Airline Reservation System: Mr. Vijay Kothawade

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 61

AIRLINE RESERVATION SYSTEM

A Project report

Submitted in partial fulfillment of the

Requirements for the award of the Degree of

BACHELOR OF SCIENCE (INFORMATION TECHNOLOGY)

By

Tushar Dyanadev Shinde

Seat Number (3040290)

Under the esteemed guidance of

Mr. Vijay Kothawade


Assistant Professor

DEPARTMENT OF INFORMATION TECHNOLOGY

KAMALADEVI COLLEGE OF ARTS COMMERCE & SCIENCE

(Affiliated to University of Mumbai)


VITTHALWADI EAST, -MAHARASHTRA-421306

Year 2018-19

1
PROFORMA FOR THE APPROVAL PROJECT PROPOSAL

(Note: All entries of the proforma of approval should be filled up with


appropriate and complete information. Incomplete proforma of
approval in any respect will be summarily rejected.)

PRN No.: …………………… Roll No: ___________

1. Name of the Student


_____________________________________________
2. Title of the Project
_____________________________________________
3. Name of the Guide
_____________________________________________
4. Teaching experience of the Guide
_____________________________________________

5. Is this your first submission? Yes No

Signature of the Student Signature of the Guide


Date: ……………… Date: ………………

Signature of the coordinator


Date: ……………

2
KAMALADEVI COLLEGE OF ARTS COMMERCE & SCIENCE

(Affiliated to University of Mumbai)


VITTHALWADI EAST, -MAHARASHTRA-421306

DEPARTMENT OF INFORMATION TECHNOLOGY

3
CERTIFICATE
This is to certify that the project entitled,"AIRLINE RESERVATION
SYSTEME",is bonafied work of TUSHAR SHINDE bearing Seat.No: (3040290)
submitted in partial fulfillment of the requirements for the award of degree of
BACHELOR OF SCIENCE in INFORMATION TECHNOLOGY from University
of Mumbai.

Internal guide Coordinator

External Examiner

Date: College seal

ABSTRACT
Airline Reservation System contains the details about flight schedules and its fare tariffs, passenger
reservations and ticket records. An airline’s inventory contains all flights with their available seats.
The inventory of an airline service is generally divided into three category of classes (e.g. First,
Business or Economy class) and each category is having seats up to 26 bookings, along with prices
and booking conditions. Inventory data is imported and maintained through a Schedule

4
Distribution System over standardized interfaces. One of the core functions of the inventory
management of airline reservations is the inventory control. Inventory control steers how many
seats are available for the different booking classes, by opening and closing individual booking
classes for sale. In combination with the fares and booking conditions stored in the Fare Quote
System the price for each sold seat is determined.

ACKNOWLEDGEMENT
We are at the outset on the completion of “AIRLINE RESERVATION SYSTEM” project, express our great
regard to those who have offered their invaluable guidance in hour of needs.

We are at the outset on the completion of “AIRLINE RESERVATION SYSTEM” project, express our great
regard to those who have offered their invaluable guidance in hour of needs.

We offer our special thanks to Dr. Sunil Sharma Kamaladevi College of Arts and Com,Vitthalwadi(East) for
giving us opportunity to undergo this project.

We would like to thank Ms.Priyanka Machaknur (Head of I.T. Department) for providing all necessary
facilities and privileges that enabled us to complete the project on time.

5
6
DECLARATION
I here by declare that the project entitled, “AIRLINE RESERVARTION SYSTEM” done at
KAMALADEVI COLLEGE OF ARTS COMMERCE & SCIENCE (421306), has not been in
any case duplicated to submit to any other university

for the award of any degree. To the best of my knowledge other than me, no one has submitted to
any other university.

The project is done in partial fulfillment of the requirements for the award of degree

Of BACHELOR OF SCIENCE (INFORMATION TECHNOLOGY) to be submitted as final

semester project as part of our curriculum.

TUSHAR SHINDE

TABLE OF CONTENTS

7
Chapter Title Page No.
1 Introduction 9
1.1 Background
1.2 Objectives
1.3 Purpose and Scope
1.3.1 Purpose
1.3.2 Scope
2 System Analysis 21
2.1 Existing Systems
2.2 Proposed System
2.3 Requirement Analysis
2.4 Hardware Requirement
2.5 Software Requirement
2.6 Justification of Selection of Technology
3 System Design 25
3.1 Module Division
3.2 Data Dictionary
3.3 ER/UML Diagrams
4 Implementation and Testing 40
4.1 Code (Place Core Segment)
4.2 Testing Approach
4.2.1 Unit Testing (Test Cases and Test Result)
4.2.2 Integration Testing (Test Cases and Test Result)
4.6 Coding

5 Result and Discussions (Output Screen) 50


6 Conclusion 59

8
7 References 60

CHAPTER :- 1
INTRODUCTION

1. INTRODUCTION

9
1.1BACKGROUND
H-LINEInformation Systems India Pvt. Ltd., was formerly known as Smart Software Technology
Development Co., Pvt. Ltd., The company was started by Dr. Kumara Prathipati in association
with Mr. Madan Mohan, H-LINE Executive Director. In the year 1997, Smart Software became the
subsidiary of simply stocks, Simply Stocks, the parent company of Smart Software, has been
acquired by H-LINENY. Currently S & P acquired so we known as H-LINEIndia a division of S &
P the McGraw-Hill Companies.

