Escolar Documentos
Profissional Documentos
Cultura Documentos
WEB BASED
ONLINE HOSTEL MANAGEMENT SYSTEM
A PROJECT
Submitted by
Mr. Dineshkumar Mulchandani
In partial fulfillment for the award of the Degree of
BACHELOR OF TECHNOLOGY
IN
INFORMATION & TECHNOLOGY
Under the guidance of
Prof. Vinay Harsora
(Assistant Professor)
Jun-2015
DECLARATION
I hereby declare that this submission is my own work and that, to the
best of my knowledge and belief, it contains no material previously
published or written by another person nor material which has been
accepted for the award of any other degree or diploma of the
university or other institute of higher learning, except where due
acknowledgment has been made in the text.
Furthermore, to the extent that I have included copyrighted material
that surpasses the bounds of fair dealing within the meaning of the
Indian Copyright Act, I certify that I have obtained a written
permission from the copyright owner(s) to include such material(s)
in my report and have included copies of such copyright clearances
to my appendix.
I declare that this is a true copy of my report, including any final
revisions, as approved by my report review committee.
Signature :
Date :
ii
CERTIFICATE
This is to certify that the report entitled Online Hostel
Management
Date:
Place:
iii
PROJECT APPROVAL
Date:
Place:
Examiner(s) Name and Signature:
1)
2)
3)
iv
ACKNOWLEDGEMENT
I fall short of words to pen down anything for the cooperation and encouragement extended by parents through the
completion of this project.
I am thankful to Crystal Hostel and Little Flower hostel,
Sabarmati, Ahmedabad for providing me the information & issues
regarding hostel management as in offline on paper mode.
I would like to thank the institute for the infrastructure,
administrative and qualitative support extended for the timely
completion of this project. I would like to express my deep sense of
gratitude & thankfulness to our head of department Mr. Amit
Lathigara and also my Internal Project Guide Mr. Vinay Harsora &
my External Project Guide Miss. Vina Mulani who provided his
expert guidance and inspiration during all phases of this project.
Their guidance, suggestions and expertise have been a source of
inspiration during the project tenure.
Last but not the least I would like to thanks all my faculty
members who maintained a friendly relation.
Place:
Signature:
Date:
Name:
v
LIST OF TABLES
Table No.
Description
Page No.
03
11
14
15
Cost of assets
20
21
21
41
42
10
Users Table
43
11
Hostellers Table
45
12
Room Table
46
13
FeePayment Table
47
14
Admin Table
47
15
Rector Table
48
16
Registration Table
49
17
49
vi
LIST OF FIGURES
Figure
Description
Page No.
No.
1
Iterative Model
Gantt Chart
13
27
27
28
29
30
31
32
10
33
11
34
12
35
13
36
vii
TABLE OF CONTENTS
Title Page
Declaration of Originality
ii
Certificate
iii
Project Approval
iv
Acknowledgement
List of Tables
vi
List of Figures
vii
Table of Content
viii
CHAPTER 1: INTRODUCTION.1
1.1 PROJECT SUMMARY2
1.2 PROJECT PROFILE.3
1.3 PURPOSE.4
1.4 SCOPE...5
1.5 TECHNOLOGY AND LITERATURE REVIEW6
CHAPTER 2: PROJECT MANAGEMENT...7
2.1 PROJECT PLANNING AND SCHEDULING.7
2.1.1 PROJECT DEVELOPMENT MODEL..8
2.1.2 PROJECT PLAN..12
2.1.3 SCHEDULE REPRESENTATION.15
2.2 RISK MANAGEMENT .16
2.2.1 RISK IDENTIFICATION....16
2.2.2 RISK ANALYSIS & PLANNING...17
2.3 ESTIMATION.19
CHAPTER 3: SYSTEM REQUIREMENT STUDY..22
3.1 HARDWARE REQUIREMENT22
3.2 WEB APPLICATION REQUIREMENT...22
viii
ix
1. INTRODUCTION
This system is designed in favor of the hostel management which helps
them to save the records of the students about their rooms and other things.
