KEMBAR78
Running Software Testing Report | PDF | Ip Address | Computer Network
0% found this document useful (0 votes)
8 views16 pages

Running Software Testing Report

The document is a project report submitted by Group 7 from the Government Polytechnic, Gondia, focusing on the development of a hotel management software titled 'Make my Trip'. It outlines the rationale, aims, course outcomes, literature review, methodology, and resources used for the project, emphasizing the importance of online booking and security measures like firewalls. The project was completed under the guidance of Ms. P.M. Bhagat and is part of the requirements for the Diploma in Computer Engineering for the academic year 2022-2023.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
8 views16 pages

Running Software Testing Report

The document is a project report submitted by Group 7 from the Government Polytechnic, Gondia, focusing on the development of a hotel management software titled 'Make my Trip'. It outlines the rationale, aims, course outcomes, literature review, methodology, and resources used for the project, emphasizing the importance of online booking and security measures like firewalls. The project was completed under the guidance of Ms. P.M. Bhagat and is part of the requirements for the Diploma in Computer Engineering for the academic year 2022-2023.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 16

GOVERNMENT OF

MAHARASHTRA STATE BOARD OF TECHNICAL


EDUCATION
DIPLOMA IN
Government Polytechnic, Gondia

A PROJECT REPORT
ON
“Make my Trip”
MICRO PROJECT SUBMITTED IN PARTIAL FULFILLMENT OF THE REQUIREMENTS
FOR THE AWARD OF GPG FOR THE PRACTICAL OF STE (22414)

SUBMITTED BY GROUP 7
Name of Student Enrollment No
1. Damini S Patle 2012420094
2. Shreyash R Wadibhasme 2012420095
3. Manish M Khawas 2012420096
4. Bhushan R Lilhare 2012420098
5. Munnwar shaikh 2012420117

GUIDED BY
Ms.P. M. Bhagat
Lecturer
Department of Computer Engineering

CERTIFICA
TE
1
This is to Certify that the project report entitled

“Make my Trip”
Was successfully completed by Student of Second
semester Diploma in (Computer engineering).
BY GROUP 7

1. Damini S Patle 2012420094


2. Shreyash R Wadibhasme 2012420095
3. Manish M Khawas 2012420096
4. Bhushan R Lilhare 2012420098
5. Munvvar Sheikh 2012420117

Carried out under guidance of Mr.Z.J. Bhallare sir, Lecturer, Computer department
and submitted to the department of computer engineering in partial fulfillment of the
requirements for the award of the Diploma in Government Polytechnic Gondia and
submitted to the Department of Government Polytechnic Gondia of Institute
Government Polytechnic Gondia work carried out during a period for the academic
year 2022-2023 as per curriculum.

Ms. P.M. Bhagat Dr. Prashant S. Sharma


Guide and Lecturer Head of Department
Department of Computer Engineering Department of Computer Engineering

Department of Computer Engineering


Government Polytechnic, Gondia
(Year: 2022-2023)

2
INDEX
Sr
Title Page no.
No.

1 Rationale 4

2 Course Outcomes Addressed 4-5

3 Literature Review 4-12

4 Actual Methodology Followed 13

5 Actual Resources Used 14

6 Outputs of the Micro-Project 14

7 Skill Developed / learning out of this Micro-Project 15

8 Applications of this Micro-Project 15

9 Area of Future Improvement 15

Micro-Project Report
3
1.Rationale:
In today’s world online booking is very wide trend. With the help of
this software, you can book online room as yours required. This is
software which has mainly made for management of a hotel. The
software has been designed with frontend as asp.net and backend as
C#.

The project hotel management manages and maintains the record of


customers and rooms of the hotel. Customer can book the room
through this software. The rooms have different categories such as
A.C., nonA.C etc.

MakeMyTrip.com, India's leading online travel company was


founded in the year 2000 by Deep Kalra. Created to empower the
Indian traveller with instant booking and comprehensive choices, the
company began its journey in the US-India travel market.

2. Aim of Micro Project:

 to make travel simple and fun for all, and our core values guide us in
making this possible.
 To install make my trip to help , Traveler to provide their
security.

4
3. Course Outcomes Addressed:

a) Apply various software testing method.


b) Prepare test cases for different type and levels of testing.
c) Prepare test plan for an application.
d) Identify bugs to create defect report of given application.
e) Test software for performance measure using automated testing tools.

4. Literature Review:
We are a technician who provides network support for a medium-sized
business. The business has grown and includes a research and
development department working on a new, very confidential project.
The livelihood of the project depends on protecting the data used by the
research and development team.

