You are on page 1of 17

Hotel Management System

ABSTRACT

This is software which is mainly made for management of a Hotel. The software has
been designed with JAVA as frontend and Microsoft Access as back-end. The project
Hotel Management manages and maintains the records of customers and rooms in the
hotel. The rooms have different categories such as standard, deluxe, VIP etc. Also some
rooms have Ac, TV, Refrigerator and many other facilities. Hotel also has other
facilities like restaurant, swimming pool etc. So these charges and records will be
maintained accordingly.

This software has been made in a user friendly interface, so that normal person can add,
delete and modify the entries of customer and handle the transactions of customers
easily.
Table of Contents

1.0 Introduction
1.1 Project Summary
1.2 Purpose
1.3 Scope
1.4 Objective

2.0 Project Management

2.1 Project Planning


2.1.1 Project Development Approach and Justification
2.1.2 Project Plan
2.1.3 Milestones and Deliverables
2.1.4 Roles and Responsibilities
2.1.5 Group Dependencies
2.2 Project Scheduling
2.3 Risk Management
2.3.1 Risk Identification (it is concerned with discovering possible
risk to the project)
2.3.2 Risk Analysis(each identified risk is considered in turn and a
judgment made about the probability and the seriousness of
the risk)
2.3.3 Risk Planning (Identify strategies to manage the risk)
2.4 Estimation
2.4.1 Effort Estimation
2.4.2 Cost Analysis (Total cost of the project including parts and
labors. Labor cost should be broken down into the areas of
design, analysis, prototype construction, software development
and programming, hardware-software integration, testing, design
modifications and documentation. A cost analysis is NOT a
tabulation of your expenditure)

3.0 System Requirements Study

3.1 User Characteristics (Type of users who is dealing with the system)
3.2 Hardware and Software Requirements (minimum requirements to run
your system)
3.3 Constraints
3.3.1 Regulatory Policies
3.3.2 Hardware Limitations
3.3.3 Interfaces to Other Applications
3.3.4 Parallel Operations
3.3.5 Higher Order Language Requirements
3.3.6 Reliability Requirements
3.3.7 Criticality of the Application
3.3.8 Safety and Security Consideration
3.4 Assumptions and Dependencies

4.0 System Analysis


4.1 Study of Current System
4.2 Problem and Weaknesses of Current System
4.3 Requirements of New System
4.3.1 User Requirements
4.3.2 System Requirements
4.4 Feasibility Study
4.4.1 Does the system contribute to the overall objectives of
the organization?
4.4.2 Can the system be implemented using the current technology
and within the given cost and schedule constraints?
4.4.3 Can the system be integrated with other system which is already
in place?
4.5 Requirements Validation
4.6 Activity/Process In New System(Use event table)
4.7 Features Of New System
4.8 Class Diagram
4.9 System Activity(Use case and/or scenario diagram)
4.10 Object Interaction
4.11 Sequence and Collaboration Diagram

5.0 System Design

5.1 System Application Design


5.1.1 Method Pseudo code
5.2 Database Design/Data Structure Design
5.2.1 Table and Relationship
5.2.2 Logical Description Of Data
5.3 Input/Output and Interface Design
5.3.1 State Transition/UML Diagram
5.3.2 Samples Of Forms, Reports and Interface

5.4 Database Design


5.4.1 Mapping Of ER Diagrams into Tables
5.4.2 Normalization
5.4.3 Table Relationship Diagram With Indication of all Keys
5.5 Input/output Design
5.6 Interface Design
5.6.1 Access Control and Security
5.6.2 State-Transition Diagram
5.7 System Structural Design
5.8 Matrices Preparation

6.0 Implementation Planning


6.1 Implementation Environment
6.2 Program/Modules Specification
6.3 Security Features
6.4 Coding Standards
7.0 Testing
7.1 Testing Plan
7.2 Testing Strategy
7.3 Testing Methods
7.4 Test Cases
7.4.1 Purpose
7.4.2 Required Input
7.4.3 Expected Result
8.0 Limitation and Future Enhancement

9.0 Conclusion and Discussion


9.1 Self Analysis of Project Viabilities
9.2 Problem Encountered and Possible Solutions
9.3 Summary of Project work
1. Introduction

1.1 Project Summary


This is software for managing the general activities of a hotel like booking of
rooms, billing etc.