It helps them from the manual work from which it is very difficult to
find the record of the students and the mess bills of the students, and the
information of about the those ones who had left the hostel.
All the hostels at present are managed manually by the hostel office.
The Registration form verification to the different data processing are done
manually.
Thus there are a lot of repetitions which can be easily avoided. And
hence there is a lot of strain on the person who are running the hostel and web
applications are not usually used in this context. This particular project deals
with the problems on managing a hostel and avoids the problems which occur
when carried manually Identification of the drawbacks of the existing system
leads to the designing of computerized system that will be compatible to the
existing system with the system which is more user friendly.
We can improve the efficiency of the system, thus overcome the
drawbacks of the existing system. We design this system of the hostel
management especially for the college hostel, through this they cannot require
so efficient person to handle and calculate the things.
This system automatically calculates all the bills and issued the
notifications for those students who are against some rules.
Page |1
Page |2
Project Title
Objective
Organization
Operating
System
Microsoft Windows 7
RDBMS
SQL SERVER
Project Guide
Submitted By
Submitted To
R.K.UNIVERSITY, RAJKOT
Table 1 Basic Data of Project Profile
Page |3
1.3 PURPOSE
To give certain rights to the rectors based profile to generate view detailed
information of students.
To provide day to day updated room details on online user interface for
guest or visitors of the hostel.
Page |4
1.4 SCOPE
It can enlarge flexibilities in the existing system with web based user
interactive interface.
It can also serve the feedback system to each visitor or guest for rating and
review of features of the hostel.
Page |5
The web based user interface have certain limits to deal with speed and
immigration performance of the web site.
The main modular part was belongs to the ASP.NET technologies and SQL
SERVER database design & utilities.
Here, ASP.NET supports multi user login with multiple profiles access and
interactive featured controls to gain flexibility in the interface creation and
management of controls.
Literature reviews directly subsets the updating of the user interface and
con currently access to the database.
Project team had visited the new little flower hostel located at Sabarmati,
Ahmedabad for review the current existing system.
The current system has the offline record keeping system which is
managed by the rector of the hostel.
It ensures the more complexity in the management of the system and also
there are number of manual forms to be filled for each individual hosteller.
It also cant support the feedback review system on the go. So, feedback
has to be maintained manually using the paper work.
Page |6
2. PROJECT MANAGEMENT
2.1 PROJECT PLANNING AND SCHEDULING
WEB APPLICATION:
A Web Application or web app is any web application that runs in a web
browser. It is created in a browser-supported programming language
(such as the combination of JavaScript, HTML and CSS) and relies on a web
browser to render the application.
Web Applications are best when the team is mostly using developer studio
and there is a high code content.
Web Application project is its much easier to exclude files from the project
view.
Page |7
In the Project planning, the core concept of current existing hostel system
will be derived with issues on them, then this planning scenario will take
place to the direct implementation of project analysis and design phase.
It will take more time to evaluate manual step by step order of the process
to the development of the online system.
So, according to module summery with defined waterfall liter ature tasks
the web application will take place as product as web portal.
An iterative life cycle model does not attempt to start with a full
specification of requirements. Instead, development begins by specifying
and implementing just part of the web application, which is then reviewed
in order to identify further requirements. This process is then repeated,
producing a new version of the web application at the end of each iteration
of the model.
Page |8
Page |9
Like other SDLC models, Iterative and incremental development has some
specific applications in the web application industry. This model is most
often used in the following scenarios:
Resources with needed skill set are not available and are planned to be
used on contract basis for specific iterations.
There are some high risk features and goals which may change in the
future.
The advantage of this model is that there is a working model of the system
at a very early stage of development which makes it easier to find
functional or design flaws. Finding issues at an early stage of development
enables to take corrective measures in a limited budget.
