TANVI SOOD
VIKAS SANGWAN
1|P ag e
Airport Authority of India
The Airport Authority of India (AAI) is an organization working under the Ministry of Civil
Aviation that manages all the airports in India. The AAI manages and operates 126 airports
including 12 international airports, 89 domestic airports and 26 civil enclaves. The corporate
headquarters (CHQ) are at Rajiv Gandhi Bhawan, Safdarjung Airport, NewDelhi. V.P
Agrawal is the current chairman of the AAI. AAI provides air navigation services over 2.8
million square nautical miles of airspace. During the year 2002-03, AAI at various airports
handled about 5 lakhs aircraft movements (4 lakhs domestic and 1 lakh international); 40
million passengers (26 million domestic and 14 million international) and 9 lakh tons of
cargo (3 lakh domestic and 6 lakh international).
History
The AAI was formed on 1 April 1995 by merging the National Airports Authority (NAA)
and International Airports Authority of India (IAAI), to create a centralized organization that
could effectively manage both the international and domestic airports. Presently, it is owned
100% by the Government of India.
2|P ag e
Bengaluru International Airport
3|P ag e
Mumbai – Chhatrapati Shivaji International Airport
4|P ag e
Functions
Control and Management of the Indian airspace extending beyond the territorial limits of the
country, as accepted by the ICAO
Design, Development. Operation and Maintenance of International and Domestic
Airports and Civil Enclaves.
Construction, Modification and Management of Passenger Terminals.
Development and Management of Cargo Terminals at International and Domestic
Airports.
Provision of Passenger Facilities and Information System at the Passenger Terminals
at airports.
Expansion and strengthening of operation area viz. Runways, Aprons, Taxiway, etc.
Provision of visual aids.
Provision of Communication and Navigational aids viz. ILS, DVOR, DME, Radar,
etc.
Revenue
Most of AAI’s revenue is generated from landing/parking fees and fees collected by
providing Air Traffic Control services to aircraft over the Indian airspace.
International Projects
The AAI has been involved in various consultancy projects with Libya, Algeria, Yemen,
Maldives, Nauru and Afghanistan. The AAI also provides trained personnel for operation,
maintenance and management of airports in these countries.
5|P ag e
ABSTRACT
This project is of ‘Conference Room Booking’ built with the help of Android (Java) as
front end and SQL and PHP as back end. This project has been built in order to eliminate
the problem related to the booking of conference rooms. The aim of this project is to help
people in booking conference room of their choice on a particular date and at particular
time for a particular duration easily.
The main achievements during the development of the project we have achieved is the
elimination of previous problem regarding security of the software and the effective flow
of control of the software so that it can run without any error and easy understanding of
the working of the software to the end users.
6|P ag e
ACKNOWLEDGEMENT
It is obvious that the development of a project and the dissertation is the beyond the scope
of one person alone. Although it is not feasible to list the names of each and every person
who helped me in the successful completion of the project, the following persons’ support
and endless help and contribution needs special mention:
7|P ag e
TABLE OF CONTENTS
CHAPTERS
1. INTRODUCTON
1.1 Background
1.2 Objectives
1.3 Purpose, Scope and Applicability
1.3.1 Purpose
1.3.2 Scope
1.3.3 Applicability
1.4 Achievements
1.5 Organization of Report
2. SURVEY OF TECHNOLOGIES
3. REQUIREMENTS AND ANALYSIS
3.1 Problem Definition
3.2 Requirements Specification
3.3 Planning and Scheduling
3.4 Software and Hardware Requirement
3.5 Preliminary Product Description
3.6 Conceptual Models
4. SYSTEM DESIGN
4.1 Basic Modules
4.2 Data Design
4.2.1 Schema Design
4.2.2 Data Integrity and Constraints
4.3 Procedural Design
4.3.1 Logic Diagram
4.3.2 Data Structures
4.4 User Interface Design
4.5 Security Issues
4.6 Test Cases Design
5. IMPLEMENTATION AND TESTING
5.1 Implementation Approaches
5.2 Testing Approach
5.2.1 Unit Testing
5.2.2 Integrated Testing
5.3 Modifications and Improvements
6. RESULTS AND DISCUSSION
6.1 Test Reports
8|P ag e
6.2 User Documentation
7. CONCLUSIONS
7.1 Conclusion
7.2 Limitation of the System
7.3 Future Scope of the Project
REFERENCES
9|P ag e
TABLE OF FIGURES
10 | P a g e
Chapter 1: INTRODUCTION
BACKGROUND
OBJECTIVE
PURPOSE
SCOPE
APPLICABILITY
ACHIEVEMENTS
ORGANISATION OF REPORT
11 | P a g e
1.1 Background:-
In order to develop software some background knowledge is essential in that field. We
too have developed small scale software previously like of billing system of a particular
shop. We have gained knowledge of Java and SQL in 5th Semester of B.TECH. This
knowledge has brought in us a confidence in building this project.
