0% found this document useful (0 votes)
21 views232 pages

Ebilling Report

Uploaded by

2022bca256
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
21 views232 pages

Ebilling Report

Uploaded by

2022bca256
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 232

HOTEL MANAGEMENT SYSTEM

A PROJECT REPORT
On
HOTEL MANAGEMENT SYSTEM

Submitted To
AXIS INSTITUTE OF HIGHER EDUCATION ROOMA KANPUR
In partial fulfillment of the requirements
For the award of the degree
CHATREPATI SAHU MAHARAJ UNIVERSITY
KANPUR

Under Guidance of:


Prepared by:
Pooja Dwivedi Saurabh kumar,Rishu gupta
Mansi singh,Aakanksha Gautam
BCA

RollNo
0901204,0801407,0901105,0901157

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 1
HOTEL MANAGEMENT SYSTEM

Title of the Project

HOTEL MANAGEMENT SYSTEM


HOTEL MANAGEMENT SYSTEM
Certificate of Originality

This is to certify that the project report entitled HOTEL MANAGEMENT


SYSTEM submitted to Axis Institute of higher Education Rooma ,Kanpur in
partial fulfillment of the requirement for the award of the degree of BACHElOR
OF COMPUTER APPLICATIONS( BCA) , is original work carried out by Saurabh
kumari with Roll no. 0901204 under my guidance.
The matter embodied in this project is genuine work done by the student and
has not been submitted whether to this University or to any other University / Institute
for the fulfillment of the requirement of any course of study.

………………………. …...…………………….
Signature of the Student:
RollNo- Signature of the Guide

Date: ……………….. Date: …………………

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 2
HOTEL MANAGEMENT SYSTEM

Acknowledgement

1. Project plays a vital role in Engineering Education. It gives a student a chance


to interact with the practical knowledge of real world. As a part of regular
curriculum, I have got a chance to perform my final project. I have started to
work on project from Jan 2011 since then many people have made valuable
suggestions, which I have incorporated in this work. I take this opportunity to
express my gratitude to them.
2. I am beholden to my colleagues who provided me complete knowledge about
this project and they were good enough to find time for fruitful discussions.
3. I am also thanking full with my present employer and faculty members of my
Institute who gives chance and valuable suggestions.
4. Last but not the least I thank to my family members for their support &

encouragement.

5. It will be great pleasure for me if the readers draw useful conclusion from

report.

Saurabh kumar
Rishu Gupta
Mansi singh
Akansha Gautam

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 3
HOTEL MANAGEMENT SYSTEM

Students Declaration

I hereby declare that the project work entitled “HOTEL MANAGEMENT


SYSTEM” in partial fulfillment of the requirement for the award of degree of BCA

and submitted to the CHATREPATI SAHU MAHARAJ UNIVERSITY, KANPUR is


authentic record of my own work carried out during the period from 23 h May2020 to
30th aug2020.
The project report has not been submitted by me for any award of any other
degree/diploma of any university/Institute.

Saurabh kumar,Rishu
Gupta,Mansi singh,
Aakanksha Gautam
BCA

RollNo.0901204,0801407,0901105,0901157

Place: Kanpur

Date: 05/2020

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 4
HOTEL MANAGEMENT SYSTEM
TABLE OF CONTENTS
Synopsis
Report

1. Project profile
1.1 Introduction
1.2 Objectives
1.3 Project Category
1.4 Tools & Platform used
1.4 Web Team
1.5 Web Engineering model used
2. System Analysis
2.1 Requirement Analysis
2.2 System Requirement Specification
 Hardware Requirement
 Software Requirement
2.3 Risk Analysis
2.4 Cost Analysis
2.5 Project Scheduling
3. System Designing
3.1 Modules
3.2 Database Design
3.3 Data Flow Diagram (DFD)
3.4 Scope and Limitation
3.5 Input Output Specification
4. Deployment & Implementation
4.1 Web Testing
4.2 Hosting & Deployment
4.3 Security
4.4 Maintenance
5. Annexure
5.1 Bibliography
5.2 Softcopy of Project on CD Rom

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 5
HOTEL MANAGEMENT SYSTEM

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 6
HOTEL MANAGEMENT SYSTEM

TITLE OF THE PROJECT

HOTEL MANAGEMENT SYSTEM

A standard web application using HTML,CSS,Java script


and
Oracal10g pages on
Recruitment System & technical form

I n t ro d u c t i o n

A hotel manager, hotelier, or lodging manager is a person who manages the


operation of a hotel, motel, resort, or other lodging-related establishment. Management
of a hotel operation includes, but is not limited to management of hotel staff, business
management, upkeep and sanitary standards of hotel facilities, guest
satisfaction and customer service, marketing management, sales management, revenue
management, financial accounting, purchasing, and other functions. The title "hotel
manager" or "hotelier" often refers to the hotel's General Manager who serves as a
hotel's head executive, though their duties and responsibilities vary depending on the
hotel's size, purpose, and expectations from ownership. The hotel's General Manager is
often supported by subordinate department managers that are responsible for individual
departments and key functions of the hotel operation. payment, the process by which
companies bill customers and receive payments electronically over the Internet.

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 7
HOTEL MANAGEMENT SYSTEM
Hotel management structure
The size and complexity of a hotel management organizational structure varies
significantly depending on the size, features, and function of the hotel or resort. A small
hotel operation normally may consist of a small core management team consisting of a
Hotel Manager and a few key department supervisors who directly handle day-to-day
operations. On the other hand, a large full-service hotel or resort complex often operates
more similarly to a large corporation with an executive board headed by the General
Manager and consisting of key directors serving as heads of individual hotel
departments. Each department at the large hotel or resort complex may normally consist
of subordinate line-level managers and supervisors who handle day-to-day operations.

Definition of e-Payment

 Electronic payment is any digital financial payment transaction involving currency


transfer between two or more parties (source: World Bank)

 Internet is usually believed to be the only mode. In reality e-payments cover a much
broader range (phone, interbank networks, etc)

Definition of e-Money Transfer

 Electronic money transfer is any transfer of funds done over any digital mean e.g. the
Internet, in a close to real-time.

 It can be done on the domestic market (money order, pension transfer, student grant)
or on the international market.

 Information on transfer status can be ensured by the system of track and trace.

E- Billing why?
 It’s paperless – you'll have fewer bills clutter your mailbox, where your personal
information could be a target of theft. You can easily print a copy of your bill if
you need one for your records.
 It’s convenient – look up your account information anytime and from anywhere
with Internet access. You'll also receive a monthly e-mail notification when your
bill is ready to be viewed.
 It’s green – using less paper is better for the environment.

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 8
HOTEL MANAGEMENT SYSTEM
 It’s secure – your unique user ID and password mean only you can access your
account information. It’s free!
Plus, you can choose from one of our convenient payment options, or even use your bank's
online bill payment service. We help make viewing and paying your bills completely hassle
free.
What is an e- signature:

An electronic signature is a digital signature is used to authenticate the identity of the


sender of a message or the signer of a document. It is easy to transport and cannot be imitated
by someone else. A digital signature can be used with any kind of message, encrypted or not.

How does it work?

Sending a message:

1. Copy-and-paste e.g. a contract into an e-mail note.

2. Using special software, you obtain a message hash (mathematical summary) of the
contract.

3. You then use a private key that you have previously obtained from a public-private
key authority to encrypt the hash.

4. The encrypted hash becomes your digital signature of the message. (Note that it will
be different each time you send a message.) At the other end, the person who receives
the message.

a. To make sure it's intact and from you, the person makes a hash of the received
message.

b. He/she then uses your public key to decrypt the message hash or summary.

c. If the hashes match, the received message is valid.

Education and Training

In the past, a hotel manager commonly was promoted from within the organization
itself. These days, a strong applicant for the position may need formal education in
addition to the hands-on job experience. This could add years and expense to the

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 9
HOTEL MANAGEMENT SYSTEM
career track; however, that education need not be a bachelor’s degree in hotel
management. An employer might also favor a liberal-arts degree plus completion of
some hotel-management courses, a qualifying associate degree or certificate in hotel
management, or successful completion of a training program sponsored by the hotel
chain. Also, someone with the correct education can expect to begin at the level and
pay of assistant manager, instead of working his way up from the bottom of the
hotel-worker food chain.

Work Environment

Hotel managers work long hours and weekends, often under stressful
conditions that require quick thinking, resourcefulness, diplomacy and
communication skills. Depending on a guest’s complaint or glowing
satisfaction, customer-service responsibilities can prove infuriating,
challenging or rewarding. A manager, by definition, also supervises,
organizes and delegates the work of employees. This involves complex
decisions on everything from handling finances, to organizing a convention,
to fixing plumbing disasters and changing décor. Very often, a career
promotion in this industry means relocating to another hotel in another
town.

Compensation

Pay varies depending on the type and size of employer and the employee’s
job responsibilities. In 2008, the annual salary for a lodging manager
averaged at just under $46,000, with the lowest-earning 10 percent making
less than $28,160 and the highest clearing more than $84,270. Many
employers offer bonuses, free training or profit-sharing in addition to that
salary. Also, given the nature of the job, lodging, meals, laundry and other
perks might be free or discounted.

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 10
HOTEL MANAGEMENT SYSTEM

Objectives
The firm handles all of the work manually, which is very tedious and mismanaged.
The objective of our project is as follows:
a. To keep the information of Customer.
b. To keep the information of consuming unit of energy of current month.
c. To keep the information of consuming unit of energy of previous month.
d. To keep the information of employee working in the department.
e. To maintain the record of the department.
The E-billing system provides the facility for payment of bill by the internet. The
objectives of the project contains the bill payment through ATM Card and Credit Card also
Debit Card as like water bill, electric bill as well as telephone bill. This objective makes more
flexible and easy for depositing bill. The main objectives of this project take the following
steps as:-
 Billing system of the water, electric and telephone making easy and paid by the
internet through card system such as ATM, Debit, Credit Card and internet banking.
 This project provide for checking status of bill and also paid bill and also states the
unit used in electric and call duration as well as monthly duration in telephone system.
 The information are send time to time by the SMS alert in a message about status of
the bill in end of the month on their mobile phone and also respective E-mail IDs.
When customer deposited the bill a confirmation message get in mobile phone.
Making more easy and less work to the customer for the payment.
 From an end–user perspective the e-billing projects consist of two functional
elements: an enhanced searchable database for customer, and also generate the billing
report.
 Web-based project management software application that makes task management,
paying bill, and document management hassle-free and straightforward. E-billing
System keeps developer’s team on the same page with a centralized location for
payment of multiple bills, tasks, issues, sites, emails, related notes and project
documents.

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 11
HOTEL MANAGEMENT SYSTEM
 This software makes Task Management a breeze with recursive task definition as well
as automatic email notification feature which gives project members a quick view of
outstanding tasks.

Project Category

The proposed project falls under “Hotel Management category” in which sets of
technologies are used. Today, software takes on a dual role. It is a product and, at the same
time, the vehicle for delivering a product. As a product, it delivers the computing potential
embodied by computer hardware or, more broadly, a network of computers that are
accessible by local hardware... As the vehicle used to deliver the product, software acts as the
basis for the control of the computer (operating systems), the communication of information
(networks), and the creation and control of other programs (software tools and environments).
Software delivers the most important product of our time information. Software is a logical
rather than a physical system element and posses following characteristics:-

1. Soft skill is developed or engineered; it is not manufactured in the classical sense.


2. Softskills doesn't "wear out."
3. Although the industry is moving toward component-based assembly, most
software continues to be custom built.

Our application lies in the category of Web-based software. It consists of web pages
retrieved by a browser are software that incorporates executable instructions written in
HTML,, C#, Java, Perl etc and data of type hypertext and a variety of visual and audio
formats. In essence, the network becomes a massive computer providing an almost unlimited
software resource that can be accessed by anyone round the globe.

These general characteristics apply to all Hotel Management:-

 Informational. Read-only content is provided with simple navigation and


links.
 Download. A user downloads information from the appropriate server.
 Customizable. The user customizes content to specific needs.
 Interaction. Communication among a community of users occurs via chat
room, bulletin boards, or instant messaging.

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 12
HOTEL MANAGEMENT SYSTEM
 User input. Forms-based input is the primary mechanism for communicating
need.
 Transaction oriented. The user makes a request (e.g., places an order) that is
fulfilled by the Web Application.
 Service oriented. The application provides a service to the user (e.g., assists the
user in determining a mortgage payment).
 Portal. The application channels the user to other Web content or services
outside the domain of the portal application.
 Database access. The user queries a large database and extracts information.

Reasons to use Hotel Management:


 Network intensive:- By its nature, a Web Application is network intensive. It
resides on a network and must serve the needs of a diverse community of
clients.
 Content driven:- In our case, the primary function of a Web Application is to
use hypermedia to present text, graphics, audio, and video content to the end-
user.
 Continuous evolution. Unlike conventional application software that evolves
over a series of planned, chronologically spaced releases, Web applications
evolve continuously and require updating.
 Immediacy. Web-based applications have an immediacy that is not found in
any other type of software. That is, the time to market for a complete Web site
can be a matter of a few days to few weeks to few months. Developers must use
methods for planning, analysis, design, implementation, and testing that have
been adapted to the compressed time schedules required for Web Application
development.
 Security. Because Web Applications are available via network access, it is
difficult, if not impossible, to limit the population of end-users who may access
the application. In order to protect sensitive content and provide secure modes
of data transmission, strong security measures must be implemented throughout
the infrastructure that supports a Web Application and within the application
itself.

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 13
HOTEL MANAGEMENT SYSTEM
 Aesthetics. An undeniable part of the appeal of a Web Application is its look
and feel. When an application has been designed to market or sell products or
ideas, aesthetics may have as much to do with success as technical design.
 Internet Standards:- Since the application is used by the wide variety of end
user possessing different infrastructural hardware and software. So it becomes
difficult to maintain uniformity. Hence some internet standards are given by
W3C and IEEE. The web application should follow these standards.

Tools and Platform used

S oft sk i l l s S p ecif i cat i on

Development Requirement:

Team

Client on Project Stake Holder

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 14
HOTEL MANAGEMENT SYSTEM

Project Manager

Information Quality
Architect Assurance
Team
Team

Content Team Technical Team


Editor Graphic Design Team Developer
Copy Writer Design Product Artist Database
Designer Administrator

Project Stake holder:- The Project Stake holder, sometimes called the
Business owner, is the person responsible for initializing the project. This
person could be, from the marketing department an external client, editors,
producers, or even the CEO of the company. The stake holder deliverables could
include:-
1. Project Concept or Idea
2. Budget
3. Marketing Plan
4. Page Mockups
5. Third Party Contents

Project Manager: - Project Manager Considered as the sole of Project. He has


following duties to perform.
1. He is the one who co-ordinates everything.
2. Assign task to different team members.
3. Defines Project Budget
4. Sets time lying from different task
Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .
Roll No :- 0901204, 0901157, 0901105, 0801407 Page 15
HOTEL MANAGEMENT SYSTEM
5. Acts as communication link between each aspect of project.
6. Sets even design direction

Information Architect Team:- The work of information architect team start


from the initialization state to the development state of the project.
Performing team of task:-
1. It collects all the information required for project initialization.
2. It is also responsible for requirement analysis
3. He performs a significant role in project planning
4. He is responsible for feasibility study
5. He is responsible for creation of graphical user interface designing
6. He is responsible for logical connectivity of GUI.

Quality Assurance Team:-

Task: - 1. Keep strict check on development phase.


1. He is responsible for all the type of testing.
2. He is in charge of maintenance of the project. Finally he is responsible
for deployment of the project.
3. After deployment of the project he collects feedback from the stake
holder.
Copy Writer:- Copy writer go to the stake holder and then Asked the problem
and this problem will be note on to the paper and then this problem send to the
editor And then editor works start.
Editor:-
Editor collects this information and arranges the better format of data.
And then after requirement analysis on the data. After requirement analysis
editor make the report of the data. If some information is less copy writer again
go to the stake holder collect all Information sends to the editor. Editor again
collecting this information. This cycling process is continuing.
Graphic Design Team: -
Graphic design teams play a very important role in the project. Graphic
design team is a center gravity of the project. After making the report of the

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 16
HOTEL MANAGEMENT SYSTEM
requirement analysis Graphic design team Design the form or prototyping
designing on to the paper as per user requirement. Graphic design team also
designs the database of the form. Graphic design team also makes the flow of
the data.
Technical Team: -
After design the prototype technical team will work out. Technical team
will write the logical programming and HTML designing. Technical team wills
enforce of the deployment of the project. Technical team will be playing the
database administrator role. Technical team will write the coding of database
connectivity.

My role in the project


I have involved in various phases of project development like, I have
designed the various web forms, Created Table & Stored procedure for database
and completed the Analysis, testing & documentation.
Database query for database purpose and design the full and final project deliver
to the stake holder and after collecting feedback of the project.

Oracle Database Architecture


An Oracle database is a collection of data treated as a unit. The purpose of a database is to
store and retrieve related information. A database server is the key to solving the problems of
information management. In general, a server reliably manages a large amount of data in a
multiuser environment so that many users can concurrently access the same data. All this is
accomplished while delivering high performance. A database server also prevents
unauthorized access and provides efficient solutions for failure recovery.

Oracle Database is the first database designed for enterprise grid computing, the most flexible
and cost effective way to manage information and applications. Enterprise grid computing
creates large pools of industry-standard, modular storage and servers. With this architecture,
each new system can be rapidly provisioned from the pool of components. There is no need
for peak workloads, because capacity can be easily added or reallocated from the resource
pools as needed.

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 17
HOTEL MANAGEMENT SYSTEM
The database has logical structures and physical structures. Because the physical and
logical structures are separate, the physical storage of data can be managed without affecting
the access to logical storage structures.

Oracle 10g DataBase Server

Oracle 10g database has following features:


 High availability feature
 Application Programming feature
 Administrative Features
 Backup and Recovery feature
 Business Intelligence feature

Oracle Database High Availability


Databases and the Internet have enabled worldwide collaboration and information sharing by
extending the reach of database applications throughout organizations and communities. Both
small businesses and global enterprises have users all over the world who require access to
data 24 hours a day. Without this data access, revenue and customers can be lost, penalties
can be owed, and bad press can have a lasting effect on customers and a company's
reputation. Building a high availability IT infrastructure is critical to the success and well
being of all enterprises in today's fast moving economy.

Oracle Database Application Development


SQL, XML, and procedural languages (e.g., PL/SQL, Java, C/C++) are the core technologies
used by application developers today. The table below summarizes the core strengths and
capabilities that each brings to the table. Any complete application solution must have
elements of all three. Oracle Database 10 g is a single integrated platform that supports all
three of these capability areas in a simple fashion with high performance and scalabilit

The Evolution of the Relational Database

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 18
HOTEL MANAGEMENT SYSTEM
The relational database concept was described first by Dr. Edgar F. Codd in an IBM
research publication entitled “System R4 Relational” appearing in 1970. Initially, it was
unclear whether any system based on this concept could achieve commercial success.
Nevertheless, Relational Software, Incorporated (RSI) began in 1977 and released Oracle V.2
as the world’s first relational database within a couple of years. By 1985, Oracle could claim
more than 1,000 relational database customer sites. By comparison, IBM would not embrace
relational technology in a commercial product until the Query Management Facility in 1983
why has relational database technology grown to become the de facto database technology
since that time? A look back at previous database technology may help to explain this
phenomenon.
Database management systems were first defined in the 1960s to provide a common
organizational framework for what had been data stored in independent files. In 1964,
Charles Bachman of General Electric proposed a network model with data records linked
together, forming intersecting sets of data, as shown on the left in Figure 1-1. This work
formed the basis of the CODASYL Data Base Task Group. Meanwhile, the North American
Aviation’s Space Division and IBM developed a second approach based on a hierarchical
model in 1965. In this model, data is represented as tree structures in a hierarchy of records,
as shown on the right in Figure 1-1. IBM’s product based on this model was brought to
market in 1969 as the Information Management System (IMS). As recently as 1980, almost
all database implementations used either the network or hierarchical approach. Although
several competitors utilized these technologies, only IMS remains.

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 19
HOTEL MANAGEMENT SYSTEM
Relational Basics

The relational database uses the concept of linked two-dimensional tables consisting of rows
and columns, as shown in Figure 1-2. Unlike the hierarchical approach, no predetermined
relationship exists between distinct tables. This means that the data
needed to link together the different areas of the network or hierarchical model need not be
defined. Because relational users don’t need to understand the representation of data in
storage to retrieve it (many such users created ad hoc queries against the data), ease of use
helped popularize the relational model.
Relational programming is nonprocedural and operates on a set of rows at a time. In a
master-detail relationship between tables, there can be one or many detail rows for

Each individual master row, yet the statements used to access, insert, or modify the data
would simply describe the set of results. In many early relational databases, data access
required the use of procedural languages that worked one record at a time. Because of this set
orientation, programs can access more than one record in a relational database more easily.
Relational databases can be used more productively to extract value from large groups of
data. The contents of the rows in Figure 1-2 are sometimes referred to as records. A column
within a row is referred to as a field. Tables are stored in a database schema, which is a
logical organizational unit within the database. Other logical structures in the schema often
include the following:
Views

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 20
HOTEL MANAGEMENT SYSTEM
Provide a single view of data derived from one or more tables or views. The view is
an alternative interface to the data, which is stored in the underlying tables that make up the
view.
Sequences
Provide unique numbers for column values. Stored procedures Contain logical
modules that can be called from programs.
Synonyms
Provide alternative names for database objects.
Indexes
Provide faster access to table rows.
Database links
Provide links between distributed databases.
The relationships between columns in different tables are typically described through the use
of keys, which are implemented through referential integrity constraints and their supporting
indexes. For example, in Figure 1-2, you can establish a link between the DEPTNO Column
in the second table, which is called a foreign key, to the DEPTNO column in the first table,
which is referred to as the primary key of that table.
Finally, even if you define many different indexes for a table, you don’t have to understand
them or manage the data they contain. Oracle includes a query optimizer that chooses the best
way to use your indexes to access the data for any particular query. The relational approach
lent itself to the Structured Query Language (SQL). SQL was initially defined over a period
of years by IBM Research, but it was Oracle Corporation that first introduced it to the market
in 1979. SQL was noteworthy at the time for being the only language needed to use relational
databases, because you could use SQL:
• For queries (using a SELECT statement)
• As a Data Manipulation Language or DML (using INSERT, UPDATE, and DELETE
statements)
• As a Data Definition Language or DDL (using CREATE or DROP statements when adding
or deleting tables)
• To set privileges for users or groups (using GRANT or REVOKE statements) Today, SQL
contains many extensions with ANSI/ISO standards that define its basic syntax.

The Oracle Family

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 21
HOTEL MANAGEMENT SYSTEM
Oracle Database 10g Database Server describes the most recent major version of the Oracle
relational Database Management System (RDBMS) family of products that share common
source code. This family includes:
• Personal Oracle, a database for single users that’s often used to develop code for
implementation on other Oracle multiuser databases
• Oracle Standard Edition, which was named Workgroup Server in its first iteration as part of
the Oracle7 family and is sometimes simply referred to as Oracle Server
• Oracle Enterprise Edition, which includes all Standard Edition functionality and additional
functionality
• Oracle Lite, used primarily for mobile applications
Oracle8 was introduced in 1997 with larger size limitations and management features,
Such as partitioning, aimed at very large database implementations. In 1998, Oracle
announced Oracle8i, which is sometimes referred to as Version 8.1 of the Oracle8 database.
The i was added to denote added functionality supporting Internet deployment in the new
version. Oracle9i followed, with Application Server available in 2000 and Database Server in
2001. Oracle Database 10g was introduced in 2003; the g denotes Oracle’s focus on emerging
grid deployment models. The terms Oracle, Oracle8, Oracle8i, Oracle9i and Oracle Database
10g (or Oracle10g) might appear to be used somewhat interchangeably in this book, because
Oracle Database 10g includes all the features of previous versions. When we describe a new
feature that was first made available specifically in certain releases, we’ve tried to note that
fact to avoid confusion, recognizing that many of you may have old releases of Oracle. We
typically use the simple term Oracle when describing features that are common to all these
releases.
Oracle has focused development around a single source code model since 1983.
While each database implementation includes some operating system–specific source code
at very low levels in order to better leverage specific platforms, the interfaces that users,
developers, and administrators deal with for each version are consistent. Because features
are consistent across platforms for implementations of Oracle Standard Edition and Oracle
Enterprise Edition, companies can migrate Oracle applications easily to various hardware
vendors and operating systems while leveraging their investments in Oracle technology. This
development strategy also enables Oracle to focus on implementing new features only once

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 22
HOTEL MANAGEMENT SYSTEM
in its product set, instead of having to add functionality at different times to different
implementations.
Oracle Standard Edition
Oracle Standard Edition refers to a specific database offering, once known as
Workgroup Server. From a functionality and pricing standpoint, this product intends to
compete in the entry-level multiuser and small database category, supporting smaller
numbers of users. These releases are available today on Windows and Unix Platforms such
as HP Compaq, HP/UX, IBM AIX, Linux, and Sun Solaris.

Oracle Enterprise Edition


Oracle Enterprise Edition is aimed at larger-scale implementations that require
additional features. Enterprise Edition is available on far more platforms than the Oracle
release for workgroups and includes advanced management, networking, programming,
and data warehousing features, as well as a variety of special-purpose options, such as
clustering, which are available at extra cost.
Oracle Personal Edition
Oracle Personal Edition is the single-user version of Oracle Enterprise Edition.
Personal Edition is most frequently used for development on a single machine. Because the
features match those of Enterprise Edition, a developer can write applications using the
Personal Edition and deploy them to multi-user servers. Some companies deploy single-user
applications using this product. However, Oracle Lite offers a much more lightweight means
of deploying the same applications

Oracle Lite

Oracle Lite, once known as Oracle Mobile, is intended for single users who are using
Wireless / mobile devices. It differs from other members of the Oracle database family in
that it doesn’t use the same database engine. Instead, Oracle developed a lightweight
engine compatible with the limited memory and storage capacity of handheld devices.

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 23
HOTEL MANAGEMENT SYSTEM
Because the SQL supported by Oracle Lite is largely the same as the SQL for other Oracle
databases, you can run applications developed for those database engines using Oracle Lite.
Replication of data between Oracle Lite and other Oracle versions is a key part of most
implementations. Table 1-2 summarizes the situations in which you would typically use
each database product. We’ve used the Oracle product names to refer to the different
members of the Oracle database family.

Summary of Oracle Features


The Oracle database is a broad and powerful product. The remainder of this book examines
different aspects of Oracle such as data structures, performance, and parallel processing.
But before you can understand each of the different areas of Oracle in depth, you must
familiarize yourself with the range of features in the Oracle database.
The rest of this chapter gives you a high-level overview of the basic areas of
functionality in the Oracle product family. To give some structure to the broad spectrum of
the Oracle database, we’ve organized the features into the following sections:
• Database application development features
• Database connection features
• Distributed database features
• Data movement features
• Performance features
• Database management features
At the end of each of the following sections describing database features we’ve included a
subsection called “Availability,” which indicates the availability of each feature in specific
Oracle products. You should be aware that as this feature list grows and Oracle implements
packaging changes in new versions, the availability of these features in the version you
implement may vary slightly.

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 24
HOTEL MANAGEMENT SYSTEM
Copyright © 2004 O’Reilly & Associates, Inc. All rights reserved.
Database Application Development Features
The main use of the Oracle database system is to store and retrieve data for applications.
The features of the Oracle database and related products described in this section are used
to create applications. We’ve divided the discussion in this section into two categories:
database programming and database extensibility options. we describe the Oracle
Developer Suite, a set of optional tools used in Oracle Database Server and Oracle
Application Server development.

Database Programming
All flavors of the Oracle database include different languages and interfaces that allow
programmers to access and manipulate the data in the database. Database programming
features usually interest two groups: developers building Oracle-based applications that will
be sold commercially and IT organizations within companies that custom-develop
applications unique to their businesses. The following sections describe the languages and
interfaces supported by Oracle.
SQL
The ANSI standard Structured Query Language (SQL) provides basic functions for data
manipulation, transaction control, and record retrieval from the database. However, most
end users interact with Oracle through applications that provide an interface that hides the
underlying SQL and its complexity.
PL/SQL
Oracle’s PL/SQL, a procedural language extension to SQL, is commonly used to implement
program logic modules for applications. PL/SQL can be used to build stored procedures and
triggers, looping controls, conditional statements, and error handling. You can compile and
store PL/SQL procedures in the database. You can also execute PL/SQL blocks via SQL*Plus,
an interactive tool provided with all versions of Oracle. Oracle Database 10g includes a more
optimized version of the core PL/SQL engine, as Oracle9i allowed creation and storage of
precompiled PL/SQL program units.
Java features and options

Oracle8i introduced the use of Java as a procedural language with a Java Virtual
Machine (JVM) in the database (originally called J Server). JVM includes support for Java
stored procedures, methods, triggers, Enterprise JavaBeans™ (EJBs), CORBA, and HTTP. The

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 25
HOTEL MANAGEMENT SYSTEM
Accelerator is used for project generation, translation, and compilation, and can also be
used to deploy/install shared libraries. The inclusion of Java within the Oracle database
allows Java developers to leverage their skills as Oracle application developers. Java
applications can be deployed in the client, Application Server, or database, depending on
what is most appropriate. Oracle data warehousing options for OLAP and data mining
provide a Java API. These applications are typically custom built using Oracle’s J Developer.
Large objects
Interest in the use of large objects (LOBs) continues to grow, particularly for storing
nontraditional data types such as images. The Oracle database has been able to store large
objects for some time. Oracle8 added the capability to store multiple LOB columns in each
table. Oracle Database 10g essentially removes the space limitation on large objects.
Object-oriented programming
Support of object structures has been included since Oracle8i to allow an object-
oriented approach to programming. For example, programmers can create user-defined
data types, complete with their own methods and attributes. Oracle’s object support
includes a feature called Object Views through which object-oriented programs can make
use of relational data already stored in the database. You can also store objects in the
database as varying arrays (VARRAYs), nested tables, or index organized tables (IOTs).

