Você está na página 1de 44

Online film ticket booking

INTRODUCTION

1. Introduction
1.1 Project Profile

Online film ticket booking system provides user a platform to enquire about the current movies in their city and provides them the facility to book their movie ticket. This application is one of the widely used web portal in present generation for booking tickets through online which had created scope for introducing new features in existing system. This efficiently reduces the effort of film ticket buying at the theatre in direct.No need of queue maintenance and rush, one can book the ticket of a movie from his or her home itself if she or he has got an internet connection.Through this user can easily know about the movies released and then make a choice. OBJECTIVE OF THE PROJECT The main purpose of our online ticket booking system is to provide another way for the customer to buy cinema ticket. It is an automatic system. After inserting the data to database, staff need not to due withthe order receive through the system. In fact, there is similar system on the internet, but there is no refund method found inthe existing system. This system is basically aimed to provide the customer the complete information of the movie, according to which the customer can book the tickets and the refund facility provides more flexibility to the system. The goals of our system are: 1. To provide a anytime anyplace service for the customer 2 .To minimize the number of staff at the ticket box3 To promote the film on the Internet

1.2 Organization Overview SAFE SOFTWARE AND INTEGRATED SOLUTION Pvt Ltd, Palakkad, has been in the Co-operative Banking Computerization field for the past 18 years. Now they are one of the leading Private Limited companies providing Total Solution (Banking Software, system software, computer hardware, networking, training & Consultancy) for computerization in Co-operative Banking Sector in Kerala. They expertise in Software, Hardware & Networking Maintenance reach many satisfied customer Banks in all over Kerala and Andaman Nicobar. Most of their customer- Banks are looking for single point maintenance for their Software, Hardware and Networking related problems. They confidently took up this responsibility and satisfactorily provided Total Computer Solution to all their Customers. They have full-fledged and well-equipped computer software, hardware and network training and maintenance facility in Palakkad town. Safes training and maintenance centre has a group of highly qualified and experienced personnel. AN ISO 9001:2008 CERTIFIED COMPANY ISO 9001:2008 is the standard that provides a set of standardized requirements for a quality management system, regardless of what the user organization does, its size, or whether it is in the private, or public sector. It is the only standard in the family against which organizations can be certified although certification is not a compulsory requirement of the standard.

2. About the Developing Tools


2.1 Introduction to .NET The .Net Framework is made up of four parts, The Common Language Runtime A Set of Class Libraries

A Set of Programming Languages ASP.NET Environment

The .NET Framework was intended to make Windows application much more reliable, while also providing an application with greater degree of security. It was intended to simplify the development of web application and services. The framework was designed to provide a single set of libraries that would work with multiple languages. The .NET Framework is a common environment for running Web applications and Web libraries-like ADO.NET, ASP.NET and Windows forms- to provide advanced standard services that can be integrated onto a variety of computer systems. The Framework providesrich application environment, simplified development and easy integration between a numbers of different languages. Currently it supports Visual Basic, C++, C# and Jscript (The Microsoft version of Java Script). 2.2. Features Of The Language The .NET Framework is the infrastructure for the Microsoft .NET platform. It is an environment for building, deploying, and running Web applications and Web Services. The .NET Framework contains a common language runtime and common class libraries - like ADO.NET, ASP.NET and Windows Forms to provide advanced standard services that can be integrated into a variety of computer systems. The.NET Framework is designed for cross-language compatibility. Cross-language compatibility means .NET components can interact with each other irrespective of the language they can write in. An application written in VB .NET can reference a DDL file written in C# or a C# application can refer to a resource written in VC++, etc. This language interoperability extends to Object-Oriented inheritance. This cross-language compatibility is possible due to common language runtime. When the .NET program is compiled, the output of the compiler is not an executable file but a file that contains a special type of code called the Microsoft Intermediate Language (MSIL). This MSIL low-level language which is designed to be read and understood by the common language runtime. Because all .NET executables exist as IL, they can freely operate. The common language

Specification defines the minimum standards that .NET language compilers must confirm to. Thus, any code compiled by a .NET compiler can interoperate with the .NET Framework. Since all .NET applications are converted to IL before execution all primitive data types are represented as .NET types. This means that, a VB Integer and a C both the languages use # int are both represented in IL code as System.Int32. Because both the languages use a common and interconvert able type system, it is possible to transfer data between components and avoid time-consuming conversions.