1.2 Objectives:-
12 | P a g e
To produce a simple, yet suitably effective user interface, and a system that is easily
maintainable, efficient and practical and does the following tasks –
Adds new Conference Room Booking details.
Update old booking details
Retrieve booking details
Generate the reports on booking details whenever wished.
Generate a Booking ID, Customer ID to the customer.
Calculate the Booking Amount, Balance Amount by deducting the advance account from
booking account.
1.3.2 Scope:-
Software is user friendly.
Less time consuming than manual system.
Maintenance of records is easier.
No need to store thick files.
Not very costly
Data integrity is present.
App is data dependent.
No chances of redundancy in records.
Application will be applicable for a long period as provisions are there for further additions
and developments.
13 | P a g e
1.3.3 Applicability:-
The software can be used directly by any person who owns rooms for conference room
booking. He/She can easily hand on experience with this software it is very erasy to operate
and provides them flexibility in their work. This app can have a broad applications in the long
run
1.4 Achievements:-
This project has brought us a lot of changes. It made us handle real life problems that can be
solved through computers. We learnt a lot about programming language like Android and
used it to build the application. We came across certain difficulties which required intensive
research and referring to various materials in order to solve them, and also taking help by our
counsellor.
14 | P a g e
Chapter 2: Survey of Technology
Today in order to develop applications various technologies are available which include
language and software and out of which we’ve used Android for our front end and Oracle as
our back end.
15 | P a g e
Chapter 3: Requirements and Analysis
PROBLEM DEFINITION
REQUIREMENT SPECIFICATIONS
PLANNING AND SCHEDULING
SOFTWARE AND HARDWARE REQUIREMENTS
PRELIMINARY PRODUCT DESCRIPTION
CONCEPTUAL MODELS
16 | P a g e
3.1 Problem Definition:-
The problem was to book a particular Conference Room on a particular date, at a particular
time and for a particular duration. This should be available online also in a wifi environment.
Any known customer having his/her User_ID and password can login and book rooms for
himself/herself on a particular date and at a particular time connecting to wifi. He can also
book the various devices/equipments required with the booking such as amplifier, projectors
of different types such as slide projectors, film projector etc. video switch, microphones,
computers etc.
17 | P a g e
3.3 Planning and Scheduling
Planning
In the planning phase of the project, the rules and constraints associated with the project is
described which controls the flow of execution of the software whenever certain tasks can or
cannot happen.
Firstly, no booking can be done on a day prior to the current date. If this happens the app
must show some error message and post that return to its previous working condition.
Secondly there shouldn’t be any conflict of rooms as same room cannot be booked by two
different parties. If users do so, then it must return some error message.
No unauthorized person shall be able to login onto the app. If someone tries so gain access
using unauthorized username, password, it should ask for the correct one.
Booking should only be done of a room that exists on a particular date and time. If it is
violated then room not available should be displayed on the screen.
No cancellation is done of the booking ID that does not exist or of previous date than the
current date. If user wants to do so respective error message should be displayed by the
software.
Scheduling
Scheduling of app is co-related to various tasks with respect to their cost, value and duration.