The disadvantage with this SDLC model is that it is applicable only to large
and bulky web application development projects. This is because it is hard
to break a small web application system into further small serviceable
increments/modules.
P a g e | 10
The following table lists out the pros and cons of Iterative and Incremental
SDLC Model:
Pros
Cons
More resources
required.
the
Defining
increments
may
require definition of the
complete system.
Management
more.
With
every
increment
operational product is delivered.
may
complexity
P a g e | 11
be
is
ANALYSIS:
After visiting the little flower hostel located at Sabarmati, Ahmedabad the
base analysis includes the offline records of the hostel and the manual
feedback forms to analyze fraction of issues into the existing system.
The drawbacks of the system also gives the more quality points to
enhance flexibility of all stockholders by upgrading the existing system.
DESIGN:
Designing of Master Page forms and other design aspects has been
completed in 30 days period I did applied lots of efforts to build design
diagrams according to the analysis on the existing system so, it takes a lot
in the case of Choosing Designing aspects such templates for Homepage
and Master Page.
Various types of tables I have to arrange with its data types and fields.
CODING:
I have completed Home Module, Login Form, Master page with validation
and Ajax control and all form validation completed in 32 days.
TESTING:
P a g e | 12
GANTT CHART:
As shown in the Gantt chart the whole process begins from analysis of the
system that takes around 23 days in the whole scenario.
Then the design for new system takes brief analysis on the components
that can be used to implement whole product. So it takes 45 days to
design all diagrams and relevant data flow designs of the system.
Next comes to design layout and UI for the web application and it takes
only 15 days to design graphical on paper designs of the web application.
P a g e | 13
TIME REQUIRED
TASK TO BE DONE
Two weeks
Three weeks
One week
Three weeks
One week
Three Weeks
Three weeks
P a g e | 14
Task Implementation
Analysis on problem
definition
Task -2
Task -3
Task -4
Development of web
interface in ASP.Net with
back-end as SQL SERVER.
Task -5
Testing in virtual
environment.
Table 4 Representation of Defined Schedule
P a g e | 15
The set of task to be done again consist various risk at the time
completion period of time.
Since there could be various risks associated with the web application
development projects, the key to identify and manage those risks is to
know about the concepts of web application risk management. Many
concepts about web application risk management could be identified but
the most important are risk index, risk analysis, and risk assessmen t.
Risk can be anything at all that could impact your application in a way you
werent expecting. Unexpected popularity that causes your server to catch
fire is a risk. The joke gets made often that too much traffic is a great
problem to have, but thats complete bullshit. Whether your server
becomes unavailable due to hardware failure, coding errors or the inability
to scale, the end result is that youre down, and the people trying to access
your application may never return.
Sometimes the actualization of the risk wont result in downtime, but could
still be seriously damaging to the success of the project.
A failure in your caching layer could result in massive strain put on your
database, which could cause latency or downtime.
P a g e | 16
A best and most scientific way of approaching risks is to classify them based
on risk attributes. Risk classification is considered as an economical way of
analyzing risks and their causes by grouping similar risks together into
classes.
Internal risks are project risks, process risks, and product risks. External
risks are generally business with the vendor, technical risks, customers
satisfaction, political stability and so on.
In general, there are many risks in the web application engineering which
is very difficult or impossible to identify all of them. Some of most
important risks in web application engineering project are categorized as
web application requirement risks, web application cost risks, web
application scheduling risk, web application quality risks, and web
application business risks.
REQUIREMENT RISKS:
a.
b.
c.
d.
e.
f.
g.
h.
i.
P a g e | 17
ECONOMICAL RISKS:
1.
2.
3.
4.
5.
6.
7.
8.