Database Connection Features


The connection between the client and the database server is a key component of
the overall architecture of a computing system. The database connection is responsible for
supporting all communications between an application and the data it uses. Oracle includes
a number of features that establish and tune your database connections. The following
features relate to the way the Oracle database handles the connection between the client
and server machines in a database interaction. We’ve divided the discussion in this section
into two categories: database networking and Oracle Application Server.

Database Networking
Database users connect to the database by establishing a network connection. You
can also link database servers via network connections. Oracle provides a number of
features to establish connections between users and the database and/or between
database servers, as described in the following sections.
Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .
Roll No :- 0901204, 0901157, 0901105, 0801407 Page 26
HOTEL MANAGEMENT SYSTEM
Oracle Net
Oracle’s network interface, Oracle Net, was formerly known as Net8 when used in
Oracle8, and SQL*Net when used with Oracle7 and previous versions of Oracle. You can use
Oracle Net over a wide variety of network protocols, although TCP/IP is by far the most
common protocol today. Features associated with Oracle Net, such as shared servers, are
referred to as Oracle Net Services.
Oracle Names
Oracle Names allows clients to connect to an Oracle server without requiring a
configuration file on each client. Using Oracle Names can reduce maintenance efforts,
because a change in the topology of your network will not require a corresponding change
in configuration files on every client machine.
Oracle Internet Directory
The Oracle Internet Directory (OID) was introduced with Oracle8i. OID serves the
same function as Oracle Names in that it gives users a way to connect to an Oracle Server
without having a client-side configuration file. However, OID differs from Oracle Names in
that it is an LDAP (Lightweight Directory Access Protocol) directory; it does not merely
support the Oracle-only Oracle Net protocol.
Oracle Connection Manager
Each connection to the database takes up valuable network resources, which can
impact the overall performance of a database application. Oracle’s Connection Manager,
illustrated in Figure 1-3, reduces the number of Oracle Net client network connections to
the database through the use of concentrators, which provide connection multiplexing to
implement multiple connections over a single network connection. Connection multiplexing
provides the greatest benefit when there are a large number of active users.

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 27
HOTEL MANAGEMENT SYSTEM

You can also use the Connection Manager to provide multiprotocol connectivity when
clients and servers run different network protocols. This capability replaces the
multiprotocol interchange formerly offered by Oracle, but it is less important today because
most companies use TCP/IP as their standard protocol. Oracle Database 10g introduces
dynamic Connection Manager Configuration, enabling changing of CMAN parameters
without shutting down the CMAN process.
You can also use the Connection Manager to provide multiprotocol connectivity
when clients and servers run different network protocols. This capability replaces the
multiprotocol interchange formerly offered by Oracle, but it is less important today because
most companies use TCP/IP as their standard protocol. Oracle Database 10g introduces
dynamic Connection Manager Configuration, enabling changing of CMAN parameters
without shutting down the CMAN process.

TECHNOLOGIES

JSP Overview

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 28
HOTEL MANAGEMENT SYSTEM
Java Server Pages, also known as JSPs, are a simple but powerful technology used to
generate dynamic HTML on the server side. They are a direct extension of Java servlets and
provide a way to separate content generation from content presentation. The JSP engine is
just another servlet that is mapped to the extension *.jsp. The following code contains a
simple example of a JSP file:
<HTML>
<BODY>
<% out.println("HELLO JSP WORLD"); %>
</BODY>
</HTML>
Its output would look similar to Figure 1.1.

You can see that this document looks like any other HTML document with some added tags
containing Java code. The source code is stored in a file called HelloJSPWorld.jsp and copied

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 29
HOTEL MANAGEMENT SYSTEM
to the document directory of the Web server. When a request is made for this document,
the server recognizes the *.jsp extension and realizes that special handling is required. The
first time the file is requested, it is compiled into a servlet object and stored in memory, and
the output is sent back to the requesting client. After the first request, the server checks to
see whether the *.jsp file has changed. If it has not changed, then the server invokes the
previously compiled servlet object. we will be discussing just how JSPs work and how to use
them. Figure 1.2 shows these steps graphically

Note
A key thing to remember about JSPs is that they are just servlets that are created from a
combination of HTML text and Java source code. This means that they contain all the
functionality of a normal servlet.
JAVA SERVER PAGE

Java Server Pages (JSPs) are similar to HTML files, but provide the ability to display dynamic
content within Web pages. JSP technology was developed by Sun Microsystems to separate
the development of dynamic Web page content from static HTML page design. The result of
this separation means that the page design can change without the need to alter the
underlying dynamic content of the page. This is useful in the development life-cycle because
the Web page designers do not have to know how to create the dynamic content, but

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 30
HOTEL MANAGEMENT SYSTEM
simply have to know where to place the dynamic content within the page. To facilitate
embedding of dynamic content, JSPs use a number of tags that enable the page designer to
insert the properties of a JavaBeans object and script elements into a JSP file. A number of
development tools, such as the Web Sphere Studio Page Designer, can be used to visually
create a page containing dynamic contents based on the properties of Java beans. Here are
some of the advantages of using JSP technology over other methods of dynamic content
creation:
❑Separation of dynamic and static content
This allows for the separation of application logic and Web page design, reducing the
complexity of Web site development and making the site easier to maintain.
❑Platform independence
Because JSP technology is Java-based, it is platform independent. JSPs can run on any nearly
any Web application server. JSPs can be developed on any platform and viewed by any
browser because the output of a compiled JSP page is HTML.
❑ Component reuse
Using JavaBeans and Enterprise JavaBeans, JSPs leverage the internet reusability offered by
these technologies. This enables developers to share components with other developers or
their client community, which can speed up Web site development.
❑ Scripting and tags
JSPs support both embedded JavaScript and tags. JavaScript is typically used to add page-
level functionality to the JSP. Tags provide an easy way to embed and modify Java Bean
properties and to specify other directives and actions we use the JSP 1.0 specification;
however, Web Sphere Application Server 3.02 and Visual Age for Java 3.02 support both JSP
1.0 and JSP 0.91 specifications. At the time of writing, the JSP 1.1 Specification - Final
Release was available
How Java Server Pages work

Java Server Pages are made operable by having their contents (HTML tags, JSP tags
and scripts) translated into a servlet by the application server. This process is responsible for
translating both the dynamic and static elements declared within the JSP file into Java
servlet code that delivers the translated contents through the Web server output stream to
the browser. Because JSPs are server-side technology, the processing of both the static and
Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .
Roll No :- 0901204, 0901157, 0901105, 0801407 Page 31
HOTEL MANAGEMENT SYSTEM
dynamic elements of the page occurs in the server. The architecture of a JSP/servlet-
enabled Web site is often referred to as thin-client because most of the business logic is
executed on the server. The following process outlines the tasks performed on a JSP file on
the first invocation of the file or when the underlying JSP file is changed by the developer :
❑The Web browser makes a request to the JSP page.
❑The JSP engine parses the contents of the JSP file.
❑The JSP engine creates temporary servlet source code based on the contents of the JSP.
The generated servlet is responsible for rendering the static elements of the JSP specified at
design time in addition to creating the dynamic elements of the page.
❑The servlet source code is compiled by the Java compiler into a servlet class file.
❑The servlet is instantiated. The init and service methods of the servlet are called, and the
servlet logic is executed.
❑The combination of static HTML and graphics combined with the dynamic elements
specified in the original JSP page definition are sent to the Web browser through the output
stream of the servlet’s response object.

Subsequent invocations of the JSP file will simply invoke the service method of the servlet
created by the above process to serve the content to the Web browser. The servlet
produced as a result of the above process remains in service until the application server is
stopped, the servlet is manually unloaded, or a change is made to the underlying file,
causing recompilation.

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 32
HOTEL MANAGEMENT SYSTEM
In the source code examples provided with this book, we have included the compiled
JSP source for the DateDisplay.jsp in the file _DateDisplay_xjsp.java. This code is useful in
understanding the relationship between JSPs and servlets and to help you understand the
role of the JSP engine in converting a JSP to a servlet.

Components of JavaServer Pages


Java Server Pages are composed of standard HTML tags and JSP tags. The available
JSP tags defined in the JSP 1.0 specification are categorized as follows:
❑Directives
❑Declarations
❑Scriptlets
❑Comments
❑Expressions
This section describes each of these categories in more detail.
Directives
Directives are JSP elements that provide global information about an entire JSP page. An
example would be a directive that indicated the language to be used in compiling a JSP
page. The syntax of a directive is as follows:
<%@ directive {attribute="value"} %>
This states that, for this page directive, assign these values for these attributes. A directive
can contain n number of optional attribute/value pairs. If we use our previous example for
indicating the JSP language, the following line of code would indicate that the JSP language
to use would be Java:
<%@ page language="java" %>
There are three possible directives currently defined by the JSP specification: page, include,
and taglib. Each one of these directives and their attributes, if applicable, are defined in the
following sections.
The page Directive
The page directive defines information that will be globally available for that Java Server
Page. These
Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .
Roll No :- 0901204, 0901157, 0901105, 0801407 Page 33
HOTEL MANAGEMENT SYSTEM
Page level settings will directly affect the compilation of the JSP. Table 1.1 defines the
attributes for the Page directive.
Note Because the mandatory attributes are defaulted, you are not required to specify any
Page directives.
Table 1.1: The Attributes for the page Directive

The include Directive

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 34
HOTEL MANAGEMENT SYSTEM
The include directive is used to insert text and code at JSP translation time. The
syntax of the include directive is as follows:
<%@ include file="relativeURLspec" %>
The file that the file attributes points to can reference a normal text HTML file or it can
reference a JSP file, which will be evaluated at translation time.
Note Currently the JSP 1.1 specification does not have a defined method for notifying the
JSP engine that the included JSP file has changed.
The taglib Directive
The most recent version of the JSP specification defines a mechanism for extending
the current set of JSP tags. It does this by creating a custom set of tags called a tag library.
That is what the taglib points to. The taglib directive declares that the page uses custom
tags, uniquely names the tag library defining them, and associates a tag prefix that will
distinguish usage of those tags. The syntax of the taglib directive is as follows:
<%@ taglib uri="tagLibraryURI" prefix="tagPrefix" %>
The taglib attributes are described in Table 1.2.
Table 1.2: The Attributes for the taglib Directive

Actions
Actions provide an abstraction that can be used to easily encapsulate common tasks. They
typically create or act on objects, normally JavaBeans. The JSP technology provides some
standard actions. These actions are defined in the following sections.
<jsp:useBean>
The <jsp:useBean> action associates an instance of a Java Bean defined with a given scope
and ID, via a newly declared scripting variable of the same ID.
<jsp:setProperty>
The <jsp:setProperty> action sets the value of a bean's property.
<jsp:getProperty>
The <jsp:getProperty> action takes the value of the referenced bean instance's property,
converts it to a java.lang.String, and places it into the implicit out object.
<jsp:include>
Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .
Roll No :- 0901204, 0901157, 0901105, 0801407 Page 35
HOTEL MANAGEMENT SYSTEM
The <jsp:include> action provides a mechanism for including additional static and dynamic
resources in the current JSP page. The syntax for this action is as follows:
<jsp:include page="urlSpec" flush="true" />
and
<jsp:include page="urlSpec" flush="true">
{ jsp:param ... /> }
</jsp:include>
The first syntax example illustrates a request-time inclusion, whereas the second contains a
list of param sub-elements that are used to argue the request for the purpose of inclusion.
Table 1.3 contains the attributes and their descriptions for the <jsp:include> action.
Table 1.3: The Attributes for the <jsp:include> Action

<jsp:forward>
The <jsp:forward> action enables the JSP engine to dispatch, at runtime, the current request
to a static resource, servlet, or another JSP. The appearance of this action effectively
terminates the execution of the current page.
Note A <jsp:forward> action can contain <jsp:param> sub-attributes. These sub attributes
provide values for parameters in the request to be used for forwarding.
The syntax of the <jsp:forward> action is as follows:
<jsp:forward page="relativeURLspec" />
and
<jsp:forward page=relativeURLspec">
{ <jsp:param .../> }
</jsp:forward>
Table 1.4 contains the single attribute and its descriptions for the <jsp:forward> action.
Table 1.4: The Attribute for the <jsp:forward> Action

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 36
HOTEL MANAGEMENT SYSTEM

<jsp:param>
The <jsp:param> action is used to provide tag/value pairs of information, by including them
as subattributes of the <jsp:include>, <jsp:forward>, and the <jsp:plugin> actions. The syntax
of the <jsp:param> action is as follows:
<jsp:params>
<jsp:param name="paramName"
value="paramValue">
</jsp:params>
Table 1.5 contains the attributes and their descriptions for the <jsp:param> action.
Table 1.5: The Attributes for the <jsp:param> Action

<jsp:param>
The <jsp:param> action is used to provide tag/value pairs of information, by including them
as subattributes of the <jsp:include>, <jsp:forward>, and the <jsp:plugin> actions. The syntax
of the <jsp:param> action is as follows:
<jsp:params>
<jsp:param name="paramName"
value="paramValue">
</jsp:params>
Table 1.5 contains the attributes and their descriptions for the <jsp:param> action.
Table 1.5: The Attributes for the <jsp:param> Action
Attribute Definition
name This attribute represents the name of the parameter being
referenced.
Value This attribute represents the value of the named parameter.

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 37
HOTEL MANAGEMENT SYSTEM

<jsp:plugin>
The <jsp:plugin> action gives a JSP author the ability to generate HTML that contains the
appropriate client-browser–dependent constructs, for example, OBJECT or EMBED, that will
result in the download of a Java plug-in and subsequent execution of the specified applet or
JavaBeans component.
The <jsp:plugin> tag is replaced by either an <object> or <embed> tag, as appropriate for
the
Requesting user agent and the new tag is written to the output stream of the response
object. The attributes of the <jsp:plugin> action provide configuration data for the
presentation of the element. The syntax of the <jsp:plugin> action is as follows:
<jsp:plugin type="pluginType"
code="classFile"
Codebase="relativeURLpath">
<jsp:params>
...
</jsp:params>
</jsp:plugin>
Table 1.6 contains the attributes and their descriptions for the <jsp:plugin> action.
Table 1.6: The Attributes for the <jsp:plugin> Action

Implicit Objects
As a JSP author, you have access to certain implicit objects that are available for use in JSP
documents, without being declared first. To satisfy the JSP specification, all JSP scripting
languages must provide access to the objects defined in Table 1.7. Each of these implicit
objects has a class or interface type defined in a core Java Development Kit (JDK) or Java
Servlet Development Kit (JSDK).

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 38
HOTEL MANAGEMENT SYSTEM
Table 1.7: The JSP Implicit Objects

JSP Scripting
JSP scripting is a mechanism for embedding code fragments directly into an HTML
page. There are three scripting language elements involved in JSP scripting. Each of these
JSP scripting elements has its appropriate location in the generated servlet. In this section
we will look at these elements and how together they will result in a complete servlet.
Declarations
JSP declarations are used to declare variables and methods in the scripting language used in
a JSP page. A JSP declaration should be a complete declarative statement. JSP declarations
are initialized when the JSP page is initialized. After the declarations have been initialized,
they are available to other declarations, expressions, and scriptlets. The syntax for a JSP
declaration is as follows:
<%! Declaration %>
A sample variable declaration using this syntax is declared here:
<%! String name = new String ("BOB"); %>
A sample method declaration using the same syntax is declared as follows:
Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .
Roll No :- 0901204, 0901157, 0901105, 0801407 Page 39
HOTEL MANAGEMENT SYSTEM
<%!public String getName() { return name; } %>
To get a better understanding of declarations, let's take the previous String declaration and
actually use it to create a JSP document. The sample document would look similar to the
following code snippet:
<HTML>
<BODY>
<%! String name = new String ("BOB"); %>
</BODY>
</HTML>
When this document is initially requested, the JSP code is converted to servlet code and the
previous declaration is placed in the declaration section of the generated servlet. The
declarations section of the generated servlet would look similar to the following code
snippet:
// begin [file="D:\\Declarations.jsp";from=(3,3);to=(3,37)]
String name = new String ("BOB");
// end
Expressions

JSP expressions are elements in a scripting language that are evaluated with the result being
converted to a java.lang.String. After the string is converted, it is written to the current out
JSP Writer object. JSP expressions are evaluated at HTTP request-time, with the resulting
String being inserted at the expression's referenced position in the .jsp file. If the resulting
expression cannot be converted to a String, then a translation time error will occur. If the
conversion to a String cannot be detected during translation, a Class Cast Exception will be
thrown at request-time. The syntax of a JSP expression is as follows:
<%= expression %>
A code snippet containing a JSP expression is shown here:
Hello <B><%= getName() %></B>
To get a better understanding of expressions, let's take this snippet and insert it into a
simple JSP document. The sample document would look similar to the following code
snippet:
<HTML>
Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .
Roll No :- 0901204, 0901157, 0901105, 0801407 Page 40
HOTEL MANAGEMENT SYSTEM
<BODY>
<%! String name = new String("BOB"); %>
<%! public String getName() { return name; } %>
- 15 -
Hello <B><%= getName() %></B>
</BODY>
</HTML>
When this document is initially requested, the JSP code is converted to servlet code and the
previous expression is resolved and placed in its referenced location of the generated
servlet's _jspService() method. The generated servlet would look similar to the following
code snippet:
// begin
out.write("<HTML>\r\n<BODY>\r\n\r\n");
// end
// begin
out.write("\r\n");
// end
// begin
out.write("\r\n\r\nHello <B>");
// end
// begin [file="D:\\Expressions.jsp";from=(6,12);to=(6,23)]
out.print( getName() );
// end
// begin
out.write("</B>\r\n\r\n</BODY>\r\n</HTML>\r\n");
// end
Scriptlets
Scriptlets are what bring all the scripting elements together. They can contain any coding
statements that are valid for the language referenced in the language directive. They are
executed at request-time and they can make use of declarations, expressions, and
JavaBeans. The syntax for a scriptlet is as follows:

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 41
HOTEL MANAGEMENT SYSTEM
<% scriptlet source %>
During the initial request the JSP scripting code is converted to servlet code and then
compiled and loaded into resident memory. The actual source code, which is found
between scriptlet tags <% ... %>, is placed into the newly created servlet's _jspService()
method. See the following sample JSP source:
<HTML>
<BODY>
<% out.println("HELLO JSP WORLD"); %>
</BODY>
</HTML>
It has a very simple scriptlet section that will print HELLO JSP WORLD to the JspWriter
implicit object out

Web Server Apache Tomcat

Tomcat is the official reference implementation of the Java Servlet and JavaServer Pages
technologies. Developed under the Apache license in an open and participatory
environment, it is intended to be a collaboration of the best-of-breed developers from
around the world.

Using Tomcat 5.5


A lot of effort has been put into making Tomcat easy to use as well as flexible. It comes with
a default configuration which should be a good starting point for most users. Once you have
Tomcat 5.5 up and running, there are many customizations from which you can choose.
To help identify which version of Tomcat you have, a "version" name has been incorporated
in a number of places. It is in the name of the binary and source archives as well as the
directory to which the archives expand. <version> will appear in the text below where this
"version" name appears. The version will be "5.5" for the initial Tomcat 5.5 release, and
"5.5.x" for subsequent maintenance releases.

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 42
HOTEL MANAGEMENT SYSTEM

Installing Tomcat

Windows

Installing Tomcat on Windows can be done easily using the Windows installer. Its interface
and functionality is similar to other wizard based installers, with only a few items of
interest.

 Installation as a service: Tomcat will be installed as a Windows NT/2k/XP service no


matter what setting is selected. Using the checkbox on the component page sets the
service as "auto" startup, so that Tomcat is automatically started when Windows
starts. For optimal security, the service should be run as a separate user, with
reduced permissions (see the Windows Services administration tool and its
documentation).
 Java location: The installer will use the registry or the JAVA_HOME environment
variable to determine the base path of a J2SE 5 JRE.
 Tray icon: When Tomcat is run as a service, there will not be any tray icon present
when Tomcat is running. Note that when choosing to run Tomcat at the end of
installation, the tray icon will be used even if Tomcat was installed as a service.
 Refer to the Windows Service HOW-TO for information on how to manage Tomcat
as Windows NT service.

The installer will create shortcuts allowing starting and configuring Tomcat. It is important
to note that the Tomcat administration web application can only be used when Tomcat is
running.

If using a J2SE 1.4 JRE, the compatibility package must be downloaded and expanded inside
the folder where Tomcat was installed.

Unix daemon
Tomcat can be run as a daemon using the jsvc tool from the commons-daemon project.
Source tarballs for jsvc are included with the Tomcat binaries, and need to be compiled.
Building jsvc requires a C ANSI compiler (such as GCC), GNU Autoconf, and a JDK.

Before running the script, the JAVA_HOME environment variable should be set to the base
path of the JDK. Alternately, when calling the ./configure script, the path of the JDK may be
specified using the --with-java parameter, such as ./configure --with-java=/usr/java.

Using the following commands should result in a compiled jsvc binary, located in
the $CATALINA_HOME/bin folder. This assumes that GNU TAR is used, and

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 43
HOTEL MANAGEMENT SYSTEM

thatCATALINA_HOME is an environment variable pointing to the base path of the Tomcat


installation.

Please note that you should use the GNU make (gmake) instead of the native BSD make on
FreeBSD systems.

cd $CATALINA_HOME/bin
tar xvfz jsvc.tar.gz
cd jsvc-src
autoconf
./configure
make
cp jsvc ..
cd ..

Tomcat can then be run as a daemon using the following commands.

cd $CATALINA_HOME
./bin/jsvc -Djava.endorsed.dirs=./common/endorsed -cp ./bin/bootstrap.jar \
-outfile ./logs/catalina.out -errfile ./logs/catalina.err \
org.apache.catalina.startup.Bootstrap

jsvc has other useful parameters, such as -user which causes it to switch to another user
after the daemon initialization is complete. This allows, for example, running Tomcat as a
non privileged user while still being able to use privileged ports. jsvc --help will return the
full jsvc usage information. In particular, the -debug option is useful to debug issues running
jsvc.

The file $CATALINA_HOME/bin/jsvc/native/tomcat.sh can be used as a template for starting


Tomcat automatically at boot time from /etc/init.d. The file is currently setup for running
Tomcat 4.1.x, so it is necessary to edit it and change the classname
from BootstrapService to Bootstrap.

Note that the Commons-Daemon JAR file must be on your runtime classpath to run Tomcat
in this manner. The Commons-Daemon JAR file is in the Class-Path entry of the
bootstrap.jar manifest, but if you get a ClassNotFoundException or a NoClassDefFoundError
for a Commons-Daemon class, add the Commons-Daemon JAR to the -cp argument when
launching jsvc.

Starting Tomcat

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 44
HOTEL MANAGEMENT SYSTEM
There are several different ways to start tomcat, including:
From the command line.
From a Java program as an embedded server.
Automatically as a Windows service.

Stopping Tomcat

To perform a normal shutdown of Tomcat 5.5, a special "shutdown" request must be send
from a separate process, or possibly a different computer. In the default configuration, that
"shutdown" request must be made using the Ajp12 protocol. If the shell or MS-DOS window
used to start Tomcat is not still open, first open a new one and set the environment the
same as for starting Tomcat.
To stop Tomcat 5.5, execute:
 On UNIX: bin/shutdown
 On Win32: bin\shutdown

The shutdown process incorporates a host, port, and a password. In the default
configuration, the host defaults to localhost. This means that Tomcat 5.5 can only be
shutdown from the same computer that started it. The port automatically defaults to the
port being used by the Ajp12 protocol. The password defaults to "not specified". This means
that a password will not be required to shutdown Tomcat 5.5

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 45
HOTEL MANAGEMENT SYSTEM

The Relationship of C,C++,C#&Java

When the chronicle of computer languages is written, the following will be said: B
led to C, C evolved into C++, and C++ set the stage for Java. To understand Java is to
understand the reasons that drove its creation, the forces that shaped it, and the legacy that
it inherits. Like the successful computer languages that came before, Java is a blend of the
best elements of its rich heritage combined with the innovative concepts required by its
unique environment. Although Java has become inseparably linked with the online
environment of the +Internet, it is important to remember that Java is first and foremost a
programming language. Computer language innovation and development occurs for two
fundamental reasons:
■ To adapt to changing environments and uses.
■ To implement refinements and improvements in the art of programming.
As you will see, the creation of Java was driven by both elements in nearly equal
measure. Java’s Lineage Java is related to C++, which is a direct descendent of C. Much of
the character of Java is inherited from these two languages. From C, Java derives its syntax.
Many of Java’s object-oriented features were influenced by C++. In fact, several of Java’s
defining characteristics come from—or are responses to—its predecessors. Moreover, the
creation of Java was deeply rooted in the process of refinement and adaptation that has
been occurring in computer programming languages for the past three decades. For these
reasons, this section reviews the sequence of events and forces that led up to Java. As you
will see, each innovation in language design was driven by the need to solve a fundamental
problem that the preceding languages could not solve. Java is no exception.
The Birth of Modern Programming: C the C language shook the computer world. Its impact
should not be underestimated, because it fundamentally changed the way programming
was approached and thought about. The creation of C was a direct result of the need for a
structured, efficient, high level language that could replace assembly code when creating
systems programs. As you probably know, when a computer language is designed, trade-offs
are often made, such as the following:
■ Ease-of-use various power.

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 46
HOTEL MANAGEMENT SYSTEM
■ Safety versus efficiency
■ Rigidity versus extensibility
Prior to C, programmers usually had to choose between languages that optimized one set of
traits or the other. For example, although FORTRAN could be used to write fairly efficient
programs for scientific applications, it was not very good for systems code. And while BASIC
was easy to learn, it wasn’t very powerful, and its lack of structure made its usefulness
questionable for large programs. Assembly language can be used to produce highly efficient
programs, but it is not easy to learn or use effectively. Further, debugging assembly code
can be quite difficult. Another compounding problem was that early computer languages
such as BASIC, COBOL, and FORTRAN were not designed around structured principles.
Instead, they relied upon the GOTO as a primary means of program control. As a result,
programs written using these languages tended to produce “spaghetti code”—a mass of
tangled jumps and conditional branches that make a program virtually impossible to
understand. While languages like Pascal are structured, they were not designed for
efficiency, and failed to include certain features necessary to make them applicable to a
wide range of programs. (Specifically, given the standard dialects of Pascal available at the
time, it was not practical to consider using Pascal for systems-level code.) So, just prior to
the invention of C, no one language had reconciled the conflicting attributes that had
dogged earlier efforts. Yet the need for such a language was pressing. By the early 1970s,
the computer revolution was beginning to take hold, and the demand for software was
rapidly outpacing programmers’ ability to produce it. A great deal of effort was being
expended in academic circles in an attempt to create a better computer language. But, and
perhaps most importantly, a secondary force was beginning to be felt.
Computer hardware was finally becoming common enough that a critical mass was
being reached. No longer were computers kept behind locked doors. For the first time,
programmers were gaining virtually unlimited access to their machines. This allowed the
freedom to experiment. It also allowed programmers to begin to create their own tools. On
the eve of C’s creation, the stage was set for a quantum leap forward in computer
languages. Invented and first implemented by Dennis Ritchie on a DEC PDP-11 running the
UNIX operating system, C was the result of a development process that started with an
older language called BCPL, developed by Martin Richards. BCPL influenced a language

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 47
HOTEL MANAGEMENT SYSTEM
called B, invented by Ken Thompson, which led to the development of C in the 1970s. For
many years, the de facto standard for C was the one supplied with the UNIX operating
system and described in The C Programming Language by Brian Kernighan and Dennis
Ritchie (Prentice-Hall, 1978). C was formally standardized in December 1989, when the
American National Standards Institute (ANSI) standard for C was adopted.
The creation of C is considered by many to have marked the beginning of the
modern age of computer languages. It successfully synthesized the conflicting attributes
that had so troubled earlier languages. The result was a powerful, efficient, structured
language that was relatively easy to learn. It also included one other, nearly intangible
aspect: it was a programmer’s language. Prior to the invention of C, computer languages
were generally designed either as academic exercises or by bureaucratic committees. C is
different. It was designed, implemented, and developed by real, working programmers,
reflecting the way that they approached the job of programming.
Its features were honed, tested, thought about, and rethought by the people who
actually used the language. The result was a language that programmers liked to use.
Indeed, C quickly attracted many followers who had a near-religious zeal for it. As such, it
found wide and rapid acceptance in the programmer community. In short, C is a language
designed by and for programmers. As you will see, Java has inherited this legacy. The Need
for C++ During the late 1970s and early 1980s, C became the dominant computer
programming language, and it is still widely used today. Since C is a successful and useful
language, you might ask why a need for something else existed. The answer is complexity.
Throughout the history of programming, the increasing complexity of programs has driven
the need for better ways to manage that complexity. C++ is a response to that need. To
better understand why managing program complexity is fundamental to the creation of C++,
consider the following. Approaches to programming have changed dramatically since the
invention of the computer. For example, when computers were first invented, programming
was done by manually toggling in the binary machine instructions by use of the front panel.
As long as programs were just a few hundred instructions long, this approach worked.
As programs grew, assembly language was invented so that a programmer could
deal with larger, increasingly complex programs by using symbolic representations of the
machine instructions. As programs continued to grow, high-level languages were introduced