Any computer that connects to an internet connection is vulnerable to


attacks. Some computers can be more vulnerable than the other. In
order for protecting against them there must be a system that should act
as a gateway between the user and the internet.

What is Firewall ?

Basically firewall is a type of wall which prevents hackers from


attacking a network. Perhaps it is one of the best protections ever made
to stand out against the internet threats. Including cyber attacks it
prevents your computer from various other threats surrounding on the
internet.While there are vast majority of the benefits provided by the
firewall there can be other drawbacks as well. Understanding both the
benefits and the drawbacks will help you to use the tool better for
acquiring the best out of your business.

In this article, I will be illustrating the 5 Advantages and Disadvantages


of Firewall | Drawbacks and Benefits of Firewall. Finally from this
article, you will know the pros and cons of using firewall.
5
Benefit of Firewall

1. Monitor Traffic
A major responsibility of a firewall is to monitor the traffic passing
through it. Whatever the information traveling through a network is in
the form of packets. Firewall inspects each of these packets for any
hazardous threats. If any chance the firewall happens to find them it
will immediately block them.

2. Protection against Trojans


Malwares especially the type Trojans are dangerous to a user. A Trojan
silently sits on your computer spying over all the works you do with it.
Whatever the information they gather will be sent to a web server.
Obviously you will not know their presence until the strange behaviours
of your computer. A firewall in this instance will immediately block
Trojans before they cause any damages to your system.

3. Prevent Hackers
Hackers on the internet constantly look for computers in order for
carrying out their illegal activities. When the hackers happen to find
such computers they will start to do even malicious activities such as
spreading viruses. Apart from those hackers there can be unknown
people such as the neighbours looking out for an open internet
connection. Hence, to prevent such intrusions it is a good idea to be
with a firewall security.

4. Access Control
Firewalls comes with an access policy that can be implemented for
certain hosts and services. Some hosts can be exploited with the
attackers. So the best in case is to block such hosts from accessing the
system. If a user feels that they need protection from these types of
unwanted access, this access policy can be enforced.

5. Better Privacy

6
Privacy is one of the major concerns of a user. Hackers constantly look
out for privacy informations for getting clues about the user. But by
using a firewall many of the services offered by a site such as the
domain name service and the finger can be blocked. Hence, the hackers
are with no chance of getting privacy details. Additionally firewalls can
block the DNS informations of the site system. Due to this the names
and the IP address will not be visible to the attackers.

We job is to install firewalls to help protect the network, based on


specific requirements. The Packet Tracer topology that you will use
includes two preconfigured firewalls. In the two scenarios presented,
you will replace the existing routers with the firewalls. The firewalls
need to be configured with the appropriate IP address configurations,
and the firewalls should be tested to ensure that they are installed and
configured correctly.

Scenario 1: Protecting the Network from Hackers


Because the company is concerned about security, you recommend a
firewall to protect the network from hackers on the Internet. It is very
important that access to the network from the Internet is restricted.
Firewall_1 has been preconfigured with the appropriate rules to provide
the security required. You will install it on the network and confirm that
it is functioning as expected.

Step 1: Replace Router_A with Firewall_1.


a. Remove Router_A and replace it with Firewall_1.

7
b. Connect the Fast Ethernet 0/0 interface on Firewall_1 to the Fast
Ethernet 0/1 interface on Switch_A. Connect the Fast Ethernet
0/1 interface on Firewall_1 to the Ethernet 6 interface of the ISP
cloud. (Use straight-through cables for both connections.)
c. Confirm that the host name of Firewall_1 is Firewall_1.
d. On Firewall_1, configure the WAN IP address and subnet mask
for the FastEthernet 0/1 interface as 209.165.200.225 and
255.255.255.224.
e. Configure the LAN IP address and subnet mask for the Fast
Ethernet 0/0 interface on Firewall_1 as 192.168.1.1 and
255.255.255.0.

Step 2: Verify the Firewall_1 configuration.


a. Use the show run command to verify your configuration. This is a
partial example of the output.

Firewall_1#show run
Building configuration...
hostname Firewall_1
!
interface FastEthernet0/0
ip address 192.168.1.1 255.255.255.0
ip nat inside
duplex auto
speed auto
!
interface FastEthernet0/1
ip address 209.165.200.225 255.255.255.224
ip access-group 100 in
ip nat outside
duplex auto
speed auto
!
8
interface Vlan1
no ip address
shutdown
!
ip nat inside source list 1 interface FastEthernet0/0
overload
ip classless
ip route 192.168.2.0 255.255.255.0 192.168.1.2
ip route 192.168.3.0 255.255.255.0 192.168.1.3
!
access-list 1 permit 192.168.0.0 0.0.255.255
access-list 100 deny ip any host 209.165.200.225
<output omitted>
!
end

b. From PC_B, ping 209.165.200.225 to verify that the internal


computer can access the Internet.

