Software Engineering Journal
Practical No.1
Problem Statements For Hotel Management system :-
Web application for Hotel reservation. We will take the selection criteria
from the user and display the hotels list for user basing on the criteria.
Users can book the room if there is availability of the rooms in that
particular hotel. There are three different types of user roles for the
application they are administrator , hotel agent and normal user.
Following are the actions provided for each user.
Normal user :
Can register for the site
Search the hotel details basing on the criteria.
Book the hotel room
Can modify the self details.
Hotel Agent:
Can register for the site
Can add/update the details of the hotel.
Adminstrator:
Will approve the new hotel details added to the application
Can delete the user/hotel details.
Minimal Features :
Adding Hotel information such as hotel name, location, number of rooms
, facilities etc. to the database
Listing the hotels based on different criteria selected by the user.
User able to select a hotel and book a room.
Booking permitted only if there are rooms available
Displaying the reservation status.
Registration of users.
Update user details.
Modify hotel details.
Approval of the details entered by the hotel agent.
Delete user/hotel details by admin
Additional Features:
Taking Feedback from user.
Rating the hotels based on the feedback.
Practical No.2
Write program to SRS .
SPECIFIC REQUIREMENTS:- There are 4 types of Requirements.
1.External Interface Requirements:-
User interface
2.Software Interfaces :-There are 3 types of Software Interfaces
1.Web Server
2.Database Server
3.Development End
3.Hardware Interfaces:- There are 2 types of Hardware Interfaces
1.Server Side
2.Client Side
4.Communication Interfaces
Functional Requirements:-
1.Registration
2.Logging In
3. Reservation
4.Receptionist Access
5.Manager Access
6.Payment Management System:-The system should allow customer
to pay bill via online using credit or debit card
7.Performance Requirements
8.Security Requirements
9.Safety Requirements
10. Capacity Requirements
11.Availability Requirements
Software System Attributes :-
1.Correctness: This system should satisfy the normal regular Hotel
Management operations precisely to fulfill the end user objectives
2.Efficiency: Enough resources to be implemented to achieve the
particular task efficiently without any hassle.
3.Flexibility: System should be flexible enough to provide space to add
new features and to handle them conveniently.
4.Integrity: System should focus on securing the customer information
and avoid data losses as much as possible.
5.Portability: The system should run in any Microsoft windows
environment .
6.Usability: The system should provide user manual to every level of
users.
7.Testability: The system should be able to be tested to confirm the
performance and clients specifications.
8.Maintainability: The system should be maintainable.
Practical No.3
DATA FLOW DIAGRAM Level 0.
Practical No.4
Use Case Diagram for Hotel Management System
A UML use case diagram can create a broad, high-level view of the
relationship between use cases, actors involved, and systems being
performed.
As you can see from the examples below, use cases are represented by oval
shapes, and the lines then show at which point an actor/user participates and
interacts with their corresponding use case. You can see where each actor is
involved within the entire process (and where they’re excluded).
For example, Admin will be able to add different hotels and view a list of
hotels in the system. Whereas, users can access the system for hotel
bookings.
Practical No.5
Practical No.6
1.state chart diagram.
2.Activity diagram.
2.Activity Diagram For Hotel Management System.
Practical No.7
Sequence Diagram For Hotel Management System .
Practical No.8
a) Component diagram
b) Deployment diagram
a)
b)
Practical No.11
Only for hotel management system :
1. User Authentication and Authorization:
● Verify that the system allows users to register and login with valid credentials.
● Verify that the system restricts access to unauthorised users and displays
appropriate error messages.
● Verify that the system allows users with different roles (e.g. guests, staff,
managers) to access appropriate features and data.
2. Room Availability and Pricing:
● Verify that the system accurately displays the availability of rooms based on
various search criteria (e.g. dates, room type, occupancy).
● Verify that the system displays the correct prices and taxes for different
rooms and packages.
● Verify that the system updates the availability and pricing information in
real-time as bookings are made.
3. Booking and Reservation Management:
● Verify that the system allows users to book and reserve rooms with various
options and upgrades (e.g. breakfast, extra bed, early check-in).
● Verify that the system confirms bookings and reservations with appropriate
messages and emails.
● Verify that the system allows users to modify or cancel bookings and
reservations within the allowed timeframe.
4. Payment and Billing:
● Verify that the system securely handles various payment methods and
currencies.
● Verify that the system calculates and displays the correct charges and taxes
for different bookings and reservations.
● Verify that the system generates and sends accurate invoices and receipts to
users and the accounting department.
5. Reporting and Analytics:
● Verify that the system generates various reports and dashboards for different
stakeholders (e.g. occupancy rates, revenue, customer feedback).
● Verify that the system allows users to filter and export data for further
analysis and decision-making.
● Verify that the system updates the reports and analytics in real-time as data is
entered and processed.
6. Integration and API:
● Verify that the system integrates with various third-party systems and
services (e.g. payment gateway, CRM, channel manager).
● Verify that the system exposes secure and reliable APIs for other systems and
developers to access and use.
● Verify that the system handles errors and exceptions gracefully and provides
appropriate error messages and logs.
7. Security and Compliance:
● Verify that the system follows secure coding practices and standards (e.g.
OWASP Top Ten, PCI DSS).
● Verify that the system encrypts sensitive data and credentials at rest and in
transit.
● Verify that the system complies with relevant laws and regulations (e.g. GDPR,
CCPA) and provides appropriate privacy policies and notices.