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 48
HOTEL MANAGEMENT SYSTEM
that gave the programmer more tools with which to handle complexity. The first
widespread language was, of course, FORTRAN. While FORTRAN was an impressive first
step, it is hardly a language that encourages clear and easy-understanding programs. The
1960s gave birth to structured programming. This is the method of programming
championed by languages such as C. The use of structured languages enabled programmers
to write, for the first time, moderately complex programs fairly easily. However, even with
structured programming methods, once a project reaches a certain size, its complexity
exceeds what a programmer can manage. By the early 1980s, many projects were pushing
the structured approach past its limits. To solve this problem, a new way to program was
invented, called object-oriented programming (OOP). Object-oriented programming is
discussed in detail later in this book, but here is a brief definition: OOP is a programming
methodology that helps organize complex programs through the use of inheritance,
encapsulation, and polymorphism. In the final analysis, although C is one of the world’s
great programming languages, there is a limit to its ability to handle complexity. Once a
program exceeds somewhere between 25,000 and 100,000 lines of code, it becomes so
complex that it is difficult to grasp as a totality. C++ allows this barrier to be broken, and
helps the programmer comprehend and manage larger program.
C++ was invented by Bjarne Stroustrup in 1979, while he was working at Bell
Laboratories in Murray Hill, New Jersey. Stroustrup initially called the new language “C with
Classes.” However, in 1983, the name was changed to C++. C++ extends C by adding object-
oriented features. Because C++ is built upon the foundation of C, it includes all of C’s
features, attributes, and benefits. This is a crucial reason for the success of C++ as a
language. The invention of C++ was not an attempt to create a completely new
programming language. Instead, it was an enhancement to an already highly successful one.
The Stage Is Set for Java By the end of the 1980s and the early 1990s, object-oriented
programming using C++ took hold. Indeed, for a brief moment it seemed as if programmers
had finally found the perfect language. Because C++ blended the high efficiency and stylistic
elements of C with the object-oriented paradigm, it was a language that could be used to
create a wide range of programs. However, just as in the past, forces were brewing that
would, once again, drive computer language evolution forward. Within a few years, the

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 49
HOTEL MANAGEMENT SYSTEM
World Wide Web and the internet would reach critical mass. This event would precipitate
another revolution in programming.
The Creation of Java was conceived by James Gosling, Patrick Naughton, Chris Warth,
Ed Frank, and Mike Sheridan at Sun Microsystems, Inc. in 1991. It took 18 months to
develop the first working version. This language was initially called “Oak” but was renamed
Java”in1995. Between the initial implementation of Oak in the fall of 1992 and the public
announcement of Java in the spring of 1995, many more people contributed to the design
and evolution of the language. Bill Joy, Arthur van Hoff, Jonathan Payne, Frank Yellin, and
Tim Lindholm were key contributors to the maturing of the original prototype. Somewhat
surprisingly, the original impetus for Java was not the Internet! Instead, the primary
motivation was the need for a platform-independent (that is, architecture neutral) language
that could be used to create software to be embedded in various consumer electronic
devices, such as microwave ovens and remote controls. As you can probably guess, many
different types of CPUs are used as controllers. The trouble with C and C++ (and most other
languages) is that they are designed to be compiled for a specific target. Although it is
possible to compile a C++ program for just about any type of CPU, to do so requires a full C+
+ compiler targeted for that CPU. The problem is that compilers are expensive and time-
consuming to create. An easier— and more cost-efficient—solution was needed. In an
attempt to find such a solution, Gosling and others began work on a portable, platform-
independent language that could be used to produce code that would run on a variety of
CPUs under differing environments.
This effort ultimately led to the creation of Java. About the time that the details of
Java were being worked out, a second, and ultimately more important, factor was emerging
that would play a crucial role in the future of Java. This second force was, of course, the
World Wide Web. Had the Web not taken shape at about the same time that Java was being
implemented, Java might have remained a useful but obscure language for programming
consumer electronics. However, with the emergence of the World Wide Web, Java was
propelled to the forefront of computer language design, because the Web, too, demanded
portable programs. Most programmers learn early in their careers that portable programs
are as elusive as they are desirable. While the quest for a way to create efficient, portable
(platform-independent) programs is nearly as old as the discipline of programming itself, it

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 50
HOTEL MANAGEMENT SYSTEM
had taken a back seat to other, more pressing problems. Further, because much of the
computer world had divided itself into the three competing camps of Intel, Macintosh, and
UNIX, most programmers stayed within their fortified boundaries, and the urgent need for
portable code was reduced. However, with the advent of the Internet and the Web, the old
problem of portability returned with a vengeance. After all, the Internet consists of a
diverse, distributed universe populated with many types of computers, operating systems,
and CPUs. Even though many types of platforms are attached to the Internet, users would
like them all to be able to run the same program. What was once an irritating but low-
priority problem had become a high-profile necessity.
By 1993, it became obvious to members of the Java design team that the problems
of portability frequently encountered when creating code for embedded controllers are also
found when attempting to create code for the Internet. In fact, the same problem that Java
was initially designed to solve on a small scale could also be applied to the Internet on a
large scale. This realization caused the focus of Java to switch from consumer electronics to
Internet programming. So, while the desire for an architecture neutral programming
language provided the initial spark, the Internet ultimately led to Java’s large-scale success.
As mentioned earlier, Java derives much of its character from C and C++. This is by intent.
The Java designers knew that using the familiar syntax of C and echoing the object-oriented
features of C++ would make their language appealing to the legions of experienced C/C++
programmers. In addition to the surface similarities, Java shares some of the other
attributes that helped make C and C++ successful. First, Java was designed, tested, and
refined by real, working programmers. It is a language grounded in the needs and
experiences of the people who devised it. Thus, Java is also a programmer’s language.
Second, Java is cohesive and logically consistent.
Third, except for those constraints imposed by the Internet environment, Java gives
you, the programmer, and full control. If you program well, your programs reflect it. If you
program poorly, your programs reflect that, too. Put differently, Java is not a language with
training wheels. It is a language for professional programmers. Because of the similarities
between Java and C++, it is tempting to think of Java as simply the “Internet version of C++.”
However, to do so would be a large mistake. Java has significant practical and philosophical
differences. While it is true that Java was influenced by C++, it is not an enhanced version of

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 51
HOTEL MANAGEMENT SYSTEM
C++. For example, Java is neither upwardly nor downwardly compatible with C++. Of course,
the similarities with C++ are significant, and if you are a C++ programmer, then you will feel
right at home with Java. One other point: Java was not designed to replace C++. Java was
designed to solve a certain set of problems. C++ was designed to solve a different set of
problems. Both will coexist for many years to come. As mentioned at the start of this
chapter, computer languages evolve for two reasons: to adapt to changes in environment
and to implement advances in the art of programming. The environmental change that
prompted Java was the need for platform-independent programs destined for distribution
on the Internet. However, Java also embodies changes in the way that people approach the
writing of programs. Specifically, Java enhances and refines the object-oriented paradigm
used by C++. Thus, Java is not a language that exists in isolation. Rather, it is part of an
ongoing process begun many years ago. This fact alone is enough to ensure Java a place in
computer language history. Java is to Internet programming what C was to systems
programming: a revolutionary force that changed the world. The C# Connection the reach
and power of Java continues to be felt in the world of computer language development.
Many of its innovative features, constructs, and concepts have become part of the baseline
for any new language. The success of Java is simply too important to ignore. Perhaps the
most important example of Java’s influence is C#. Recently created by Microsoft to support
the .NET Framework, C# is closely related to Java. For example, both share the same general
C++-style syntax, support distributed programming, and utilize the same object model.
There are, of course, differences between Java and C#, but the overall “look and feel” of
these languages is very similar. This “cross-pollination” from Java to C# is the strongest
testimonial to date that Java redefined the way we think about and use a computer
language. Why Java Is Important to the Internet. The Internet helped catapult Java to the
fore front of programming, and Java, in turn, has had a profound effect on the Internet. The
reason for this is quite simple: Java expands the universe of objects that can move about
freely in cyberspace. In a network, two very broad categories of objects are transmitted
between the server and your personal computer: passive information and dynamic, active
programs. For example, when you read your e-mail, you are viewing passive data. Even
when you download a program, the program’s code is still only passive data until you
execute it. However, a second type of object can be transmitted to your computer: a

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 52
HOTEL MANAGEMENT SYSTEM
dynamic, self-executing program. Such a program is an active agent on the client computer,
yet is initiated by the server. For example, a program might be provided by the server to
display properly the data that the server is sending. As desirable as dynamic, networked
programs are, they also present serious problems in the areas of security and portability.
Prior to Java, cyberspace was effectively closed to half the entities that now live there. As
you will see, Java addresses those concerns and, by doing so, has opened the door to an
exciting new form of program: the applet. THE JAVA LANGUA

System Analysis
S o ft w a r e R e q u i r e m e n t S p e c i fi c a ti o n
System requirement shows the hardware and software requirement, which is
necessary for developing the software. Necessary software and hardware requirement,
which are necessary for making this software are as follows:
1 .Software Requirement:
Software requirement for developing this project is as follows:
2. Java technology.
3. Microsoft -Access 98 or higher version.
4. Windows XP or higher version.
2. Hardware Requirement:
Hardware requirement for developing this project is as follows:
1. IntelP4 Corei3 Processor
2. 32 MB RAM or higher

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 53
HOTEL MANAGEMENT SYSTEM
3. 1.2 GB Hard Disk or greater.
4. Video Display Unit.
5. Keyboard.
6. Mouse.
7. One Printer for printing the electricity bill.

ARCHITECTURAL DESIGN:
SDLC of the Project
SDLC( System Development Life Cycle):
System development life cycle is a sequence of events carried out by analyst, designers
and users to develop and important an information system. Activities are carried out in
different stages. The phases are as follows:
1. Preliminary Investigation (Feasibility Study)
2. Determination Of System Requirement
3. Design Of The System
4. Development Of Software
5. System Testing
6. System Implementation
7. System Maintenance
1. Preliminary Investigation (Feasibility Study):
An important outcome of this preliminary investigation is determining whether the
System requested is feasible or not. The major Purpose of this study is listed below:
 Identify the responsible users and develop an initial scope of the system.
 Identify current deficiencies in the user’s environment determine objectives for the
new system.
Determine whether it is feasible to automate the system and if so suggest some acceptable
options:
The three major areas to consider while determining the feasibility of a project are:
 Technical Feasibility
 Economical Feasibility
 Operational Feasibility
Technical Feasibility:
Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .
Roll No :- 0901204, 0901157, 0901105, 0801407 Page 54
HOTEL MANAGEMENT SYSTEM
The Analyst finds out whether current technical resources, which are available in the
organization, are capable of handling user requirements.
Economical Feasibility:
Economical or financial feasibility is second part of resource determination. Basic
resources to consider are:
 Management time
 Time spent by system analysis team
 Cost of doing the full system study
 Estimated cost of hardware
 Estimated cost of software
 Detailed investigation
 Analysis or determination of system requirement
Operational Feasibility:
Operational feasibility is dependent upon determining human resources for the
project. It refers to projecting whether the system will operate and be used once it is
installed. The document to be produced at the end of this activity is called “FEASIBILITY
STUDY REPORT”.

2. Determination Of Requirements (Analysis)


Determination of system requirement involves studying the current business system
in Great detail to find out how it works and where improvements have to be made.
This activity is carried out in two phases:
 Requirement Analysis Detailed investigation.
The heart of the system analysis is aimed at having a detailed understanding of all-
important facts of the project under consideration. Analyst working closely with employees
and managers must be able to answer the following key question:
 What is being done by the current system?
 How is being done?
 How frequently does it occur?

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 55
HOTEL MANAGEMENT SYSTEM
 How big is the volume of transactions or decisions?
 How well is the task being performed?
 Does a problem exist?
 If problem exists, how serious is it?
 If a problem exists, what is the underlying cause?
 To answer the above question system analyst talks to a variety of people to gather
details about the project.
Questionnaires are used to collect this information from large groups of people who
can’t be interviewed individually. Detailed investigations also require the study of
Manual and reports, actual observation of work activities and collection of existing
Forms and document to fully understand the project.
 Analysis or determination of system requirement
It is during this phase that the analyst and the user come to an agreement on what
Functions the proposed system has to perform. A detailed document has to prepare by
system analyst containing the following:
 Inputs that must be received by the syInputs that must be received by the system
Inputs that must be received by the syThe outputs to be produced by the system
Inputs that must be received by the syThe data to be retained
Inputs that must be received by the syThe procedures to get the output from the given inputs
Inputs that must be received by the syAudit and control requirements
Inputs that must be received by the sySystem acceptance criteria
This detailed document is called functional specification or proposed procedures.
3. Design Of The System
The design process should take care of the following:
Inputs that must be received by the syIdentification of reports and outputs the new system should produce.
Inputs that must be received by the syScrutinize the data present on each report/output .
Inputs that must be received by the sySketch the form or display as exp ected to appear at the end of completion of the
system. This may be done on paper or on a computer display using one of the automated
system design tools description of data to be input calculated or stored individual data items
and calculation procedure written in detail.
Inputs that must be received by the syThe procedures written should tell how to process the data and produce the output

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 56
HOTEL MANAGEMENT SYSTEM
The document produced at the end of this activity is called design specification
4. Development Of Software
In this stage the actual coding / writing of the program is done. Analyst –
programmers do analyst and designs well as code programs programmers are responsible
for documenting the program including comments that explain both how and why certain
procedure was coded in specific way. Programs are individually tested using some test data.
Documentation is also essential to test the programs and carry out maintenance once the
application has been installed. This activity of system development life cycle produces
tested programs.
5. System Testing
Once the programs are tested individually the system as a whole needs to tested.
During string the system is used experimentally to ensure that the software does not Fail
that it will run According to its specifications and in the way user accept it too. Special test
data is prepared as input for processing and the result are examined to locate unexpected
result.
6. System Implementation
In this stage the system analyst uses new software, which has been tested into use.
User personnel are trained and any files of data needed by the new system are constructed.
Thus new software is installed and then used.
7. System Maintenance
Once installed the software is often used for many years. However both the
organization and user change. The environment may also change over a period of time;
therefore the software has to be maintained.

DFD (Data Flow Diagram):


They are the versatile diagramming tools used for structured system analysis. They
are specifically used for process modeling which involves graphically representing the
function or process, which captures, manipulate, store, and distribute data between a
system and its environment and between components within a system.
CONTEXT DIAGRAM:

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 57
HOTEL MANAGEMENT SYSTEM
This is the start point of data flow diagramming process. It is denoted as the highest-
level diagram. It gives an overview of an organizational system that shows the system
boundaries, external entities that interact with the system and the major information flows
between the entities and the system.
DETAIL DESIGN OF PROPOSED SYSTEM:
MODULE:
There are mainly four module in our project. These are as follows:
1. Domestic bill information module.
2. Commercial bill information module.
3. Domestic customer record module.
4. Commercial customer record module.
1. Domestic Bill Information Module:
In this module, we can see information related to the domestic bill like customer’s
name, address, its customer id, service centre, his electricity bill description, which contain
bill no, bill date, total bill etc. we can also calculate total bill of the customer according to
total unit, bill charge of the bill.
2. Commercial Bill Information Module:
There is no difference between domestic bill information module and this module
except that, this module is for commercial purpose. We can see information related to the
commercial bill like customer’s name, shop no, address, its customer id, service centre his
electricity bill description, which contain bill no, bill date, total bill etc. we can also calculate
total bill of the customer according to total unit, bill charge of the bill.
3. Domestic Customer Record Module:
In this module, we can create the record related to the domestic customer like his
name, address, customer id. This module can also perform deleting a record modifying
existing record etc.

4. Commercial Customer Record Module:


In this module, we can create the record related to the customer like his name,
address, customer id. This module can also perform deleting a record, modifying existing
Record etc. We can also see the existing record by next and previous button.

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 58
HOTEL MANAGEMENT SYSTEM
Requirement Analysis
Before starting a project, the first thing which should be considered are the
requirements to be full filled by the new system can be uncovered through a proper analysis
of the existing System for its problems ; this is known as Requirement- Analysis.
Requirement Analysis is the most important part to be considered before developing any
project as we must be aware of the objectives. That we wish to achieve by making this
project. This analysis finds out the Problems faced by the user or the client and the possible
solutions to those problems. We can use some questionnaires to find out the problems faced
by the client. This system will be helping administrator for doing all the related jobs so the
analysis part include problems faced by the HR administrator and other facilities expected by
him from the new system. The manual handling of all HR function may produce numerous
types of problems, such as: Entering storing and searching of employee information manually
are time consuming and error prone process: The information may include the personal
details of an employee, past history, skills, and experiences. HRMS records the information
starting with the application submitted by a candidate and will continue adding new
information like selection, training, appraisals, project handled, and the other activities
involved. This Information is to be maintained throughout an employee’s tenure and
thereafter also –for official’s records. The manual handling of all these function will require
more time and persons for the proper functioning of the HR process. The older book keeping
method generates several other Problems when entering a new record or deleting and
updating an existing one.
The second task which is very important is the time management:
This is about the working days calculation according to the attendance record
Available. This is also about analyzing the time to work ratio for all employees. Similarly,
work load distribution is concerned with HR management and manually it is very difficult to
handle. An automated System is always required here.

Calculating salary and making salary slips of a large into employee is quite
cumbersome:
The automation of this process becomes most important as it is a periodic process; the
calculation of salary is not an easy process as it takes care of all the accounting information
of an employee, the package being received, working days, leaves, benefits program being

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 59
HOTEL MANAGEMENT SYSTEM
participated by the employee, pension plane, insurance policy, medical facilities, etc.
Handling of all this information and calculating salaries periodically every month needs an
automated system which can help the HR professionals to perform their task in an efficient
manner. To solve all these problems we can develop a HRMS which will help to automate all
the above discussed tasks associated with HR department. The Requirement Analysis can be
discussed with a much broader view but this given analysis is enough to put a basic platform
to build our new system.
Feasibility Study
Feasibility study is the phase in which the analyst checks that the candidate system is
feasible for the organization or not. This entails identification, description & evaluation of
the system. Feasibility study is done to select the best system that meets the performance
requirement. If the feasibility study is to serve as a decision document, it must answer key
questions.
1. Is there a new and better way to do the job that will benefit the user?
2. What are the costs and savings of the alternatives?
3. What is recommended?
The most successful system projects are not necessarily the biggest or most visible in the
business but rather those truly meet user’s expectations.
Feasibility considerations
Three key considerations are involved in the feasibility study. They are as follows:-
Economic Feasibility:
Economic analysis is the most frequently used method for evaluating the
effectiveness of the candidate system. We analyze the candidate system (computerized
system) is feasible as than the manual system because it saves the money, time and
manpower. It also feasible according to cost benefits analysis.

Technical Feasibility:

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 60
HOTEL MANAGEMENT SYSTEM
Technical feasibility centers around the technology used. It means the candidate
system is technically feasible i.e. it don’t have any technical fault and work properly in the
given environment. Our system is technically feasible; it is providing us required output.
Behavioral Feasibility:
Behavioral feasibility is the analysis of behavior of the candidate system. In this we
analyze that the candidate system is working properly or not. If working than it
communicating proper with the environment or not. All this matters are analyzed and a
good candidate system is prepared. Due to the change of system what is the change in
behavior of the users, this factors are also analyzed.
Request Clarification
Many requests from employees and users in organizations are not clearly stated.
Therefore, before any systems investigation can be considered, the project request must be
examined to determine precisely what the originator wants. A simple telephone call may
suffice if the requester has a clear idea but does not know how to state it. On the other hand,
the requester may merely be asking for help without knowing what is wrong or why there is a
problem. Problem clarification in this case is much more difficult. In either case, before any
further steps can be taken, the project requests must be clearly states. This phase (initial
study) involves estimating whether or not a development project is worthwhile. Problems
with the current automated or manual system are identified, as well as the benefits and costs
of an alternative system. If the benefits seem to outweigh the costs (especially when
compared with competing projects), a green signal may be given to continue the project, and
detailed plans and schedules are drafted for making the system a reality. The proposed
solution to the user’s problem may involve something between dramatic change (completely
new system) and slight change to the present system. If the present system is manual and a
computer system is proposed, the development project will probably be very large. At the
other extreme are small development project that represent slight changes to existing systems,
such as sorting information in a different way or inserting subtotals or adding new columns to
a report.
The objectives of this phase are:
 To determine the feasibility of computerization of a particular system or area of
operation.
 To define clearly the objectives, scope and limitations of the project.

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 61
HOTEL MANAGEMENT SYSTEM
 To establish a good working relationship between the user department and the data
processing (DP) department.
 To acquaint user management with the approach and method of work in systems
development.
 To estimate the resources required for system development, live running and
maintenance
 To identify the likely benefits, which should accrue from the introduction of the
system? During this phase, which should be as short as possible, the systems analyst
will be concerned with:

 1. How the present system works?


 2. The staffing levels involved their grades and duties.
 3. The volume of work: statistics on the various types of transaction, level of overtime
working, employment of casual staff, etc.
 4. Any current backlog of work and any seasonal influences on the workload.
 5. The time taken to process data through the system, delays in issuing management
reports, etc.
 6. Lists of all documents, files and reports associated with the system.
 7. Interfaces with other systems.
An initial study calls for learning as much as possible about the proposed project. At
this point in the project, rough as mates are made of the following:
 Desired outputs of the system.
 Available inputs for the system.
 Time required completing the changes.
 Feasibility of such changes.
During the preparation of the initial study, information must be gathered from many
sources. Within the organization, information is gathered from users, managers, and
system developers. Users and managers must be interviewed to find pout what they need
from the system. System developers have a wealth of knowledge of the organizations
current capabilities and operations in terms or providing inputs to the system. External
information is also critical for determining what new possibilities are offered by vendors in
terms of systems available and programs for providing specific types of output. New

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 62
HOTEL MANAGEMENT SYSTEM
technologies and developments may allow faster processing, more storage, and lower costs
than ever before. At this point in the project, it is usually very difficult and expensive to
specify system characteristics accurately. Often it is impossible to be precise without
actually doing much of the proposed work -- including extensive interviewing of users and
very detailed studying of procedures. A quick guess about the system’s characteristics is all
that is needed at this point. To develop of rough plan of the outputs of the proposed
system, brief interviews are held with the intended users. These interviews result in short
descriptions of how the outputs will be displayed or printed on video displays or printed in
reports. The inputs required to produce the required outputs must be listed and the
sources of these inputs determined. It is important to discover if new files will have to be
created or sources of information developed, or if the inputs are already gathered and
stored in the current system. A tentative, general schedule for developing the system should
be described. It is determined by the users and the developers and must take into account
the urgency of the business need and the limited scheduling resources of the developers.
Feasibility study is the phase in which the analyst checks that the candidate system is
feasible for the organization or not. This entails identification, description & evaluation of
the system. Feasibility study is done to select the best system that meets the performance
requirement. If the feasibility study is to serve as a decision document, it must answer key
questions.
1. Is there a new and better way to do the job that will benefit the user?
2. What are the costs and savings of the alternatives?
3. What is recommended?
The most successful system projects are not necessarily the biggest or most visible in the
business but rather those truly meet user’s expectations.
Feasibility considerations
Three key considerations are involved in the feasibility study. They are as follows:-
Economic Feasibility:
Economic analysis is the most frequently used method for evaluating the
effectiveness of the candidate system. We analyze the candidate system (computerized
system) is feasible as than the manual system because it saves the money, time and
manpower. It also feasible according to cost benefits analysis.

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 63
HOTEL MANAGEMENT SYSTEM

Technical Feasibility:
Technical feasibility centers on the technology used. It means the candidate system
is technically feasible i.e. it don’t have any technical fault and work properly in the given
environment. Our system is technically feasible; it is providing us required output.
Behavioral Feasibility:
Behavioral feasibility is the analysis of behavior of the candidate system. In this we
analyze that the candidate system is working properly or not. If working than it
communicating proper with the environment or not. All this matters are analyzed and a
good candidate system is prepared. Due to the change of system what is the change in
behavior of the users, this factors are also analyzed.

System Study Report:


The output from this phase is a formal report called a Feasibility Report or System
Study Report. This report may contain:
1. An introduction, which puts the report in perspective and perhaps quotes the terms of
reference.
2. The objectives for the system.
3. A commentary on how the present system achieves or fails to achieve those objectives.
4. Interfaces with other systems and the implications of these interfaces.
5. Present operating costs and conditions including organization structure and staffing
levels.
6. A first estimate of system development time and a related draft implementation
timetable.
7. A schedule of the hardware and other requirements, e.g., availability of system at
weekends.
8. Expected benefits, which will accrue from the use of a new system.
9. A cost-benefit projection
10. Conclusions and recommendations.
The study report also covers the following four areas for management:

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 64
HOTEL MANAGEMENT SYSTEM
1. Recommendations for changing the present system: After analyzing all the process
and cons of each project proposal, recommendations for changes are made.
2. Effects on operations: If it is recommended to develop or change a system, the report
must describe how the system or the changes will affect current operations.
3. Effects on personnel: The effects of the new or changes system on people’s jobs
should be carefully described. This includes everything from possible resistance to
the new technology to differences in how employees enjoy their work.
4. Details of the changes: All of the detailed information from interviews, preliminary
cost and benefit estimations, and other analyses should be included.

The report would normally be supported by working papers and flow charts: It is then up to
senior management to decide whether his system should advance to the next stage of the
systems development life cycle. Request Approval not all requested projects are desirable or
feasible. In fact, some organizations receive so many project requests from employees that
only a few of them can be pursued. However, those that are both feasible and desirable
should be put into a schedule. Inn some cases, development can start immediately. Butt in
most cases; systems staff members are busy on other on going projects. When this happens
management decides which projects are most important and schedules them. Many
business organizations develop information system plans as carefully as they plan for new
products, new manufacturing programs, or plant expansion. After a project request is
approved, its cost,, priority, completion, time, and personnel requirement are estimated as
used to determine where to add it on any existing project list. Inexpensive projects are not
necessarily approved automatically, since many projects compete for scarce resource.
Some organizations have long waiting lists (backlogs) of projects. It may take a year or two
for the information systems department to begin work on projects submitted and approved
today. Later on, when other preceding projects are completed, the proposed application
development can be launched. At this time, the collection of data and determination of
requirement begin.

SOFTWARE REQUIREMENT SPECIFICATION

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 65
HOTEL MANAGEMENT SYSTEM
SRS is a document that completely describes what the proposed software should do
without describing how the software will do it. The basic information for this is that the user
need keeps changing as environment in which the system is to change with time. This leads
to a request for requirement changes even after the requirement phase is done and the SRS
is produced. The origin of most software system is the need of a client, who either wants to
automate the existing manual system or desires a new software system. The developer
creates the software system and the end user will use the completed system. There are
three major parties interested in new system: the client, the user and the developer.
Somehow the requirements for the system that will satisfy the needs of the client and the
concerns of the users have to be communicated to the developer. The problem is that the
client usually does not understand the software and the software development process, and
developer often does not understand the client’s problem and application area. The basic
purpose of SRS is to bridge the communication gap. The SRS is the medium through which
the client and the user needs are accurately specified; indeed SRS forms the basic of the
software development. A good SRS should satisfy all the parties—sometimes very hard to
archive- and involves trade-offs and persuasions. The important purpose of developing SRS
is the helping the client understand their own needs.

ADVANTAGE OF SRS

 An SRS establishes the basis for agreement between the client and the supplier on
what the software product will do.
 An SRS provides reference for validation of the final product.

 A high quality SRS is a prerequisite to high quality software.

 A high quality SRS reduces the development cost.

CHARACTERSTICS OF AN SRS

A good SRS is

Correct
Complete
Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .
Roll No :- 0901204, 0901157, 0901105, 0801407 Page 66
HOTEL MANAGEMENT SYSTEM
Unambiguous

Verifiable
Consistent
Ranked for importance and/or stability
Modifiable
Traceable

Software Engineering Model used


The spiral model is a software development process combining elements of both
design and prototyping-in-stages, in an effort to combine advantages of top-down and
bottom-up concepts. Also known as the spiral lifecycle model, it is a systems development
method (SDM) used in information technology (IT). This model of development combines
the features of the prototyping model and the waterfall model. The spiral model is intended
for large, expensive and complicated projects. The spiral model, also known as the spiral
lifecycle model, is a systems development method (SDM) used in information technology
(IT). This model of development combines the features of the prototyping model and the
waterfall model. The spiral model is intended for large, expensive, and complicated projects.

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 67
HOTEL MANAGEMENT SYSTEM

The steps in the spiral model can be generalized as follows:


 The new system requirements are defined in as much detail as possible. This usually
involves interviewing a point of users representing all the external or internal users
and other aspects of the existing system.
 A preliminary design is created for the new system.
 A first prototype of the new system is constructed from the preliminary design. This is
usually a scaled-down system, and represents an approximation of the characteristics
of the final product.
 A second prototype is evolved by a fourfold procedure:
 evaluating the first prototype in terms of its strengths, weaknesses, and risks;
 defining the requirements of the second prototype;
 planning and designing the second prototype;
 Constructing and testing the second prototype.
At the customer's option, the entire project can be aborted if the risk is deemed too great.
Risk factors might involve development cost overruns, operating-cost miscalculation, or any
other factor that could, in the customer's judgment, result in a less-than-satisfactory final
product the existing prototype is evaluated in the same manner as was the previous
prototype, and, if necessary, another prototype is developed from it according to the

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 68
HOTEL MANAGEMENT SYSTEM
fourfold procedure outlined above. The preceding steps are iterated until the customer is
satisfied that the refined prototype represents the final product desired. The final system is
constructed, based on the refined prototype. The final system is thoroughly evaluated and
tested. Routine maintenance is carried out on a continuing basis to prevent large-scale
failures and to minimize downtime.