H-LINE, is the world leader in deeply integrating information –on public & private companies,
investment firms, relationships among firms and professionals, biographical and contact data,
events, transactions, securities data, regulatory filings, news, research products, interactions, and
knowledge.

H-LINE enables leading financial, advisory, and corporate professionals to efficiently make more
intelligent business decisions. H-LINEserves over 10,000 + clients, including the market leaders in
investment banking, investment management, private equity, and related professional services, as
well as some of the world’s largest corporations.

H-LINE products integrate public & Private capital market information with software applications
for research, analysis, idea generation, workflow management, and relationship development.
HLINE are not just a data or software Company, but a team of dynamic

Microsoft. NET Framework

The .NET Framework is a new computing platform that simplifies application development
in the highly distributed environment of the Internet. The .NET Framework is designed to fulfill
the following objectives:

10
 To provide a consistent object-oriented programming environment whether object code is
stored and executed locally, executed locally but Internet-distributed, or executed remotely.
 To provide a code-execution environment that minimizes software deployment and
versioning conflicts.
 To provide a code-execution environment that guarantees safe execution of code, including
code created by an unknown or semi-trusted third party.
 To provide a code-execution environment that eliminates the performance problems of
scripted or interpreted environments.
 To make the developer experience consistent across widely varying types of applications,
such as Windows-based applications and Web-based applications.
 To build all communication on industry standards to ensure that code based on the .NET
Framework can integrate with any other code.
The .NET Framework has two main components: the common language runtime and the
.NET Framework class library. The common language runtime is the foundation of the .NET
Framework. You can think of the runtime as an agent that manages code at execution time,
providing core services such as memory management, thread management, and remoting, while
also enforcing strict type safety and other forms of code accuracy that ensure security and
robustness. In fact, the concept of code management is a fundamental principle of the runtime.
Code that targets the runtime is known as managed code, while code that does not target the
runtime is known as unmanaged code. The class library, the other main component of the .NET
Framework, is a comprehensive, object-oriented collection of reusable types that you can use to
develop applications ranging from traditional command-line or graphical user interface (GUI)
applications to applications based on the latest innovations provided by ASP.NET, such as Web
Forms and XML Web services.

The .NET Framework can be hosted by unmanaged components that load the common language
runtime into their processes and initiate the execution of managed code, thereby creating a software
environment that can exploit both managed and unmanaged features. The .NET Framework not
only provides several runtime hosts, but also supports the development of thirdparty runtime hosts.

11
For example, ASP.NET hosts the runtime to provide a scalable, server-side environment for
managed code. ASP.NET works directly with the runtime to enable Web Forms applications and
XML Web services, both of which are discussed later in this topic.

Internet Explorer is an example of an unmanaged application that hosts the runtime (in the
form of a MIME type extension). Using Internet Explorer to host the runtime enables you to embed
managed components or Windows Forms controls in HTML documents. Hosting the runtime in
this way makes managed mobile code (similar to Microsoft® ActiveX® controls) possible, but
with significant improvements that only managed code can offer, such as semi-trusted execution
and secure isolated file storage.

The following illustration shows the relationship of the common language runtime and the
class library to your applications and to the overall system. The illustration also shows how
managed code operates within a larger architecture.

Features of the Common Language Runtime:

The common language runtime manages memory, thread execution, code execution, code
safety verification, compilation, and other system services. These features are intrinsic to the
managed code that runs on the common language runtime.

With regards to security, managed components are awarded varying degrees of trust, depending on
a number of factors that include their origin (such as the Internet, enterprise network, or local
computer). This means that a managed component might or might not be able to perform fileaccess
operations, registry-access operations, or other sensitive functions, even if it is being used in the
same active application.

The runtime enforces code access security. For example, users can trust that an executable
embedded in a Web page can play an animation on screen or sing a song, but cannot access their
personal data, file system, or network. The security features of the runtime thus enable legitimate
Internet-deployed software to be exceptionally featuring rich.

12
The runtime also enforces code robustness by implementing a strict type- and
codeverification infrastructure called the common type system (CTS). The CTS ensures that all
managed code is self-describing. The various Microsoft and third-party language compilers
generate managed code that conforms to the CTS. This means that managed code can consume
other managed types and instances, while strictly enforcing type fidelity and type safety.

In addition, the managed environment of the runtime eliminates many common software
issues. For example, the runtime automatically handles object layout and manages references to
objects, releasing them when they are no longer being used. This automatic memory management
resolves the two most common application errors, memory leaks and invalid memory references.

The runtime also accelerates developer productivity. For example, programmers can write
applications in their development language of choice, yet take full advantage of the runtime, the
class library, and components written in other languages by other developers. Any compiler vendor
who chooses to target the runtime can do so. Language compilers that target the .NET Framework
make the features of the .NET Framework available to existing code written in that language,
greatly easing the migration process for existing applications.