The purpose of this document is to collect, analyze and define high-level needs and
features of the Hotel Management System. It focuses on the capabilities needed by
the stakeholders, and the target users, and why these needs exist. The details of how
the Hotel Management System fulfills these needs are detailed in the use-case and
supplementary specifications.

1.2 Purpose

This software is aimed at facilitating the prompt, accurate and easy management of
a hotel. It will be very helpful to the manager on the one hand and to the customers
as they would be able to get good and fast service.

1.3 Scope
In this software, the hotel manager can add new customers and manage that
customer information. Restaurant manager can add restaurant bill in that customer
bill. This software works at all hotels that cater to a large number of customers and
want to computerize the complete management process.

1.4 Objective
The objective of Hotel Management system is to develop a project which maintains
booking of rooms and handles accounts of a hotel. It is a window based application
to be implemented in java.

2. Project management

2.1 Project Planning


The plan consists of collecting requirements, creating gantt chart, data flow
diagram, use-case diagram, class diagram, semantic model diagram, sequence
diagram, collaboration diagram, activity diagram, and implementation.

2.1.1 Project Development Approach and Justification


The approach is in four steps: Design, Implement, Test, and Review.

2.1.2 Project Plan


2.1.3 Milestones and Deliverables
When one task is performed and completed, it’s said to have covered a milestone.
The working model of the software is called deliverables.

2.1.4 Roles and Responsibilities


The programmer has to implement the software logic for two roles of a person:
Administrator and User

2.1.5 Group Dependencies


This part has to deal with inter dependency of the software logic i.e. in terms of
classes, files, functions, etc

2.2 Project Scheduling


If various projects are going on than some specific amount of time is dedicated to
both of the projects making efficient project scheduling.

2.3 Risk Management

2.3.1 Risk Identification


Since such working models are already available online for free, the use of this
software after paying some money will not be easy for faculties and students.

2.3.2 Risk Analysis


The risk is analysed as the above and the solution is as following point.

2.3.3 Risk Planning


Providing a high reliability and privilege given to faculties to create new software
with more security features will compensate for the money.
2.4 Estimation

2.4.1 Effort Estimation


This part includes the work hours of employees for the project.

2.4.2 Cost Analysis

Total cost of the project including parts and labors. Labor cost should be broken down
into the areas of design, analysis, prototype construction, software development and
programming, hardware-software integration, testing, design modifications and
documentation. A cost analysis is NOT a tabulation of your expenditure.

3. System Requirements Study

3.1 Hardware and Software Requirements


Operating System: Vista, XP, Windows 7
RAM: 512MB or more

3.2 Constraints

3.2.1 Regulatory Policies


All policies relevant to Regulation and this software need to mentioned here.

3.2.2 Hardware Limitations


When server cannot cater to more number of users, it takes time to process.

3.2.3 Interfaces to Other Applications


There is no interface with other application.

3.2.4 Parallel Operations


Parallel operation for hotel management is to create user and allocating room.

3.2.5 Higher Order Language Requirements


As the program is written in JAVA, server must be available to process the script of

JAVA.

3.2.6 Reliability Requirements


The software is of no use if it doesn’t provide reliability.
3.2.7 Criticality of the Application
Attention must be paid to the critics i.e. how to remove the problem and how to add a
new feature.

3.2.8 Safety and Security Consideration


The software should not cause spread of a virus.

3.4 Assumptions and Dependencies


Assumptions made:
1. The software should work on different operating systems.
2. There should be database backups.

4. System Analysis

4.1 Study of Current System


Current system for hotel management is fully based on paper work. Hotel
Management has to manage all records of customers and rooms in papers.

4.2 Problem and Weaknesses of Current System


Paperwork is tedious job. There is delay and the problem of human error in allotting
rooms and providing services.

4.3 Requirements of New System

4.3.1 User Requirements


There should be software which allocate rooms automatically and maintain records of
customers and generate bill automatically for customers.

4.3.2 System Requirements

There should be database backup of hotel management system. There should be Java
supported framework for the system. Operating system should be Windows XP or higher
version of Windows.