Applications

For a typical shrink-wrap application, the spiral model might mean that you have a
rough-cut of user elements (without the polished / pretty graphics) as an operable
application, add features in phases, and, at some point, add the final graphics.
The spiral model is used most often in large projects. For smaller projects, the
concept of agile software development is becoming a viable alternative. The US military has
adopted the spiral model for its Future Combat Systems program.
Advantages
Estimates (i.e. budget, schedule, etc.) become more realistic as work progresses,
because important issues are discovered earlier. It is more able to cope with the (nearly
inevitable) changes that software development generally entails. Software engineers (who
can get restless with protracted design processes) can get their hands in and start working
on a project earlier.
Risk Analysis
Uncertainty, which is constantly present in our daily lives, frequently impacts our
decisions and actions. When we talk about risk, we normally mean the chance that some
undesirable impact will occur. Hence, we normally seek to avoid or minimize risk. If there is
a chance of rain, and we don't want to get wet, we may choose to stay indoors -- avoiding
that risk -- or we may take an umbrella to minimize the impact of rain upon us. Uncertainty
can impact our decisions and actions in desirable as well as undesirable ways. In risk analysis
we usually focus on what can go wrong -- the outcomes that represent loss or damage --
although an effective analysis will also help us understand what can go right as well.
A risk assessment involves evaluating existing physical and environmental security
and controls, and assessing their adequacy relative to the potential threats of the
organization. A business impact analysis involves identifying the critical business functions

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 69
HOTEL MANAGEMENT SYSTEM
within the organization and determining the impact of not performing the business function
beyond the maximum acceptable outage. Types of criteria that can be used to evaluate the
impact include: customer service, internal operations, legal/statutory and financial. Our
business processes depend heavily on technology and automated systems, and their
disruption for even a few days could cause severe financial loss and threaten survival. The
continued operations of this organization depend on management’s awareness of potential
disasters, their ability to develop a plan to minimize disruptions of mission critical functions,
and the capability to recover operations expediently and successfully. The risk analysis
process provides the foundation for the entire recovery planning effort.
A primary objective of business recovery planning is to protect the organization in
the event that all or part of its operations and/or computer services is rendered unusable.
Each functional area of the organization should be analyzed to determine the potential risk
and impact related to various disaster threats. Regardless of the prevention techniques
employed, possible threats that could arise inside or outside the organization need to be
assessed. Although the exact nature of potential disasters or their resulting consequences
are difficult to determine, it is beneficial to perform a comprehensive risk assessment of all
threats that can realistically occur to the organization. Regardless of the type of threat, the
goals of business recovery planning are to ensure the safety of customers, employees and
other personnel during and following a disaster.

The risk analysis process provides the foundation for the entire recovery planning
effort. A primary objective of business recovery planning is to protect the organization in the
event that all or part of its operations and/or computer services is rendered unusable. Each

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 70
HOTEL MANAGEMENT SYSTEM
functional area of the organization should be analyzed to determine the potential risk and
impact related to various disaster threats. Regardless of the prevention techniques
employed, possible threats that could arise inside or outside the organization need to be
assessed. Although the exact nature of potential disasters or their resulting consequences
are difficult to determine, it is beneficial to perform a comprehensive risk assessment of all
threats that can realistically occur to the organization. Regardless of the type of threat, the
goals of business recovery planning are to ensure the safety of customers, employees and
other person.
Uncertainty can arise in several ways:
 If the quantity we'd like to know is a competing firm's planned product price,
uncertainty arises from our lack of knowledge: The price may be well known to that
firm's employees, but it's unknown to us.
 If the quantity is market demand for products like ours, uncertainty arises from the
complexity of the process: Demand depends on economic factors, fashions and
preferences, and our and other firms' actions -- and even if we knew all of these, we
couldn't fully calculate their net impact on final demand.
 If the quantity is a material thickness in nanometers, uncertainty may arise from
limits on our ability to measure this physical quantity. We may also have limits on
our ability to control fabrication of the material.
Many processes that we want to model -- from the failure rate of an electronic
component to the behavior of a macromolecule -- have inherent randomness for all
intents and purposes.

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 71
HOTEL MANAGEMENT SYSTEM

Cost estimation
Why SCE is difficult and error prone ?
It is the responsibility of the project manager to make accurate estimations of effort
and cost. This is particularly true for projects subject to competitive bidding where a bid too
high compared with competitors would result in loosing the contract or a bid too low could
result in a loss to the organization. This does not mean that internal projects are
unimportant. From a project leaders estimate the management often decide whether to
proceed with the project. Industry has a need for accurate estimates of effort and size at a
very early stage in a project. However, when software cost estimates are done early in the
software development process the estimate can be based on wrong or incomplete
requirements. A software cost estimate process is the set of techniques and procedures that
an organization uses to arrive at an estimate. An important aspect of software projects is to
know the cost, The major contributing factor is effort. Software cost estimation requires a
significant amount of effort to perform it correctly.
SCE is often done hurriedly, without an appreciation for the effort required. You need
experience at developing estimates, especially for large projects. Human bias i.e. An
Estimator is likely to consider how long a certain portion of the system would take, and then
to merely extrapolate this estimate to the rest of the system, ignoring the non-linear aspects
of software development.

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 72
HOTEL MANAGEMENT SYSTEM
The causes of poor and inaccurate estimation
Imprecise and drifting requirements new software projects are nearly always different form
the last. Software practitioners don't collect enough information about past projects.
Estimates are forced to match the resources available.

ALGORITHMIC COST MODELS


To date most work carried out in the software cost estimation field has focused on
algorithmic cost modeling. In this process costs are analyzed using mathematical formulae
linking costs or inputs with metrics to produce an estimated output. The formulae used in a
formal model arise from the analysis of historical data. The accuracy of the model can be
improved by calibrating the model to your specific development environment, which
basically involves adjusting the weightings of the metrics. There are a variety of different
models available, the best known are Boehm's COCOMO [BOEHM-81], Putman's SLIM, and
Albrecht's' function points [ALBR-83]. On an initial instinct you might expect formal models
to be advantageous for their 'off-the-shelf' qualities, but after close observation this is
regarded as a disadvantage by cost estimators due to the additional overhead of calibrating
the system to the local circumstances. However, the more time spent calibrating a formal
model the more accurate the cost estimates should be. A distinct disadvantage of formal
models is the inconsistency of estimates; [KEMERER] conducted a study indicating that
estimates varied from as much as 85 - 610 % between predicated and actual values.
Calibration of the model can improve these figures; however, formal models still produce
errors of 50-100%. In terms of the estimation process, nearly all algorithmic models deviate
from the classical view of the cost estimation process in Figure 1.

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 73
HOTEL MANAGEMENT SYSTEM

An input requirement of an algorithmic model is to provide a metric to measure the


size of the finished system. Typically lines of source code are used, this is obviously not
known at the start of the project. SLOC is also very dependant on the programming
language and programming environment, this is difficult to determine at an early stage in
the problem especially as requirements are likely to be sketchy. Despite this SLOC has been
the most widely used size metric in the past, but current trends indicate that it is fast
becoming less stable. This is probably due to the changes in software development process
in recent years highlighted with a tendency to use prototyping, case tools and so forth. An
alternative is to use function points proposed by [ALBRECHT], which are related to the
functionality of the software rather than its size. A more recent approach is to use object
points. This is in comparison a new methodology and has not been publicized in the same
depth as function points and SLOC. In essence the method is very similar to function points
but counts objects instead of functions. Its recent rise has been prompted by the interest in
the object orientation revolution. Algorithmic models generally provide direct estimates of
effort or duration. As shown in figure 1 the main input is usually a prediction of software
size. Effort prediction models take the general form:
Effort = p*S
(1/productivity rate)

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 74
HOTEL MANAGEMENT SYSTEM
Where p is productivity constant and S is the size of the system once the value for p is
known. E.g. productivity = 450 source lines of code per month, making p = 0.0022 and the
size of the system has been estimated at 8500 KLOC effort = 0.0022 * 8500
Effort = 18.7 person moths
The example above assumes that the relationship between effort and size is a linear one.
Most models allow for non-linear relationships by introducing economies or dish-economies
of scale. The general formula being:
Effort = p * Se
A study published by [WALSTON & FELIX] which consisted of 60 projects at IBM federal
systems division concluded that effort could be modeled as:
Effort = 5.2 KLOC 0.91
This is an example of economies of scale. As the exponent 0.91 is less than 1. Wellston and
Felix observed the following results:

Table 1.0

Effort (PM) Size(KLOC) KLOC/PM

42.27 10 0.24

79.42 20 0.25

182.84 50 0.27

343.56 100 0.29

2792.57 1000 0.36

These findings indicate that there is greater productivity when building large software
systems as opposed to small systems. However, the results can be justified as it is expected
that larger teams can specialize and the overheads are of a relatively fixed size. A
publication by [BANKER & KEMERER] discusses the existence of either economies and
diseconomies of scale, for more information about this I strongly recommend reading this
paper.

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 75
HOTEL MANAGEMENT SYSTEM
EXPERT JUDGEMENT

The majority of research work carried out in the software cost estimation field has
been devoted to algorithmic models. However, by an overwhelming majority, expert
judgment is the most commonly used estimation method. A Dutch study carried out by
[HEMSTRA] revealed that 62% of estimators / organizations use this intuition technique and
a study carried out by [VIGDER & KARK] also confirmed the techniques popularity. In its
crudest form the expert judgment method involves consultation with one or more local
experts who are knowledgeable about the development environment or application domain
to estimate the effort required to complete a software project.
The method relies heavily on the experience of their knowledge in similar
development environments and historically maintained databases on completed projects
and the accuracy of theses past projects. However, the study carried out by [VIGDER &
KARK] indicated that in general estimators did not refer to previous projects as it was too
difficult to access or the expert could not see how the information would help in the
accuracy of the estimate. The study claimed that the majority of estimators tended to use
their memories of previous projects. If more than one expert is used the weighted average
of their estimates are taken. There are obvious risks with this method. As the project may
have some unique features which could take longer than anticipated. The weighted average
is also very much dependent on the competence of the estimator. However, a particular
strength of using an expert is that they can raise unique strengths and weaknesses of the
local organizational characteristics. Despite widespread use, the method seems to have
received a rather poor reputation and is often regarded as subjective and unstructured
making it vulnerable against more structured methods. A more structured form a expert
judgment is the Wideband Delphi Approach. An excellent paper by [HUGHES 96] discusses
expert judgment in detail identifying its strengths and weaknesses , but redressing the
balance that expert judgment is simply a ‘guess’ and identifying how useful the method can
be in industry.

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 76
HOTEL MANAGEMENT SYSTEM
Assessment of Expert Judgement

MACHINE LEARNING

The continuing poor performance results produced by statistical cost estimation


models have flooded the cost estimation area for over the last decade. Their inability to
handle categorical data, cope with missing data points, spread of data points and most
importantly lack of reasoning capabilities has triggered an increase in the point of studies
using non-traditional methods, the latest of which is machine learning techniques. This
technique categorizes together the methods:

Neural Networks

Fuzzy Logic

Case-Based Reasoning
Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .
Roll No :- 0901204, 0901157, 0901105, 0801407 Page 77
HOTEL MANAGEMENT SYSTEM

Analogy

Rule-Based

Regression Trees

Hybrid System

Machine learning is a new area which is demonstrating the promise of producing


consistently accurate estimates. The system effectively "learns" how to estimate from
training set of completed projects. In theory this approach is more robust against noise and
data outliers all suggesting machine learning techniques are suitable for software project
effort prediction. This is exemplified by a research project undertaken at Bournemouth
University by Schofield involving the development of an analogy based case tool called
ANGEL. This tool has produced accurate results and a cut down version is available Click on
the link below to see a comparison of each of these machine learning techniques.

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 78
HOTEL MANAGEMENT SYSTEM
Project Scheduling
15Jan 17Jan 18Jan 19Jan 20Jan 21Jan
2011 2011 2011 2011 2011 2011
Start Module
Planning

Prototype

Web
Form
Design
Coding

Database
Programming
Testing Finish

A grant chart or bar chart is the simplest form of formal project management. The Gantt
chart is used almost exclusively for scheduling purpose and therefore controls only the time
dimention
GANTT CHART

22jan 24jan 25jan 27jan 6feb 14feb


2011 2011 2011 2011 2011 2011
Start Information
Gathering
Problem
Identification
Requirement
Analysis
Risk
Analysis
Cost
Analysis
Prototype

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 79
HOTEL MANAGEMENT SYSTEM
Designing

15feb 17feb 11mar 18mar 21mar 23April2011 30May


2011 2011 2011 2011 2011 2011
Deployment
&validation

Modules
System
Integration

Testing
Deployment
Documentation Finish

Admin Module
17feb 17feb 18feb 18feb 18feb 19feb
2011 2011 2011 2011 2011 2011

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 80
HOTEL MANAGEMENT SYSTEM
Module
Planning

Prototype

Web Form
Design
Coding

Database Finish
Programming
Testing Finish

Client Module

23feb 23feb 24feb 24feb 25feb 25feb


2011 2011 2011 2011 2011 2011

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 81
HOTEL MANAGEMENT SYSTEM
Module
Planning

Prototype

Web Form
Design
Coding

Database
Programming
Testing Finish

19feb 19feb 21feb 21feb 22feb 22feb


2011 2011 2011 2011 2011 2011
Module
Planning

Prototype

Web Form
Design
Coding

Database
Programming
Testing Finish

Billing module

Billing Enquiry Module


25feb 26feb 26feb 28feb 28feb 1mar
2011 2011 2011 2011 2011 2011

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 82
HOTEL MANAGEMENT SYSTEM
Module
Planning

Prototype

Web Form
Design
Coding

Database
Programming
Testing Finish

1mar 2mar 2mar 4mar 4mar 5mar


2011 2011 2011 2011 2011 2011
Module
Planning

Prototype

Web Form
Design
Coding

Database
Programming
Testing Finish

Home Module

Login Module
7mar 7mar 8mar 9mar 10mar 11mar
2011 2011 2011 2011 2011 2011

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 83
HOTEL MANAGEMENT SYSTEM
Module
Planning

Prototype

Web Form
Design
Coding

Database
Programming
Testing Finish

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 84
HOTEL MANAGEMENT SYSTEM

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 85
HOTEL MANAGEMENT SYSTEM

Project Planning
MVC Architecture

This project will be developed using Model-View-Controller architecture. This


architecture, when implemented makes life of the developer easy. The developer can
concentrate on logic building in the controller Servlet and other helper classes for it
while a designer can design good JSP pages without much java code implementing some
logic in the page. In MVC architecture, a central controller Servlet handles all the
business logic with the help of some helper classes. Model Part can be defined by a pure
java class or JavaBeans which are nothing but data transfer object used to carry data.
They may be initialized automatically or manual Manner using Result Set. Finally, view
part is implemented through JSP pages which are used to create the real views of the
system to the user. Separating Development of a project into these three aspects is
somewhat complex but it increase reusability of components and extensibility of the
system

Project Life Cycle:-

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 86
HOTEL MANAGEMENT SYSTEM

The Project Life Cycle consists of four phases:


1. Project Initiation
The Initiation Phase is the first phase in the project. In this phase a business problem
(or opportunity) is identified and a business case which provides various solution options is
defined. A feasibility study is then conducted to investigate the likelihood of each solution
option addressing the business problem and a final recommended solution is put forward.
Once the recommended solution is approved, a project is initiated to deliver the approved
solution. A ‘Terms of Reference’ is completed, which outlines the objectives, scope and
structure of the new project, and a Project Manager is appointed. The Project Manager
begins recruiting a project team and establishes a Project Office environment. Approval is
then sought to move into the detailed planning phase.
2. Project Planning
Once the scope of the project has been defined in the terms of reference, the
project enters the detailed planning phase. This involves the creation of a: Project plan

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 87
HOTEL MANAGEMENT SYSTEM
(outlining the activities, tasks, dependencies and timeframes). Resource Plan (listing the
labor, equipment and materials required) Financial Plan (identifying the labor, equipment
and materials costs)
Quality Plan (providing quality targets, assurance and control measures) Risk Plan
(highlighting potential risks and actions taken to mitigate them) Acceptance Plan (listing the
criteria to be met to gain customer acceptance) Communication Plan (listing the information
needed to inform stakeholders) Procurement Plan (identifying products to be sourced from
external suppliers). At this point the project has been planned in detail and is ready to be
executed.
3. Project Execution
This phase involves the execution of each activity and task listed in the Project plan.
While the activities and tasks are being executed, a series of management processes are
undertaken to monitor and control the deliverables being output by the project. This
includes the identification of changes, risks and issues, the review of deliverable being
produced against the acceptance criteria. Once all of the deliverables have been produced
and the customer has accepted the final solution, the project is ready for closure.

4. Project Closure
Project Closure involves releasing the final deliverables to the customer, handling
over project documentation, terminating supplier contracts, releasing project resources and
communicating the closure of the project to all stakeholders. The Last remaining step is to
undertake a Post implementation Review to quantify the overall success of the project and
list any lessons learnt for future projects. The following sections provide a more detailed
description of each phase and list document templates which provide the project Manger
with guidance on how to complete each phase successfully.
Initiation
The initiation phase essentially involves the project ‘start-up’. It is the phase with in
which the business problem or opportunity is identified, the solution is agreed, a project
formed to produce the solution and a project team appointed. The diagram below depicts
the activities undertaken:

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 88
HOTEL MANAGEMENT SYSTEM
Develop Business Case
Once a business problem or opportunity has been identified, a business case is prepared.
This includes:
 A detailed definition of the problem or opportunity
 An analysis of the potential solution options available. For each option, the potential
benefits, costs, risks and issues are documented.
 A formal feasibility study may be commissioned if the feasibility of any particular
solution option is not clear.
 The recommended solution and a generic implementation plan.
 The business case is approved by the project sponsor and the required funding is
allocated o proceed with the project.
Perform Feasibility Study
At any stage during (or after) the development of a business case, a formal feasibility
study may be commissioned. The purpose is to assess the likelihood of a particular solution
option’s achieving the benefits outlined in the business case. The feasibility study will also
investigate whether the forecast costs are reasonable, the solution is achievable, and the
risks rare acceptable and/or any likely issues are avoidable.
Establish Terms of references
After the solution has been agreed and funding Allocated, a project is formed. The
Terms of Reference defined the vision; objectives, scope the organization structure (roles
and responsibilities) and a summarized plan of the activities, resources and funding require
undertaking the project. Finally, any risks, issues, planning assumptions and constraints are
listed.

Modules

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 89
HOTEL MANAGEMENT SYSTEM
The requirement analysis of a given system specifies its exact need. All requirements
to be fulfilled by the newly designed system should be considered first before designing it. A
better design can only be prepared after a full requirement analysis of the system and
finding why the system is required. An e-billing can be used by some end users who want
make payment through internet. The other users of this application are software
management people who are responsible to handle all the payments reported and fix them.
Following is the list of requirements to be fulfilled for payment of the bill of water Electricity
and telephone. It should provide a user interface to deposit the bill. There should be a
provision of assigning the bill status for saving water and electricity. All users should be
capable of viewing status of reported bill. All types of access to the system should be
checked and verified for the authentication of the user. After going through requirement
analysis, we can design various modules for the applications .These modules can be
designed and planned separately and integrated together to make whole application work
and meet all requirements specified in requirement specifications. The software will be
designed according to the various modules required to fulfill all the requirements uncovered
in our requirement analysis. The whole system can be divided into modules. The following
modules can be recognized in our project:
 Login module
 Admin module
 Registration Module
 Billing Module
 Billing Enquiry Module
 SMS alert Module
 Report Module
 Feedback Module

Login Module->

This module has been designed to manage login process. All types of accesses by
different type of users are verified for their authentication. This module includes user
interface to enter login id and password to check the identity of the user. Only the
Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .
Roll No :- 0901204, 0901157, 0901105, 0801407 Page 90
HOTEL MANAGEMENT SYSTEM
authorized user can deposit their bill according its status. Different modules are secured
from different type of users who do not have the privilege to access some module.

Admin Module->

This module manages functions such as assigning various properties to the billing
information and provides the tips for saving water and energy .Further; it handles the
corrections of bill and any changement according to customer requirement. An administrator
can also delete, add and modify the account of user as required.

Registration Module->

This module provides the registration of the user for providing details of the user and
also consumer number and also account number. The user requirement is so important for
taking more information due to depositing bill that may be electric bill, water bill and
telephone bill.
Billing Module->
The billing module states the choose of type of bill as water bill, telephone bill,
electricity bill. User can select the billing type and make the payment.

Database Design

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 91
HOTEL MANAGEMENT SYSTEM
The whole project is in fact an information management system, which interacts
with the database having of tables. The tables with their column names and data type are as
follows:

KESCO

Field name Data type Size Primary key Null


CONNECTIONNO VARCHAR2 20 N Y
CUSTOMENAME VARCHAR2 30 Y
DATEOFCONNECTION DATE Y
LOAD VARCHAR2 10 Y
ADDRESS VARCHAR2 100 Y

LOGINTABLE

Field name Data type Size Primary key Null


EMAILID Varchar2 30 N Y
PASSWORD Varchar2 10 Y
CONTACTNO NUMBER 11 Y
CONNECTIONNO Varchar2 15 Y
METERNO Varchar2 10 Y
CUSTOMERNAME Varchar2 30 Y
LOAD Varchar2 10 Y
TYPEOFELECTRICITY Varchar2 20 Y
ADDRESS Varchar2 50 Y
DATEOFCONNECTION Varchar2 30 Y
STATUS Varchar2 10 Y

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 92
HOTEL MANAGEMENT SYSTEM
ADMINTABLE

Field name Data type Size Primary key Null


EMAILID VARCHAR2 30 Y
PASSWORD VARCHAR2 10 Y
NAME VARCHAR2 50 Y
CONTACTNO NUMBER 20 Y
ADDRESS VARCHAR2 40 Y

MYACCOUNTDETAIL

Field name Data type Size Primary Null


key
S.NO. NUMBER N Y
CONNECTIONNO VARCHAR2 20 Y
CUSTOMERNAME VARCHAR2 30 Y
LASTBILLDATE DATE Y
LASTBILLAMMOUNT NUMBER Y
LASTPAYMENTDATE DATE Y
LASTPAYMENT VARCHAR2 10 Y
MODEOFPAYMENT VARCHAR2 15 Y
NEXTBILLDATE DATE Y
CREDITLIMIT VARCHAR2 10 Y
UNBILLEDAMMOUNT NUMBER Y

BILLDETAILS

Field name Data type Size Primary key Null


INVOICENO NUMBER 10 N Y
CONNECTIONNO VARCHAR2 10 N Y
BILLDATE DATE N Y
AMMOUNT NUMBER 10 N Y
DUEDATE DATE N Y
READING NUMBER 10 N Y

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 93
HOTEL MANAGEMENT SYSTEM
PAYMENTDETAILS

Field name Data type Size Primary key Null


SNO. NUMBER 10 N Y
INVOICENO NUMBER 10 Y
CONNECTIONNO VARCHAR2 15 N Y
PAYMENTDATE DATE Y
MODEOFPAYMENT VARCHAR2 30 Y
AMMOUNT NUMBER 10 Y
STATUS VARCHAR2 10 Y
UNBILLEDAMOUNT VARCHAR 10

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 94
HOTEL MANAGEMENT SYSTEM

Data Flow Diagram

Designing of system deals with transforming the requirements of system into a form
implement able using a programming language. We can broadly classify various design
activities into two parts:
 Preliminary (or high level) design.
 Detailed Design.
 In preliminary design part we design the following items:
 Different modules required to implement the design.
 Control relationship among the identified modules.
 Interface among different modules.
The outcome of high-level design is called system architecture. High-level design of the
project is as follows.
Context Diagram
Level 0 DFD establish the context of the system to be developed. It represents the
interaction of the system with various external entities. Not only the external entities with
which the system interacts are identified, but the data interchange occurring between the
system and these external entities are also represented on the context diagram. The context
diagram represents the entire system as a single bubble.
4.1.1DATA FLOW DIAGRAMS (0-LEVEL DFD)
Pictorial representations of systems have long been acknowledged as being more
effective that narrative. They are easier to grasp when being explained or investigate; it is
easier to find a particular aspect interest, and pictorial representations are less ambiguous
than narrative.
The DFD is a simple graphical notation that can be used to represent a system in terms of
the input data to the system, various processing carried out on these data, and the output
data generated by the system.

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 95
HOTEL MANAGEMENT SYSTEM

DATA FLOW DIAGRAM

Context Level DFD

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 96
HOTEL MANAGEMENT SYSTEM

1Level DFD

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 97
HOTEL MANAGEMENT SYSTEM

2 Level DFD

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 98
HOTEL MANAGEMENT SYSTEM

ENTITY RELATIONSHIP DIAGRAM

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 99
HOTEL MANAGEMENT SYSTEM

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 100
HOTEL MANAGEMENT SYSTEM

Input Output Specification

HOME.JSP

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 101
HOTEL MANAGEMENT SYSTEM

Login.jsp For Admin&User

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 102
HOTEL MANAGEMENT SYSTEM

BillGenrate.JSP

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 103
HOTEL MANAGEMENT SYSTEM
ViewUser.jsp

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 104
HOTEL MANAGEMENT SYSTEM

BlockUser.jsp

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 105
HOTEL MANAGEMENT SYSTEM

UnblockUser.jsp

AdminProfile.jsp

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 106
HOTEL MANAGEMENT SYSTEM

Customerhome.jsp

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 107
HOTEL MANAGEMENT SYSTEM

MyAccount.jsp

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 108
HOTEL MANAGEMENT SYSTEM

Mybilling.jsp

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 109
HOTEL MANAGEMENT SYSTEM

Viewbill.jsp

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 110
HOTEL MANAGEMENT SYSTEM

Pay(netbanking).jsp

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 111
HOTEL MANAGEMENT SYSTEM

Pay(credit card).jsp

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 112
HOTEL MANAGEMENT SYSTEM

PaymentHistory.jsp

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 113
HOTEL MANAGEMENT SYSTEM

UserProfile.jsp

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 114
HOTEL MANAGEMENT SYSTEM

Changepassword.aspx

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 115
HOTEL MANAGEMENT SYSTEM

EditProfile.jsp

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 116
HOTEL MANAGEMENT SYSTEM

Enquiry.jsp

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 117
HOTEL MANAGEMENT SYSTEM

Registration.jsp

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 118
HOTEL MANAGEMENT SYSTEM

Newuserreg.jsp

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 119
HOTEL MANAGEMENT SYSTEM

Regdetail.jsp

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 120
HOTEL MANAGEMENT SYSTEM

Reg.Success.jsp

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 121
HOTEL MANAGEMENT SYSTEM

PaymentHistory.jsp

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 122
HOTEL MANAGEMENT SYSTEM

CreditLimit.jsp

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 123
HOTEL MANAGEMENT SYSTEM

UnbilledUser.jsp

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 124
HOTEL MANAGEMENT SYSTEM

Updatesuccess.jsp

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 125
HOTEL MANAGEMENT SYSTEM

Sendanouncement.jsp

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 126
HOTEL MANAGEMENT SYSTEM

Aboutus.jsp

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 127
HOTEL MANAGEMENT SYSTEM

Contactus.jsp

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 128
HOTEL MANAGEMENT SYSTEM

Feedback.jsp

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 129
HOTEL MANAGEMENT SYSTEM

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 130
HOTEL MANAGEMENT SYSTEM

Home.jsp

<%@ page contentType="text/html ; charset=iso-8859-1" language="java"


import="java.sql.*,java.util.* , java.text.*" errorPage=""%>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 131
HOTEL MANAGEMENT SYSTEM
<head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
<link href="css/style.css" type="text/css" rel="stylesheet"/>
<title>ebiling.com</title>
<style type="text/css">
</style>
</head>

<body bgcolor="#FFFFCC">
<table bgcolor="#990000"align="center" height="523" width="700" border="1">
<tr>
<td height="100" width="700"><jsp:include page="header1.jsp"/></td>
</tr>
<tr>
<td height="5"><marquee>
SAVE ELECTICITY&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;SAVE
WATER</marquee></td>
</tr>
<tr>
<td height="5" ><jsp:include page="menu.jsp"/></td>
</tr>
<tr><td>
<%
DateFormat df=new SimpleDateFormat("EEEE,dd MMM,yyyy");
String date=df.format(new java.util.Date());
out.print(" | "+date+" | ");
%>
</td></tr>
<tr>
<td height="408"><jsp:include page="homedata.jsp"/></td>
</tr>
<tr>
<td height="5"align="center" ><jsp:include page="footer.jsp"/></td> </tr>
</table>
</body>
</html>

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 132
HOTEL MANAGEMENT SYSTEM

Header1.jsp
<%@ page contentType="text/html; charset=utf-8" language="java" import="java.sql.*"
errorPage="" %>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
<title>Untitled Document</title>
</head>

<body>
<table width="700" height="100" border="0">
<tr>
<td><img src="images/header2.png" alt="head" width="700" height="100" /></td>

</tr>
</table>
</body>
</html>

Menu.jsp

<%@page language="java"%>
<html>
<body>

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 133
HOTEL MANAGEMENT SYSTEM
<link href="css/style.css" type="text/css" rel="stylesheet"/>
<table border="0" cellpadding="0" cellspacing="0" align="center" >
<tr>
<td width="10" class="menu_button_left"></td>
<td class="menu"><a href="home.jsp">Home</a></td>
<td width="19" class="menu_button_mid"></td>
<td class="menu"><a href="adminlogin.jsp?type=Admin">Admin</a></td>
<td width="19" class="menu_button_mid"></td>
<td class="menu"><a href="index.jsp?type=User">User</a></td>

<td width="19" class="menu_button_mid"></td>


<td class="menu"><a href="aboutus.jsp">About Us</a></td>
<td width="19" class="menu_button_mid"></td>
<td class="menu"><a href="feedback.jsp">Feedback</a></td>
<td width="19" class="menu_button_mid"></td>
<td class="menu"><a href="contactus.jsp">Contact Us</a></td>
</tr>
</table>
</body>
</html>
Homedata.jsp

<%@ page contentType="text/html; charset=utf-8" language="java" import="java.sql.*"


errorPage="" %>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
<title>Untitled Document</title>
<script src="Scripts/AC_RunActiveContent.js" type="text/javascript"></script>
</head>

<body>
<B><center>
<table width="650" height="470" border="0">

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 134
HOTEL MANAGEMENT SYSTEM
<tr>
<td bgcolor="#990000"><script type="text/javascript">
AC_FL_RunContent(
'codebase','http://download.macromedia.com/pub/shockwave/cabs/flash/
swflash.cab#version=9,0,28,0','width','650','height','470','title','ds','src','home','quality','high','pl
uginspage','http://www.adobe.com/shockwave/download/download.cgi?
P1_Prod_Version=ShockwaveFlash','movie','home' ); //end AC code
</script><noscript><object classid="clsid:D27CDB6E-AE6D-11cf-96B8-444553540000"
codebase="http://download.macromedia.com/pub/shockwave/cabs/flash/
swflash.cab#version=9,0,28,0" width="650" height="470" title="ds">
<param name="movie" value="home.swf" />
<param name="quality" value="high" />
<embed src="home.swf" quality="high"
pluginspage="http://www.adobe.com/shockwave/download/download.cgi?
P1_Prod_Version=ShockwaveFlash" type="application/x-shockwave-flash" width="650"
height="470"></embed>
</object></noscript></td>
</tr>
</table>
</center></B>
</body>
</html>