While the runtime is designed for the software of the future, it also supports software of
today and yesterday. Interoperability between managed and unmanaged code enables developers to
continue to use necessary COM components and DLLs.

The runtime is designed to enhance performance. Although the common language runtime
provides many standard runtime services, managed code is never interpreted. A feature called
justin-time (JIT) compiling enables all managed code to run in the native machine language of the
system on which it is executing. Meanwhile, the memory manager removes the possibilities of
fragmented memory and increases memory locality-of-reference to further increase performance.

Finally, the runtime can be hosted by high-performance, server-side applications, such as


Microsoft® MS Access™ and Internet Information Services (IIS). This infrastructure enables you
to use managed code to write your business logic, while still enjoying the superior performance of
the industry's best enterprise servers that support runtime hosting.

13
.NET Framework Class Library

The .NET Framework class library is a collection of reusable types that tightly integrate
with the common language runtime. The class library is Object Oriented, providing types from
which your own managed code can derive functionality. This not only makes the .NET Framework
types easy to use, but also reduces the time associated with learning new features of the .NET
Framework. In addition, third-party components can integrate seamlessly with classes in the .NET
Framework.

For example, the .NET Framework collection classes implement a set of interfaces that you
can use to develop your own collection classes. Your collection classes will blend seamlessly with
the classes in the .NET Framework.

As you would expect from an object-oriented class library, the .NET Framework types
enable you to accomplish a range of common programming tasks, including tasks such as string
management, data collection, database connectivity, and file access. In addition to these common
tasks, the class library includes types that support a variety of specialized development scenarios.
For example, you can use the .NET Framework to develop the following types of applications and
services:

 Console applications.
 Scripted or hosted applications.
 Windows GUI applications (Windows Forms).
 ASP.NET applications.
 XML Web services.
 Windows services.

14
For example, the Windows Forms classes are a comprehensive set of reusable types that vastly
simplify Windows GUI development. If you write an ASP.NET Web Form application, you can
use the Web Forms classes.

Client Application Development

Client applications are the closest to a traditional style of application in Windows-based


programming. These are the types of applications that display windows or forms on the desktop,
enabling a user to perform a task. Client applications include applications such as word processors
and spreadsheets, as well as custom business applications such as data-entry tools, reporting tools,
and so on. Client applications usually employ windows, menus, buttons, and other GUI elements,
and they likely access local resources such as the file system and peripherals such as printers.

Another kind of client application is the traditional ActiveX control (now replaced by the
managed Windows Forms control) deployed over the Internet as a Web page. This application is
much like other client applications: it is executed natively, has access to local resources, and
includes graphical elements.

In the past, developers created such applications using C/C++ in conjunction with the
Microsoft Foundation Classes (MFC) or with a rapid application development (RAD) environment
such as Microsoft® Visual Basic®. The .NET Framework incorporates aspects of these existing
products into a single, consistent development environment that drastically simplifies the
development of client applications.

The Windows Forms classes contained in the .NET Framework are designed to be used for
GUI development. You can easily create command windows, buttons, menus, toolbars, and other
screen elements with the flexibility necessary to accommodate shifting business needs.

For example, the .NET Framework provides simple properties to adjust visual attributes
associated with forms. In some cases the underlying operating system does not support changing
these attributes directly, and in these cases the .NET Framework automatically recreates the forms.
This is one of many ways in which the .NET Framework integrates the developer interface, making
coding simpler and more consistent.

15
Unlike ActiveX controls, Windows Forms controls have semi-trusted access to a user's
computer. This means that binary or natively executing code can access some of the resources on
the user's system (such as GUI elements and limited file access) without being able to access or
compromise other resources. Because of code access security, many applications that once needed
to be installed on a user's system can now be safely deployed through the Web. Your applications
can implement the features of a local application while being deployed like a Web page.

ASP.NET

ASP.NET is part of the whole. NET framework, built on top of the Common Language
Runtime (also known as the CLR) - a rich and flexible architecture, designed not just to cater for
the needs of developers today, but to allow for the long future we have ahead of us. What you
might not realize is that, unlike previous updates of ASP, ASP.NET is very much more than just an
upgrade of existing technology – it is the gateway to a whole new era of web development.

ASP.NET is a feature at the following web server releases

 Microsoft IIS 5.0 on WINDOWS 2000 Server  Microsoft IIS 5.1 on WINDOWS XP

ASP.NET has been designed to try and maintain syntax and run-time compatibility with
existing ASP pages wherever possible. The motivation behind this is to allow existing ASP Pages
to be initially migrated ASP.NET by simply renaming the file to have an extension of .aspx. For
the most part this goal has been achieved, although there are typically some basic code changes
that have to be made, since VBScript is no longer supported, and the VB language itself has
changed.

Some of the key goals of ASP.NET were to

 Remove the dependency on script engines, enabling pages to be type safe and compiled.

16
 Reduce the amount of code required to develop web applications.
 Make ASP.NET well factored, allowing customers to add in their own custom functionality,
and extend/ replace built-in ASP.NET functionality.

 Make ASP.NET a logical evolution of ASP, where existing ASP investment and therefore
code can be reused with little, if any, change.
 Realize that bugs are a fact of life, as ASP.NET should be as fault tolerant as possible.

Benefits of ASP.NET

The .NET Framework includes a new data access technology named ADO.NET, an
evolutionary improvement to ADO. Though the new data access technology is evolutionary, the
classes that make up ADO.NET bear little resemblance to the ADO objects with which you might
be familiar. Some fairly significant changes must be made to existing ADO applications to convert
them to ADO.NET. The changes don't have to be made immediately to existing ADO applications
to run under ASP.NET, however.

ADO will function under ASP.NET. However, the work necessary to convert ADO
applications to ADO.NET is worthwhile. For disconnected applications, ADO.NET should offer
performance advantages over ADO disconnected record sets. ADO requires that transmitting and
receiving components be COM objects. ADO.NET transmits data in a standard XML-format file so
that COM marshaling or data type conversions are not required.

ASP.NET has several advantages over ASP.

The following are some of the benefits of ASP.NET:

 Make code cleaner.

17
 Improve deployment, scalability, and reliability.
 Provide better support for different browsers and devices.
 Enable a new breed of web applications.
ActiveX

ActiveX is a specification develops by Microsoft that allows ordinary Windows programs


to be run within a Web page. ActiveX programs can be written in languages such as Visual Basic
and they are complied before being placed on the Web server.

ActiveX application, called controls, are downloaded and executed by the Web browser, like
Java applets. Unlike Java applets, controls can be installed permanently when they are
downloaded; eliminating the need to download them again. ActiveX’s main advantage is that it can
do just about anything.

This can also be a disadvantage:

Several enterprising programmers have already used ActiveX to bring exciting new
capabilities to Web page, such as “the Web page that turns off your computer” and “the Web page
that formats disk drive”.

Fortunately, ActiveX includes a signature feature that identifies the source of the control
and prevents controls from being modified. While this won’t prevent a control from damaging
system, we can specify which sources of controls we trust.

ActiveX has two main disadvantages

It isn’t as easy to program as scripting language or Java.

ActiveX is proprietary.

It works only in Microsoft Internet Explorer and only Windows platforms.

18
ADO.NET

ADO.NET provides consistent access to data sources such as Microsoft SQL Server, as
well as data sources exposed via OLE DB and XML. Data-sharing consumer applications can use
ADO.NET to connect to these data sources and retrieve, manipulate, and update data.

ADO.NET cleanly factors data access from data manipulation into discrete components that
can be used separately or in tandem. ADO.NET includes .NET data providers for connecting to a
database, executing commands, and retrieving results. Those results are either processed directly,
or placed in an ADO.NET Dataset object in order to be exposed to the user in an ad-hoc manner,
combined with data from multiple sources, or remote between tiers. The ADO.NET Dataset object
can also be used independently of a .NET data provider to manage data local to the application or
sourced from XML.

1.2 OBJECTIVES

• To be a leader in U.S and a strong global player in supplying financial data products and
services.

• To provide quality services on time at globally competitive prices. • To achieve optimal

utilization of the important resources: people, time and money.

H-LINE Values

19
Client Orientation


H-LINE clients are H-LINE first priority


H-LINE deliver promises and nurture long-term relationships with H-LINE clients

1.3 PURPOSE AND SCOPE

1.3.1 PURPOSE
• Airline Reservation System contains the details about flight schedules and its fare tariffs,
passenger reservations and ticket records.
• The inventory of an airline service is generally divided into three category of classes (e.g.
First, Business or Economy class) and each category is having seats up to 26 bookings,
along with prices and booking conditions.

1.3.2 SCOPE
Inventory control steers how many seats are available for the different booking classes, by opening
and closing individual booking classes for sale. In combination with the fares and booking
conditions stored in the Fare Quote System the price for each sold seat is determined.

20
1.3.3 APPLICABILITY
FEASIBILITY REPORT
Feasibility is the measure of how beneficial or practical the development of information system will be to
an organization.
The feasibility study involves following main criteria:-
a. Whether the identified user needs may be satisfied using current software and hardware technologies.

b. The study will decide if the proposed system will be cost-effective and if it can be developed given
existing budgetary constraints.

c. Feasibility study should be cheap and quick.

d. The result should inform the decision of whether to go ahead with a more detailed analysis.

CHAPTER :- 2
SYSTEM ANALYSIS

21
AIRLINE RESERVATION SYSTEM

2.1 EXISTING SYSTEM

In few countries if a person wants to book a flight ticket, he use to follow one of these things:

 Manually goes to the Airport and book his ticket.


 Downloading the ticket form as paper document, filling it manually and submitting it at
Airport.
 Fill the Ticket form on system and get the print out as paper documents to submit it at Airport.
 Booking the Ticket at some particular registered ticket counters in online.
 Even above approaches make a ticket booking online, it was not completely done on online.
Passenger may not have much freedom over this approach.
 Hence the Passenger may or may not be satisfied with this approach as it includes manual
intervention like travelling to Airport for booking his ticket.

2.2 PORPOSED SYSTEM

The Proposed system ensures the complete freedom for users, where user at his own system can
logon to this website and can book his ticket. Our proposed system allows only registered users to
book the tickets, view timings and cancel their tickets.

In this Proposal the entire work is done on online and ticket with id is also provided for
passengers as a print document. Here passengers can send their queries and suggestions through a
feedback form.

2.3 REQUIREMENT ANALYSIS

The following three areas were taken into consideration while deciding the
feasibility of the proposed system.

 Technical Feasibility

 Economic Feasibility
 Operational Feasibility

Technical Feasibility

The company is an efficient company with excellent infrastructure so as to


successfully support me, as a developer, and support the website. The
system, which is being developed in the latest web technology available, can
efficiently use the resources available and maximize output.

Economic Feasibility

The project will be quite beneficial economically as it will be designed to


cater a global audience as per the company's market presence
requirements. It shall ensure a richer customer base that spreads across the
globe thanks to the transaction facilities that will be implemented.

Operational Feasibility

The project once completed shall be useful to the company and the company
will be able to manage it very effectively using the administration tools that
shall be incorporated within the said system. The general difficulty level of
the project has been kept low so as to ensure ease of operation.

2.4 Hardware Requirements

• Intel-i3 (Processor).
• 256 MB Ram
• 512 KB Cache Memory
• Hard disk 100 GB

Page | 23
2.5 Software Requirements

• Operating System : Windows 7/8/8.1/10 with MS-office


• Programming language : .NET2.0, VISUAL STUDIO 2010
• Web-Technology : ASP.NET Back-End
: SQL SERVER 2008 Web Server : IIS.

Page | 24
CHAPTER
:- 3
SYSTEM ANALYSIS

3.1 Module Division


MODULAR DESCRIPTION & FUNCTIONAL REQUIREMENTS

The list of modules incorporated with “AIRLINE RESERVATION SYSTEM” are

1. Registration module

Page | 25
2. Administrative module

3. Passenger module

1. Registration module

In registration module first we ask passenger to give his details.After registering with us the
passenger can logon to his/her own account and can view all flight details such as Timings,
Prices,Availability of seats and can book the ticket with unique ticket id.Once Passenger registered
with us can book any number of tickets.

2. Administrative module

Administrative module is provided for the sake of administrators to manage the site and update the
content at regular intervals, The major operations included in this module are:

 Create and maintain airline schedule, fare and timings of the Flight.
 View the passenger list.
 View the available seats in the flights.
 Cancel the tickets.
 Updating the flight schedule and timings and fare.

Page | 26
3. Passenger module

This module is meant for passengers, where a user logging into his/her owns account will view this
panel. The major operations included in this module were

 View all airline schedules, timings, fare details and seats availability.
 Book for the tickets.
 View and cancelling of the ticket.
 Send feedback.

Behind these modules, it also includes additional WebPages like Password recovery console,
Tips regarding journey, Traveling news around world and help regarding our site.

Page | 27
3.2 Data Dictionary:

FEEDBACK TABLE

ATTRIBUTE NAME DATATYPE CONSTRAINTS SAMPLE VALUES

ID Int Primary key 1

Name Varchar(50) Not null Suhas

Email Varchar(50) Not null [email protected]

Subject Varchar(50) Not null Password

Message Varchar(MAX) Null Some text message here

SCHEDULING TABLE

Page | 28
ATTRIBUTE NAME DATATYPE CONSTRAINTS SAMPLE VALUE

Flightname Varchar(50) Primary key Suhas

Time Datetime Not null 27/06/2010 6:55:00 AM

Sourcestation Varchar(50) Not null HYD

Destinationstation Varchar(50) Not null NEW DELHI

Seats Int Not null 120

Price Int Not null 1200

TICKETBOOKING TABLE

ATTRIBUTE NAME DATATYPE CONSTRAINTS SAMPLE VALUES

Passengername Varchar(50) Foreign key Suhas

Flightname Varchar(50) Foreign key Kingfisher

Sourcestation Varchar(50) Not null HYD

Destinationstation Varchar(50) Not null DELHI

Ticketno Int Primary key 104

Numberof Int Not null 3


paasengers

Page | 29
REGISTRATION TABLE

ATTRIBUTE NAME DATATYPE CONSTRAINTS SAMPLEVALUES

Username Varchar2(20) Primary key Suhas

Password Varchar2(20) check Suhas1230

First name Number(10) Not null Suhas Ravva

Gender Varchar2(20) Not null Male

Location Number (20) Not null INDIA

Phno Number(10) Not null 9177761547

Page | 30
Page | 31
3 DATA FLOW DIAGRAMS:

A data flow diagram is graphical tool used to describe and analyze movement of data through a system. These
are the central tool and the basis from which the other components are developed. The transformation of
data from input to output through processed, may be described logically and independently of physical
components associated with the system. These are known as the logical data flow diagrams. The physical data
flow diagrams show the actual implements and movement of data between people, departments and
workstations. A full description of a system actually consists of a set of data flow diagrams. Using two familiar
notations Yourdon, Gane and Sarson notation develops the data flow diagrams. Each component in a DFD is
labeled with a descriptive name. Process is further identified with a number that will be used for identification
purpose. The development of DFD’S is done in several levels. Each process in lower level diagrams can be
broken down into a more detailed DFD in the next level. The top-level diagram is often called a “context
diagram”.

Context Diagram:

It contains a single process, but it plays a very important role in studying the current system. The
context diagram defines the system that will be studied in the sense that it determines the boundaries.
Anything that is not inside the process identified in the context diagram will not be part of the system study.
It represents the entire software element as a single bubble with input and output data indicated by incoming
and outgoing arrows respectively.

A DFD is also known as a “bubble chart” has the purpose of clarifying system requirements and
identifying major transformations that will become programs in system design. So it is the starting point of the
design to the lowest level of detail. A DFD consists of a series of bubbles joined by data flows in the system.

Page | 32
DFD SYMBOLS:

In the DFD, there are four symbols

1. A square defines a source(originator) or destination of system data


2. An arrow identifies data flow. It is the pipeline through which the information flows. Data
move in a specific direction from an origin to a destination.
3. A circle or a bubble represents a process that transforms incoming data flow into outgoing data
flows.
4. An open rectangle is a data store, data at rest or a temporary repository of data

Symbols Elementary references

Process that transforms data flow

Data Flow

Source or Destination of data

Data Store

Constructing a DFD:

Several rules of thumb are used in drawing DFD’S:

1. Process should be named and numbered for an easy interface. Each name should be
representative of the process.
2. The direction of flow is from top to bottom and from left to right. Data traditionally flow from
source to the destination although they may flow back to the source. One way to indicate this

Page | 33
is to draw long flow line back to a source. An alternative way is to repeat the source symbol as
a destination. Since it is used more than once in the DFD it is marked with a short diagonal.
3. When a process is exploded into lower level details, they are numbered.
4. The names of data stores and destinations are written in capital letters. Process and dataflow
names have the first letter of each work capitalized.
A DFD typically shows the minimum contents of data store. Each data store should
contain all the data elements that flow in and out.
Questionnaires should contain all the data elements that flow in and out. Missing
interfaces redundancies and like is then accounted for often through interviews.

Salient features of DFD’S:

The DFD shows flow of data, not of control loops and decision are controlled
considerations do not appear on a DFD.
1. The DFD does not indicate the time factor involved in any process whether the data flow
take place daily, weekly or monthly.
2. The sequence of events is not brought out on the DFD.

Types of data flow diagrams

DFD’s are of two types

(a) Physical DFD


(b) Logical DFD

1. Physical DFD:

Structured analysis states that the current system should be first understand correctly. The physical DFD is

the model of the current system and is used to ensurethat the current system has been clearly understood.
Physical DFDs shows actual devices, departments, and people etc., involved in the current system 2. Logical

DFD:

Logical DFDs are the model of the proposed system. They clearly should show the requirements on which the
new system should be built. Later during design activity this is taken as the basis for drawing the system’s
structure charts.

Page | 34
Rules Governing the DFD’S:

Process

1. No process can have only outputs.

2. No process can have only inputs. If an object has only inputs than it must be a sink.

3. A process has a verb phrase level.

Data Store

1. Data cannot move directly from one data store to another data store, a process must move data.

2. Data cannot move directly from an outside source to a data store, a process, which retrieves, must
move data from the source and place the data into data store.

3. A data store has a noun phrase level.

Page | 35
CLASS DIAGRAM:

State Chat Digram:

Page | 36
check availability

view availableseats

reserve seat

gives ticket id

Page | 37
Sequence Diagrams:

Collaboration Diagram:

Page | 38
CHAPTER 4. IMPLEMENTATION AND TESTING

4.1 PROJECT DEVELOPMENT APPROACH

Page | 39
Software process model
To solve actual problems in an industry, software developer or a team of
developers must incorporate a development strategy that encompasses the
process, methods and tools layers and generic phases. This strategy is often
referred to as process model or 3 software developing paradigm. A process
model for software developing is chosen based on the nature of project and
application, the methods and tools to be used, and the controls and deliverables
that are required. All software development can be characterized as a problem
solving loop in which four distinct stages are encountered: Status quo, problem
definition, technical development and solution integration. Regardless of the
process model that is chosen for a software project all of the stages coexist
simultaneously at some level of detail.

Our project follows the waterfall model

THE WATERFALL MODEL

The steps of the typical waterfall model are:

1) Requirement definition

2) System & software design

3) Implementation

4) Integration & system testing 5)Operation and maintenance

Page | 40
There have been some variations from the typical waterfall model for this project
lifecycle.

Page | 41
4.2 TEST CASE
TYPES OF TESTING:

Unit Testing
Unit Testing is done on individual modules as they are completed and become executable. It is
confined only to the designer's requirements

Each module can be tested using the following two strategies:

Black Box Testing

In this strategy some test cases are generated as input conditions that fully execute all functional
requirements for the program. This testing has been uses to find errors in the following categories:

a) Incorrect or missing functions


b) Interface errors
c) Errors in data structure or external database access
d) Performance errors
e) Initialization and termination errors.
In this testing only the output is checked for correctness. The logical flow of the data
is not checked.

White Box testing

In this the test cases are generated on the logic of each module by drawing flow graphs
of that module and logical decisions are tested on all the cases. It has been uses to

generate the test cases in the following cases:

a) Guarantee that all independent paths have been executed.


b) Execute all logical decisions on their true and false sides.
c) Execute all loops at their boundaries and within their operational bounds.
d) Execute internal data structures to ensure their validity.

Page | 42
Integrating Testing

Integration testing ensures that software and subsystems work together as a whole. It tests the
interface ofall the modules to make sure that the modules behave properly when integrated
together.

System Testing
Involves in-house testing of the entire system before delivery to the user. Its aim is to satisfy the user
the system meets all requirements of the client's specifications.

Acceptance Testing

It is a pre-delivery testing in which entire system is tested at client's site on real world data to find errors.

Validation

The system has been tested and implemented successfully and thus ensured that all the requirements as
listed in the software requirements specification are completely fulfilled. In case of erroneous input
corresponding error messages are displayed.

Compilation Test:

It was a good idea to do our stress testing early on, because it gave us time to fix some of the
unexpected deadlocks and stability problems that only occurred when components were exposed to very
high transaction volumes.

Execution Test:

This program was successfully loaded and executed. Because of good programming there was no
execution error.

Output Test:

The successful output screens are placed in the output screens section above.

Page | 43
TEST CASES:

S.No Test case name Test Pre Expected Output


condition
procedure result
1. Registration form Name, HOME Message Success
registered
Loginname,Pass
successfull
word,Confirm
y,Loginnam
password, Sex,
e already
Location, Phno
exists,
password
not
matched

2. Login form Enter Loginname, HOME Display Success


login
Password, Type
successfull
y,invalid
username
or password

3. Scheduling View Admin flight details Success


Flightname, home page Updated
Form
Time,Sourceststi
on,Destinationsts
tion,Seats,

Price.

4. Passenger list form View Admin Passengerd Success


Passengername,F home page etails
lightname,Source Updated
station,Destinati
onstation,Numbe
rofpassengers,Tic
ketno.

Page | 44
5. Feedback view form ViewID,Name,Em Admin Feedback Success
ail,Subject,Messa home page Displayed
ge.

6. Timings form Sourcestation,De User home Flight Success


stinationstation page name, time
displayed

7. Ticketbooking form Numberofpassen User home Successfull Success


gers, Flightname, page y booked,
Sourceststion,
Ticketid will
Destinationstatio
be
n.
displayed.

8. Cancel ticket form Flightname, User Successfull Success


Ticketno. homepage y
canceled,se
rver buzy

9. Booked Tickets Passengername,F User home List of Success


form lightname,Source page tickets of
station,Destinati that user
on,Tickno,

Noofpassengers

10. Feedback form Name, Email, User home Thankyou Success


Subject, page for your
Message. feedback

Page | 45
4.3Coding
Loging Page

Login using System; using System.Data;


using System.Configuration; using
System.Collections; using System.Web;
using System.Web.Security;
usingSystem.Web.UI; using
System.Web.UI.WebControls; using
System.Web.UI.WebControls.WebParts; using
System.Web.UI.HtmlControls; using
System.Data.SqlClient;

publicpartialclassDefault2 : System.Web.UI.Page
{
SqlConnection con;
SqlCommand cmd;
SqlDataReader dr;
String s = ConfigurationManager.ConnectionStrings["cc"].ConnectionString;

protectedvoid Page_Load(object sender, EventArgs e)


{
con = newSqlConnection(s);
con.Open();
}
protectedvoid Login1_Authenticate(object sender, AuthenticateEventArgs e)
{
try
{
cmd = newSqlCommand("Select * from Users Where User_Name='" + Login1.UserName +
"'and Password='"+ Login1.Password + "'", con);
dr = cmd.ExecuteReader(); if
(dr.Read())
{
Response.Redirect("flight_detail.aspx");
}

}
catch (Exception ee)
{
Response.Write(ee.ToString());
}
}

Page | 46
using System; using System.Data; using
System.Configuration; using
System.Collections; using System.Web;
using System.Web.Security;
usingSystem.Web.UI; using
System.Web.UI.WebControls; using
System.Web.UI.WebControls.WebParts; using
System.Web.UI.HtmlControls; using
System.Data.SqlClient;

publicpartialclassDefault2 : System.Web.UI.Page
{
SqlConnection con;
SqlCommand cmd;

String s = ConfigurationManager.ConnectionStrings["cc"].ConnectionString; int


i = 0;
protectedvoid Page_Load(object sender, EventArgs e)
{
con = newSqlConnection(s);
con.Open();
TextBox1.Focus();
}
protectedvoid Button2_Click(object sender, EventArgs e)
{
TextBox1.Text = "" ;
TextBox2.Text = "";
TextBox3.Text = "";
Response.Redirect("flight_detail.aspx");
}
protectedvoidButton1_Click(object sender, EventArgs e)
{

cmd = newSqlCommand("Update Users set Password='"+TextBox2.Text+"' Where


Password='"+TextBox1.Text+"'", con); i = cmd.ExecuteNonQuery();
if(i==1)
{
Response.Write("<Script Language=JavaScript>alert('Your Password has been
Changed')</Script>");
}

}
protectedvoid TextBox2_TextChanged(object sender, EventArgs e)
{

Page | 47
}
}

Air_Ticket
using System; using System.Data; using
System.Configuration; using
System.Collections; using System.Web;
using System.Web.Security; using
System.Web.UI;
usingSystem.Web.UI.WebControls; using
System.Web.UI.WebControls.WebParts; using
System.Web.UI.HtmlControls; using
System.Data.SqlClient;

publicpartialclassDefault15 : System.Web.UI.Page
{
SqlConnection con;
SqlCommand cmd;
SqlDataReader dr;
String s = ConfigurationManager.ConnectionStrings["cc"].ConnectionString;
protectedvoid Page_Load(object sender, EventArgs e)
{
con = newSqlConnection(s);
con.Open();
Session["vv5"] = "56";
Session["vv6"] = "1326";
Session["vv2"] = "30/4/2019";
Session["vv"] = "Mumbai";
Session["vv1"] = "USA";
Session["vv3"] = "Class A";
Session["vv7"] = "2000";
TextBox1.Text = Session["z"].ToString();
TextBox6.Text = Session["z1"].ToString();
TextBox7.Text = Session["vv5"].ToString();
TextBox3.Text = Session["vv6"].ToString();
TextBox8.Text = Session["vv2"].ToString();
TextBox4.Text = Session["vv"].ToString();
TextBox5.Text = Session["vv1"].ToString();
TextBox9.Text = Session["vv3"].ToString();
TextBox10.Text = Session["vv7"].ToString();
TextBox2.Text=Session["qqq9"].ToString();
// if (Session["a"] != null)
// {
// cmd = new SqlCommand("select Invoice_No from Add_Passenger where E_Mail='" +
Session["a"].ToString() + "'", con);
// dr = cmd.ExecuteReader();
// if(dr.Read())
// {
// TextBox2.Text = dr[0].ToString();
// }
// con.Close();
/// }

}
}

Page | 48
Reservation_proc

using System; using System.Data; using


System.Configuration; using
System.Collections; using System.Web;
usingSystem.Web.Security; using
System.Web.UI; using
System.Web.UI.WebControls; using
System.Web.UI.WebControls.WebParts; using
System.Web.UI.HtmlControls; using
System.Data.SqlClient;
publicpartialclassDefault9 : System.Web.UI.Page
{
SqlConnection con;
SqlCommand cmd;
SqlDataReader dr;
String s = ConfigurationManager.ConnectionStrings["cc"].ConnectionString;

protectedvoid Page_Load(object sender, EventArgs e)


{
con = newSqlConnection(s);
con.Open();
cmd = newSqlCommand("Select Distinct(Source) from Add_Flight", con);
dr = cmd.ExecuteReader(); if (!IsPostBack)
{
while (dr.Read())
{
DropDownList1.Items.Add(dr[0].ToString());
}
}
con.Close();
}
protectedvoid Button1_Click(object sender, EventArgs e) {
Session["vv"] = DropDownList1.SelectedItem;
Response.Redirect("Reserv_Proc2.aspx");
} protectedvoid Button2_Click(object sender,
EventArgs e) {

}
}

Page | 49
CHAPTER :- 5
RESULT AND DISCUSSION
Home Page:

Page | 50
Page | 51
AIRLINE RESERVATION SYSTEM
AIRLINE RESERVATION SYSTEM
Page | 55
CHAPTER 6: CONCLUSION
Getting accurate information about what visas or permits you need is an important part of preparing for a
trip or stay abroad. To help you with this task we have provided information about embassies and
consulates abroad, and we have also included companies that provide visa and passport services.

We offer documentation processing, application & filing services for those interested in applying for a
visa.A strong research team ensures that cases are evaluated and processed as per the latest updated
rules and regulations.

















CHAPTER 7. REFERENCE
 FOR .NET INSTALLATION

www.support.mircosoft.com

 FOR DEPLOYMENT AND PACKING ON SERVER

www.developer.comwww.15seco

nds.com

 FOR SQL

www.msdn.microsoft.com

 FOR ASP.NET

www.asp.netwww.asptoday.com

www.aspfree.com

 REFERENCE BOOKS

Evangelous Petereous, “C#.NET Black Book”.

Roger S.Pressman, “Software Engineering”.

Jain, “SQL FOR PROFESSIONALS”.

Wrox, “Professional ASP.NET”.

You might also like