4.4 Feasibility Study

4.4.1 Does the system contribute to the overall objectives of the organization?

4.4.4 Can the system be implemented using the current technology and within the
given cost and schedule constraints?
4.4.5 Can the system be integrated with other system which is already in place?

4.5 Requirements Validation


It is concerned with showing that the requirements actually define the system which
the customer wants.

4.6 Activity/Process In New System


As defined in 4.3

4.7 Features Of New System

-Easy management of checking –in and other processes.


-Saves time
-Can give accurate information about hotel when required
-Billing becomes easy
-Customer information
-Reduces paper work

4.8 Class Diagram


4.9 System Activity

4.10 Object Interaction

This deals with how two or more objects exchange data along with them.

4.11 Sequence and collaboration diagram


SEQUENCE DIAGRAM FOR HOTEL MANAGEMENT SYSTEM

fiJanager/Derek Hnt el h/Iana gement Wnncr Bill Pa ment


tinnist Ssgt

5. Check roo

6.Allot rooms
5. System Design

5.1 System Application Design


From first form of login for administrator to corresponding other forms.

5.1.1 Method Pseudo code


Algorithm or flow-chart is generated according to the data and the task to be performed.

5.2 Database Design


Relational Database is maintained as we know the data required is the same for all.

5.2.1 Table and Relationship

There are 3 tables maintained in MS Access:

1. Room: Maintains list of all rooms of the hotel


2. Customer: Information about customer
3. Admin: Administrator login
5.3 Input/output and Interface Design
Input/output always differs because of different customers but Interface is same

for all.

5.3.1 Samples of Forms, Reports and

Interface Login Form:

Main Window:
Check In and Check out Form:

Guest Information window:


Room Information Window:

5.4 Interface Design

5.4.1 Access Control and Security


The security and access control is provided by a login form that checks the user
id and password of the user.

6. Implementation Planning

6.1 Implementation Environment


Implementations environment is in Java and software is made in Netbeans IDE.
NetBeans provides a user friendly environment for project development.
.
6.2 Program/Modules Specification
The Hotel Management software is aimed towards the hotels that want to computerize
their management system. It is user-friendly and easy to learn.
➢ Functions:
-Login for authorized users
-Entry of customer details
-Allot room to customers based on current status as shown by software.
-Manage the billing including usage of other services of the hotel
-Track of all customers as their details are stored.

6.3 Security Features


-There is one module for administrator login. First of all administrator has to login to
software with his/her user-id and password.

6.4 Coding Standards


The system is developed in Java which is an Object-Oriented language. Proper
validation has been done for various inputs and outputs of the system. Care has been
taken about proper indentation of the code.

7. Testing

7.1 Testing Plan


First inspection is performed followed by white box testing which is applied by the
programmer.

7.2 Testing Strategy


If it is white box testing then all statements are checked whether they are logically
correct.

7.3 Testing Methods


Two methods are used: Boundary value checking, Equivalence class partitioning

7.4 Test Cases

Test Case 1: Testing login module

Expected response:
Error message should be displayed if entered USERID and/or password is not
found in database of administrator.
System response:
“Error: No match for USERID and/or password.”

Test Case 2: Testing Check in module “CHECK IN”

Expected Response:
Error message should be displayed if room is not available for requested period.
System Response:
“The following errors were found:
Room is not available for requested period.”

7.4.1 Purpose
Checking whether the performance is up to the mark is very important.

7.4.2 Required Input


First condition to check is to provide valid input which should give valid output.

7.4.3 Expected Result


Through expected results only we can check whether the output is correct.

8. Limitation and Future Enhancement


Limitation: The limitation of our present software is that this is desktop based software
and we cannot reserve rooms in advance for customer.Thisproject can’t be used for
hotel having different branches.

Future Enhancement: We are going to make online web based application for this
system so customer can automatically find rooms and reserve their rooms in advance.

9. Conclusion and Discussion

9.1 Self Analysis of Project Viabilities


Review the software often, to check how it’s working.

9.2 Problem Encountered and Possible Solutions


If any problem occurs, then solve it.

9.3 Summary of Project work


Planning and design of code is very important while building large software.

You might also like