Adminlogin.jsp

<%@ page contentType="text/html ; charset=iso-8859-1" language="java"


import="java.sql.*,java.util.* , java.text.*" errorPage=""%>
<%
String type=(String)session.getAttribute("type");%>

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 135
HOTEL MANAGEMENT SYSTEM
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
<link href="css/style.css" type="text/css" rel="stylesheet"/>
<title>ebiling.com</title>
<style type="text/css">
</style>
</head>

<body bgcolor="#FFFF99">
<table bgcolor="#990000" align="center" height="523" width="700" border="1">
<tr>
<td height="100" width="700"><jsp:include page="header1.jsp"/></td>
</tr>
<tr>
<td height="5"><marquee>
SAVE ELECTICITY&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;SAVE
WATER</marquee></td>
</tr>
<tr>
<td height="5" ><jsp:include page="menu.jsp"/></td>
</tr>
<tr><td>
<%
DateFormat df=new SimpleDateFormat("EEEE,dd MMM,yyyy");
String date=df.format(new java.util.Date());
out.print(" | "+date+" | ");
%>
</td></tr>
<tr>
<td height="408" align="center">
<table height="408" border="0" width="700">
<tr>
<td width="264">

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 136
HOTEL MANAGEMENT SYSTEM
<form name="frmlogin" method="post" action="adminhandler.jsp">
<table width="300" height="259" border="0">
<tr>
<td colspan="2"><div align="center"><strong><h3>Login for
Services</h3></strong></div></td>
</tr>
<tr>
<td ><b>Enter Email_Id</b></td>
<td ><input type="text" name="textName" id="textName"/></td>
</tr>

<tr>
<td> <b>Enter Password</b></td>
<td><input type="password" name="textPassword" id="textPassword"/></td>
</tr>
<tr><td><b>Type</b></td>
<td> <%=(String)request.getParameter("type")%>
<input type="hidden" name="type" value="<
%=(String)request.getParameter("type")%>"/></td>
</tr>

<tr>
<td colspan="2"><div align="center">
<input type="submit" name="subLogin" id="subLogin" value="Submit"/>
</div></td>
</tr>
<tr>
<td colspan="2"><a href="forgett.jsp"><b>Forgot Password</b></a>

</td>
</tr>
</table>
</form></td>
<td width="420"><table width="400" height="179" border="0">
<tr>

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 137
HOTEL MANAGEMENT SYSTEM
<td width="411"><strong><b>Bill Junction saves your time &
money.</b></strong></td>
</tr>
<tr>
<td><strong><b>Pay bills through internet or sms.</b></strong></td>
</tr>
<tr>
<td><strong><b>Pay your electricity,water,telephone &amp;
e.t.c.</b></strong></td>
</tr>
<tr>
<td><strong><b>Bill Junction is cost effective and time efficient</b></strong></td>
</tr>
<tr>
<td><strong><b>Want to know more ?</b></strong></td>
</tr>
</table></td>
</tr>
</table>
</td>
</tr>
<tr>
<td height="5"align="center" ><jsp:include page="footer.jsp"/></td> </tr>
</table>
</body>
</html>

Userlogin.jsp
<%@ page contentType="text/html ; charset=iso-8859-1" language="java"
import="java.sql.*,java.util.* , java.text.*" errorPage=""%>
<%
String type=(String)session.getAttribute("type");%>

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 138
HOTEL MANAGEMENT SYSTEM
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
<link href="css/style.css" type="text/css" rel="stylesheet"/>
<title>ebiling.com</title>
<style type="text/css">
</style>
</head>

<body bgcolor="#FFFFCC">
<table bgcolor="#990000"align="center" height="523" width="700" border="1">
<tr>
<td height="100" width="700"><jsp:include page="header1.jsp"/></td>
</tr>
<tr>
<td height="5"><marquee>
SAVE ELECTICITY&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;SAVE
WATER</marquee></td>
</tr>
<tr>
<td height="5" ><jsp:include page="menu.jsp"/></td>
</tr>
<tr><td>
<%
DateFormat df=new SimpleDateFormat("EEEE,dd MMM,yyyy");
String date=df.format(new java.util.Date());
out.print(" | "+date+" | ");
%>
</td></tr>
<tr>
<td height="408" align="center">
<table height="408" border="0" width="700">
<tr>
<td width="264">

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 139
HOTEL MANAGEMENT SYSTEM
<form name="frmlogin" method="post" action="loginhandler1.jsp">
<table width="300" height="259" border="0">
<%
if("blank".equals((String)request.getParameter("msg")))
{
out.println("fields are blank");
}
%>
<tr>
<td colspan="2"><div align="center"><strong><h3>Login for
Services</h3></strong></div></td>
</tr>
<tr>
<td><b>Enter Email_Id</b> </td>
<td><input type="text" name="textName" id="textName"/></td>
</tr>

<tr>
<td> <b>Enter Password</b></td>
<td><input type="password" name="textPassword" id="textPassword"/></td>
</tr>
<tr><td><b>Type</b></td>
<td> <%=(String)request.getParameter("type")%>
<input type="hidden" name="type" value="<
%=(String)request.getParameter("type")%>"/></td>
</tr>

<tr>
<td colspan="2"><div align="center">
<input type="submit" name="subLogin" id="subLogin" value="Submit"/>
</div></td>
</tr>
<tr>
<td colspan="2"><a href="forgett.jsp">Forgott
Password</a>&nbsp;&nbsp;/&nbsp;&nbsp;
<a href="registration.jsp">New User ?</a>

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 140
HOTEL MANAGEMENT SYSTEM
</td>
</tr>
</table>
</form></td>
<td width="420"><table width="400" height="179" border="0">
<tr>
<td width="411"><strong><b>Bill Junction saves your time &
money.</b></strong></td>
</tr>
<tr>
<td><strong><b>Pay bills through internet or sms.</b></strong></td>
</tr>
<tr>
<td><strong><b>Pay your electricity,water,telephone &amp;
e.t.c.</b></strong></td>
</tr>
<tr>
<td><strong><b>Bill Junction is cost effective and time efficient</b></strong></td>
</tr>
<tr>
<td><strong><b>Want to know more ?</b></strong></td>
</tr>
</table></td>
</tr>
</table>
</td>
</tr>
<tr>
<td height="5"align="center" ><jsp:include page="footer.jsp"/></td> </tr>
</table>
</body>
</html>
Adminhome.jsp
<%@ page contentType="text/html ; charset=iso-8859-1" language="java"
import="java.sql.*,java.util.* , java.text.*" errorPage=""%>
<html xmlns="http://www.w3.org/1999/xhtml">

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 141
HOTEL MANAGEMENT SYSTEM
<head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
<title>ebiling.com</title>
<style type="text/css">
#apDiv1 {
position:absolute;
width:200px;
height:115px;
z-index:1;
left: 980px;
top: 185px;
}
</style>
</head>

<body bgcolor="#FFFF99">
<table bgcolor="#990000" align="center" height="523" width="700" border="1">
<tr>
<td height="100"><jsp:include page="header1.jsp"/></td>
</tr>
<tr>
<td height="5"><marquee>
SAVE ELECTICITY&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;SAVE WATER
</marquee></td>
</tr>
<tr>
<td height="5" ><jsp:include page="adminmenu.jsp"/></td>
</tr>
<tr><td>
<%
DateFormat df=new SimpleDateFormat("EEEE,dd MMM,yyyy");
String date=df.format(new java.util.Date());
out.print(" | "+date+" | ");
String logina=(String)session.getAttribute("logina");
if("yesa".equals(logina))

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 142
HOTEL MANAGEMENT SYSTEM
out.print("Welcome Mr......"+(String)session.getAttribute("useradmin"));

%>
<div id="apDiv1"><a href="index.jsp">Logout</a></div>
</td></tr>
<tr>
<td height="408" align="center">
<b>Admin Home Provide more Flexibility to user By Technical Support....</b>
</td>
</tr>
<tr>
<td height="5"align="center"><jsp:include page="footer.jsp"/></td>
</tr>
</table>
</body>
</html>
Adminmenu.jsp
<%@page language="java"%>
<html>
<body>
<link href="css/style.css" type="text/css" rel="stylesheet"/>
<table border="0" cellpadding="0" cellspacing="0" align="center" >
<tr>
<td width="10" class="menu_button_left"></td>
<td class="menu"><a href="billgenerate.jsp">BillGenerate</a></td>
<td width="19" class="menu_button_mid"></td>
<td class="menu"><a href="viewuser.jsp">ViewUser</a></td>
<td width="19" class="menu_button_mid"></td>
<td class="menu"><a href="blockuser.jsp">BlockUser</a></td>
<td width="19" class="menu_button_mid"></td>
<td class="menu"><a href="unblockuser.jsp">UnBlockUser</a></td>
<td width="19" class="menu_button_mid"></td>
<td class="menu"><a href="adminprofile.jsp">My Profile</a></td>
<td width="19" class="menu_button_mid"></td>
<td class="menu"><a href="sendanna.jsp">SendAnnouncement</a></td>
</tr>

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 143
HOTEL MANAGEMENT SYSTEM
</table>
</body>
</html>

Adminhandler.jsp
<%@page contentType="text/html" pageEncoding="UTF-8" import="java.sql.*"%>
<%
String ademail=request.getParameter("textName");
String adpassword=request.getParameter("textPassword");

try{
boolean flag=false;
Class.forName("oracle.jdbc.driver.OracleDriver");
Connection
con=DriverManager.getConnection("jdbc:oracle:thin:@localhost:1521:xe","ebilling","ebilling")
;
Statement stmt=con.createStatement();
String query="select * from admintable";
ResultSet rs=stmt.executeQuery(query);
while(rs.next())
{
String admail=rs.getString(1);
String adpass=rs.getString(2);

if(ademail.equals(admail) && adpassword.equals(adpass))


{
flag = true;
break;
}

if(flag)

{
session.setAttribute("logina","yesa");

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 144
HOTEL MANAGEMENT SYSTEM
session.setAttribute("useradmin", rs.getString("name"));
response.sendRedirect("adminhome.jsp");
session.setAttribute("ademail",ademail);
}

if(!rs.next())
{
response.sendRedirect("adminlogin.jsp?type=Admin");

}
catch(Exception e)
{
out.println(e);
}
%>

Billgenrate.jsp

<%@ page contentType="text/html ; charset=iso-8859-1" language="java"


import="java.sql.*,java.util.* , java.text.*" errorPage=""%>
<%
try{
Class.forName("oracle.jdbc.driver.OracleDriver");
Connection con =
DriverManager.getConnection("jdbc:oracle:thin:@localhost:1521:xe","ebilling","ebilling");
Statement stmt=con.createStatement();
String qry="select max(invoicenno) from billdetails";
ResultSet rs=stmt.executeQuery(qry);

int read;
int inv;
if(rs.next())
{
inv=rs.getInt(1);

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 145
HOTEL MANAGEMENT SYSTEM
}
else
{
inv=0;
}
inv++;
%>
<html>
<head><title>ebiling.com</title>
<style type="text/css">
#apDiv1 {
position:absolute;
width:200px;
height:115px;
z-index:1;
left: 980px;
top: 185px;
}
</style></head>
<body bgcolor="#FFFF99">
<table bgcolor="#990000" align="center" height="523" width="700" border="1">
<tr>
<td height="100"><jsp:include page="header1.jsp"/></td>
</tr>
<tr>
<td height="5"><marquee>
SAVE ELECTICITY&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;SAVE WATER
</marquee></td>
</tr>
<tr>
<td height="5" ><jsp:include page="adminmenu.jsp"/></td>
</tr>
<tr><td>
<%
DateFormat df=new SimpleDateFormat("EEEE,dd MMM,yyyy");
String date=df.format(new java.util.Date());

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 146
HOTEL MANAGEMENT SYSTEM
out.print(" | "+date+" | ");
String logina=(String)session.getAttribute("logina");
if("yesa".equals(logina))
out.print("Welcome Mr......"+(String)session.getAttribute("useradmin"));

%>
<div id="apDiv1"><a href="index.jsp">Logout</a></div>
</td></tr>
<tr><td height="408" align="center">

<form method ="post" action="billhandler.jsp">


<%if("error".equals((String)request.getParameter("msg")))
{out.println("Field are blank / Exception");}
else {
if("success".equals((String)request.getParameter("msg")))
out.println("Bill Created Successfully");}
%>
<table>
<tr><td> <b>InvoiceNumber</b></td><td><% out.print(inv);%></td>
<% String invo = Integer.toString(inv);
session.setAttribute("i",invo); %>
</tr>
<tr><td><b>ConnectionNo</b></td><td><input type="text" name="connectionno"
value=""/></td></tr>
<tr><td><b>CurrentReading</b></td><td><input type="text" name="currentreading"
value=""/></td></tr>
<tr><td><input type="submit" value="submit"></td></tr>
</table>
</form>
</td></tr>
<tr>
<td height="5"align="center"><jsp:include page="footer.jsp"/></td>
</tr>
</table>
</body>
</html>

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 147
HOTEL MANAGEMENT SYSTEM
<%
}
catch(Exception e)
{
out.println(e);
}%>
Billhandler.jsp
<%--
Document : billhandler
Created on : May 24, 2011, 4:29:57 PM
Author : Lenovo
--%>

<%@page contentType="text/html" pageEncoding="UTF-8" import="java.sql.*,java.util.*"%>


<%
String inv = (String)session.getAttribute("i");
int invoic=Integer.parseInt(inv);
String connectionno=request.getParameter("connectionno");
int connect=Integer.parseInt(connectionno);
String cureading=request.getParameter("currentreading");
int currentread=Integer.parseInt(cureading);

String loadc=null;
String typeelect=null;
double charges;
double monthlyrent;
double totalamount;
int preading=0;

try{
Class.forName("oracle.jdbc.driver.OracleDriver");
Connection
con=DriverManager.getConnection("jdbc:oracle:thin:@localhost:1521:xe","ebilling","ebilling")
;

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 148
HOTEL MANAGEMENT SYSTEM
Statement stpr=con.createStatement();
String qrypr="select max(reading) from billdetails where
connectionno='"+connectionno+"'";
ResultSet rspr = stpr.executeQuery(qrypr);

while(rspr.next())
{
preading=rspr.getInt(1);
}
int noofunits=(currentread-preading);
rspr.close();
stpr.close();
// out.print(noofunits);

Statement stmt = con.createStatement();


String query="select * from logintable where connectionno='"+connectionno+"'";
ResultSet rs=stmt.executeQuery(query);
while(rs.next())
{
String load=rs.getString(7);
loadc=load.substring(0,1);
typeelect=rs.getString(8);
}

int loadm=Integer.parseInt(loadc);
stmt.close();
rs.close();
// out.print(loadm);
//out.print(typeelect);
if(loadm >= 1 && loadm <=3 )
{
monthlyrent=150;
}
else if(loadm > 3 && loadm <= 5)
{

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 149
HOTEL MANAGEMENT SYSTEM
monthlyrent=225;
}
else if(loadm >5 && loadm <=8)
{
monthlyrent=375;
}
else
{
monthlyrent=425;
}

if("Domestic".equals(typeelect)||"domestic".equals(typeelect))
{
if(noofunits <= 100)
{
charges=3;
}
else if(noofunits > 100 && noofunits <= 300)
{
charges=3.50;
}
else
{
charges=4;
}
}
else
{
if(noofunits <= 100)
{
charges=3.50;
}

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 150
HOTEL MANAGEMENT SYSTEM
else if(noofunits > 100 && noofunits <= 300)
{
charges=4;
}
else
{
charges=5;
}

//out.print(charges);
//out.println(monthlyrent);
totalamount =((noofunits*charges)+monthlyrent);
//out.print(totalamount);

Calendar cal = new GregorianCalendar();


int year = cal.get(Calendar.YEAR);
int mm = cal.get(Calendar.MONTH);
int dd = cal.get(Calendar.DAY_OF_MONTH);
java.sql.Date date=new java.sql.Date(year, mm, dd);
String m=Integer.toString(mm);
String y=Integer.toString(year);
String bdate=05+"/"+m+"/"+y;
String ddate=25+"/"+m+"/"+y;

String qry="insert into billdetails values(?,?,?,?,?,?)";


PreparedStatement prestmt=con.prepareStatement(qry);

prestmt.setInt(1,invoic);
prestmt.setInt(2,connect);
prestmt.setString(3,bdate);
prestmt.setDouble(4,totalamount);
prestmt.setString(5,ddate);
prestmt.setInt(6,currentread);

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 151
HOTEL MANAGEMENT SYSTEM

prestmt.executeUpdate();
prestmt.close();
con.close();
response.sendRedirect("billgenerate.jsp?msg=success");

}
catch(Exception e)
{
out.println(e);
}

%>
Viewuser.jsp
<%@ page contentType="text/html ; charset=iso-8859-1" language="java"
import="java.sql.*,java.util.* , java.text.*" errorPage=""%>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
<link href="css/style.css" type="text/css" rel="stylesheet"/>
<title>ebiling.com</title>
<style type="text/css">
#apDiv1 {
position:absolute;
width:200px;
height:115px;
z-index:1;
left: 980px;
top: 185px;
}
</style>
</head>

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 152
HOTEL MANAGEMENT SYSTEM
<body bgcolor="#FFFFCC">

<table bgcolor="#990000"align="center" height="523" width="700" border="1">


<tr>
<td height="100" width="700"><jsp:include page="header1.jsp"/></td>
</tr>
<tr>
<td height="5"><marquee>
SAVE ELECTICITY&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;SAVE
WATER</marquee></td>
</tr>
<tr>
<td height="5" ><jsp:include page="adminmenu.jsp"/></td>
</tr>
<tr><td>
<%
DateFormat df=new SimpleDateFormat("EEEE,dd MMM,yyyy");
String date=df.format(new java.util.Date());
out.print(" | "+date+" | ");
String logina=(String)session.getAttribute("logina");
if("yesa".equals(logina))
out.print("Welcome Mr......"+(String)session.getAttribute("useradmin"));

%>
<div id="apDiv1"><a href="index.jsp">Logout</a></div>
</td></tr>
<tr>
<td height="408" valign="top">
<table align="center"cellpading="2"width="100%">
<tr bgcolor="#0054A8"align="center">
<td><b>Emailid</b></td><td><b>Password</b></td><td><b>ConnectionNo</
b></td><td><b>CustomerName</b></td><td><b>ContactNo</b></td><td><b>Address</
b></td></tr>
<%
try {
Class.forName("oracle.jdbc.driver.OracleDriver");

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 153
HOTEL MANAGEMENT SYSTEM
Connection
con=DriverManager.getConnection("jdbc:oracle:thin:@localhost:1521:xe","ebilling","ebilling")
;
Statement stmt=con.createStatement();
String query="select * from logintable";
ResultSet rs=stmt.executeQuery(query);
int i=2;
while(rs.next())
{
if(i%2==0)
out.println("<tr bgcolor=#330099>");
else
out.println("<tr bgcolor=#330099>");
i++;
out.println("<td>"+rs.getString(1)+"</td>");
out.println("<td>"+rs.getString(2)+"</td>");
out.println("<td>"+rs.getString(4)+"</td>");
out.println("<td>"+rs.getString(6)+"</td>");
out.println("<td>"+rs.getString(3)+"</td>");
out.println("<td>"+rs.getString(9)+"</td>");
out.println("</tr>");
}
}

catch(Exception e)
{
out.print(e);
}
%>
</table>
<div align="center"><hr width="100"/>
<a href="adminhome.jsp">BACK</a><hr width="100"/></div>
</td>
</tr>
<tr>
<td height="5"align="center" ><jsp:include page="footer.jsp"/></td> </tr>

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 154
HOTEL MANAGEMENT SYSTEM
</table>
</body>
</html>

Blockuser.jsp
<%@ page contentType="text/html ; charset=iso-8859-1" language="java"
import="java.sql.*,java.util.* , java.text.*" errorPage=""%>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
<link href="css/style.css" type="text/css" rel="stylesheet"/>
<title>ebiling.com</title>
<style type="text/css">
#apDiv1 {
position:absolute;
width:200px;
height:115px;
z-index:1;
left: 980px;
top: 185px;
}
</style>
</head>

<body bgcolor="#FFFFCC">

<table bgcolor="#990000"align="center" height="523" width="700" border="1">


<tr>
<td height="100" width="700"><jsp:include page="header1.jsp"/></td>
</tr>
<tr>
<td height="5"><marquee>
SAVE ELECTICITY&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;SAVE
WATER</marquee></td>

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 155
HOTEL MANAGEMENT SYSTEM
</tr>
<tr>
<td height="5" ><jsp:include page="adminmenu.jsp"/></td>
</tr>
<tr><td>
<%
DateFormat df=new SimpleDateFormat("EEEE,dd MMM,yyyy");
String date=df.format(new java.util.Date());
out.print(" | "+date+" | ");
String logina=(String)session.getAttribute("logina");
if("yesa".equals(logina))
out.print("Welcome Mr......"+(String)session.getAttribute("useradmin"));

%>
<div id="apDiv1"><a href="index.jsp">Logout</a></div>
</td></tr>
<tr>
<td height="408" valign="top">
<table align="center"cellpading="2"width="100%">
<tr bgcolor="#0054A8"align="center">
<td><b>Emailid</b></td><td><b>Password</b></td><td><b>ConnectionNo</
b></td><td><b>CustomerName</b></td><td><b>ContactNo</b></td><td><b>Address</
b></td></tr>
<%
try {
Class.forName("oracle.jdbc.driver.OracleDriver");
Connection
con=DriverManager.getConnection("jdbc:oracle:thin:@localhost:1521:xe","ebilling","ebilling")
;
Statement stmt=con.createStatement();
String query="select * from logintable";
ResultSet rs=stmt.executeQuery(query);
int i=2;
while(rs.next())
{
if(i%2==0)

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 156
HOTEL MANAGEMENT SYSTEM
out.println("<tr bgcolor=#330099>");
else
out.println("<tr bgcolor=#330099>");
i++;
out.println("<td>"+rs.getString(1)+"</td>");
out.println("<td>"+rs.getString(2)+"</td>");
out.println("<td>"+rs.getString(4)+"</td>");
out.println("<td>"+rs.getString(6)+"</td>");
out.println("<td>"+rs.getString(3)+"</td>");
out.println("<td>"+rs.getString(9)+"</td>");
out.println("</tr>");
}
}

catch(Exception e)
{
out.print(e);
}
%>
</table>
<div align="center"><hr width="100"/>
<a href="adminhome.jsp">BACK</a><hr width="100"/></div>
</td>
</tr>
<tr>
<td height="5"align="center" ><jsp:include page="footer.jsp"/></td> </tr>
</table>
</body>
</html>
Blockhandler.jsp

<%@page contentType="text/html" pageEncoding="UTF-8" import="java.sql.*"%>


<% String blockid=request.getParameter("loginidblock");
String block="NO";
try{
Class.forName("oracle.jdbc.driver.OracleDriver");

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 157
HOTEL MANAGEMENT SYSTEM
Connection
con=DriverManager.getConnection("jdbc:oracle:thin:@localhost:1521:xe","ebilling","ebilling")
;
String qry="Update logintable set status='"+block+"' where emailid='"+blockid+"'";
PreparedStatement prestmt=con.prepareStatement(qry);
prestmt.executeUpdate();
response.sendRedirect("blockuser.jsp?msg=success");

}
catch(Exception e)
{
out.println(e);
}
%>
Unblockuser.jsp
<%@ page contentType="text/html ; charset=iso-8859-1" language="java"
import="java.sql.*,java.util.* , java.text.*" errorPage=""%>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
<link href="css/style.css" type="text/css" rel="stylesheet"/>
<title>ebiling.com</title>
<style type="text/css">
#apDiv1 {
position:absolute;
width:200px;
height:115px;
z-index:1;
left: 930px;
top: 180px;
}
</style>
</head>

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 158
HOTEL MANAGEMENT SYSTEM
<body bgcolor="#FFFFCC">

<table bgcolor="#990000"align="center" height="523" width="700" border="1">


<tr>
<td height="100" width="700"><jsp:include page="header1.jsp"/></td>
</tr>
<tr>
<td height="5"><marquee>
SAVE ELECTICITY&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;SAVE
WATER</marquee></td>
</tr>
<tr>
<td height="5" ><jsp:include page="adminmenu.jsp"/></td>
</tr>
<tr><td>
<%
DateFormat df=new SimpleDateFormat("EEEE,dd MMM,yyyy");
String date=df.format(new java.util.Date());
out.print(" | "+date+" | ");
String logina=(String)session.getAttribute("logina");
if("yesa".equals(logina))
out.print("Welcome Mr......"+(String)session.getAttribute("useradmin"));

%>
<div id="apDiv1"><a href="index.jsp">Logout</a></div>
</td></tr>
<tr>
<td height="408" valign="middle">

<form method="post" action="unblockhandler.jsp">


<table align="center"><tr><td align="center"><h3>UnBlock User</h3></td></tr>
<%if("success".equals((String)request.getParameter("msg")))
out.println("<tr><td>User Unblocked Successfully...</td></tr>");%>
<tr><td>&nbsp;</td></tr>
<%try{
Class.forName("oracle.jdbc.driver.OracleDriver");

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 159
HOTEL MANAGEMENT SYSTEM
Connection
con=DriverManager.getConnection("jdbc:oracle:thin:@localhost:1521:xe","ebilling","ebilling")
;
Statement stmt=con.createStatement();
String query="select * from logintable where status='NO'";
ResultSet rs=stmt.executeQuery(query);

%>

<tr><td align="center"><b>List Of UnAuthenticated Users:</b>


<select name="userlist">
<% while(rs.next())
{
%>
<option><%=rs.getString("emailid")%></option>

<%
}
}
catch(Exception e)
{
out.print(e);
}%>
</select></td></tr><tr><td>&nbsp;</td></tr>
<tr><td align="center"><b>Enter Loginid for Block:</b><input type="text"
name="loginidblock" value=""/></td></tr>
<tr><td align="center"><input name="submit" type="submit" value="UnBlock" /></td></tr>
<tr><td>&nbsp;</td></tr>

</table>

</form>

</td>
</tr>
<tr>

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 160
HOTEL MANAGEMENT SYSTEM
<td height="5"align="center" ><jsp:include page="footer.jsp"/></td> </tr>
</table>
</body>
</html>

Unblockhandler.jsp

<%@page contentType="text/html" pageEncoding="UTF-8" import="java.sql.*"%>


<% String blockid=request.getParameter("loginidblock");
String block="YES";
try{
Class.forName("oracle.jdbc.driver.OracleDriver");
Connection
con=DriverManager.getConnection("jdbc:oracle:thin:@localhost:1521:xe","ebilling","ebilling");
String qry="Update logintable set status='"+block+"' where emailid='"+blockid+"'";
PreparedStatement prestmt=con.prepareStatement(qry);
prestmt.executeUpdate();
response.sendRedirect("unblockuser.jsp?msg=success");

}
catch(Exception e)
{
out.println(e);
}
%>

Adminprofile.jsp

<%@ page contentType="text/html ; charset=iso-8859-1" language="java"


import="java.sql.*,java.util.* , java.text.*" errorPage=""%>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
<link href="css/style.css" type="text/css" rel="stylesheet"/>
<title>ebiling.com</title>
<style type="text/css">
Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .
Roll No :- 0901204, 0901157, 0901105, 0801407 Page 161
HOTEL MANAGEMENT SYSTEM
#apDiv1 {
position:absolute;
width:200px;
height:115px;
z-index:1;
left: 980px;
top: 185px;
}
</style>
</head>

<body bgcolor="#FFFFCC">

<table bgcolor="#990000"align="center" height="523" width="700" border="1">


<tr>
<td height="100" width="700"><jsp:include page="header1.jsp"/></td>
</tr>
<tr>
<td height="5"><marquee>
SAVE ELECTICITY&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;SAVE
WATER</marquee></td>
</tr>
<tr>
<td height="5" ><jsp:include page="adminmenu.jsp"/></td>
</tr>
<tr><td>
<%
DateFormat df=new SimpleDateFormat("EEEE,dd MMM,yyyy");
String date=df.format(new java.util.Date());
out.print(" | "+date+" | ");
String logina=(String)session.getAttribute("logina");
if("yesa".equals(logina))
out.print("Welcome Mr......"+(String)session.getAttribute("useradmin"));

%>
<div id="apDiv1"><a href="index.jsp">Logout</a></div>
</td></tr>
<tr>
<td height="408">
<%
String ademail=(String)session.getAttribute("ademail");

try
{
Class.forName("oracle.jdbc.driver.OracleDriver");
Connection
con=DriverManager.getConnection("jdbc:oracle:thin:@localhost:1521:xe","ebilling","eb
illing");
Statement stmt = con.createStatement();

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 162
HOTEL MANAGEMENT SYSTEM
String query="select * from admintable where emailid='"+ademail+"'";
ResultSet rs=stmt.executeQuery(query);
while(rs.next())
{

%>
<table border="0" align="center">
<tr>
<td colspan="2"><div
align="center"><strong><h3>YourProfile</h3></strong></div></td>
</tr>
<tr>
<td colspan="2"><em><h4>Following Information was furnished at the time of
Interview to ebilling system.com</h4></em></td>
</tr>
<tr>
<td width="279"><b>Name</b> </td>
<td width="295"><%=rs.getString(3)%></td>
</tr>
<tr>
<td><b>ContactNo</b></td>
<td><%=rs.getString(4)%></td>
</tr>
<tr>
<td><b>Address</b></td>
<td><%=rs.getString(5)%></td>
</tr>
<tr>
<td><b>Password</b></td>
<td><%=rs.getString(2)%></td>
<%}
}
catch(Exception e)
{out.print(e);}%>
</tr></table>
</td>
</tr>
<tr>
<td height="5"align="center" ><jsp:include page="footer.jsp"/></td>
</tr>
</table>
</body>
</html>

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 163
HOTEL MANAGEMENT SYSTEM