Depending upon the project scheduling can be done dynamic in implementation. The
following are the various types of scheduling techniques.
18 | P a g e
3.4 Software and Hardware Requirements:-
Tools Used:-
Android
Oracle
19 | P a g e
3.5 Preliminary Product Description
The new system is more advanced than the previous ones. It provides more security
and easy access to the app with enhancement of backup and recovery so the proposed system
need more advanced software installed in the system. In order to achieve all of its objectives
proper knowledge of how to handle the software is also mandatory. The main objectives of
the new system are as follows:-
To maintain a common centralized database for the entire booking record.
To provide quick and accurate retrieval of data in a flexible manner.
To maintain proper security and confidentiality of data.
To develop a modular user friendly system.
To ensure optimum utilization of expensive resources.
To establish standard of data exchange between various systems.
To assist planning, monitoring and budgeting processor.
To increase organization efficiency through reduction in the overall cost of delivery
member case services.
To provide useful accurate, complete and timely information to meet the requirements
of various authorities requiring such data.
To improve managerial effectiveness in planning.
To reduce critical and clerical work loads.
The new system will function very efficiently, having proper management of data and
information regarding the list of users and their authorization level. It’ll also have the
functionalities of changing the password, maintaining employee information, customer’s
information and many more features besides booking the conference room.
This is the most creative and challenging phase of the system life cycle. It describes the final
system process by which it is developed.
The major steps in design are present in the following figure:
Following are the designing tools used for designing the app
DFD
ERD
2. An arrow identifies data flow. It is the pipeline through which the information flows
3. A circle or a bubble represents a process that transforms incoming data flow into
outgoing data flows.
21 | P a g e
CONSTRUCTING A DFD:
Several rules of thumb are used in drawing DFD’s:
1. Process should be named and numbered for an easy reference. Each name should be
representative of the process.
2. The direction of flow is from top to bottom and from left to right. Data traditionally flow
from source to the destination although they may flow back to the source. One way to
indicate this is to draw long flow line back to a source. An alternative way is to repeat the
source symbol as a destination. Since it is used more than once in the DFD it is marked with
a short diagonal
3. When a process is exploded into lower level details, they are numbered.
4. The names of data stores and destinations are written in capital letters. Process and
dataflow names have the first letter of each work capitalized
Generate booking
Manages
and manage
user and
customer’s
employee Conference records
details
Room
Booking
Customers
22 | P a g e
DFD for Administration:-
1st level DFD :-
Administrator
User Table
Changes
Stores
Password
Employee
3
Records
2
CRB
Database
Administrator
23 | P a g e
2nd level DFD:-
Verifies the
old Replaces
password the old
password
Verifies the with new
employee Stores in
details the
database
Stores the
details in Derives
the information
database from the
database by
supplying Administrator
the userid
CRB
Database Changes
Adds new Password
customer 4
Generate details
new 3
Booking
2
Booking Clerk
24 | P a g e
2nd Level DFD
Confirms
old Replaces
password the old
password
with new
Verifies
customer Stores in
Stores
details the
details in
database
database
Retrieves data Retrieves
for new information
booking from
database
Generate
New Stores
booking record of
new
booking in
the Booking Clerk
database
Entity Relationship Diagram is used to understand and document the system data independent
of how the data is being used or will be used. ERD describe the relation between groups of
data.
Data is the centre of any processing system. It is therefore necessary to understand it and the
relationship between the groups of data to be able to model a system.
The basic concepts of an ERD are entity and data relationships. In a system there may be
several entities question bank, student details etc
The ERD is a representation of the relationship between entity types.
25 | P a g e
ER- diagrams consist of following components:-
Rectangles – represent Entity sets.
Ellipses – represent attributes.
Diamonds – represent relationship sets.
Lines – link attributes to entity sets and entity sets to relationship sets.
Double Ellipses – represent multi valued attributes.
Double lines – indicate total participation of an entity in a relationship set.
Dashed ellipses – denote derived attributes.