Inadequate budget
Change of requirements and extension of requirements
Human errors
Lack of employment of manager experience
Lack of enough skill
Lack of good estimation in projects
QUALITY RISKS:
1. Inadequate documentation
2. Lack of project standard
3. Lack of design documentation
4. Inadequate budget
5. Human errors
6. Unrealistic schedule
7. Extension of requirements change
8. Poor definition of requirements
9. Lack of enough skill
10. Lack of testing and good estimation in projects
11. Inadequate knowledge about techniques, programming language, tools,
and so on
STRATEGIES FOR RISK MANAGEMENT:
During the web application development process various strategies for risk
management could be identified and defined according to the amount of
risk influence.
P a g e | 18
2.3 ESTIMATION:
Most of the web application cost estimation models views the estimation
process as being a function that is computed from a set of cost drivers . And
in most cost estimation techniques the primary cost driver or the most
important cost driver is believed to be the web application requirements.
Cost driver is anything that may or will affect the cost of the web
application. Cost driver are things such as design methodology, skill-levels,
risk assessment, personnel experience, programming language or system
complexity.
P a g e | 19
As shown in above table the cost of physical assets includes the main
hardware as well as development environment costs that are comes to
front at all over total is 68500 rupees of this project.
Project duration - time that is needed to complete the project. Which taken
around 170 days to complete overall significant deliverables of the whole
project.
The outputs (loading, duration and effort) are usually computed as fixed
number with or without tolerance in the classical view. Many of the data
that are inputs to the process are modified or refined during the web
application cost estimation process.
P a g e | 20
Category
Cost Driver
Nominal
High
Product
Attributes
Required
Software
Reliability
Database
Size
0.75
0.88
1.00
1.15
Very
High
1.40
0.94
1.00
1.08
1.16
Product
Complexity
0.70
0.85
1.00
1.15
1.30
1.65
Execution
1.00
Time
Constraint
Main
1.00
Storage
Constraint
Computer
0.87
1.00
Turnaround
Time
Table 6 cost driver of attributes
1.11
1.30
1.66
1.06
1.21
1.56
1.07
1.15
Category
Cost Driver
Very
Low
Low
Nominal
High
Very
High
Personnel
Attributes
Analyst
Capability
1.46
1.19
1.00
0.96
0.71
Applications
Experience
1.29
1.13
1.00
0.91
0.82
Programmer
Capability
1.42
1.17
1.00
0.86
0.70
Virtual
Machine
Experience
Language
Experience
1.21
1.10
1.00
0.90
1.14
1.07
1.00
0.95
Modern
Programmin
g Practices
Use of
Software
Tools
Testing tasks
1.24
1.10
1.00
0.91
0.82
1.24
1.10
1.00
0.91
0.83
1.23
1.08
1.00
1.04
1.10
Computer
Attributes
Project
Attributes
P a g e | 21
Extra
High
-
Extra
High
: ASP.NET
Backend
: C#
Frame work
RAM
: 128 Mb SD RAM
Monitor
Keyboard
Mouse
: Logitech 3-Button
CD-ROM
: Samsung 52X
Hard Drive
: 40GB HDD
Mother Board
: Pentium 810
Web browser
Web utilities
P a g e | 22
4. SYSTEM DESIGN
4.1 INPUT DESIGN:
The system design is divided in to two portions. The Administrator
section and the User (students) section.
4.1.1 ADMINISTRATOR:
He/she can change their rooms, edit and delete the student records.
The goal of input data design is to make data entry base easy, logical and
free from errors as possible.
In input data design, we design the source document that capture the data
and then select the media used to enter them into the computer.
There are two major approaches for entering data in to the computer.
They are
A. Menus.
B. Dialog Boxes.
P a g e | 23
B. Dialog Box: Dialog boxes are windows and these windows are mainly
popup, which appear in response to certain conditions that occur when a
program is run. It allows the display of bitmaps and pictures. It can have
various controls like buttons, text boxes, list boxes and combo boxes.
Using these controls we can make a dialog with the program.
Once the output requirements are determined, the system designer can
decide what to include in the system and how to structure it so that they
require output can be produced. For the proposed web application, it is
necessary that the output reports be compatible in format with the existing
reports. The output must be concerned to the overall performance and the
systems working.