Customerhome.jsp

<%@ page contentType="text/html ; charset=iso-8859-1" language="java"


import="java.sql.*,java.util.* , java.text.*" errorPage=""%>
<%
String na=(String)session.getAttribute("a");
String cnm=null;
try
{
Class.forName("oracle.jdbc.driver.OracleDriver");
Connection
con=DriverManager.getConnection("jdbc:oracle:thin:@localhost:1521:xe","ebilling","ebilling");
Statement stmt = con.createStatement();
String query="select * from logintable where emailid='"+na+"'";
ResultSet rs=stmt.executeQuery(query);
while(rs.next())
{
String cnn = rs.getString(3);
cnm=rs.getString(4);
session.setAttribute("cnno", cnm);
String mtn = rs.getString(5);
session.setAttribute("meterno",mtn);
String name = rs.getString(6);
String ld = rs.getString(7);
String ty = rs.getString(8);
String adr = rs.getString(9);

%>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/
xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
<link href="css/style.css" type="text/css" rel="stylesheet"/>
<title>ebiling.com</title>
<style type="text/css">
#apDiv1 {
position:absolute;
width:200px;
height:24px;
z-index:1;
left: 980px;
top: 180px;
}
</style>
</head>

<body bgcolor="#FFFF99">
<table bgcolor="#990000" align="center" height="523" width="700" border="1">
<tr>
<td height="100" width="700"><jsp:include page="header1.jsp"/></td>
</tr>

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 164
HOTEL MANAGEMENT SYSTEM
<tr>
<td height="5"><marquee>
SAVE ELECTICITY&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;SAVE WATER
</marquee></td>
</tr>
<tr>
<td height="5" ><jsp:include page="customerhomeframe.jsp"/></td>
</tr>
<tr>
<td height="5"><%
DateFormat df=new SimpleDateFormat("EEEE, dd MMMM, yyyy");
String date=df.format(new java.util.Date());
out.print("| "+date+" | ");
%>
<div id="apDiv1"><table><tr><td><a
href=index.jsp>Logout</a></td></tr></table></div></td>
</tr>
<tr>
<td height="408">
<table align="center" height="293" width="400" border="0">
<tr>
<td height="50"colspan="2"><div align="center"><strong><h3>Welcome To The
Customer</h3></strong></div>
<label></label>
<div align="center"></div></td>
</tr>
<tr>
<td height="30"><div align="left"><b>Connection No.</b></div></td>
<td width="153"><%=rs.getString(4)%></td>
</tr>
<tr>
<td height="30"><div align="left"><b>Meter No.</b></div></td>
<td width="153"><%=rs.getString(5)%></td>
</tr>
<tr>
<td height="30"><div align="left"><b>Name</b></div></td>
<td><%=rs.getString(6)%></td>
</tr>
<tr>
<td height="30"><div align="left"><b>Type</b></div></td>
<td><%=rs.getString(8)%></td>
</tr>
<tr>
<td height="30"><div align="left"><b>Load</b></div></td>
<td><%=rs.getString(7)%></td>
</tr>
<tr>
<td height="30"><div align="left"><b>Address</b></div></td>
<td>
<%=rs.getString(9)%>
</td>
</tr>
</table>
</td>
Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .
Roll No :- 0901204, 0901157, 0901105, 0801407 Page 165
HOTEL MANAGEMENT SYSTEM
</tr>
<tr>
<td height="5"align="center"><jsp:include page="footer.jsp"/></td>
</tr>
</table>
</body>
</html>
<% }
}
catch(Exception e)
{
out.println(e);
}
%>

Customerhomeframe.jsp
<%@page language="java"%>
<html>
<body>
<link href="css/style.css" type="text/css" rel="stylesheet"/>
<table border="0" cellpadding="0" cellspacing="0" align="center" >
<tr>
<td width="10" class="menu_button_left"></td>
<td class="menu"><a href="customerhome.jsp">Welcome</a></td>
<td width="19" class="menu_button_mid"></td>
<td class="menu"><a href="myaccount.jsp">My Account</a></td>
<td width="19" class="menu_button_mid"></td>
<td class="menu"><a href="mybilling.jsp">My Billing</a></td>
<td width="19" class="menu_button_mid"></td>
<td class="menu"><a href="profile.jsp">My Profile</a></td>
<td width="19" class="menu_button_mid"></td>
<td class="menu"><a href="inquery.jsp">Enquiry</a></td>
</tr>
</table>
</body>
</html>

Myaccount.jsp
<%@ page contentType="text/html; charset=iso-8859-1" language="java" import="java.sql.*,
java.util.*, java.text.* " errorPage="" %>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/
xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
<link href="css/style.css" type="text/css" rel="stylesheet"/>
<title>ebiling.com</title>
<style type="text/css">
#apDiv1 {
position:absolute;
width:200px;

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 166
HOTEL MANAGEMENT SYSTEM
height:24px;
z-index:1;
left: 980px;
top: 180px;
}
</style>
</head>

<body bgcolor="#FFFF99">
<table bgcolor="#990000" align="center" height="523" width="700" border="1">
<tr>
<td height="100" width="700"><jsp:include page="header1.jsp"/></td>
</tr>
<tr>
<td height="5"><marquee>
SAVE ELECTICITY&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;SAVE WATER
</marquee></td>
</tr>
<tr>
<td height="5" ><jsp:include page="customerhomeframe.jsp"/></td>
</tr>
<tr>
<td height="5"><%
DateFormat df=new SimpleDateFormat("EEEE, dd MMMM, yyyy");
String date=df.format(new java.util.Date());
out.print("| "+date+" | ");
%>
<div id="apDiv1"><table><tr><td><a
href=index.jsp>Logout</a></td></tr></table></div></td>
</tr>
<tr>
<td height="408"><jsp:include page="myaccountdata.jsp"/></td>
</tr>
<tr>
<td height="5"align="center"><jsp:include page="footer.jsp"/></td>
</tr>
</table>
</body>
</html>

Myaccountdata.jsp

<%@page contentType="text/html" pageEncoding="UTF-8" import="java.sql.*"%>


<form name="form1" method="post" action="">
<table align="center" width="387" border="0">
<tr>
<td colspan="2"><div align="center"><strong><h3>MY
ACCOUNT</h3></strong></div></td>
</tr>
<tr>
<td width="167"><b>Customer Name</b></td>
<td width="204"><label>

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 167
HOTEL MANAGEMENT SYSTEM
<input type="text" name="textfield" id="textfield">
</label></td>
</tr>
<tr>
<td><b>Current Bill</b></td>
<td><label>
<input type="text" name="textfield2" id="textfield2">
</label></td>
</tr>
<tr>
<td><b>Last Bill Date</b></td>
<td><label>
<input type="text" name="textfield3" id="textfield3">
</label></td>
</tr>
<tr>
<td><b>Last Bill Ammount</b></td>
<td><label>
<input type="text" name="textfield4" id="textfield4">
</label></td>
</tr>
<tr>
<td><b>Last Payment</b></td>
<td><label>
<input type="text" name="textfield5" id="textfield5">
</label></td>
</tr>
<tr>
<td><b>Last Payment Date</b></td>
<td><label>
<input type="text" name="textfield6" id="textfield6">
</label></td>
</tr>
<tr>
<td><b>Mode of Payment</b></td>
<td><label>
<input type="text" name="textfield7" id="textfield7">
</label></td>
</tr>
<tr>
<td><b>Next Bill Date</b></td>
<td><label>
<input type="text" name="textfield8" id="textfield8">
</label></td>
</tr>
<tr>
<td><b>Credit limit</b></td>
<td><label>
<input type="text" name="textfield9" id="textfield9">
</label></td>
</tr>
<tr>
<td height="26<b>Unbilled Ammount</b></td>
<td><input type="text"name="textfield10" id="textfield10">
Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .
Roll No :- 0901204, 0901157, 0901105, 0801407 Page 168
HOTEL MANAGEMENT SYSTEM
</td>
</tr>
</table>
</form>

Mybilling.jsp

<%@ page contentType="text/html; charset=iso-8859-1" language="java" import="java.sql.*,


java.util.*, java.text.* " errorPage="" %>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/
xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
<link href="css/style.css" type="text/css" rel="stylesheet"/>
<title>ebiling.com</title>
<style type="text/css">
#apDiv1 {
position:absolute;
width:200px;
height:24px;
z-index:1;
left: 980px;
top: 180px;
}
</style>
</head>

<body bgcolor="#FFFF99">
<table bgcolor="#990000" align="center" height="523" width="700" border="1">
<tr>
<td height="100" width="700"><jsp:include page="header1.jsp"/></td>
</tr>
<tr>
<td height="5"><marquee>
SAVE ELECTICITY&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;SAVE WATER
</marquee></td>
</tr>
<tr>
<td height="5" ><jsp:include page="customerhomeframe.jsp"/></td>
</tr>
<tr>
<td height="5"><%
DateFormat df=new SimpleDateFormat("EEEE, dd MMMM, yyyy");
String date=df.format(new java.util.Date());
out.print("| "+date+" | ");
%>
<div id="apDiv1"><table><tr><td><a
href=index.jsp>Logout</a></td></tr></table></div></td>
</tr>
<tr>
<td height="408"><jsp:include page="mybillingdata.jsp"/></td>

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 169
HOTEL MANAGEMENT SYSTEM
</tr>
<tr>
<td height="5"align="center"><jsp:include page="footer.jsp"/></td>
</tr>
</table>
</body>
</html>

Mybillingdata.jsp

<%@ page contentType="text/html; charset=utf-8" language="java" import="java.sql.*"


errorPage="" %>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/
xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
<title>Untitled Document</title></head>

<body>
<form id="form1" name="form1" method="post" action="">
<table align="left" width="224" border="0">
<tr>
<td width="250" height="40"><strong><a href="viewbill.jsp"><b>VIEW
BILL</b></a></strong></td>
</tr>
<tr>
<td height="40"><strong><a href="pay1.jsp"><b>PAY BILL</b></a></strong></td>
</tr>
<tr>
<td height="40"><strong><a href="paymenthistory.jsp"><b>PAYMENT
HISTORY</b></a></strong></td>
</tr>
<tr>
<td height="40"><strong><a href="creditlimit.jsp"><b>CREDIT
LIMIT</b></a></strong></td>
</tr>

<tr>
<td height="40"><strong><a href="unbilleduser.jsp"><b>UNBILLED
USER</b></a></strong></td>
</tr>

</table>

</form>
</body>
</html>

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 170
HOTEL MANAGEMENT SYSTEM

Viewbill.jsp
<%@ page contentType="text/html ; charset=iso-8859-1" language="java"
import="java.sql.*,java.util.* , java.text.*" errorPage=""%>
<%
String cnm=(String)session.getAttribute("cnno");
String na=(String)session.getAttribute("a");
String meterno=(String)session.getAttribute("meterno");
int metern=Integer.parseInt(meterno);

int invoice=0;
try{
Class.forName("oracle.jdbc.driver.OracleDriver");
Connection
con=DriverManager.getConnection("jdbc:oracle:thin:@localhost:1521:xe","ebilling","ebilling");

Statement stmt1=con.createStatement();
String qry="select max(invoicenno) from billdetails where connectionno='"+cnm+"'";
ResultSet rs1=stmt1.executeQuery(qry);
while(rs1.next())
{
invoice=rs1.getInt(1);
}
stmt1.close();
rs1.close();

Statement stmt2=con.createStatement();
String query="select * from billdetails where invoicenno='"+invoice+"'";
ResultSet rs2=stmt2.executeQuery(query);
while(rs2.next())
{

%>

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/


xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
<link href="css/style.css" type="text/css" rel="stylesheet"/>
<title>ebiling.com</title>
<style type="text/css">
#apDiv1 {
position:absolute;
width:200px;
height:24px;
z-index:1;
left: 980px;
top: 180px;
}

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 171
HOTEL MANAGEMENT SYSTEM
</style>
</head>

<body bgcolor="#FFFF99">
<table bgcolor="#990000" align="center" height="523" width="700" border="1">
<tr>
<td height="100"><jsp:include page="header1.jsp"/></td>
</tr>
<tr>
<td height="5"><marquee>
SAVE ELECTICITY&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;SAVE WATER
</marquee></td>
</tr>
<tr>
<td height="5" ><jsp:include page="customerhomeframe.jsp"/></td>
</tr>
<tr>
<td height="5"><%
DateFormat df=new SimpleDateFormat("EEEE, dd MMMM, yyyy");
String date=df.format(new java.util.Date());
out.print("| "+date+" | ");
%>
<div id="apDiv1"><table><tr><td><a
href=index.jsp>Logout</a></td></tr></table></div></td>
</tr>
<tr><td height="407" align="center">
<table width="245" border="0">
<tr>
<td height="31" colspan="3"><div align="center"><strong><h3>Bill Details</h3></strong></
div></td>
</tr>

<tr>
<td height="37"><b>Connection No.</b></td>
<td><%=rs2.getString(2)%></td>

</tr>
<tr>
<td height="30"><b>Meter No.</b></td>
<td><%out.print(metern);%></td>

</tr>
<tr>
<td height="31"><b>Bill Date</b></td>
<td><%=rs2.getString("billdate")%></td>

</tr>
<tr>
<td height="29"><b>Ammount</b></td>
<td><%=rs2.getInt("amount")%></td>

</tr>
<tr>
Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .
Roll No :- 0901204, 0901157, 0901105, 0801407 Page 172
HOTEL MANAGEMENT SYSTEM
<td height="30"><b>Due Date</b></td>
<td><%=rs2.getString("duedate")%></td>

</tr>
<tr>
<td height="29"><b>Invoice No.</b></td>
<td><%out.print(invoice);%></td>

</tr>
<tr>
<td height="31">&nbsp;</td>
<td><a href="#"><b>Details</b></a></td>
<td><a href="#"><b>Download</b></a></td>
</tr>

</table>
</td>
</tr>
<tr>
<td height="5"align="center"><jsp:include page="footer.jsp"/></td>
</tr>
</table>
</body>
</html>

<%
}
}
catch(Exception e)
{
out.println(e);
}
%>

Viewbilldata.jsp

<%@ page contentType="text/html; charset=utf-8" language="java" import="java.sql.*"


errorPage="" %>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/
xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
<title>Untitled Document</title>
</head>

<body>
<form id="form1" name="form1" method="post" action="">
<table width="237" border="0">
<tr>

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 173
HOTEL MANAGEMENT SYSTEM
<td height="31" colspan="3"><div align="center"><strong>Bill Details</strong></div></td>
</tr>

<tr>
<td height="37">Connection No.</td>
<td>&nbsp;</td>
<td>&nbsp;</td>
</tr>
<tr>
<td height="30">Meter No.</td>
<td>&nbsp;</td>
<td>&nbsp;</td>
</tr>
<tr>
<td height="31">Bill Date</td>
<td>&nbsp;</td>
<td>&nbsp;</td>
</tr>
<tr>
<td height="29">Ammount</td>
<td>&nbsp;</td>
<td>&nbsp;</td>
</tr>
<tr>
<td height="30">Due Date</td>
<td>&nbsp;</td>
<td>&nbsp;</td>
</tr>
<tr>
<td height="29">Invoice No.</td>
<td>&nbsp;</td>
<td>&nbsp;</td>
</tr>
<tr>
<td height="31">&nbsp;</td>
<td><a href="#">Details</a></td>
<td><a href="#">Download</a></td>
</tr>
</table>
<table align="left"width="100" border="0">
<tr>
<td>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<strong><a
href="customerhome.jsp">Log Out</a></strong></td>
</tr>
</table>
</form>
</body>
</html>

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 174
HOTEL MANAGEMENT SYSTEM

Pay1.jsp

<%@ page contentType="text/html; charset=iso-8859-1" language="java" import="java.sql.*,


java.util.*, java.text.* " errorPage="" %>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/
xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
<title>Untitled Document</title>
<script type="text/javascript">
function fun(str)
{
if(str=="net")
{
document.getElementById("data").innerHTML="<table width='400'
height='478'border='0'><tr><td width='20'><input type='radio' name='radio' id='radio'
value='radio'/></td><td width='118'><img src='images/162.gif' width='117'/></td><td
width='20'><input type='radio' name='radio' id='radio14' value='radio'/></td><td
width='141'><img src='images/ALB.gif' width='138' height='36'/></td><td width='20'><input
type='radio' name='radio' id='radio15' value='radio'/></td><td width='136'><img
src='images/BBK.gif' width='125' height='35'/></td><td width='20'><input type='radio'
name='radio' id='radio16' value='radio'/></td><td width='733'><img src='images/BBR.gif'
width='140' height='35'/></td></tr><tr><td><input type='radio' name='radio' id='radio2'
value='radio' /></td><td height='54'><img src='images/BOI.gif' width='118'/></td><td><input
type='radio' name='radio' id='radio13' value='radio'/></td><td><img src='images/BOM.gif'
width='141'/></td><td><input type='radio' name='radio' id='radio18'
value='radio'/></td><td><img src='images/CRP.gif' width='128'/></td><td><input type='radio'
name='radio' id='radio17' value='radio'/></td><td><img src='images/CUB.gif' width='138'
height='38'/></td></tr><tr><td><input type='radio' name='radio' id='radio3'
value='radio'/></td><td height='54'><img src='images/DBK.gif' width='115'/></td><td><input
type='radio' name='radio' id='radio12' value='radio'/></td><td><img
src='images/HDFC.gif'/></td><td><input type='radio' name='radio' id='radio19'
value='radio'/></td><td><img src='images/ICICI.gif' width='129'/></td><td><input type='radio'
name='radio' id='radio20' value='radio'/></td><td><img src='images/IDB.gif'
width='142'/></td></tr><tr><td><input type='radio' name='radio' id='radio4'
value='radio'/></td><td height='59'><img src='images/IDS.gif' width='113'/></td><td><input
type='radio' name='radio' id='radio11' value='radio'/></td><td><img src='images/INB.gif'
width='139' height='39'/></td><td><input type='radio' name='radio' id='radio22'
value='radio'/></td><td><img src='images/IOB.gif' width='129'/></td><td><input type='radio'
name='radio' id='radio21' value='radio'/></td><td><img src='images/JKB.gif' width='139'
height='36'/></td></tr><tr><td><input type='radio' name='radio' id='radio5'
value='radio'/></td><td height='46'><img src='images/KBL.gif' width='114'/></td><td><input
type='radio' name='radio' id='radio10' value='radio'/></td><td><img
src='images/KVB.gif'/></td><td><input type='radio' name='radio' id='radio23'
value='radio'/></td><td><img src='images/LVC.gif' width='128'/></td><td><input type='radio'
name='radio' id='radio26' value='radio'/></td><td><img src='images/LVR.gif' width='138'
height='39'/></td></tr><tr><td><input type='radio' name='radio' id='radio6'
value='radio'/></td><td><img src='images/OBC.gif' width='115' height='30'/></td><td><input
type='radio' name='radio' id='radio9' value='radio'/></td><td><img
src='images/PNB.gif'/></td><td><input type='radio' name='radio' id='radio24'

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 175
HOTEL MANAGEMENT SYSTEM
value='radio'/></td><td><img src='images/PSB.gif' width='132'/></td><td><input type='radio'
name='radio' id='radio27' value='radio'/></td><td><img src='images/SBI.gif'
width='137'/></td></tr><tr><td><input type='radio' name='radio' id='radio7'
value='radio'/></td><td><img src='images/SBJ.gif' width='107'/></td><td><input type='radio'
name='radio' id='radio8' value='radio'/></td><td><img src='images/SBP.gif' width='138'
height='34'/></td><td><input type='radio' name='radio' id='radio25'
value='radio'/></td><td><img src='images/SIB.gif' width='134' height='39'/></td><td><input
type='radio' name='radio' id='radio28' value='radio'/></td><td><img src='images/SVC.gif'
width='138' height='34'/></td></tr><tr><td><input type='radio' name='radio' id='radio32'
value='radio'/></td><td><img src='images/SYD.gif' width='111' height='32'/></td><td><input
type='radio' name='radio' id='radio31' value='radio'/></td><td><img src='images/TMB.gif'
width='135' height='42'/></td><td><input type='radio' name='radio' id='radio30'
value='radio'/></td><td><img src='images/UBI.gif' width='136' height='39'/></td><td><input
type='radio' name='radio' id='radio29' value='radio'/></td><td><img src='images/UTI.gif'
width='139'/></td></tr><tr><td><input type='radio' name='radio' id='radio33'
value='radio'/></td><td><img src='images/YBK.gif' width='113'/></td></tr></table>";
}
if(str=="card")
{
document.getElementById("data").innerHTML="<table width='300'
height='67'border='0'><tr><td><input type='radio' name='radio' id='radio'
value='radio'/></td><td><img src='images/Visa Card.gif'/></td><td><input type='radio'
name='radio' id='radio2' value='radio'/></td><td><img src='images/Master
Card.gif'/></td><td><input type='radio' name='radio' id='radio3' value='radio'/></td><td><img
src='images/Amex Card.gif'/></td> </tr></table>";
}
}
</script>
<style type="text/css">
<!--
#apDiv1 {
position:absolute;
width:200px;
height:18px;
z-index:1;
left: 980px;
top: 185px;
}
-->
</style>
</head>

<body bgcolor="#FFFF99">
<table bgcolor="#990000" align="center" height="604" width="712" border="1">
<tr>
<td width="717" height="100"><jsp:include page="header1.jsp"/></td>
</tr>
<tr>
<td height="5"><marquee>
SAVE ELECTICITY&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;SAVE WATER
</marquee></td>
</tr>
<tr>
<td height="5" ><jsp:include page="customerhomeframe.jsp"/></td>
Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .
Roll No :- 0901204, 0901157, 0901105, 0801407 Page 176
HOTEL MANAGEMENT SYSTEM
</tr>
<tr>
<td height="5"><%
DateFormat df=new SimpleDateFormat("EEEE, dd MMMM, yyyy");
String date=df.format(new java.util.Date());
out.print("| "+date+" | ");

%>
</td>
</tr>
<tr>
<td height="408"><div id="apDiv1"><a href="index.jsp">LogOut</a></div>
<table width="491" height="148" border="0">
<tr>
<td colspan="5" align="center"><h3>Payment Home</h3></td>
</tr>

<tr>
<td align="center"><b>Ammount:</b><input type="text" name="textfield" id="textfield"
/></td>
</tr>
<tr>
<td align="center"><b>Mode:</b>&nbsp;&nbsp;<input type="radio" name="radio"
id="radio" value="net" onclick="fun('net')"/>
Net Banking&nbsp;&nbsp;<input type="radio" name="radio" id="radio" value="card"
onclick="fun('card')" />
Credit Card</td>
</tr>
<tr><td align="center"><div id="data"></div></td></tr>
<tr><td><input type="submit" name="submit" value="PayNow"/></td></tr>

</table></td>
</tr>
<tr>
<td height="5"align="center"><jsp:include page="footer.jsp"/></td>
</tr>
</table>
</body>
</html>

Paymenthistory.jsp

<%@ page contentType="text/html; charset=iso-8859-1" language="java" import="java.sql.*,


java.util.*, java.text.* " errorPage="" %>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/
xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
<link href="css/style.css" type="text/css" rel="stylesheet"/>
Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .
Roll No :- 0901204, 0901157, 0901105, 0801407 Page 177
HOTEL MANAGEMENT SYSTEM
<title>ebiling.com</title>
<style type="text/css">
#apDiv1 {
position:absolute;
width:200px;
height:24px;
z-index:1;
left: 980px;
top: 180px;
}
</style>
</head>

<body bgcolor="#FFFF99">
<table bgcolor="#990000" align="center" height="523" width="700" border="1">
<tr>
<td height="100"><jsp:include page="header1.jsp"/></td>
</tr>
<tr>
<td height="5"><marquee>
SAVE ELECTICITY&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;SAVE WATER
</marquee></td>
</tr>
<tr>
<td height="5" ><jsp:include page="customerhomeframe.jsp"/></td>
</tr>
<tr>
<td height="5"><%
DateFormat df=new SimpleDateFormat("EEEE, dd MMMM, yyyy");
String date=df.format(new java.util.Date());
out.print("| "+date+" | ");
%>
<div id="apDiv1"><table><tr><td><a
href=index.jsp>Logout</a></td></tr></table></div></td>
</tr>
<tr>
<td height="408"><jsp:include page="paymenthistorydata.jsp"/></td>
</tr>
<tr>
<td height="5"align="center"><jsp:include page="footer.jsp"/></td>
</tr>
</table>
</body>
</html>

Paymenthistorydata.jsp

<%@ page contentType="text/html; charset=utf-8" language="java" import="java.sql.*"


errorPage="" %>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/
xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 178
HOTEL MANAGEMENT SYSTEM
<head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
<title>Untitled Document</title>
</head>

<body>
<form id="form1" name="form1" method="post" action="">
<table width="323" height="326" border="0" align="center">
<tr>
<td colspan="3"><div align="center"><strong><h3>PAYMENT HISTORY</h3></strong></
div></td>
</tr>
<tr>
<td width="124"><b>S.No.</b></td>
<td width="90">&nbsp;</td>
<td width="68">&nbsp;</td>
</tr>
<tr>
<td><b>Payment Date</b></td>
<td>&nbsp;</td>
<td>&nbsp;</td>
</tr>
<tr>
<td><b>Reciept Date</b></td>
<td>&nbsp;</td>
<td>&nbsp;</td>
</tr>
<tr>
<td><b>Payment Mode</b></td>
<td>&nbsp;</td>
<td>&nbsp;</td>
</tr>
<tr>
<td><b>Amount</b></td>
<td>&nbsp;</td>
<td>&nbsp;</td>
</tr>
<tr>
<td><b>Status</b></td>
<td>&nbsp;</td>
<td>&nbsp;</td>
</tr>
<tr>
<td>&nbsp;</td>
<td><strong><a href="#"><b>Download</b></a></strong></td>
<td><strong><a href="#"><b>Print</b></a></strong></td>
</tr>
</table>

</form>
</body>
</html>

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 179
HOTEL MANAGEMENT SYSTEM
Profile.jsp

<%@ page contentType="text/html; charset=iso-8859-1" language="java" import="java.sql.*,


java.util.*, java.text.* " errorPage="" %>
<%
String na=(String)session.getAttribute("a");

try
{
Class.forName("oracle.jdbc.driver.OracleDriver");
Connection
con=DriverManager.getConnection("jdbc:oracle:thin:@localhost:1521:xe","ebilling","ebilling");
Statement stmt = con.createStatement();
String query="select * from logintable where emailid='"+na+"'";
ResultSet rs=stmt.executeQuery(query);
while(rs.next())
{
String cn=rs.getString(4);
session.setAttribute("b",cn);
%>
<html >
<head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
<link href="css/style.css" type="text/css" rel="stylesheet"/>
<title>ebiling.com</title>
<style type="text/css">
#apDiv1 {
position:absolute;
width:200px;
height:24px;
z-index:1;
left: 980px;
top: 180px;
}
</style>
</head>

<body bgcolor="#FFFF99">
<table bgcolor="#990000" align="center" height="523" width="700" border="1">
<tr>
<td height="100"><jsp:include page="header1.jsp"/></td>
</tr>
<tr>
<td height="5"><marquee>
SAVE ELECTICITY&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;SAVE WATER
</marquee></td>
</tr>
<tr>
<td height="5" ><jsp:include page="customerhomeframe.jsp"/></td>
</tr>
<tr>
<td height="5"><%

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 180
HOTEL MANAGEMENT SYSTEM
DateFormat df=new SimpleDateFormat("EEEE, dd MMMM, yyyy");
String date=df.format(new java.util.Date());
out.print("| "+date+" | ");
%>
<div id="apDiv1"><table><tr><td><a
href=index.jsp>Logout</a></td></tr></table></div></td>
</tr>
<tr>
<td height="408"><table width="584" height="389" border="0" align="center">
<tr>
<td colspan="2"><div align="center"><strong>
<h3>Registration Information</h3>
</strong></div></td>
</tr>
<tr>
<td colspan="2"><em><b>Following Information was furnished at the time of
registration to ebilling system.com</b></em></td>
</tr>
<tr>
<td width="279"><b>ConnectionNo</b> </td>
<td width="295"><%=rs.getString(4)%></td>
</tr>
<tr>
<td><b>Customer name</b></td>
<td><%=rs.getString(6)%></td>
</tr>
<tr>
<td><b>Load</b></td>
<td><%=rs.getString(7)%></td>
</tr>
<tr>
<td><b>Address</b></td>
<td><%=rs.getString(9)%></td>
</tr>
<tr>
<td><b>Emil-Id</b></td>
<td><%=rs.getString(1)%></td>
</tr>
<tr>
<td><b>Password</b></td>
<td><%=rs.getString(2)%></td>
</tr>
<tr>
<td><b>ContactNo</b></td>
<td><%=rs.getString(3)%></td>
</tr>
<tr>
<td><b>Type of Electricity</b></td>
<td><%=rs.getString(8)%></td>
</tr>
<tr>
<td colspan="2"><a href="editprofile.jsp"><b>Edit</b></a></td>
<td><a href="changepasswordprofile.jsp"><b>ChangePassword</b></a> </td>
</tr>
Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .
Roll No :- 0901204, 0901157, 0901105, 0801407 Page 181
HOTEL MANAGEMENT SYSTEM
</table></td>
</tr>
<tr>
<td height="5"align="center"><jsp:include page="footer.jsp"/></td>
</tr>
</table>
</body>
</html>
<%
}
}
catch(Exception e)
{
out.println(e);
}
%>

Editprofile.jsp
<%@ page contentType="text/html; charset=iso-8859-1" language="java" import="java.sql.*,
java.util.*, java.text.* " errorPage="" %>
<%
String na=(String)session.getAttribute("a");

try
{
Class.forName("oracle.jdbc.driver.OracleDriver");
Connection
con=DriverManager.getConnection("jdbc:oracle:thin:@localhost:1521:xe","ebilling","ebilling");
Statement stmt = con.createStatement();
String query="select * from logintable where emailid='"+na+"'";
ResultSet rs=stmt.executeQuery(query);
while(rs.next())
{
%>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/
xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
<link href="css/style.css" type="text/css" rel="stylesheet"/>
<link href="css/style.css" type="text/css" rel="stylesheet"/>
<title>ebiling.com</title>
<style type="text/css">
#apDiv1 {
position:absolute;
width:200px;
height:24px;
z-index:1;
left: 980px;
top: 180px;