26 | P a g e
Chapter 4: System Design
BASIC MODULES
DATA DESIGN
PROCEDURAL DESIGN
USER INTERFACE DESIGN
SECURITY ISSUES
TEST CASE DESIGN
27 | P a g e
4.1 Basic Modules: -
1. Login check
2. Change Password
3. Create User
4. Drop user
5. New Employee Entry
6. View Employee Details
7. Book Room
8. Cancel the Room Booking
9. View Booking Details
10. New Customer Entry
11.View Customer Details
1. Login Check: This Module is meant for checking the valid Admin/user logging into the
software.
2. Change Password: This Module is responsible for changing the existing password of
the valid user.
3. Create user: This Module works for administrator in order to create a User: This
Module works for administrator in order to create a new user who can log on the software.
4. Drop User: This Module also works for administrator in order to delete any existing user
for the database.
5. New Employee Entry: This Module provides the facility of the entering the details of
any new employee by the administrator which after submission added to the database and
generates and displays the employee_id.
6. View Employee Entry: This Module provides the details of any existing employee
when provided the employee_id by the administrator.
7. Book Room: This Module is the main module of the entire software. It takes input from
the booking clerk/customer, the date of booking, starting time, ending time and the capacity
of the room to be booked and displays the list of available rooms if it exists.
Further, one can book the desired room from the list of available rooms by clicking the book
button. If the customer is a new customer then the details of the customer must be entered in
the database so that he/she own id. After that when provided the customer id it displays the
booking amount and asks for the advance amount. After entering the advance amount, it
generates the booking details with booking id and related information if there is no error in
this booking regarding the constraints applied to the tables if there is any error it displays an
error message.
8. Cancel Room Booking: This module is responsible for cancelling of the room booked
when provided a valid booking id by the booking clerk.
28 | P a g e
9. View Booking Details: This module is meant for displaying the details of any booking
if provided a valid Booking id
10. New Customer Entry: This module is meant for entering the details of a new
customer. After submitting it generates the customer id which can be used at the time of
booking of conference rooms. The details are saved to the database in the customer table.
11.View Customer Details: This module is meant for viewing the details of any
customer when provided the valid customer id.
User Table
Field Name Data type Description
User id VarChar2(20) Unique for each other
Password VarChar2(15) Password
Cust_Detail Table
Field Name Data type Description
Cust_ID Number(5) Automatic generate
Cust_Name VarChar2(20) Name of customer
Cust_Address VarChar2(30) Address of customer
Cust_Gender VarChar2(6) Sex of customer
Cust_Phoneno VarChar2(15) Phone no of customer
Conf_Room Table
Field Name Data type Description
Room no Number(2) Room No
Capacity Number(3) Capacity of room
Rate_per_hr Number(5) Amt. paid per hour
29 | P a g e
Booking Table
Field Name Data type Description
Booking ID Number(5) Automatic generate
Cust_ID Number(5) Customer’s id
Room_no Number(2) Room No
Booking_date Date Date of booking
Start_time Varchar2(5) Start time of booking
End_Time Varchar2(5) End time of booking
Booking_amount Number(6) Total amount for booking
Advance Number(6) Advance given by the
customer
Balance Number(6) Total amount-Advance
Emp_Details Table
Field Name Data type Description
Emp_Id Number(5) Automatic generate
Emp_Name Varchar2(20) First name of Employee
Emp_Fname Varchar2(20) Employee’s Father Name
Emp_DOB Date Date of Birth
Emp_Joiningdate Date Date of Joining
Emp_Gender Varchar2(6) Sex of Employee
Emp_Address Varchar2(30) Address of Employee
Emp_Ismarried Varchar2(10) Material Status of Employee
Emp_Designation Varchar2(20) Designation of Employee
Emp_Phoneno Varchar2(15) Phone No. of Employee
Emp_Salary Number(5) Salary of Employee
30 | P a g e
Foreign Key Constraint:-
1. cust_ID: cust_ID is taken as foreign key in the booking table so that the booking
can be related to the particular customer that exist in the cust_Details table.