2.3

ASP.NET ASP.NET stands for Active Server Pages .NET. This is used to create web pages and web

technologies and is an integral part of Microsoft's .NET framework vision. As a member of the .NET framework, ASP.NET is a very valuable tool for programmers and developers as it allows them to build dynamic, rich web sites and web applications using compiled languages like VB and C#. ASP.NET is not limited to script languages, it allows you to make use of .NET languages like C#, J#, VB, etc. It allows developers to build very compelling applications by making use of Visual Studio, the development tool provided by Microsoft. ASP.NET is purely server-side technology. It is built on a common language runtime that can be used on any Windows server to host powerful ASP.NET web sites and technologies.

Advantages of using asp.net ASP.NET drastically reduces the amount of code required to build large applications. ASP.NET makes development simpler and easier to maintain with an event-driven, server side programming model. ASP.NET pages are easy to write and maintain because the source code and HTML are together.

The source code is executed on the server. The pages have lots of power and flexibility by this approach. The source code is compiled the first time the page is requested. Execution is fast as the Web Server compiles the page the first time it is requested. The server saves the compiled version of the page for use next time the page is requested.

2.4

The HTML produced by the ASP.NET page is sent back to the browser. The application source code you write is not sent and is not easily stolen. ASP.NET validates information entered by the user without writing a single line of code. About C# C# represent the next step in the ongoing evolution of programming languages. Its creation

was deeply rooted in the process of refinement and adaptation that has characterized computer language development for the past several years. Like all successful languages that came before c# builds upon the past while advancing the art of programming created by Microsoft to support development for its Dot net framework ,C# leverages time tested features with the cutting edge innovations. It provides a highly usable efficient way to write programs for the modern enterprise computing environment. Which includes windows ,the internet components and so on.

2.5

SQL Server 2005 Microsoft SQL Server is a relational model database server produced by Microsoft. Its primary

query languages are T-SQL and ANSI SQL.SQL Server 2005 (codenamed Yukon), released in October 2005, is the successor to SQL Server 2000. It included native support for managing XML data, in

addition to relational data. For this purpose, it defined an xml data type that could be used either as a data type in database columns or as literals in queries. XML columns can be associated with XSD schemas; XML data being stored is verified against the schema. XML is converted to an internal binary data type before being stored in the database. Specialized indexing methods were made available for XML data. XML data is queried using XQuery; Common Language Runtime (CLR) integration was a main features with this edition, enabling one to write SQL code as Managed Code by the CLR. SQL Server 2005 added some extensions to the T-SQL language to allow embedding XQuery queries in TSQL. In addition, it also defines a new extension to XQuery, called XML DML, that allows query-based modifications to XML data. SQL Server 2005 also allows a database server to be exposed over web services using TDS packets encapsulated within SOAP (protocol) requests. When the data is accessed over web services, results are returned as XML. For relational data, T-SQL has been augmented with error handling features (try/catch) and support for recursive queries with CTEs (Common Table Expressions). SQL Server 2005 has also been enhanced with new indexing algorithms, syntax and better error recovery systems. Data pages are check summed for better error resiliency, and optimistic concurrency support has been added for better performance. Permissions and access control have been made more granular and the query processor handles concurrent execution of queries in a more efficient way. Partitions on tables and indexes are supported natively, so scaling out a database onto a cluster is easier.

2.6 WINDOWS 7

Operating System

Windows 7 is an operating system released by Microsoft on October 22, 2009. It follows the previous (sixth) version of Windows, called Windows Vista. Like previous versions of Windows, Windows 7 has a graphical user interface (GUI) that allows you to interact with items on the screen using a keyboard and mouse. However, Windows 7 is also includes a feature called "Windows

Touch" that supports touchscreen input and multitouch functionality. For example, you can rightclick a file by touching it with one finger and tapping it with another. You can also zoom in on an image by touching it with two fingers, then spreading your fingers apart. Windows 7 is bundled with several touch-ready programs that are designed for touchscreen use.