The data in the system has to be stored and retrieved from database.
Designing the database is part of system design. Data elements and data
structures to be stored have been identified at analysis stage.
They are structured and put together to design the data storage and
retrieval system. A database is a collection of interrelated data stored with
minimum redundancy to serve many users quickly and efficiently.
P a g e | 24
The DFD is drawn using various symbols. It has a source and a destination.
The process is represented using circles and source and destination are
represented using squares. The data flow is represented using arrows. One
reader can easily get the idea about the project through Data Flow Diagram.
Overall Diagrams:
4.5.1 DATA FLOW DIAGRAM(s) [D. F. D.]:
The data flow diagram covers all the processes and data storage area,
which takes place during any transaction in the system. The data flow
diagrams are functionally divided into context level, Zero level, and First
level and Second level data flow diagrams.
P a g e | 25
(3) A data flow: It is packet of data. It may be in the form of document, letter
etc.
(4) Data store: Any store data but with no reference to the physical method of
storing.
P a g e | 26
UNIVERSITY/
FUNDING
GOVERNMENT
AGENCY
HOSTEL
Request
MANAGEMENT
Fulfill
SYSTEM
Registration
Amount
Account Details
1.0
Registration
Receipts
2.0
Send Receipts
Account
FeePayment
Update
Office
Information
Message Given
3.0
Room
Allocation
Set room
Room allocated
Room_data
4.0
Confirmation
Information
Confirm flag
P a g e | 27
STUDENT
STUDENT
Registration
Info Updated
1.1
Registration
as new user
Inquiry
Student/hosteller data
Acknowledgment
1.2
Fill Account
Information
Submitted Form
Receive Response
Use case diagram is a diagram that shows the interaction between user and
system to capture the users goals.
P a g e | 28
Hostel file
In Below mentioned use case diagram shows the main features that are
accessible by the hosteller or user by using Use cases as for each separated
use with system.
P a g e | 29
P a g e | 30
P a g e | 31
P a g e | 32
P a g e | 33
P a g e | 34
P a g e | 35
P a g e | 36
5. DATA DICTIONARY
It is developed during data flow analysis and assists the analysts involved
in determining the system requirements. Analysts use data dictionary for
the following important reasons:
o To manage the details in large system.
o To communicate a common meaning for all system elements.
o To document the features of the system.
o To facilitate analysis of the details in order to evaluate the
characteristics and determine where system changes should be made.
o To locate errors and omissions in the system.
The data dictionary contains different types of descriptions for the data
flowing through the system.
P a g e | 37
Next to Data Elements comes the Data storage which provides the
information of where and how each data element is stored in which table
and it also give information of any constraints if there.
This step also gives knowledge of different data types used for different
field and their size. All the normalized tables are showed in data storage.
Data Flow stage shows the flow of data in the system. This step is can be
already seen in the data flow diagrams above in this document.
So, it refers to all the data flow paths were transactions are done in the
computerized system.
The data flow step also includes different processes used in the system and
it is followed by External Entities used in the system.
P a g e | 38
Table: users
Attribute Name
Usage Of Attribute
username
User Name
password
Password
role
Profile Type
emailid
Table: room_data
Attribute Name
Usage Of Attribute
room_id
Room Id as unique ID
Room_no
Room Number
room_type
Room Type
building
No_of_beds
Facilities
Table: rectors
Attribute Name
Usage Of Attribute
username
name
P a g e | 39
age
Age of an rector
address
Address of rector
phone
date_of_join
Table: Feepayment
Attribute Name
Usage Of Attribute
hostel_fees
fees of hostel
mess_charge
charges of mess
inventory_charges
Charges of inventory
payment_date
date of payment
total_paid
due_payment
username
Table: hostellers
Attribute Name
Usage Of Attribute
username
hosteler_id
Unique Id of hostelers
hosteler_name
hosteler_dob
hosteler_room_no
hosteler_date_of_joining
hosteler_purpose
P a g e | 40
hosteler_approximate_term
Term / duration
father_name
name of father
father_mob_no
Mobile no of father
mother_name
name of mother
mother_mob_no
Mobile no of mother
hosteler_address
Address of hosteler
hosteler_email
Email of hosteler
hosteler_working_institute
hosteler_mob_no
guardian_name
name of guardians
guardian_address
address of guardian
guardian_mob_no
hosteler_fixed_deposit
hosteler_image_id
Table: Admin
Attribute Name
Usage Of Attribute
username
User Id of administrator
name
Name of administrator
address
phone
phone number
date_of_join
Joining date
Table 8 All Data Elements
P a g e | 41
Table Name
Description
Users
Hostellers
Rectors
FeePayment
Fees Table contains the details about student Fees for the
hostel.