2. 2.room_no: room_no is taken as foreign key in the booking table so that the booking
can be related to a particular room that exist in the conf_Room table.
1. The validity of the Employee age: The validity has been applied on the
Employee table to check that the difference
between the date of birth and the joining date
of the employee must be greater than or equal
to 18 years.
2. Valid booking date: This constraint checks for valid booking date
entered for booking it must not be any date
before the system date
3. Valid booking date, time and room no This constraint checks for a valid booking
date and time that is no any booking exists
with same date and same time having the
same room no as it will lead to conflict
between the two bookings of the same room
on the same date and same time
Software has different modules to perform various functions which contain a set of
instruction in order to perform that function effectively. The flow of execution of instruction
may change whenever the program contains jumps, loops, etc. A control flow graph describes
the sequence in which different instructions of a program get executed. It also describes how
the flow of control passes through the program. Here is some common flow of execution of
the program has been represented through various CFG.
31 | P a g e
4.3.2 Data Structures:-
The programs contain different types of variables which carry the value specified for a
particular purpose. The variables can be declared as per the requirement of the program. The
variables can be declared as per the requirement of the program. Various can be declared as
per the requirement of the program. Various types of data can be classified linearly or having
tree type data structure. Here if the requirement to store the values of similar data type in the
program occurs, then array type of data structure can be used. Also, as we are using JAVA as
a programming language to develop the software we are aware of that it is an object oriented
programming language having class as a data structure wrapping in it the variables and
functions that operate on those variables.
32 | P a g e
3. Algorithm to generate a new booking: -
Input data: Data of booking, starting time of booking, ending time of booking, capacity,
advance amount.
Input data: room no, customer id, booking amount, balance.
Output data: List of available rooms determine the booking done with booking id.
Algorithm used:
First of all date of booking, starting time, ending time and capacity is entered by the user
which is passed to function which displays the list of available room based on the
requirements from the database with their corresponding details like capacity and rate per
hour.
Choice of room is selected from the list of available room which further asks for the customer
id if the customer is any of the existing customers. If it is new one then customer entry from
is displayed by clicking on new customer button. After filing the form customer id is
generated which can be used to pass in the booking table?
Calculation of booking amount is done as follows:
Duration=End time-Start time
Booking amount = Rate per hour*Duration
Advance amount is taken as input from the user and is deducted from booking amount and
the result is stored in the balance variable as follows:
Balance=Booking amount- Advance amount.
All the above explicit and implicit data are sent to the database to store the values in the
booking table which after entering the data returns the booking id.
This booking id is further passed to the function responsible for displaying the booking
details which finally displays all the above input data after retrieving from the database.
The pictorial representation of the user interfaces is shown with the help of falling screen
shots: -
33 | P a g e
34 | P a g e
35 | P a g e
36 | P a g e
4.5 Security Issues:-
As any softwasre is built it requires protection from unauthorized access so that no any
inconsistent data should be there that could cause problem. Thus, software must be secure
enough to handle these types of situations. There must be authorization level assigned with
each used level wise.
We have created two types of authorization level one for administration and other for
booking clerk. An administrator is responsible for creating any new employee with their
corresponding details. He/she can also create users who can work as booking clerk to book
rooms available but with limited access of the software. An administrator can view the details
of any employee thus hiding the data from unauthorized access.
4.6 Test cases design: -
Login form:
37 | P a g e
Chapter 5: Implementation and Testing
IMPLEMENTATION APPROACHES
TESTING APPROACH
UNIT TESTING
INTEGRATED TESTING
MODIFICATION AND IMPROVEMENTS
38 | P a g e
5.1 Implementation Approaches:-
Installation Procedure of the Software:
In order to run the software proper installation of the software is necessary. This software
has been developed by using ANDROID as front end and ORACLE as back end that’s why
first of all to run the software we need to install ANDROID and ORACLE in the system .