Windows 7 is available in the following editions: Windows 7 Home Premium - the standard version installed with most home PCs and includes all of the features listed above. Windows 7 Professional - typically installed on business computers and includes all the Home Premium features as well as additional features such as Windows XP mode (XPM) and Domain Join. Windows 7 Ultimate - the most complete version, which has all of the Professional features as well as BitLocker data protection and additional language support.

System Analysis

3.

System Analysis

EXISTING SYSTEM The existing system is a tedious work due to manual data handling of records . Manual data handling leads to the wastage of money and time .The speed and accuracy is less in the existing system . There is a chance of occurring manual errors while handling the transactions at the agency. Limitations of existing system Existing System consumes more time Possibility of occurring human errors No data security and inconsistency 3.3 Feasibility Study Feasibility study is a procedure that identifies, describes and evaluates candidate system and selects the best system for the job. An estimate is made of whether the identified user needs may be satisfied using current software and hardware technologies. The study will decide if the proposed system will be cost effective from a business point of view and if it can be developed given existing budgetary constraints. The key considerations involved in the feasibility analysis are economic, technical, behavioral and operational. Technical Feasibility The assessments of technical feasibility centers on the existing system and to what extent it can support the proposed addition. This was based on an outline design of candidate system requirements in turns of inputs, files, programs, procedures and staff. It involves financial considerations to accommodate technical enhancements. Economic Feasibility Economic analysis is the most frequently used method for evaluating the effectiveness of a candidate system. It is more commonly known as cost benefit analysis, the procedure to determine the benefits and savings that are expected from a candidate system and compare them with costs. If the

benefits outweigh costs then a decision is made to design and implement the system. Otherwise make alteration in the proposed system. Operational Feasibility People are inherently resistant to change, and computers have been known to facilitate change. An estimate should be made about the reaction of the user stag towards the development of a computerized system. Computer installations have something to do with turn over, transfers and

changes in job status. The introduction of a candidate system requires special effort to educate, sell and train the staff for conducting the business. The Candidate system was found to be technically, economically and behaviorally feasible. The system was developed user friendly, needless training and improves the working environment. Justification of any capital outlay is that it will increase profit, reduce expenditures or improve the quality of service or goods, which in turn may be expected to provide increased profits. Disregarding the initial expenses, the candidate system was assessed to be feasible in all ways to implement. 3.4 Fact finding techniques Requirements analysis encompasses all of the tasks that go into the investigation, scoping and definition of a new or altered system. The first activity in analysis phase is to do the preliminary investigation. During the preliminary investigation data collecting is a very important and for this we can use the fact finding techniques. The following fact finding techniques can be used for collecting the data: Observation This is a skill which the analysts have to develop. The analysts have to identify the right information and choose the right person and look at the right place to achieve his objective. He should have a clear vision of how each departments work and work flow between them and for this should be a good observer. Requirements analysis is an important part of the system design process, whereby requirements engineers and business analysts, along with systems engineers or software developers, identify the needs or requirements of a client. Once the clients requirements have been identified and facts collected, the system designers are then in a design a solution. 3.5 Proposed System

The main objective of the proposed system is to overcome the drawbacks in the manual system. Also some modification have to make it a simple and user friendly. Redendency and inconsistency problems are completely solved in the proposed system . High speed and accuracy are the main features of the proposed system over the manual system. Advantages Heavily reduces the human workload It is user friendly and simple Fast information flow.

3.3 Proposed System The main aim of the project is any user they can access the system through website at any time without going to the company. As a new user also he can collect all information like as a movies Available ,list of theatres
This project contains three modules 1 .Admin 2. Booking tickets 3. Users

3.4 Feasibility Study Feasibility study is a procedure that identifies, describes and evaluates Online film ticket booking and selects the particular movie ,then user ensure the particular seat availability. An estimate is made of whether the identified user needs may be satisfied using current software and hardware technologies. The study will decide if the proposed system will be cost effective from a business point of view and if it can be developed given existing budgetary constraints. The key considerations involved in the feasibility analysis are economic, technical, behavioral and operational.
Technical Feasibility

The assessments of technical feasibility centers on the existing system and to what extent it can support the proposed addition. This was based on an outline design of conline film ticket booking system

requirements in turns of inputs, enhancements.