Admin
Room_data
Registration
Image_Details
The above tables are described briefly and can be understand clearly from
next page. Each table is described along with different fields used, their
data types, their size and constraints.
P a g e | 42
Users: -
Objective: The users table contains the information about the different users
and their passwords, which are used to access the system as there is more than
one owner in the factory and they can access data privately. The table stores
the data as username and password and thus provides security to the system.
This table also contains the administrator user and its password, so all the
rights are provided to the administrator and some rights are not provided by
the system to some local users.
Tables Referred: users
Table Format:
field name field description
Type
size
null
Username
50
Not allowed
Password
Password
Nvarchar(50)
50
Not allowed
role
Role of user
Int
Not allowed
Emailed
e-mail ID of user
Nvarchar(50)
50
Not allowed
P a g e | 43
Hostellers: -
Objective: The Status table contains the information about the Student &
his/her guardians and parents details.
Tables Referred: Hostellers
Table Format:
Field name
field
description
type
size
Null?
Username
50
Not
allowed
hosteler_id
Unique Id of
hostelers
nvarchar
10
Yes
hosteler_name
Student
name/ name
of hostelers
Nvarchar
Max
Yes
hosteler_dob
Date of birth
of hosteler
Date/time
NA
Yes
hosteler_room_no
Room no of
allocated
room
Int
Yes
hosteler_date_of_joining
joining date
of hostelers
Date/time
NA
Yes
hosteler_purpose
purpose of
standout at
hostel
Nvarchar(50)
50
Yes
hosteler_approximate_te
rm
Term /
duration
Nvarchar(50)
50
Yes
father_name
name of
father
Nvarchar(max)
max
Yes
father_mob_no
Mobile no of
father
Double
10
Yes
mother_name
name of
mother
Nvarchar(max)
Max
Yes
P a g e | 44
mother_mob_no
Contact no of
mother
Double
10
Yes
hosteler_address
Address of
hosteler
Nvarchar(max)
Yes
hosteler_email
Email id of
hosteler
Nvarchar(50)
50
yes
hosteler_working_institu
te
At where
hosteler
works
Nvarchar(50)
50
Yes
hosteler_mob_no
Mobile
number of
hosteler
Double
10
yes
guardian_name
Name of
guardian
Nvarchar(max)
Max
Yes
guardian_address
Address of
guardian
Nvarchar(max)
Max
Yes
guardian_mob_no
Mobile
number of
guardian
Double
10
yes
hosteler_fixed_deposit
Deposited
amount
Int
Yes
hosteler_image_id
Profile
Images
unique id
Nvarchar(50)
50
yes
username
Reference Key:
hosteler_id
P a g e | 45
Room_data: -
Objective: The Room_data table contains the information about the Room
whether the there related detail.
Tables Referred: Room_data
Table Format:
Field name field description
type
size Null?
room_no
Room No
Char
room_id
Room Unique id
Nvarchar 10
Not null
room_type
Type of room
Nvarchar 10
Yes
building
yes
Yes
Feepayment :-
Objective: The Fees table contains the information about the Student Fees
description.