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 182
HOTEL MANAGEMENT SYSTEM
}
</style>
</head>

<body bgcolor="#FFFF99">
<form name="form1" method="post" action="upadatehandler.jsp">
<table bgcolor="#990000" align="center" height="523" width="700" border="1">

<tr>
<td height="100" width="700"><jsp:include page="header1.jsp"/></td>
</tr>
<tr>
<td height="5"><marquee>
SAVE ELECTICITY&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;SAVE WATER</marquee></
td>
</tr>
<tr>
<td height="5" ><jsp:include page="customerhomeframe.jsp"/></td>
</tr>
<tr>
<td height="5"><%
DateFormat df=new SimpleDateFormat("EEEE, dd MMMM, yyyy");
String date=df.format(new java.util.Date());
out.print("| "+date+" | ");
%>
<div id="apDiv1"><table><tr><td><a
href=index.jsp>Logout</a></td></tr></table></div></td>
</tr>
<tr>
<td height="408" align="center"><table width="475" height="226" border="0"
align="center">
<tr>
<td width="142"><b>Email-Id</b></td>
<td width="140"><input type="text" name="editname"
value="<%=rs.getString(1)%>"/></td>
<td width="171">&nbsp;</td>
</tr>
<tr>
<td><b>Password</b></td>
<td><input type="text" name="editpass" value="<%=rs.getString(2)%>"/></td>
<td>&nbsp;</td>
</tr>
<tr>
<td><b>Contact No</b></td>
<td><input type="text" name="editcot" value="<%=rs.getString(3)%>"/></td>
<td>&nbsp;</td>
</tr>
<tr>
<td><b>Type of Electricity</b></td>
<td><input type="text" name="editelect" value="<%=rs.getString(8)%>"/></td>
<td>&nbsp;</td>
</tr>
<tr>

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 183
HOTEL MANAGEMENT SYSTEM
<td colspan="3"><input type="submit" name="button" id="button" value="Update" /> /
<a href="changepasswordprofile.jsp"><b>Change Password</b></a>
<div align="center"><hr width="100"/>
<a href="profile.jsp">BACK</a><hr width="100"/></div> </td>
</tr>

</table></td></tr>
<tr>
<td height="5"align="center" ><jsp:include page="footer.jsp"/></td> </tr>
</table>
</form>
</body>
</html>
<%
}
}
catch(Exception e)
{
out.println(e);%>

Changepasswordprofile.jsp

<%@ page contentType="text/html; charset=iso-8859-1" language="java" import="java.sql.*,


java.util.*, java.text.* " errorPage="" %>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
<link href="css/style.css" type="text/css" rel="stylesheet"/>
<link href="css/style.css" type="text/css" rel="stylesheet"/>
<title>ebiling.com</title>
<style type="text/css">
#apDiv1 {
position:absolute;
width:200px;
height:24px;
z-index:1;
left: 980px;
top: 180px;
}
</style>
</head>

<body bgcolor="#FFFF99">
<form name="frmcp" method="post" action="changephandler.jsp">
<table bgcolor="#990000" align="center" height="523" width="700" border="1">
<tr>
<td height="100" width="700"><jsp:include page="header1.jsp"/></td>
</tr>
<tr>
<td height="5"><marquee>

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 184
HOTEL MANAGEMENT SYSTEM
SAVE ELECTICITY&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;SAVE
WATER</marquee></td>
</tr>
<tr>
<td height="5" ><jsp:include page="customerhomeframe.jsp"/></td>
</tr>
<tr>
<td height="5"><%
DateFormat df=new SimpleDateFormat("EEEE, dd MMMM, yyyy");
String date=df.format(new java.util.Date());
out.print("| "+date+" | ");
%>
<div id="apDiv1"><table><tr><td><a
href=index.jsp>Logout</a></td></tr></table></div></td>
</tr>
<tr>
<td height="408" align="center"><table width="420" height="222" border="0"
align="center">
<%
if("blank".equals( (String)request.getParameter("msg")))
out.print("Fields are Blanks/Password is not match");
else if("error".equals((String)request.getParameter("msg")))
out.print("The Old Password is Incorrect....");
%>
<tr>
<td colspan="2"><em><h4>Please fill the correct details to change
password</h4></em></td>
</tr>
<tr>
<td width="165"><b>Old Password</b></td>
<td width="185"><input type="password" name="textop" id="textop" /></td>
</tr>
<tr>
<td><b>New Password</b></td>
<td><input type="password" name="textnp" id="textnp" /></td>
</tr>
<tr>
<td><b>Re-Enter Password</b></td>
<td><input type="password" name="rep" id="rep" /></td>
</tr>
<tr>
<td height="26" colspan="2"><div align="center">
<input type="submit" name="button" id="button" value="Submit" />
</div></td><td><div align="center"><hr width="100"/>
<a href="profile.jsp">BACK</a><hr width="100"/></div></td>
</tr>
</table></td></tr>
<tr>
<td height="5"align="center" ><jsp:include page="footer.jsp"/></td> </tr>
</table>
</form>
</body>
</html>

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 185
HOTEL MANAGEMENT SYSTEM
Ubdatesuccess.jsp
<%@ page contentType="text/html; charset=iso-8859-1" language="java" import="java.sql.*,
java.util.*, java.text.* " errorPage="" %>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/
xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
<link href="css/style.css" type="text/css" rel="stylesheet"/>
<title>ebiling.com</title>
<style type="text/css">
#apDiv1 {
position:absolute;
width:200px;
height:24px;
z-index:1;
left: 980px;
top: 180px;
}
</style>
</head>
<body bgcolor="#FFFF99">
<table bgcolor="#990000" align="center" height="523" width="700" border="1">
<tr>
<td height="100" width="700"><jsp:include page="header1.jsp"/></td>
</tr>
<tr>
<td height="5"><marquee>
SAVE ELECTICITY&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;SAVE WATER</marquee></
td>
</tr>
<tr>
<td height="5" ><jsp:include page="menu.jsp"/></td>
</tr>
<tr>
<td height="5"><%
DateFormat df=new SimpleDateFormat("EEEE, dd MMMM, yyyy");
String date=df.format(new java.util.Date());
out.print("| "+date+" | ");
%>
<div id="apDiv1"><table><tr><td><a
href=index.jsp>Logout</a></td></tr></table></div></td>
</tr>
<tr>
<td height="408" align="center"><table width="394" height="98" border="0">
<%if("update".equals((String)request.getParameter("msg")))
{ %>
<tr>
<td height="46"><div align="center"><strong><h3>Your updation has been
successfully</h3> </strong></div></td>
</tr>
<%}

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 186
HOTEL MANAGEMENT SYSTEM
else if("reg".equals((String)request.getParameter("msg")))
{%>
<tr><td height="46"><div align="center"><strong><h3>Your Registration has been
successfully</h3> </strong></div></td></tr>

<%}%>
<tr>
<td width="384" height="46"><div align="center"><hr width="100"/>
<a href="index.jsp"><b>Continue</b></a><hr width="100"/></div></td>
</tr>
</table></td></tr>
<tr>
<td height="5"align="center" ><jsp:include page="footer.jsp"/></td> </tr>
</table>
</body>
</html>

Updatehandler.jsp

<%@ page contentType="text/html; charset=utf-8" language="java" import="java.sql.*"


errorPage="" %>
<%
String na=(String)session.getAttribute("b");
String en=request.getParameter("editname");
String ep=request.getParameter("editpass");
String ec=request.getParameter("editcot");
String et=request.getParameter("editelect");

try
{
Class.forName("oracle.jdbc.driver.OracleDriver");
Connection
conn=DriverManager.getConnection("jdbc:oracle:thin:@localhost:1521:xe","ebilling","ebilling");
Statement stmt=conn.createStatement();
String query="Update logintable set emailid='"+en+"', password='"+ep+"',contactno='"+ec+"',
typeofelectricity='"+et+"' where connectionno='"+na+"'";
stmt.executeUpdate(query);
response.sendRedirect("updatesuccess.jsp?msg=update");
}
catch(Exception e)
{
out.println(e);
response.sendRedirect("editprofile.jsp");
}
%>
Enquiry.jsp
<%@ page contentType="text/html; charset=iso-8859-1" language="java" import="java.sql.*,
java.util.*, java.text.* " errorPage="" %>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/
xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 187
HOTEL MANAGEMENT SYSTEM
<head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
<link href="css/style.css" type="text/css" rel="stylesheet"/>
<title>ebiling.com</title>
<style type="text/css">
#apDiv1 {
position:absolute;
width:200px;
height:24px;
z-index:1;
left: 980px;
top: 180px;
}
</style>
</head>

<body bgcolor="#FFFF99">
<table bgcolor="#990000" align="center" height="523" width="700" border="1">
<tr>
<td height="100"><jsp:include page="header1.jsp"/></td>
</tr>
<tr>
<td height="5"><marquee>
SAVE ELECTICITY&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;SAVE WATER
</marquee></td>
</tr>
<tr>
<td height="5" ><jsp:include page="customerhomeframe.jsp"/></td>
</tr>
<tr>
<td height="5"><%
DateFormat df=new SimpleDateFormat("EEEE, dd MMMM, yyyy");
String date=df.format(new java.util.Date());
out.print("| "+date+" | ");
%>
<div id="apDiv1"><table><tr><td><a
href=index.jsp>Logout</a></td></tr></table></div></td>
</tr>
<tr>
<td height="408"><jsp:include page="inquerydata.jsp"/></td>
</tr>
<tr>
<td height="5"align="center"><jsp:include page="footer.jsp"/></td>
</tr>
</table></body></html>

Enquirydata.jsp

<%@ page contentType="text/html; charset=utf-8" language="java" import="java.sql.*"


errorPage="" %>
<form name="form1" method="post" action="">
<table align="center" width="690" height="189" border="0">

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 188
HOTEL MANAGEMENT SYSTEM
<tr>
<td colspan="2"><p>An innovative customer grievance redressal service enabling
customers to post their grievances directly to concerned division of KESCo, who will in turn
assign the task to the concerned officials to attend the problem immediately. Up on successful
registration a unique registration number will be generated and provided to the customer,
which is to be retained for status enquiry.</p>

Following links are for registering the Complaint and viewing status of the Complaints under
the grievance cell.

</td>
</tr>
<tr>
<td><div align="center"><hr width="100"/>
<a href="complaint.jsp"><b>complaint register</b></a><hr width="100"/></div></td>

</tr>
</table>
</form>

Changep.jsp
<%--
Document : changep
Created on : May 21, 2011, 4:16:01 PM
Author : Lenovo
--%>

<%@page contentType="text/html" pageEncoding="UTF-8" import="java.sql.*"%>


<%
String cn=(String)session.getAttribute("b");
String np=(String)session.getAttribute("p");
try
{
Class.forName("oracle.jdbc.driver.OracleDriver");
Connection
con=DriverManager.getConnection("jdbc:oracle:thin:@localhost:1521:xe","ebilling","ebilling");
Statement stmt= con.createStatement();
String query="Update logintable set password ='"+np+"' where connectionno='"+cn+"'";
stmt.executeUpdate(query);
response.sendRedirect("changepasssubmit.jsp");
}
catch(Exception e)
{
out.println(e);
}
%>

Changephandler.jsp

<%--

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 189
HOTEL MANAGEMENT SYSTEM
Document : changephandler
Created on : May 21, 2011, 3:38:31 PM
Author : Lenovo
--%>

<%@ page contentType="text/html; charset=utf-8" language="java" import="java.sql.*"


errorPage="" %>
<%

String cn=(String)session.getAttribute("b");
String na=(String)session.getAttribute("a");

String pa=request.getParameter("textop");
String np=request.getParameter("rep");
session.setAttribute("p", np);
String nrep=request.getParameter("textnp");

if("".equals(pa)||"".equals(np)||"".equals(nrep)||!(np.equals(nrep)))
{
response.sendRedirect("changepasswordprofile.jsp?msg=blank");
}

try
{
Class.forName("oracle.jdbc.driver.OracleDriver");
Connection
con=DriverManager.getConnection("jdbc:oracle:thin:@localhost:1521:xe","ebilling","ebilling");
Statement stmt= con.createStatement();
String query="select * from logintable where emailid='"+na+"'";
ResultSet rs=stmt.executeQuery(query);
while(rs.next())
{
String p=rs.getString(2);
String e=rs.getString(1);

if(pa.equals(p) && na.equals(e))


{
response.sendRedirect("changep.jsp");
}
}
if(!rs.next())
{
response.sendRedirect("changepasswordprofile.jsp?msg=error");
}
}
catch(Exception e)
{
out.println(e);
}
%>

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 190
HOTEL MANAGEMENT SYSTEM
Registration.jsp
<%@ page contentType="text/html; charset=iso-8859-1" language="java" import="java.sql.*,
java.util.*, java.text.* " errorPage="" %>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/
xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
<link href="css/style.css" type="text/css" rel="stylesheet"/>
<link href="css/style.css" type="text/css" rel="stylesheet"/>
<title>ebiling.com</title>
<style type="text/css">

</style>
</head>
<body bgcolor="#FFFF99">
<table bgcolor="#990000" align="center" height="523" width="700" border="1">
<tr>
<td height="100" width="700"><jsp:include page="header1.jsp"/></td>
</tr>
<tr>
<td height="5"><marquee>
SAVE ELECTICITY&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;SAVE WATER</marquee></
td>
</tr>
<tr>
<td height="5" ><jsp:include page="menu.jsp"/></td>
</tr>
<tr>
<td height="5"><%
DateFormat df=new SimpleDateFormat("EEEE, dd MMMM, yyyy");
String date=df.format(new java.util.Date());
out.print("| "+date+" | ");
%>
</td>
</tr>
<tr>
<td height="408" align="center"><form id="form1" name="form1" method="post"
action="newuser.jsp">
<table width="557" height="276" border="0">
<tr>
<td colspan="2"><div align="left"><strong><h4>WELCOME TO THE CUSTOMER</h4></
strong></div></td>
</tr>
<%
if("blank".equals((String)request.getParameter("msg")))
out.print("Fields are Blank / You are not Authorised from Kesco...");
else if("error".equals((String)request.getParameter("msg")))
out.println("You are already registered ...Please login...");
%>
<tr>
<td width="116"><b>Connection no.</b></td>

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 191
HOTEL MANAGEMENT SYSTEM
<td width="349"><input type="text" name="textconnection" id="textconnection" /></td>
</tr>
<tr>
<td><b>Customer Name</b></td>
<td><input type="text" name="textname" id="textname" /></td>
</tr>

<tr>
<td colspan="2">
<div align="left">
<input type="submit" name="button" id="button" value="Proceed" />
</div></td>
</tr>
</table>
</form></td></tr>
<tr>
<td height="5"align="center" ><jsp:include page="footer.jsp"/></td> </tr>
</table>
</body>
</html>

Newuser.jsp

<%@ page contentType="text/html; charset=utf-8" language="java" import="java.sql.*"


errorPage="" %>
<%
String na=request.getParameter("textconnection");
session.setAttribute("x",na);
String nm=request.getParameter("textname");
session.setAttribute("y",nm);

if("".equals(na) ||"".equals(nm))
{
response.sendRedirect("registration.jsp?msg=blank");
}
try
{
Class.forName("oracle.jdbc.driver.OracleDriver");
Connection
con=DriverManager.getConnection("jdbc:oracle:thin:@localhost:1521:xe","ebilling","ebilling");
Statement stmt= con.createStatement();
String query="select * from kesco ";
ResultSet rs=stmt.executeQuery(query);
while(rs.next())
{
String conna=rs.getString(1);
String cusname=rs.getString(2);

if(na.equals(conna) && nm.equals(cusname))


{
response.sendRedirect("newuserreg.jsp");

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 192
HOTEL MANAGEMENT SYSTEM
}

}
if(!rs.next()) {
response.sendRedirect("registration.jsp?msg=blank");
}
}
catch(Exception e)
{
out.println(e);
}
%>

Newuserreg.jsp

<%--
Document : newuserreg
Created on : May 20, 2011, 12:36:44 PM
Author : Lenovo
--%>

<%@ page contentType="text/html ; charset=iso-8859-1" language="java"


import="java.sql.*,java.util.* , java.text.*" errorPage=""%>
<%
String na=(String)session.getAttribute("x");
String nm=(String)session.getAttribute("y");
try{

Class.forName("oracle.jdbc.driver.OracleDriver");
Connection
con=DriverManager.getConnection("jdbc:oracle:thin:@localhost:1521:xe","ebilling","ebilling");
Statement stmt= con.createStatement();
String q="select * from logintable";
ResultSet rs1=stmt.executeQuery(q);
while(rs1.next())
{
String cn=rs1.getString(4);
String cm=rs1.getString(6);

if(na.equals(cn) && nm.equals(cm))


{
response.sendRedirect("registration.jsp?msg=error");
}
}
stmt.close();
rs1.close();
Statement stm=con.createStatement();
String query="select * from kesco where connectionno='"+na+"' and
customername='"+nm+"'" ;
ResultSet rs=stm.executeQuery(query);
while(rs.next())
{
%>

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 193
HOTEL MANAGEMENT SYSTEM
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/
xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
<link href="css/style.css" type="text/css" rel="stylesheet"/>
<title>ebiling.com</title>
<style type="text/css">
#apDiv1 {
position:absolute;
width:200px;
height:24px;
z-index:1;
left: 980px;
top: 180px;
}
</style>
</head>
<body bgcolor="#FFFF99">
<table bgcolor="#990000" align="center" height="523" width="700" border="1">
<tr>
<td height="100" width="700"><jsp:include page="header1.jsp"/></td>
</tr>
<tr>
<td height="5"><marquee>
SAVE ELECTICITY&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;SAVE WATER</marquee></
td>
</tr>
<tr>
<td height="5" ><jsp:include page="menu.jsp"/></td>
</tr>
<tr>
<td height="5"><%
DateFormat df=new SimpleDateFormat("EEEE, dd MMMM, yyyy");
String date=df.format(new java.util.Date());
out.print("| "+date+" | ");
%>
<div id="apDiv1"><table><tr><td><a
href=index.jsp>Logout</a></td></tr></table></div></td>
</tr>
<tr>
<td height="408" align="center">
<form id="frmreg" name="frmreg" method="post" action="">
<table width="518" height="288" border="0">
<tr>
<td width="240"><b>Connection_no</b></td>
<td><%=rs.getString(1)%></td>
</tr>
<tr>
<td><b>Customer Name</b></td>
<td><%=rs.getString(2)%></td>
</tr>
<tr>
<td><b>Date of connection</b></td>
Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .
Roll No :- 0901204, 0901157, 0901105, 0801407 Page 194
HOTEL MANAGEMENT SYSTEM
<td><%=rs.getString(3)%></td>
</tr>
<tr>
<td><b>Load</b></td>
<td><%=rs.getString(4)%></td>
</tr>
<tr>
<td><b>Adress</b></td>
<td><%=rs.getString(5)%></td>
</tr>
<tr>
<td colspan="2"><a href="regdetail.jsp"> Next</a></td>
</tr>

</table>
</form></td></tr>
<tr>
<td height="5"align="center" ><jsp:include page="footer.jsp"/></td>
</tr>
</table>
</body>
</html>
<%
}
}
catch(Exception e)
{
out.println(e);
}
%>

Regdetail.jsp

<%@ page contentType="text/html; charset=iso-8859-1" language="java" import="java.sql.*,


java.util.*, java.text.* " errorPage="" %>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/
xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
<link href="css/style.css" type="text/css" rel="stylesheet"/>
<link href="css/style.css" type="text/css" rel="stylesheet"/>
<title>ebiling.com</title>
<style type="text/css">

</style>
</head>

<body bgcolor="#FFFF99">
<table bgcolor="#990000" align="center" height="523" width="700" border="1">

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 195
HOTEL MANAGEMENT SYSTEM
<tr>
<td height="100" width="700"><jsp:include page="header1.jsp"/></td>
</tr>
<tr>
<td height="5"><marquee>
SAVE ELECTICITY&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;SAVE WATER</marquee></
td>
</tr>
<tr>
<td height="5" ><jsp:include page="menu.jsp"/></td>
</tr>
<tr>
<td height="5"><%
DateFormat df=new SimpleDateFormat("EEEE, dd MMMM, yyyy");
String date=df.format(new java.util.Date());
out.print("| "+date+" | ");
%>
</td>
</tr>
<tr>
<td height="408" align="center">
<form id="form1" name="form1" method="post" action="regdetailhandler.jsp">
<table width="472" height="324" border="0">
<tr>
<td width="204"><b>Type of Electricity</b></td>
<td width="252"><input type="text" name="textelect" id="textelect" /></td>
</tr>
<tr>
<td><b>Meter_no.</b></td>
<td><input type="text" name="textMeterno" id="textMeterno" /></td>
</tr>
<tr>
<td><b>Contact_no.</b></td>
<td><input type="text" name="textContactno" id="textContactno" /></td>
</tr>
<tr>
<td><b>E-mail</b></td>
<td><input type="text" name="textEmail" id="textEmail" /></td>
</tr>
<tr>
<td><b>Password</b></td>
<td><input type="password" name="textPass" id="textPass" /></td>
</tr>
<tr>
<td><b>Repassword</b></td>
<td><input type="password" name="textrepass" id="textrepass" /></td>
</tr>
<tr>
<td colspan="2"><input type="submit" name="button" id="button" value="Submit" /></td>
</tr>
</table>
</form>
</td>
</tr>
Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .
Roll No :- 0901204, 0901157, 0901105, 0801407 Page 196
HOTEL MANAGEMENT SYSTEM
<tr>
<td height="5"align="center" ><jsp:include page="footer.jsp"/></td> </tr>
</table>
</body>
</html>

Regdetailhandler.jsp

<%@page contentType="text/html" pageEncoding="UTF-8" language="java"


import="java.sql.*,java.util.*,java.text.*;"%>
<%
String dt=null;
String ld=null;
String adr=null;
String stat="YES";

String na=(String)session.getAttribute("x");
String nm=(String)session.getAttribute("y");

String elect=request.getParameter("textelect");
String me=request.getParameter("textMeterno");

String cot=request.getParameter("textContactno");
String ma=request.getParameter("textEmail");
String pas=request.getParameter("textPass");
String re=request.getParameter("textrepass");
try
{
Class.forName("oracle.jdbc.driver.OracleDriver");
Connection
con=DriverManager.getConnection("jdbc:oracle:thin:@localhost:1521:xe","ebilling","ebilling");
Statement stmt= con.createStatement();
String query="select * from kesco where connectionno='"+na+"'";
ResultSet rs=stmt.executeQuery(query);
while(rs.next())
{

dt=rs.getString(3);
ld=rs.getString(4);
adr=rs.getString(5);
}

String qry="Insert into


logintable(emailid,password,contactno,connectionno,meterno,customername,load,typeofelectr
icity,dateofconnection,address,status) values(?,?,?,?,?,?,?,?,?,?,?)";
PreparedStatement prestmt = con.prepareStatement(qry);
prestmt.setString(1,ma);
prestmt.setString(2,pas);
prestmt.setString(3,cot);

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 197
HOTEL MANAGEMENT SYSTEM
prestmt.setString(4,na);
prestmt.setString(5,me);
prestmt.setString(6,nm);
prestmt.setString(7,ld);
prestmt.setString(8,elect);
prestmt.setString(9,dt);
prestmt.setString(10,adr);
prestmt.setString(11,stat);
prestmt.executeUpdate();
con.close();
stmt.close();
response.sendRedirect("updatesuccess.jsp?msg=reg");

}
catch(Exception e)
{
out.println(e);
}
%>

Registrationsuccess.jsp

<%@ page contentType="text/html; charset=iso-8859-1" language="java" import="java.sql.*,


java.util.*, java.text.* " errorPage="" %>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/
xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
<link href="css/style.css" type="text/css" rel="stylesheet"/>
<title>ebiling.com</title>
<style type="text/css">
#apDiv1 {
position:absolute;
width:200px;
height:24px;
z-index:1;
left: 980px;
top: 180px;
}
</style>
</head>
<body bgcolor="#FFFF99">
<table bgcolor="#990000" align="center" height="523" width="700" border="1">
<tr>
<td height="100" width="700"><jsp:include page="header1.jsp"/></td>
</tr>
<tr>
<td height="5"><marquee>

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 198
HOTEL MANAGEMENT SYSTEM
SAVE ELECTICITY&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;SAVE WATER</marquee></
td>
</tr>
<tr>
<td height="5" ><jsp:include page="menu.jsp"/></td>
</tr>
<tr>
<td height="5"><%
DateFormat df=new SimpleDateFormat("EEEE, dd MMMM, yyyy");
String date=df.format(new java.util.Date());
out.print("| "+date+" | ");
%>
<div id="apDiv1"><table><tr><td><a
href=index.jsp>Logout</a></td></tr></table></div></td>
</tr>
<tr>
<td height="408" align="center"><table width="394" height="98" border="0">
<%if("update".equals((String)request.getParameter("msg")))
{ %>
<tr>
<td height="46"><div align="center"><strong><h3>Your updation has been
successfully</h3> </strong></div></td>
</tr>
<%}
else if("reg".equals((String)request.getParameter("msg")))
{%>
<tr><td height="46"><div align="center"><strong><h3>Your Registration has been
successfully</h3> </strong></div></td></tr>

<%}%>
<tr>
<td width="384" height="46"><div align="center"><hr width="100"/>
<a href="index.jsp"><b>Continue</b></a><hr width="100"/></div></td>
</tr>
</table></td></tr>
<tr>
<td height="5"align="center" ><jsp:include page="footer.jsp"/></td> </tr>
</table>
</body>
</html>

Loginhandler.jsp

<%@page contentType="text/html" pageEncoding="UTF-8" language="java"


import="java.sql.*"%>
<%

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 199
HOTEL MANAGEMENT SYSTEM
String type=request.getParameter("type");
session.setAttribute("type", type);
String na=request.getParameter("textName");
session.setAttribute("a",na);
String pa=request.getParameter("textPassword");
if("".equals(na)||"".equals(pa))
{
response.sendRedirect("index.jsp?msg=blank");
}
try
{
Class.forName("oracle.jdbc.driver.OracleDriver");
Connection
con=DriverManager.getConnection("jdbc:oracle:thin:@localhost:1521:xe","ebilling","ebilling");
Statement stmt= con.createStatement();
String query="select * from logintable";
ResultSet rs=stmt.executeQuery(query);
while(rs.next())
{
String nm=rs.getString(1);
String pass=rs.getString(2);
String stat=rs.getString(11);
if(na.equals(nm) && pa.equals(pass)&&"YES".equals(stat))
{
response.sendRedirect("customerhome.jsp");
}
}
if(!rs.next())
{
response.sendRedirect("index.jsp?type=User");
}
con.close();
stmt.close();
rs.close();
}
catch(Exception e)
{
out.println(e);
}
%>

Insert.jsp

<%@ page contentType="text/html; charset=utf-8" language="java" import="java.sql.*"


errorPage="" %>

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 200
HOTEL MANAGEMENT SYSTEM
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/
xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
<title>Untitled Document</title>
</head>

<body>
<form id="form1" name="form1" method="post" action="inserthandler.jsp">
<table width="461" border="1">
<%
if("blank".equals((String)request.getParameter("msg")))
{
out.println("fields are blank");
}
%>
<tr>
<td width="218"><b>Name</b></td>
<td width="227"><input type="text" name="textname" id="textname" /></td>
</tr>
<tr>
<td><b>Address</b></td>
<td><input type="text" name="textaddress" id="textaddress" /></td>
</tr>
<tr>
<td><b>Contact</b></td>
<td><input type="text" name="textcont" id="textcont" /></td>
</tr>
<tr>
<td><b>Email</b></td>
<td><input type="text" name="textmail" id="textmail" /></td>
</tr>
<tr>
<td><b>Age</b></td>
<td><input type="text" name="textage" id="textage" /></td>
</tr>
<tr>
<td colspan="2"><div align="center">
<input type="submit" name="button" id="button" value="Submit" />
<input type="submit" name="button2" id="button2" value="Reset" />
</div></td>
</tr>
</table>
</form>
</body>
</html>

Inserthandler.jsp
<%@page contentType="text/html" pageEncoding="UTF-8" language="java"
import="java.sql.*"%>
<%

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 201
HOTEL MANAGEMENT SYSTEM
String na=request.getParameter("textname");
String add=request.getParameter("textaddress");
String coe=request.getParameter("textcont");
String mail=request.getParameter("textmail");
String age=request.getParameter("textage");
if("".equals(na)||"".equals(add)||"".equals(coe)||"".equals(mail)||"".equals(age))
{
response.sendRedirect("insert.jsp?msg=blank");
}
try
{
Class.forName("oracle.jdbc.driver.OracleDriver");
Connection
con=DriverManager.getConnection("jdbc:oracle:thin:@localhost:1521:xe","ebilling","ebilling");
Statement stmt= con.createStatement();
String query="insert into uinfo values('"+na+"','"+add+"','"+coe+"','"+mail+"','"+age+"')";
ResultSet rs=stmt.executeQuery(query);
out.println("Success");
con.close();
stmt.close();
rs.close();
}
catch(Exception e)
{
out.println(e);
}
%>

Detail.jsp

<%@ page contentType="text/html; charset=utf-8" language="java" import="java.sql.*"


errorPage="" %>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/
xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
<title>E-Billing.com</title>
</head>

<body>
<form name="frmuserlogin" method="post" action="loginhandler1.jsp">
<table height="141" width="658" border="0">
<tr>
<td width="126" ><strong><h4>EXISTING USER</h4></strong></td>
<td width="200"></td>
<td width="318"><div align="left"><strong><b>Bill Junction saves your time &
money.</b></strong></div></td>
</tr>
<tr>
<td height="25"><b>Login Id</b></td>
<td><label>

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 202
HOTEL MANAGEMENT SYSTEM
<input type="text" name="textName" id="textName" />
</label></td>
<td width="318"><div align="left"><strong><b>Pay bills through internet or
sms.</b></strong></div></td>
</tr>
<tr>
<td height="28"><b>Password</b></td>
<td><label>
<input type="text" name="textPassword" id="textPassword" />
</label></td>
<td><div align="left"><strong><b>Pay your electricity,water,telephone &amp;
e.t.c.</b></strong></div></td>
</tr>
<tr>
<td height="29"><b>Forget ?</b></td>
<td><label>
<input type="submit" name="button" id="button" value="LOGIN" />
</label></td>
<td><div align="left"><strong><b>Bill Junction is cost effective and time
efficient.</b></strong></div></td>
</tr>
<tr>
<td height="21"></td>
<td></td>
<td><div align="left"><strong><b>Want to know more ?</b></strong></div></td>
</tr>
</table>
</form>
</body>
</html>

Connectionhandler.jsp

<%@page contentType="text/html" pageEncoding="UTF-8" language="java"


import="java.sql.*"%>
<%
String coe=request.getParameter("textconnection");
String na=request.getParameter("textname");
String cit=request.getParameter("textcity");
try
{
Class.forName("oracle.jdbc.driver.OracleDriver");
Connection
con=DriverManager.getConnection("jdbc:oracle:thin:@localhost:1521:xe","ebilling","ebilling");
Statement stmt= con.createStatement();
String query="select * from kesco";
ResultSet rs=stmt.executeQuery(query);
while(rs.next())
{
String conne=rs.getString(1);
String nam=rs.getString(2);
String ct=rs.getString(5);

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 203
HOTEL MANAGEMENT SYSTEM

if(coe.equals(conne) && na.equals(nam))


{
response.sendRedirect("reg.jsp");
}
else
{
response.sendRedirect("fail.jsp");
}
}
con.close();
stmt.close();
rs.close();
}
catch(Exception e)
{
out.println(e);
}
%>

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 204
HOTEL MANAGEMENT SYSTEM

Development

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 205
HOTEL MANAGEMENT SYSTEM
After designing the structure of all the modules and database, the project is to be
developed using MVC (Model View Controller) architecture. Implementation of this
Architecture separates the here parts form each other-data, view, and business logic and
hence they can be developed separately. The view designed using JSP and the logic is
embedded in the controller which is nothing but a Servlet. In this Project, we will be using
pure java classes to hold the data. These pure java classes will be having only attribute
variables representing corresponding data field with no methods. The overall development
is done and executed with the help of a web server like Tomcat.