It involves financial considerations to accommodate technical

ENTITY-RELATIONSHIP Diagrams

E-R (Entity-Relationship) Diagram is used to represents the relationship between the table. The symbols used in E-R diagrams are: SYMBOL PURPOSE

entities in

Represents Entity sets.

Represent attributes.

Represent Relationship Sets.

Line represents flow Structured analysis is a set of tools and techniques that the analyst. To develop a new kind of a system:

The traditional approach focuses on the cost benefit and feasibility analysis, Project management, and hardware and software selection an personal considerations.

ER DIAGRAM Admin

Password User Name Age

Address

EmailID
gender

User phno

New User Details

User name

Add movie,

Theatre,tickets
No of tickets

Tickets Theatre Cost name


Seat Nos

User name Movie Name

Show time

4.DATABASE DIAGRAM

System Specification

4. System

Specification

4.1 Software Specification Operating System Front end Back end Documentation : Windows XP/7 : ASP with C# : SQL server 2005 : Microsoft Word

Hardware Requirements Processor RAM Hard disk Memory Monitor Keyboard Mouse : Pentium IV : 512MB : 20GB : 64MB : SVGA color :Standard 106 key : Mouse suitable for windows operating System.

System Design

5. System Design
5.1 Introduction to System Design

System design deals with planning and designing of the system. It is a solution that is the translation of requirements into ways of meeting them. The design will determine the success of the system. The goal of the design process is to produce a model or a representation of a system, which can be used later to build that system. The produced system is called the design of the system. The design process for software systems often has two levels.

System design: - At the first level the focus is on deciding which modules are needed for the system, the specifications of these modules, how the modules should be interconnected. This is what we call the top level design or system design.

Detailed design: - In the second level, the internal design of the modules or how the specifications of the module can be decided upon. The design is called detailed design. Detailed design essentially expands the system design to contain a more detailed description of the processing logic and the data structures such that the design is sufficiently complete for coding. The system design describes the characteristics of the system.

Modularization is the process of partitioning the system into modular units of limited size to simplify maintenance when necessary. Each and every module is selected according to the function. Modularization makes system development simpler. It is an attempt to minimize the complexity of the problem. Modular design increases the flexibility of the system. The system is

partitioned into different segments. The program code is also divided into different subroutines according to the options.

5.2 Input Design Input design is the process of converting user-oriented inputs to a computer-based format. The quality of system determines the quality of system outputs. All the data entry screens should be of interactive nature so that the user can directly input data according to prompt messages. The input design determines whether the user can interact directly with the computer. Interactive input screens ensure the reliability and accuracy of the system.

5.3 Output Design


Output design generally refers to the results and information that are generated by the system. For many end-users, output is the main reason for developing the system and the basis on which they evaluate the usefulness of application. The objective of a system finds its shape in terms of the output. The analysis of the objective of a system leads to determination of outputs. Outputs of a system can take various forms. The most common are reports, screen displays, printed form, graphical drawing etc. The output also varies in terms of their contents, frequency, timing and format. The users of the output, its purpose and sequence of details to be printed are all considered. The output from a system is the justification for its existence. If the outputs are inadequate in anyway, the system itself is inadequate. The basic requirements of output are that it should be accurate, timely and appropriate, in terms of content, medium and layout for its intended purpose. Hence it is necessary to design output so that the objectives of the system are met in the best possible manner. The outputs are in the form of reports. When designing output, the system analyst must accomplish things like, to determine what information to be present, to decide whether to display or print the information and select the output medium to distribute the output to intended recipients.

