Hostel Management System
Hostel Management System
ON
5. Interface requirement 14
5.1 Graphical interface 14
5.2 Command line interface 14
5.3 Hardware interface 14
5.4 Software interface 14
6. Performance requirement 15
8. Security 18-22
8.1 Description 18
8.2 Technical issues 19
8.3 Cost and schedule 20
8.4 Risk 21-22
10. Conclusion 22
Page 1
1. Project Introduction
The purpose of this SRS document is to provide a detailed overview of our software
product, its parameters and goals. This document describes the project's target audience
and its user interface, hardware and software requirements. It defines how our client,
team and audience see the product and its functionality.
Our project goals are to create a management system for hostels or it centralized
database where the hostel management provides to accessing information through WEB,
research collections and providing high level services and collections to its users.
1.3 Overview : -
In this software we will provide with the “HOSTEL MANAGEMENT SYSTEM” with
the features:
rather than specific functions the system may perform. Specific design elements
are usually outside the scope of this document, although design standards may be
referenced. Hostel rooms, investigates the reservation of rooms, and develops
different facilities, principles and potential strategies for further exploration of the
use of facilities.
2.General Description : -
Defining the functionality is the most important part of the whole scenario because
the how the product is going to perform is the foremost matter of concern for any
business solution. It describes general functionality of the SYSTEM as: -.
Provided the database which allows the user to check all the fortnight
information like quantity of rooms, facilities, number of available rooms
etc.
Provide user login form & password.
Provided with the facility to access information through WEB.
Database security features.
Other user friendly facilities
User may face the restriction on some room reservation to access the
information & downloads its information due to these are for confirmation. User can not
login without User-Id & Password
Page 3
1.3User Objective :-
The new system will provide the user-friendly environment through GUI
based application, which gives an easy access to software interface for user.
User wants a system which provides the feature to get information from the
system without interrupting the job of others, which also reduces the workload
of the hostelers and information can be gathered more frequently.
1.4General Constraints :-
3. SYSTEM ANALYSIS :-
System analysis and design refers to the process of examining a business situation
with the intent of improving it through better procedures methods. System development
can generally be thought of as having two major component. System Analysis and
System Design.
System
Windows 98, ME, NT4, 2000 or Windows XP
Page 5
depends that how compressed our data is in the resources. The response time will be even
less then that.
The product is highly stable and still would made upgraded to the fact that we commit to
provide after sales services, but any feature that the other side wants to embed would may
end up in extra economics, still we commit to get the solution modified and updated each
time we find a need of, or can be minor modified as per the user’s wish within a month of
the purchase of the software.
Stability establish the basis for agreement between the customers and the suppliers on
what the software product is to do.
detail regarding any information was very difficult, because data is stored in different
books and each book at different places. In case of any problem, no one can solve the
problem until the master of this field is not present. I have not changed the structure of
organisation. I have delivered a system that looks like a current structure of organisation.
But, this system removes all the overheads. All the computational work will be done
automatically in our system.
With the help of above support we remove defect of existing software. In future, we can
easily switch over any platform to ensure that system does not halt in case of undesired
situation or events.
3.2.3 Economical Feasibility
Economic analysis is the most frequently used technique for evaluating the
effectiveness of a proposed system. It is commonly known as cost/benefit analysis: The
procedure is to determine the benefit and savings that are expected from a proposed
system and compare them with cost. If benefits outweigh cost, a decision is taken to
design and implement the system. Otherwise, further justification or alternative in the
proposed system will have to be made if it is to have a chance of being approved. This is
an ongoing effort that improves in accuracy at each phase of the system life cycle.
4. SYSTEM DESIGNING:-
4.1 SCOPE:-
1) A person should be able to login the system, change the password.
2) Mail should be send to the concerned person about confirmation of rooms.
3) Login id and password should be send at the email address.
4) The system should automatically show the fare for the corrosponding seat.
The term database design can used to describe many different parts of the design of an
overall database system. Principally, and most correctly, it can be thought of as the logical
design of the base data structures used to store the data. In the relational model these are
the tables and views. In an object database the entities and relationships map directly to
object classes and named relationships. However, the term database design could also be
used to apply to the overall process of designing, not just the base data structures, but also
the forms and queries used as part of the overall database application within the database
management system .
The process of doing database design generally consists of a number of steps which will
be carried out by the database designer. Usually, the designer must:
0-LEVEL Diagram
Page 10
HOSTEL
MANAGEMENT
PAYMENTS BED
MANAGEMENT MANAGEMENT
HOSTEL
MANAGEMENT
SYSTEM
ALLOTES ROOMS
MANAGEMENT MANAGEMENT
RENT
MANAGEMENT
1-Level Diagram
Page 11
HOSTEL GENRATE
MANAGEMENT HOSTEL REPORT
BED GENRATE
MANAGEMENT BED REPORT
HOSTEL
RENT MANAGEMET GENRATE
MANAGEMENT RENT REPORT
SYSTEM
PAYMENT GENRATE
MANAGEMENT PAYMENT REPORT
ALLOTEES CHECK
Admin Lodin to Check
MANAGEMENT ALLOTEES DETAIL
System Roles of Manage Hostel Details
Access
2-LEVEL DFD
Manage Beds Details
Forget
Passwor
d Manage Rooms Details
Check
Manage
Credentia
Modules Manage Rent Details
ls
4.4 ER DIAGRAM :-
DEPARTMENT NAME
NUMBE
R
BELON DEPARTMENT
GS
BIRTHDAT OFFERR
E D
SE REGISTE
X STUDENT R
STUDENT ID
STUDENT’S
NAME
Page 13
COURSE
LIVIN
G COURSE
NAME
HOSTEL NUMBER
OF
CREDIT
HOSTEL
ID
HOSTEL NAME
COURSE NO
NUMBER
OF
SEATS
5. INTERFACE REQUIREMENT:-
Website server
Database server
Client machine with internet connection
6. Performance Requirement: -
The website must be able to provide a user-friendly interface to search, select and
sell various items from the shop along with proper navigational controls. Design scheme
should be aesthetic and uniform
Internet speed
Proper security and communication for password and premium submission.
Page 15
7.1 SECURITY:-
The authorization mechanism of the system will block the unwanted attempts to
the server and also let the system decide on which privileges may the user have. The
system has different types of users so there are different levels of authorization. There
will be also a firewall installed on the server so the incoming transactions can be filtered.
Data integrity for critical variables will also be checked.
7.2 REALIBILITY:-
The system shall operate 95% of the time. The number of defect should not
exceed 10 per function. In addition, before the submission of the final release the
calendar must be tested in case of the defects over 10 per function.
7.3 MANTAINABILITY:-
The requirements, modules that are explained in this document are enough to
satisfy the customer needs and wants. In case of a change or addition demand after
Page 16
completing the system or in development process of the system, a new agreement shall be
done between the acquirer and FERSOFT Dev Group. The maintainability shall be easily
done by integrating new modules new offering new software solutions for the system.
7.4 PORTABILITY:-
The OBTRS is online service. So, anyone can use the service. One and only the
server of the system must have the required software including MYSQL, Apache.
7.5 REUSABILITY:-
Software development, have made many observations about the theories of software
reuse and what will actually work in practice. Key among these observations lies the fact
that to successfully introduce a formal reuse program into an organization, management
must support reuse both with words and with the necessary resources.
(1) we point out that reuse allows the manager to continue to avoid cost over the entire
life of the product. in our environment, we have centralized support for our reusable
components. so if reusable software has a bug, reusers can have it fixed for free (not
counting the hassle). although we can estimate maintenance costs many ways, we happen
to do it by multiplying our known historical error rates by what it costs us to fix those
errors.
determine if the software specified meets their needs or how the software must be
modified to meet their need.
8. SECURITY:-
8.1. DESCRIPTION:-
The security part is yet the best part that would make our product ahead of the rest crew.
A part of the security concern is being taken under the research work. We do not commit
that this part would be fulfilled surely, still our efforts will always soar high holding the
reigns of success and while being on ground.
Some hostels are creating individual user accounts totrack which titles an individual has
checked out, and to create "HOSTEL MANAGEMENT" type features.
The technology that we are going to use in order to implement this security
solution is that of the hostel management system embedded with our
Page 18
software solution that can really help us out in sending bus information and
confirmation through reservation. In case any transaction is being made from
an account the user will receive a information notice regarding his each and
every transaction. Hopefully we are going to implement this technology
through hostel management service.
Page 19
Now looking at the time limit of 53 days and working for 3 hours and work to do
we can divide our work in following parts:
Merely we think of the cost estimation on the basis of the following points:
We estimated a
8.4 RISK:-
The complete RISK ANALYSIS is given below in the table :-
5. Continuation What if the user side even after signing the contract are
stream of continuously asking for the changes and modification an undue
requirement problem would be there in the development of the software and
changes. undue time would be utilized for the same which can ultimately
result in a delay in the project.
6. Short Falls in Again a new Bulgarian problem to face.
furnished product
Page 21
Internet speed
Proper security and communication for password and premium
submission.
www.google.com
10.Conclusion
Page 22