Tables Referred: Fees
Table Format:
field name
field description
Type
size Null?
hostel_fees
fees of hostel
Double
10
yes
mess_charge
charges of mess
Double
Yes
inventory_charges
Charges of inventory
Double
yes
payment_date
date of payment
Date
10
Yes
total_paid
Total paid
amount
money Double
50
Yes
due_payment
10
Yes
P a g e | 46
Username
Unique Id of
(Primary key)
user Nvarchar 10
Not
allowed
username
Reference Key:
NO
Admin :-
Objective: The Admin table contains the information about the Administrator
person.
Tables Referred: Admin
Table Format:
field name
field description
Username
Not
allowed
Name
Nvarchar 50
yes
Age
Age of administrator
Double
Yes
Address
Full Address of
administrator
Nvarchar N
Yes
Phone
Phone no of admin
Double
10
Yes
Date
10
Yes
type
size Null?
10
username
Reference Key:
P a g e | 47
rectors :-
Objective: The table contains the Personal information about the Employee.
Tables Referred: Employee_info
Table Format:
field name
field description
type
Username
Nvarchar 20
Not allowed
Name
Employee Name
Nvarchar 50
Yes
Age
Age
Double
Yes
Address
Address of emp
Nvarchar n
Yes
Phone
date
size Null?
10
Yes
10
Yes
username
Reference Key:
Registration: -
Objective: The registration table contains the information about the basic
details of account holder to register.
Tables Referred: registration
Table Format:
field name
Field description
type
size Null?
username
Nvarchar 20
Not
allowed
Password
Password of user
Nvarchar 20
Not
allowed
P a g e | 48
Name
Nvarchar 50
yes
Contact_no
Double
Yes
10
username
-
Image_Details :-
Objective: The image details table contains the information about the image
profile photo for the Account holder.
Tables Referred: Image_Details
Table Format:
Field name
Field description
type
Nvarchar 50
Not allowed
Nvarchar 50
Yes
Image_id
Image
size Null?
Not allowed
Image_Id
No reference key in this table.
P a g e | 49
6. TESTING
1) Functionality Testing:
This is the test for all the links in web pages, database connection, forms
used in the web pages for submitting or getting information from user,
Cookie testing.
Forms are the integral part of any web site. Forms are used to get
information from users and to keep interaction with them. So we had
checked many things on these forms as below:
o We had checked all the validations on each field.
o We had checked for the default values of fields.
o We had tested for wrong inputs to the fields in the forms.
o Options to create forms if any, form delete, view or modify the forms.
Cookies are small files stored on user machine. These are basically used to
maintain the session mainly login sessions.
P a g e | 50
Database testing:
o Data consistency is very important in web application. So, we did have
checked for data integrity and errors while we edit, delete, modify the
forms or do any DB related functionality.
o In that case, we had checked that if all the database queries are
executing correctly, data is retrieved correctly and also update d
correctly.
2) Usability Testing:
Content checking:
o Content should be logical and easy to understand. Check for spelling
errors. Use of dark colors annoys users and should not be used in site
theme. You can follow some standards that are used for web page and
content building. These are common accepted standards like as I
mentioned above about annoying colors, fonts, frames etc.
o Content should be meaningful. All the anchor text links should be
working properly. Images should be placed properly with proper sizes.
o These are some basic standards that should be followed in web
development. Your task is to validate all for UI testing.
3) Compatibility Testing:
Compatibility of our web site is very important testing aspect. So, we had
checked many compatibility aspects as listed as below:
o Browser compatibility
o Operating system compatibility
o Mobile browsing
o Printing options
o Browser compatibility:
P a g e | 51
So, we had tested this web application on different browsers like Internet
explorer, Firefox, Netscape navigator, AOL, Safari, Opera browsers with
different versions and got that all results were satisfactory results.
OS compatibility:
o Some functionality in our web application is may not be compatible
with all operating systems. All new technologies used in web
development like graphics designs, interface calls like different APIs
may not be available in all Operating Systems.
o So, we had tested application on different operating systems like
Windows, UNIX, MAC, Linux, and Solaris with different OS flavors.
Mobile browsing:
o While testing web pages on mobile browsers, there were no any
compatibility issues exists on mobile.
4) Security Testing:
We had tested by pasting internal URL directly into browser address bar
without login. Internal pages should not open.
In this case, we have checked that If user are logged in using username and
password and browsing internal pages then try changing url options
directly. Then Access should denied for this user to view others stats.
We had tried some invalid inputs in input fields like login username,
password, and input text boxes. & also checked for the system reaction on
all invalid inputs.
P a g e | 52
As per according to the hostels existing system there are lots of conflicts
and problems occurs in the maintenance of hostel from top managemen t
possibilities to the bottom phase of storing data records.
So, this web application is designed in such a way that whole system can be
almost online and no paper work needed to be done.
Each profile login gives certain rights to the user to perform operations.
For example: Hosteller can view their own data and own records only at
the hosteller login. And if rector gets logged in with his/her credentials
he/she will access whole data of hosteller and can view, insert, update,
delete specific data.
So here each & every features have been provided based on the profile type
of the user. And here the system also serves the advance features like group
bookings of rooms or payment online payment facilities at the hosteller
login.
So, now we will see most of main pages of our web-application with
screenshots as below to understand working and interactive usage of our
online portal.
P a g e | 53
As shown in the screen shot the home page contains the main view to be
represented to the guest as well as online visitors.
P a g e | 54
Now if user clicks to the gallery in menu bar he/she will redirect to the
gallery to view amazing moments that are captured in hostel life. As
indicates that we serves the best hostel facilities.
As shown in Screenshot, the red icons are the photo album access to the
direct view of images of photo albums in the gallery page.
P a g e | 55
As shown in screenshot the login page is commonly one for each user login
whether he/she is hosteller, rector or administrator. But it will redirect
user to its own portal as profile type and gives whole access to the allocated
rights to that user.
P a g e | 56
Hosteller account will give platform with hosteller rights to view and
perform operations with no admin rights to user at that portal.
P a g e | 57
The specific menu is provided to the user portal to access data of own and
for payment of fee as well as to perform other operations like feedback or
complaint of any service issues.
Here we see the screen shots of parents information and payment data that
how it will arrive in website.
P a g e | 58
It shows the data of fee with new records as well as reaming fee to be paid
or how much fee has been paid And It also gives feature to generate fee
receipt in pdf file format.
When user will click on generate pdf of this data it will make pdf and gives
to user to print or download file.
P a g e | 59
As shown in screen shot above the rector will login with his/her allocated
user id and password and it will redirects to the Rector Portal of the
website.
P a g e | 60
Which at rectors home page he/she can view, insert, delete, and update the
data of all rooms of each and every wing of hostel.
At this account type he/she can also view/insert/update and delete data of
every hosteller who all are registered in hostel.
P a g e | 61
P a g e | 62
He/she can access all parents pages of the web-application which can give
major access & rights to the admin.
He/she can change/update fee as per business rules by just clicking over
the fee information page in admin portal.
And we had seen that contact us and about us page that are virtually
mounted in each page of web application whether user is guest or specific
hosteller they can contact to office at any time by just clicking over the
about us in the main menu of page or just clicking over the
communication info from the main menu of web application.
P a g e | 63
8. FUTURE PLAN
P a g e | 64
9. CONCLUSION
P a g e | 65
Asp. [Online] :
o http://www.asp.net.
asp.net-tutorials. [Online] :
o http:// www.asp.net-tutorials.com
Code project.[Online]:
o http://www.codeproject.com/KB/aspnet/
Css-tricks. [Online]:
o http://css-tricks.com
msdn.microsoft.[Online]:
o http://msdn.microsoft.com/en-us/aa336522.aspx
w3schools.[Online]:
o http://www.w3schools.com/aspnet/
P a g e | 66