5.4 Database Design The database design procedure transforms the information domain model created during the analysis into tables that will be required to implement the software or system. A database is a collection of data. Some of the major task in computer system is to store and manage data. To handle these tasks a specialized computer program known as DBMS is needed. A DBMS stores, process and retrieves data efficiently. The database design is made-up of two levels. 1. Conceptual Level Conceptual Level This level represents the major data objects and relationship between them. Conceptual level describes the essential feature of the system data. Normalization After the conceptual level, the next level of process of database design to organize the data structure into a good shape is called Normalization. The normalization simplifies the entries, removing the redundancies from the system data and finally builds a data structure, which is both flexible and adaptable to the system. There are six rules associated with normalization and are the key factors for a good database design. The six rules are: 1NF (First Normal Form) Each row and column must have a single value with no repeating values. 2NF (Second Normal Form) Each non-key column must depend on the primary key column. 3NF (Third Normal Form) No non-key column can depend on another non-key column. 2. Normalization

BCNF (Boyce Code Normal Form No attribute of a composite key can depend on the attribute of another composite key. 4NF (Fourth Normal Form) An entity cannot have a 1:1 relationship between primary key columns and non-key columns. 5NF (Fifth Normal Form) - Break all tables into the smallest possible pieces to eliminate all redundancy within a table.

5.5 System Module

Admin module It deals with the entire master forms. Hotel module This module deals with the various hotel details. Itinerary module It deals with the fixed touring packages , it schedule and custom itineraries in this reserving of hotels and vehicles etc has been handled. Vehicle module It deals with various types of vehicle details. Report module In this module we can generate the various tourism portal reports.

5.6 Data Flow Diagram 5.6.1 Introduction to DFD

A Data flow diagram (DFD) is a diagram that describes the flow of data and the processes that change or transform data throughout a system. Four basic symbols are used to construct data flow diagram. They are symbols that represent data sources, data flows, data transformation, and data storage. Basic data flow diagram symbols are: A square defines a sources (originator) or destination of a system data. An arrow identifies data flow. It is a pipe line through which information flows. A Circles represents a process that transforms incoming data flow(s) into outgoing data flow(s). An open rectangle is data storage.

5.6.2

Data Flow Diagrams

DFD

Hotel Db user master Vehicle db

Login

Enter Login Details

Manage Vehicle Module

Manage Hotel Module

Verification

Manage Admin

Generate itinerary

Generate

ER DIAGRAM

TABLE DESIGN
CUSTOMER DETAILS

ENQUIRY

FEEDBACK

HOTEL

ITENARY

PACKAGE

PAYMENT

REGISTER

ROOM TARIFF

STAFF

VEHICLE

VEHICLE DETAILS

VEHICLE TARIFF

System Testing

6.System Testing
System testing is the stage of implementation, which is aimed at ensuring that the system works accurately and efficiently before live operations commands. The logical design and physical design should be thoroughly and continually examined on paper to ensure that they would work after implementation. Thus the system testing is a confirmation of accuracy.

6.1.1.TESTING METHODOLOGIES Integration Testing


The integration is the next important concept that highlights in the testing scenario. Integration testing can be performed in different strategies. One of them is the Big Bang testing in which one could first test all of a systems modules separately and then whole systems at once. But here we proceed abruptly from the module testing and the integration testing disappears. Another alternative is the Incremental Testing With the Incremental testing there are many

advantages. We can start the integration as soon as reasonable subsets of modules have been developed. It is easier to localize errors incrementally. The partial aggressions of modules often constitute important subsystems that can have autonomy with these testing. The need for stubs and drivers can be reduced.
UNIT TESTING Unit testing focuses on the verification efforts in the module. The unit testing is always a white box oriented one and this step can be conducted in parallel for modules. The module interface is tested to ensure that information flows in and out appropriately. The local data structures are examined to ensure that data stored temporarily. Boundary conditions are tested to ensure that the module is operating properly at the boundaries established. All independent paths through the control structures are implemented to ensure that all statements in a module are executed at least once.

REQUIREMENT TESTING The main aim of this test plan is to see whether the outputs generated and inputs given according to the user requirements and specifications. This is done in the security department by the developer with the project team who conducted the actual test. The suggestions arise in the testing should be incorporated in the project. USER TESTING During the testing the tester plays the role of the individual who desires to penetrate into the system. The tester may attempt to acquire passwords through external clerical means and may attack the system. The tester may also overwhelm the system thereby denying service to others and purposely generate system errors and also browse through data. VALIDATION TESTING At the end of user testing, software is completely assembled as a package, interfacing errors have now been uncovered and correcting testing begins. Software testing and validation are achieved through a serious black box tests that demonstrate conformity with the requirement.