Installation/Hosting Process

HOSTING AND DEPLOYMENT


Webhosting:
Domain Booking:
Domain is the indicator of the business strength and hence domain name selected
care fully so that it fulfills the business need of the client.
Hosting Process:-
» Book your domain online.
» Purchase the space on a web server.
» Now configure your domain for the Name Server.
» Now open Control Panel
Add Domain
MYcompany.com
Create database
» Open on your computer Oracle Server.
» Upload database tables & stored procedures in the database.
» Using ftp client upload all the web forms, images & streaming media files.
» Test the domain
» Hosting process completed.

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 206
HOTEL MANAGEMENT SYSTEM

Web Project Security


Current state
Web applications represent highly vulnerable attack avenues.Most
discussions on web application security, center on attacking it and secure coding to
protect it. Methods for detecting such attacks are coming into their own Existing
detection methods are being tested before customers accept these solutions as
standard.

Detection Techniques

Detection Techniques

Static Techniques Dynamic Techniques

Anomaly-based Signature-based

Using static techniques


– Happens post-occurrence of event
– Parse log files using standard tools/techniques
– Aim is forensics investigation
Using dynamic techniques
– Detect the attack as it happens
– Trigger alarms when attack is happening
– Aim is detect/prevent in real-time
Static detection techniques
 Data sources to look at:
Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .
Roll No :- 0901204, 0901157, 0901105, 0801407 Page 207
HOTEL MANAGEMENT SYSTEM
o Web Server Logs
o Application Server Logs
o Web Application’s custom audit trail
o Operating system logs
 What’s missing:
o POST data (only GET data available)
o HTTP Headers only partially represented
Dynamic Detection Techniques
The web application intrusion detection space is divided into two possibilities:
– Signature-based
– Anomaly-based
Each has its own implementation and effectiveness issues

Securing Web Server


A secure Web server provides a protected foundation for hosting your Web
applications, and Web server configuration plays a critical role in your Web application's

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 208
HOTEL MANAGEMENT SYSTEM
security. Badly configured virtual directories, a common mistake, can lead to unauthorized
access. A forgotten share can provide a convenient back door, while an overlooked port can
be an attacker's front door. Neglected user accounts can permit an attacker to slip by your
defenses unnoticed.
What makes a Web server secure? Part of the challenge of securing your Web server
is recognizing your goal. As soon as you know what a secure Web server is, you can learn
how to apply the configuration settings to create one. This chapter provides a systematic,
repeatable approach that you can use to successfully configure a secure Web server.

Threats and Countermeasures

The fact that an attacker can strike remotely makes a Web server an appealing target.
Understanding threats to your Web server and being able to identify appropriate
countermeasures permits you to anticipate many attacks and thwart the ever-growing ints
of attackers. The main threats to a Web server are:

Profiling

Profiling, or host enumeration, is an exploratory process used to gather information about


your Web site. An attacker uses this information to attack known weak points.

Vulnerabilities
 Common vulnerabilities that make your server susceptible to profiling include:
 Unnecessary protocols
 Open ports
 Web servers providing configuration information in banners
Attacks

Common attacks used for profiling include:

 Port scans
 Ping sweeps
 NetBIOS and server message block (SMB) enumeration

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 209
HOTEL MANAGEMENT SYSTEM
Countermeasures

Countermeasures include blocking all unnecessary ports, blocking Internet Control Message
Protocol (ICMP) traffic, and disabling unnecessary protocols such as NetBIOS and SMB.

Denial of Service

Denial of service attacks occur when your server is overwhelmed by service requests. The
threat is that your Web server will be too overwhelmed to respond to legitimate client
requests.

Vulnerabilities

Vulnerabilities that increase the opportunities for denial of service include:

 Weak TCP/IP stack configuration


 Unmatched servers
Attacks

Common denial of service attacks include:

 Network-level SYN floods


 Buffer overflows
 Flooding the Web server with requests from distributed locations
Countermeasures

Countermeasures include hardening the TCP/IP stack and consistently applying the latest
software patches and updates to system software.

Unauthorized Access

Unauthorized access occurs when a user without correct permissions gains access to
restricted information or performs a restricted operation.

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 210
HOTEL MANAGEMENT SYSTEM
Vulnerabilities

Common vulnerabilities that lead to unauthorized access include:

 Weak IIS Web access controls including Web permissions


 Weak NTFS permissions
Countermeasures

Countermeasures include using secure Web permissions, NTFS permissions, and .NET
Framework access control mechanisms including URL authorization.

Arbitrary Code Execution

Code execution attacks occur when an attacker runs malicious code on your server either to
compromise server resources or to mount additional attacks against downstream systems.

Vulnerabilities

Vulnerabilities that can lead to malicious code execution include:

 Weak IIS configuration


 Unpatched servers
Attacks

Common code execution attacks include:

 Path traversal
 Buffer overflow leading to code injection
Countermeasures

Countermeasures include configuring IIS to reject URLs with "../" to prevent path traversal,
locking down system commands and utilities with restrictive access control lists (ACLs), and
installing new patches and updates.

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 211
HOTEL MANAGEMENT SYSTEM
Elevation of Privileges

Elevation of privilege attacks occur when an attacker runs code by using a privileged process
account.

Vulnerabilities

Common vulnerabilities that make your Web server susceptible to elevation of privilege
attacks include:

 Over-privileged process accounts


 Over-privileged service accounts
Countermeasures

Countermeasures include running processes using least privileged accounts and using least
privileged service and user accounts. Viruses, Worms, and Trojan Horses Malicious code
comes in several varieties, including:

 Viruses. Programs that are designed to perform malicious acts and cause disruption
to an operating system or applications.
 Worms. Programs that are self-replicating and self-sustaining.
 Trojan horses. Programs that appear to be useful but that actually do damage.

In many cases, malicious code is unnoticed until it consumes system resources and slows
down or halts the execution of other programs. For example, the Code Red worm was one
of the most notorious to afflict IIS, and it relied upon buffer overflow vulnerability in an
ISAPI filter.

Vulnerabilities

Common vulnerabilities that make you susceptible to viruses, worms, and Trojan horses
include:

 Unpatched servers

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 212
HOTEL MANAGEMENT SYSTEM
 Running unnecessary services
 Unnecessary ISAPI filters and extensions
Countermeasures

Countermeasures include the prompt application of the latest software patches, disabling
unused functionality such as unused ISAPI filters and extensions, and running processes with
least privileged accounts to reduce the scope of damage in the event of a compromise.

Attacks

The attacker places packet-sniffing tools on the network to capture traffic.

Countermeasures

Countermeasures to prevent packet sniffing include the following:

 Use secure authentication, such as Windows authentication, that does not send
passwords over the network.
 Encrypt SQL Server authentication credentials. If you use SQL Server authentication,
you can encrypt credentials automatically by installing a server certificate on the
database server.
 Secure communication channels. Options include using Secure Sockets Layer (SSL) or
Internet Protocol Security (IPSec).
 Use remote procedure call (RPC) encryption with Enterprise Services applications.
 Use a segmented network, which can isolate eavesdropping to compromised
segments.
 Use the Http Channel.
 Unauthorized Access

If you fail to block the ports used by applications that run on the application server at the
perimeter firewall, an external attacker can communicate directly with the application
server. If you allow computers other than the front-end Web servers to connect to the
application server, the attack profile for the application server increases.

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 213
HOTEL MANAGEMENT SYSTEM
Vulnerabilities

Vulnerabilities that can result in unauthorized access include:

 Weak perimeter network and firewall configurations


 Superfluous ports open on the internal firewall
 Lack of IPSec policies to restrict host connectivity
 Unnecessary active services
 Unnecessary protocols
 Weak account and password policies
Attacks

Common attacks to gain unauthorized access include:

 Port scanning that detects listening services


 Banner grabbing that gives away available services and possibly software versions
 Malicious application input
 Password attacks against default accounts with weak passwords
Countermeasures

Countermeasures to prevent unauthorized access include:

 Firewall policies that block all traffic except expected communication ports
 TCP/IP filtering or IPSec policies to prevent unauthorized hosts from establishing
connections
 Disabling unused services
 Static DCOM endpoint mapping that allows access only to authorized hosts

Viruses, Worms, and Trojan Horses

These attacks are often not noticed until they begin to consume system resources, which
slow down or halts the execution of other applications. Application servers that host IIS are
susceptible to IIS attacks.

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 214
HOTEL MANAGEMENT SYSTEM
Vulnerabilities
 Unpatched servers
 Running unnecessary services
 Unnecessary ISAPI filters and ISAPI extensions
Countermeasures

Countermeasures that help mitigate the risk posed by viruses, Trojan horses, and worms
include:

 Promptly applying the latest software patches


 Disabling unused functionality, such as unused ISAPI filters and extensions
 Running processes with least privileged accounts to reduce the scope of damage in
the event of a compromise

T e s ti n g
Software testing is a critical element of software quality assurance and represent the
ultimate review of specification design, coding, purpose of product testing is to verify and
validate various work products via unit integrated unit, final product to ensure that they
meet their requirements.

6.1 TESTING OBJECTIVES


 Basically testing is done for the following purposes.
 Testing is a process of executing program with the intent of finding an error.
 A good test case is one that has a high probability of finding an as yet undiscovered
error.
 A successful test case is one that uncovers an as yet undiscovered error.
 Our objective is to design test cases that systematically uncover different classes of
error and do so with a minimum amount of time and effort. This process has two
parts:

 Planning

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 215
HOTEL MANAGEMENT SYSTEM
This involves writing and reviewing unit integration, functional, validation and acceptance
test plans.

 Execution
This involves executing these test plans, measuring. Collecting data and very fine if it meets
the quality criteria. Data collected is used to make appropriate changes in the plans related
to development and testing. The quality of a product or item can be achieved by ensuring
that the product meets the requirements by planning and conducting the following tests at
various stages.
6.2 TYPES OF TESTING SOFTWARE : The main types of software testing are:
Component Testing
Starting from the bottom the first test level is “Component Testing”, sometimes
called Unit Testing. It involves checking that each feature specified in the “Component
Design” has been implemented in the component. In theory an independent tester should
do this, but in practice the developer usually does it, as they are the only people who
understand how a component works. The problem with a component is that it performs
only a small part of the functionality of a system, and it relies on co-operating with other
parts of the system, which may not have been built yet. To overcome this, the developer
either builds, or uses special software to trick the component into believing it is working in a
fully functional system.
Interface Testing
As the components are constructed and tested they are then linked together to
check if they work with each other. It is fact that two components that have passed all their
tests, when connected to each other produce one new component full of faults. These tests
can be done by specialists, or by the developers.
Interface testing is not focused on what the components are doing but on how they
communicate with each other, as specified in the “System Design”. The “system Design”
defines relationship between components, and this involves stating:
1). what a component can expect from another component in terms of services.

2). How these services will be asked for.


Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .
Roll No :- 0901204, 0901157, 0901105, 0801407 Page 216
HOTEL MANAGEMENT SYSTEM
3). How they will be given.
4). How to handle non standard conditions, i.e. errors.
5). Tests are constructed to deal with each of these.
The tests are organized to check all the interfaces, until all the components have been built
and interfaced to each other producing the whole system.

System Testing
Once the entire system has been built then it has to be tested against the “System
Specification” to check if it delivers the features required. It is still developer focused,
although specialist developers known as system testers are normally employed to do it.In
essence System testing is not about checking the individual parts of the design, but about
checking the system as a whole. In effect it is one giant component. System testing can
involve of specialist types of test to see if all the functional and non-functional requirements
have been met. In addition to functional requirements these may include the following
types of testing for the non-functional requirements:
1). Performance- Are the performance criteria met?

2). Volume- Can large volumes of information be handled?


3). Stress- Can peak volumes of information be handled?
4). Documentation- Is the documentation usable for the system?
5). Robustness- Does the system remain stable under adverse circumstances?
There are many others, the needs for which are dictated by how the system is supposed to
perform.
Acceptance Testing
Acceptance testing checks the system against the “Requirements”. It is similar to system
testing in that the whole system is checked but the important difference is the change in
focus:

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 217
HOTEL MANAGEMENT SYSTEM
System testing checks that the system that was specified has been delivered.
Acceptance testing checks that the system delivers what was requested. The customer and
not the developer should always do acceptance testing. The customer knows what is
required from the system to achieve value in the business and is the only person qualified to
make that judgment. The forms of tests may follow those in system testing, but at all times
they are informed by the business needs.
Release Testing
Even if a system meets all its requirements, there is still a case to be answered that it
will benefit the business. Release testing is about seeing if the new or changed system will
work in the existing business environment. Mainly this means the technical environment,
and checks concerns such as:
1). Does it affect any other systems running on the hardware?
2). is it compatible with other system?
3). Does it have acceptable performance under load?
These tests are usually run by the computer operations team in a business. It would
appear obvious that the operation team should be involved right from the start of a project
to give their opinion of a new system may have.
Test Case Design
Test case design focuses on a set of techniques for the creation of test cases that
meet overall testing objectives. In test case design phase, the engineer creates a series of
test cases that are intended to “demolish” the software that has been built. Any software
product can be tested in one of two ways:
1). Knowing the specific function that a product has been designed to perform, tests can be
conducted that demonstrate each function is fully operational, at the same time searching
for errors in each function. This approach is known as Black Box Testing.
2). Knowing the internal workings of a product, tests can be conducted to ensure that
internal operation performs according to specifications and all internal components have

been adequately exercised. This approach is known as White Box Testing.

 Black box testing is designed to uncover errors. They are used to demonstrate that
software functions are operations; that input is properly accepted and output is

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 218
HOTEL MANAGEMENT SYSTEM
correctly produced; and that integrity of external information is maintained. A black
box examines some fundamental aspects of a system with little regard for the
internal logical structure of the software.
 White box testing of software is predicated on close examination of procedural
details. Providing test cases that exercises specific set of conditions and/or loops
tests logical paths through the software. The “state of program” may be examined at
various points to determine if the expected or asserted status corresponding to the
actual status.

TESTING OF CURRENT PROJECT

Software testing is arguably the least understood part of the development process.
Through a four-phase approach, the author shows why eliminating bugs is tricky and why
testing is a constant trade-off. Virtually all developers know the frustration of having
software bugs reported by users. When this happens, developers inevitably ask: How did
those bugs escape testing? Countless hours doubtless went into the careful testing of
hundreds or thousands of variables and code statements, so how could a bug have eluded
such vigilance?
Four phases:
 Modeling the software’s environment
 Selecting test scenarios
 Running and evaluating test scenarios
 Measuring testing progress
These phases offer testers a structure in which to group related problems that they must
solve before owing on to the next phase.

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 219
HOTEL MANAGEMENT SYSTEM

EMBED Word.Picture.8

Performance&Scalability:
The scalability in the testing lab features powerful workstations and top-of-the-line
networking equipment and is capable of testing the performance and scalability of an end-
to-end solution, not just individual components. The lab is capable of generating a realistic
load of thousands of virtual users consisting of a mix of user profiles while simultaneously
exercising different portions of a dynamic Web application, based on real-world Web usage
patterns. Testing tools can capture a variety of critical statistics, such as per-page user
response times, web interactions per second, transaction error rates and network traffic.
The testing lab also reports on empirical performance metrics of e-commerce products
subjected to massive user load, versus projecting results based on smaller load tests.
This approach ensures that the data reported provides an accurate depiction of the
actual performance of the tested products. Through arrangements with many of the leading
web testing tool vendors, testing lab is capable of generating complex scripts to be used in
testing.

A typical scalability testing involves the following steps:


 Consult with the client to determine the activities that will be exercised during
testing;
 Code the test tool script to stress the website;
 Coordinate the enabling of appropriate server log files during the test;
 Consult with the client regarding a response time threshold value;
 Determine how many concurrent virtual users cause the response time to exceed
the threshold value; and

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 220
HOTEL MANAGEMENT SYSTEM
 Calculate average response times under various load conditions.
CompatibilityTesting
Testing lab examines a website’s compatibility with multiple operating system/browser
combinations. Testing lab works closely with clients to develop a compatibility-testing
matrix that will include the relevant combinations to be tested. Available configurations
typically include Intel-based systems with Windows operating systems and associated
browsers as well as Macintosh systems and associated browsers. Testing lab will test the
major features of the website during the compatibility testing, using various approaches.
Testing lab works with clients to develop a test matrix that reflects the hardware and
software combinations to be tested and uses a variety of different editions and service packs
of operating environments in the testing. Our Testing lab has identified more than 70
possible combinations of configurations. During testing, Testing labs evaluates the ability of
the website to work in a satisfactory manner using both high- and low-speed connections.
All major functions of the website will be exercised by each configuration.
FunctionalityTesting
Functionality in testing labs includes examination of website pages, menus, options,
and links to determine if the site functions as intended. Testing labs logs on to a client site
and, acting as multiple types of users, performs many functions associated with that site.
Testing labs should accomplish functionality testing by utilizing labs-developed test scripts,
client-developed test scripts, or some combination of both. These testing labs works with
clients to determines the appropriate operating system and browser combinations to be
tested. Typically, testing labs exercises all site functions including links, search operations
and responsiveness.

UsabilityTesting
To conduct usability testing, testing labs assembles a focus group of testers with a
broad range of experience in personal computer and Internet usage. Working with its client,
all testing lab’s highly skilled Usability Testing Team will develop a questionnaire that
addresses the various aspects of the client’s website. The questionnaire, along with the
focus group debriefing, is designed to elicit the responses and opinions of the members of
the focus group regarding the usability of the website. A final report will include testing labs’
Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .
Roll No :- 0901204, 0901157, 0901105, 0801407 Page 221
HOTEL MANAGEMENT SYSTEM
expert opinion as well as the individual responses and group consensus regarding the
comparative usability of the website.

Security Implementation
Computer security is an important topic. As e-commerce blossoms, and the Internet
works its way into every nook and cranny of our lives, security and privacy come to play an
essential role. Computer security is moving beyond the realm of the technical elite, and is
beginning to have a real impact on our everyday lives.
It is no big surprise, then, that security seems to be popping up everywhere, from
headline news to TV talk shows. Because the general public doesn't know very much about
security, a majority of the words devoted to computer security cover basic technology
issues such as what firewalls are, what cryptography is, or which antivirus product is best.
Much of the rest of computer security coverage centers around the "hot topic of the day,"
usually involving an out-of-control virus or a malicious attack. Historically, the popular press
pays much attention to viruses and denial-of-service attacks: Many people remember
hearing about the Anna Kournikova worm, the "Love Bug," or the Melissa virus ad nauseam.
These topics are important, to be sure. Nonetheless, the media generally manages not to
get to the heart of the matter when reporting these subjects. Behind every computer
security problem and malicious attack lies a common enemy—bad software.

Technical Trends Affecting Software Security


Complex systems, by their very nature, introduce multiple risks. And almost all
systems that involve software are complex. One risk is that malicious functionality can be
added to a system (either during creation or afterward) that extends it past its primary,
intended design. As an unfortunate side effect, inherent complexity lets malicious and
flawed subsystems remain invisible to unsuspecting users until it is too late. This is one of
the root causes of the malicious code problem. Another risk more relevant to our purposes
is that the complexity of a system makes it hard to understand, hard to analyze, and hard to
secure. Security is difficult to get right even in simple systems; complex systems
serve only to make security harder. Security risks can remain hidden in the jungle of
complexity, not coming to light until it is too late. Extensible systems, including computers,
are particularly susceptible to complexity-driven hidden risk and malicious functionality

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 222
HOTEL MANAGEMENT SYSTEM
problems. When extending a system is as easy as writing and installing a program, the risk of
intentional introduction of malicious behavior increases drastically—as does the risk of
introducing unintentional vulnerabilities. Any computing system is susceptible to hidden
risk. Rogue programmers can modify systems software that is initially installed on the
machine. Unwitting programmers may introduce security vulnerability when adding
important features to a network-based application. Users may incorrectly install a program
that introduces unacceptable risk or, worse yet, accidentally propagate a virus by installing
new programs or software updates. In a multiuser system, a hostile user may install a Trojan
horse to collect other users' passwords. These attack classes have been well-known since
the dawn of computing, so why is software security a bigger problem now than in the past?
We believe that a small int of trends have a large amount of influence on the software
security problem.
One significant problem is the fact that computer networks are becoming
ubiquitous. The growing connectivity of computers through the Internet has increased both
the point of attack vectors (avenues for attack) and the ease with which an attack can be
made. More and more computers, ranging from home personal computers (PCs) to systems
that control critical infrastructures (such as the power grid), are being connected to the
Internet. Furthermore, people, businesses, and governments are increasingly dependent on
network-enabled communication such as e-mail or Web pages provided by information
systems. Unfortunately, because these systems are connected to the Internet, they become
vulnerable to attacks from distant sources. Put simply, an attacker no longer needs physical
access to a system to cause security problems.
Because access through a network does not require human intervention, launching
automated attacks from the comfort of your living room is relatively easy. Indeed, the well-
publicized denial-of-service attacks in February 2000 took advantage of (previously
compromised) hosts to flood popular e-commerce Web sites, including Yahoo!, with bogus
requests automatically. The ubiquity of networking means that there are more systems to
attack, more attacks, and greater risks from poor software security practice than ever
before.
A second trend that has allowed software security vulnerabilities to flourish is the
size and complexity of modern information systems and their corresponding programs. A

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 223
HOTEL MANAGEMENT SYSTEM
desktop system running Windows/NT and associated applications depends on the proper
functioning of the kernel as well as the applications to ensure that an attacker cannot
corrupt the system. However, NT itself consists of approximately 35 million lines of code,
and applications are becoming equally, if not more, complex. When systems become this
large, bugs cannot be avoided. Exacerbating this problem is the widespread use of low-level
programming languages, such as C or C++, that do not protect against simple kinds of
attacks (most notably, buffer overflows). However, even if the systems and applications
codes were bug free, improper configuration by retailers, administrators, or users can open
the door to attackers. In addition to providing more avenues for attack, complex systems
make it easier to hide or to mask malicious code. In theory, we could analyze and prove that
a small program was free of security problems, but this task is impossible for even the
simplest of desktop systems today, much less the enterprise-wide systems used by
businesses or governments.
A third trend exacerbating software security problems is the degree to which
systems have become extensible. An extensible host accepts updates or extensions,
sometimes referred to as mobile code, so that the system's functionality can be evolved in
an incremental fashion. For example, the plug-in architecture of Web browsers makes it
easy to install viewer extensions for new document types as needed.
Given a basic intuitive grasp of the architecture of a browser (a program that runs on
top of an operating system and provides basic Web interface services), it is natural to
assume that a browser may be used to enhance security. In reality, it is hard to tell where
the boundaries of the browser are, where the operating system fits, and how a browser can
protect itself. The two most popular browsers, Netscape Navigator and Microsoft Internet
Explorer (MSIE), have very fuzzy boundaries and include many more hooks to external
applications than most people realize.
On the most pervasive platform (Windows 95, 98, and Millennium Edition (ME))
there is really no way for a browser to protect itself or any secrets it may be trying to keep
(like client-side certificates) at all. This means that if your design requires some security
features inside the browser (like an intact Java Virtual Machine [JVM] or a cryptographic
secret), there is probably a real need for a more advanced operating system like
Windows/NT or UNIX. Without delving into the details of how a browser is constructed, it is

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 224
HOTEL MANAGEMENT SYSTEM
worth showing a general-purpose abstract architectural diagram of each. Figures 1–2 and 1–
3 show Netscape and MSIE respectively. From a high-level perspective, it is clear that there
are many interacting components involved in each architecture. This makes securing a
browser quite a monumental task. In addition, helper applications (such as AOL Instant
Messenger for Netscape and ActiveX control functionality in MSIE) introduce large security
risks.

Figure 1–2: An overview of the Netscape architecture.

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 225
HOTEL MANAGEMENT SYSTEM

Unfortunately, the very nature of extensible systems makes security harder. For one thing, it
is hard to prevent malicious code from slipping in as an unwanted extension. Meaning, the
features designed to add extensibility to a system (such as Java's class-loading mechanism)
must be designed with security in mind. Furthermore, analyzing the security of an extensible
system is much harder than analyzing a complete system that can't be changed. How can
you take a look at code that has yet to arrive? Better yet, how can you even begin to
anticipate every kind of mobile code that may arrive?

Figure 1–3: An overview of the Internet Explorer architecture.

Together, the three trends of ubiquitous networking, growing system complexity, and built-
in extensibility make the software security problem more urgent than ever. There are other

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 226
HOTEL MANAGEMENT SYSTEM
trends that have an impact as well, such as the lack of diversity in popular computing
environments, and the tendency for people to use systems in unintended ways (for
example, using Windows NT as an embedded operating system).

Software maintenance
Software maintenance is the modification of a software product after delivery to
correct faults, to improve performance or other attributes, or to adapt the product to a
modified environment.

The Software Maintenance Context


Software Maintenance
Existing software product Modified software product

Maintenance need
 Enhancement
Software engineering process Installation, operation, maintenance
 Correction

Software Maintenance Covers


Basic concepts Maintenance Process Key issues in software Techniques for
maintenance maintenance
 Definitions and  Process models  Technical  Program
terminology  Management comprehensi
 Majority of  Maintenance  Cost and on
maintenance activities estimation  Re-
costs engineering
 The nature of  Software  Reverse
maintenance maintenance engineering
 Evolution of measurement
software  Impact
 Need for analysis
maintenance

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 227
HOTEL MANAGEMENT SYSTEM

 Categories of
maintenance

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 228
HOTEL MANAGEMENT SYSTEM

Conclusions:

The developed system has the following features which make the working in the intranet a very

easy task.

Features:

 User Friendly:

The system is user friendly as it provides all the facilities of reservation to the user right at

home so it helps to save his time and effort ,and the working of the booking procedure is so

easy and understandable that anyone can book ticket by just understanding the procedure once

 Attractive Layout:

Each screen is designed in such a way that the user will feel enthusiastic while working with the

system.

 Easy to Learn:

Due to the easy layout and its user friendliness, it is very easy to learn how to work with the

system. The user will feel relaxed and enjoy working with it.

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 229
HOTEL MANAGEMENT SYSTEM

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 230
HOTEL MANAGEMENT SYSTEM

FUTURE ENHANCEMENT

Today all the action are performed online because it is fast, efficient & trouble
shooting in case of huge queue as time is so precious today that no one wants to waste it. It
is also a way of reliable and quick communication as some time it is needed to be inform
quickly, in such case online works only. E-Billing System is the best example of all above
services.The application can be further enhanced to include the following things-
>> Provide better customer service
>> Solve a complaint with in quick time.
>> Customer service provider.

Bibliography
Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .
Roll No :- 0901204, 0901157, 0901105, 0801407 Page 231
HOTEL MANAGEMENT SYSTEM

Websites

URL’s J2EE,Oracle Resource Description


www.java.sun.com For JDK, JSP and JDBC

www.apache.come For Tomcat Web Server

www.james.com For JSP and Servlet

www.jarlin.com For JSP, Servlet and Eclipse

www.oracle.com For Oracle Database Management with Java


http://java.sun.com/blueprints/guidelines/
designing_webservices/html/security6.html For Security Features of J2EE, Web
Applications

Books

Name of Book Publication


Beginning POJOs: From Novice to professional by
WILEY INDIA
Seth Lodd
Beginning Apache Struts: From Novice to
WILEY INDIA
Professional by Arnold Dray
Expert Spring MVC and Web Flow By Seth Lodd WILEY INDIA

Professional java user interface by Mauro Marinilli WILEY INDIA

Pro Java ME MMAPI Mobile media API for Java WILEY INDIA

Micro Edition by vikram goyal WILEY INDIA

PRO JSP 2/2.1 by Simon Brown WILEY INDIA


nd
SCJD Exam with J2SE 5, 2 edition by Andrew
monk house

Name:-SAURABH KUMAR,RISHU GUPTA , MANSI SINGH , AAKANSHA GUPTA .


Roll No :- 0901204, 0901157, 0901105, 0801407 Page 232

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy