Online Hotel Reservation System Simplifies Room Bookings
1.
2.
3.
4. • Online Hotel Reservation System will provide
service to online customers, employee and
an administrator.
• Online customers can make searches,
Reservations and cancel an existing
reservation on the hotel reservation’s
website.
• Administrator can add/ update the hotel and
room information
5. Sources of Reservations
• Guest reservations come from a variety of
market segments.
• Some of the more common groups include
corporate clients, group travelers, pleasure
travelers, and current guests who want to
return to the same hotel.
7. Advantages of Online Hotel Booking System
• Saves time of Customers for quickly reserving
rooms
• Secure – Very secure system due to login and password option
availability
• User Friendly
• Less Chances of Human Errors
• Ability to create extensive guest history with
records like guest stay, address, preferences for
unlimited years
• User-definable screens
• Report Generator
• Email-reminder
8. Disadvantages of Online Hotel Booking System
• Expensive system
• Maintenance is also expensive
• Spoofing attack may occur in Online Hotel
Reservation System
• Hacking of Website may leads to crash of system
9. Algorithm
Step 1: Register User Record
Step 2: Login with Username and Password
Step 3: If Valid Username and password
Then Goto Step 4
Else Invalid Username and password
Then Goto Step 2
Step 4: Check availability of rooms
Step 5: If Rooms Available
Then Goto Step 6
Else Rooms Not Available
Then Goto Step 10
Continues……..
11. Online Hotel Reservation System
Diagram
Customer
Online
Reservation
System
Enquiry Details
Reservation Details
Confirmation Details
12. Field Name Data type Width Description Validation
Room_no Int 10 Stores Room
Number
Primary Key
Customer_id Int 10 Stores
Customer_id
Foreign Key
Room _type Varchar 20 Stores Room
Type
NOT NULL
Room_size Varchar 10 Stores Room
Size
NOT NULL
Room _price Currency 5 Stores Room
Price
NOT NULL
Table 1: Room Details
13. Table 2: Customer Details
Field Type Data Type Width Description Validation
Customer_id Int 10 Stores
Customer ID
Primary Key
Name Varchar 20 Stores Name
of Customer
Name cannot
be BLANK
Last_name Varchar 20 Stores Last
Name of
Customer
Lastname
cannot be
BLANK
Location Varchar 10 Store Location
of Customer
NOT NULL
Address Varchar 30 Store Address
of Customer
NOT NULL
Telephone Varchar 10 Store
Telephone
Number
NOT NULL
Email Varchar 30 Store Email of
Customer
NOT NULL
14. Table 3: Reservation Details
Field Data Type Width Description Validation
Reservation_
no
Int 20 Stores
Reservation
Number
Primary Key
Customer_id Int 10 Stores Customer
ID
Foreign Key
Room_no Int 10 Stores Room_no Foreign Key
Check_in Varchar 10 Stores Check in
Details
NOT NULL
Check_out Varchar 10 Stores Check out
Details
NOT NULL
26. Customer_i
d
Name Last_Name Location Address Telephone Email
20 Tom Cooper Ireland ABC 65485478 dsa@gm
ail.com
25 Chris Lewis US XYZ 88554887 chr@gm
ail.com
35 Surinder Khanna India DEF 95648542 sk@gmai
l.com
TAJ HOTEL CUSTOMER DETAILS
27. Room_no Customer_id Room_type Room_size
(in SQ m)
Room_price
(RS)
25 20 Executive Suit 97 sq m 11,250
100 25 THE TATA Suit 95 sq m 10,300
200 35 RAJPUT Suit 90 sq m 9000
TAJ HOTEL ROOM DETAILS
28. Reservation_no Customer_id Room_no Check_in Date Check-out Date
1 20 25 31/12/2016 12/1/2017
2 25 100 2/2/2017 5/2/2017
3 35 200 5/3/2017 8/3/2017
TAJ HOTEL ROOM RESERVATION DETAILS
29.
30. Implementation Methods
1. Direct Approach
Direct installation of the new system with immediate
discontinuance of the old existing system is reffered as “cold
turnkey” approach.
This approach becomes useful when these factors are
considered.
1. The new system does no replace the existing system.
2. Old system is regarded absolutely of no value
3. New system is compact and simple.
4. The design of the new system is inexpensive with more
advantages and less risk involved.
31. Implementation Methods
2.Parallel Approach
-The selected new system is installed and operated with
current system.
-This method is expensive because of duplicating facilities
and personal to maintain both the systems.
- In this approach a target date must be fixed when the
operations of old system cease and new one will operate on
its own.
32. Implementation Methods
3. Modular Approach
This is generally recognized as “Pilot approach”, means the
implementation of a system in the Organization on a piece-
meal basis.
This has few advantages / merits
1. The risk of systems failure is localized
2. The major problem can be easily identified and corrected
before further implementation.
3. Operating personal can be trained before system is installed
in a location.
33. Implementation Methods
4. Phase-in-Implementation
-This approach is similar to modular method but it differs
because of segmentation of system, however, not the
organization.
- It has advantages that the rate of changes in a given
Organization can be totally minimized and the data processing
resource can be acquired gradually over a period of time.
- System exhibits certain disadvantages such as limited
applicability, more costs incurred to develop interface with old
system and a feeling in the Organization that system is never
completed.
34.
35. Corrective Maintenance: -
This type of maintenance implies removing errors in a
program, which might have crept in the system due to
faulty design or wrong assumptions.
Thus, in corrective maintenance, processing or
performance failures are repaired.
Maintenance Methods
36. Maintenance Methods
Adaptive Maintenance: -
In adaptive maintenance, program functions are
changed to enable the information system to satisfy the
information needs of the user.
This type of maintenance may become necessary
because of organizational changes which may include:
a) Change in the organizational procedures,
b) Change in organizational objectives, goals, policies,
etc.
c) Change in forms
d) Change in information needs of managers.
e) Change in system controls and security needs, etc.
37. Maintenance Methods
Perfective Maintenance: -
Perfective maintenance means adding new programs or
modifying the existing programs to enhance the
performance of the information system.
This type of maintenance undertaken to respond to
user’s additional needs which may be due to the changes
within or outside of the organization.
Outside changes are primarily environmental changes,
which may in the absence of system maintenance,
render the information system ineffective and inefficient.
38.
39.
40. Conclusion
• While developing this project we have learnt a lot about hotel
management
•The Online Hotel Reservation System was developed to replace
the manual process of booking for a hotel room or any other
facility of the hotel.
•The old system does not serve the customer in a better way;
rather it makes customer data vulnerable.
•The new system keeps proper records of customers for
emergency and security purposes.
•We have learnt how to make a system user friendly
•We also realized the importance of maintaining a minimal
margin for error.
•During the development process we studied carefully and
understood the criteria of Implementation process.