Following steps should be performed to run the software:-
i) Install ORACLE in the system.
ii) Install Android in the system.
iii) After installing the same we need to create a connection between the two through
JDBC- ODBC bridge. To create a connection go to Control Panel and then to
Administrative Tools in case of Windows 2000 or higher versions else directly go
to Data Sources(ODBC).
iv) A dialog box appears, select system DSN tab.
v) Click on Add button.
vi) Select Oracle ODBC driver from the list of options.
vii) Write the Data Source name as conf. This is the name of DSN used in the
program.
viii) Create desired table in Oracle given in Schema Design with various constraints.
ix) Create the administrator account with the password. This value will be given by
the administrator at running time of the software.
x) Compile the source code of Android and run the software by double clicking on
the conference batch file icon.
39 | P a g e
Each of these functions would need to ensure that they do only just what the user requests,
and not something other than that. The system that has been implemented will need to
stimulate typical situations that are currently being frequently performed manually at home,
as well as typical ones. As will explain later, these typical cases were tested more thoroughly
than a typical one.
The main objective of the testing is to show the presence of bugs, not the absence. No
absolute certainty can be gained from the testing. The testing just ensures that the candidate
system is an efficient alternative to the present system.
2. Testing should help locate errore, not just detect their presence.
The tests done on the designed software was to verify the following properties of the
software:
Correctness (satisfaction of the specifications)
Reliability (how well it meets the requirement)
Portability (running in different environments)
Usability (ease with which user can use the software)
Maintainability (modifications after initial release), etc.
White Box Testing is checking every single path of the program, so the errors can be traced
than compare to the black box testing.
Example:-
Calculation of booking amount is integrated with the rate per hour of a particular room and
calculation of duration of booking which we can get after subtracting end time of booking
and start time of booking.
Similarly calculation of balance amount is integrated with the subtracted result of booking
amount and Advance amount. The result is checked with the desired result and found it
correct.
41 | P a g e
5.4 Modification and Improvements:-
After completion of testing various bugs found which were debugged. The source code has
been modified and some of the algorithms has been changed in order to ccorrect the output of
the system.
Example:-
The automatic generation of Employee_Id, Cutomer_Id and Booking_Id was found not
working properly so the algorithm for the generation of these Ids has been changed and later
on it was found that it was working properly with the implementation of the new algorithm.
PAY NOW button was not functioning properly in the Booking Report of a particular
booking. This button was meant for paying of the balance amount if it is and updating the
value of the balance to zero. If there is no balance amount left for a particular booking then
Amount already Paid message should be displayed. This was not working properly so the
algorithm has been changed in order to make the desired changes in the database
permanently.
42 | P a g e
Chapter 6: Results and Discussions
TEST REPORTS
USER DOCUMENTATION
43 | P a g e
6.1 Test Reports:-
After all the tests on the designed software to verify its various qualities following
conclusions were attained:
44 | P a g e
45 | P a g e
46 | P a g e
47 | P a g e
48 | P a g e
49 | P a g e
50 | P a g e
51 | P a g e
Chapter 7: Conclusion
CONCLUSION
LIMITATION OF THE SYSTEM
FUTURE SCOPE OF THE SYSTEM
52 | P a g e
7.1 Conclusion:-
This chapter will review the initial objective and the extent to which they were fulfilled. It
will summarise the project’s success and weakness and what was learnt during it duration.
53 | P a g e
4. Help Facility Review:-
The requirements demanded a user friendly system that had the possibility of the helping the
user where appropriate. This is achieved through the facility of continual communication
from the system ,in the form of the on-line help guidance and also messages the system
displays to the user about possible mistakes that could be remedied and whether processed
should continue or not.
The project has been designed to work on the large scale, so according to our analysis in the
future scope of this project is bright and would have an everlasting effect on the current
system. The future scope of the project is that it would be provided with the functionalities of
Bugs Report and submitting facility in case there are any abnormal failures in the software.
Next, we would like to make the software work even faster in case the database size
increases. We would also like to include safe mode facility in the software so as to recover
the software hangs out or has abnormal crashes or errors.
54 | P a g e
References:-
55 | P a g e