A plan outlines the classes of tests to be conducted and test procedure defines specific cases that will be used to demonstrate conformity with requirements. Both the plan and the procedure are designed to ensure that all functional requirements are achieved, documentation is correct and other requirements are met. After the validation test, one of the two possible conditions exists. They are: 1. 2. The function or performance characteristics confirm to specification and are accepted. A deviation from the specification is uncovered and a deficiency list is created.

The deviation or error discovered at this stage in a project can rarely be corrected prior to scheduled completion. It is necessary to negotiate with the customer to establish methods.

OUTPUT TESTING The output testing is one of the most important tests in system testing. The outputs generated should be according to the customer requirement. The output should be an acceptable one to the user.

SYSTEM IMPLEMENTATION

7. IMPLEMENTATION The first step to do before implementation is to install .Net and SQL server with windows. The first part of installing all the require software and hardware with proper networking has been done in the first phase. And in the second phase the software installed and shows the user how it runs. The successful implementation of the new system depends upon the involvement of staff working in the department. The stage consists of testing the developed program with sample data, Detection & correction of errors, Testing whether the system meets user requirements, Creating files of the system with the actual data, Making necessary changes are desired by the user, Training user personnel, An implementation design of method is to achieve the changes over method. After that the user should check all hardware configurations. After installing the required application software the user has to check and verify all installed component. The module are implemented and tested one by one Includes Project Information, Client Information, Technical Analysis, Technical Advice, Verification System The main aim of this Implementation plan is to see whether the outputs created and inputs were given according to the user requirements and specifications that have been established. This was

done in the security department by having the developer as a secondary person and another employee who conducted the actual test. Some Suggestion was made while requirement testing was done that has been incorporated. The implementation means the conversion of a newly developed system into action. The three types of implementation are Implementation of new computer system to replace the existing system. Implementation of modified application to replace an existing system. Implementation of a computer system to replace the manual system.

The implementation phase involves mainly three steps:

7.1.1 Planning The implementation of the system involves people from different sections and it involves many problems. Co-operation from different staff members was sought for successful implementation. 7.1.2 Training Good training is to be provided to the user of the system. An operation manual provided with the system makes the process easier 7.1.3 Changeover It is the process of converting the existing system. The new system was found easier to use and the staff were satisfied with reports generated by the new system

8. System Maintenance
EFFECTIVE MAINTAINENCE Proposes that the improvement of an existing quality management system (QMS) through flexibility and innovation will increase product and service quality, which will in turn enhance and advance the organizations business objective. Explores the segmentalist and integrative concepts within the context of construction firms. Findings from a research project suggest that these should be removed from or implemented into the organization where necessary. Believes that organizations must adopt the integrative approach which looks ahead into the challenges of the future rather than the segmentalist approach which is contented with past accomplishments. Suggests that a corporate renaissance must be created within the organization to take on these challenges and to implement change and innovation. It is therefore necessary to develop the humanistic factors and a participatory management environment. However, in so doing, the technical aspects are also of importance and should not be totally ignored. These are collectively the key elements to maintaining a quality management system effectively.

PREVENTIVE MAINTAINENCE Preventive maintenance can be defined as follows: Actions performed on a time- or machinerun-based schedule that detect, preclude, or mitigate degradation of a component or system with the aim of sustaining or extending its useful life through controlling degradation to an acceptable level.

9. CONCLUSION

The scope of the project has been described and can be extended to give flexibility of performing the maintenance of the tour details and calculating the bill after choosing tour packages. Customer can register and book tour packages as per their requirements. Customer can view various tour packages ,hotel details etc.Its very user friendly.

FUTURE ENHANCEMENT

BIBILIOGRAPHY

1. Visual Studio 2005 Black Book

- Rob Thayer

5. Mastering Database Programming with Visual Basic 6 - Evangelos Petroutsos 6. Software Engineering 7. System Analysis and Design 8. An Introduction to Database Management System - Pressman - James A.Senn - C.J.Date

APPENDIX

Você também pode gostar