PC>ping 209.165.200.225
Pinging 209.165.200.225 with 32 bytes of data:
Reply from 209.165.200.225: bytes=32 time=107ms TTL=120
Reply from 209.165.200.225: bytes=32 time=98ms TTL=120
Reply from 209.165.200.225: bytes=32 time=104ms TTL=120
Reply from 209.165.200.225: bytes=32 time=95ms TTL=120
Ping statistics for 209.165.200.225:
Packets: Sent = 4, Received = 4, Lost = 0 (0% loss),
Approximate round trip times in milli-seconds:
Minimum = 95ms, Maximum = 107ms, Average = 101ms

c. From privileged EXEC mode on Firewall_1, save the running


configuration to the startup configuration using the copy run start
command.

9
Scenario 2: Securing the Research and Development Network
Now that the entire network is secured from traffic originating from the
Internet, secure the research and development network, Subnet C, from
potential breaches from inside the network. The research and
development team needs access to both the server on Subnet B and the
Internet to conduct research. Computers on Subnet B should be denied
access to the research and development subnet.

Firewall_2 has been preconfigured with the appropriate rules to provide


the security required. You will install it
on the network and confirm that it is functioning as expected.

Step 1: Replace Router_C with Firewall_2.


a. Remove Router_C and replace it with Firewall_2.
b. Connect the Fast Ethernet 0/1 interface on Firewall_2 to the Fast
Ethernet 0/3 interface on Switch_A. Connect the Fast Ethernet
0/0 interface on Firewall_2 to the Fast Ethernet 0/1 interface on
Switch_C. (Use straight-through cables for both connections.)
c. Confirm that the host name of Firewall_2 is Firewall_2.
d. On Firewall_2, configure the WAN IP address and subnet mask
for the Fast Ethernet 0/1 interface as 192.168.1.3 and
255.255.255.0.
e. Configure the LAN IP address and subnet mask for the Fast
Ethernet 0/0 interface of Firewall_2 as 192.168.3.1 and
255.255.255.0.

Step 2: Verify the Firewall_2 configuration.


a. Use the show run command to verify the configuration. This is a
partial example of the output.
Firewall_2#show run
Building configuration...
... !
interface FastEthernet0/0
ip address 192.168.3.1 255.255.255.0

10
ip nat inside
duplex auto
speed auto
!
interface FastEthernet0/1
ip address 192.168.1.3 255.255.255.0
ip access-group 100 in
ip nat outside
duplex auto
speed auto
!
access-list 1 permit 192.168.3.0 0.0.0.255
access-list 100 permit ip host 192.168.2.10 any
access-list 100 permit ip host 192.168.1.1 any
<output omitted>
!
End

b. From the command prompt on PC_B, use the ping command to


verify that the computers on Subnet B cannot access the computers on
Subnet C.
PC>ping 192.168.3.10
Pinging 192.168.3.10 with 32 bytes of data:
Request timed out.
Request timed out.
Request timed out.
Request timed out.
Ping statistics for 192.168.3.10:
Packets: Sent = 4, Received = 0, Lost = 4 (100% loss),

c. From the command prompt on PC_C, use the ping command to


verify that the computers on Subnet C can access the server on
Subnet B.

11
PC>ping 192.168.2.10
Pinging 192.168.2.10 with 32 bytes of data:
Request timed out.
Reply from 192.168.2.10: bytes=32 time=164ms TTL=120
Reply from 192.168.2.10: bytes=32 time=184ms TTL=120
Reply from 192.168.2.10: bytes=32 time=142ms TTL=120
Ping statistics for 192.168.2.10:
Packets: Sent = 4, Received = 3, Lost = 1 (25% loss),
Approximate round trip times in milli-seconds:
Minimum = 142ms, Maximum = 184ms, Average = 163ms

d. From the command prompt on PC_C, use the ping command to


verify that the computers on Subnet C can access the Internet.

PC>ping 209.165.200.225
Pinging 209.165.200.225 with 32 bytes of data:
Reply from 209.165.200.225: bytes=32 time=97ms TTL=120
Reply from 209.165.200.225: bytes=32 time=118ms TTL=120
Reply from 209.165.200.225: bytes=32 time=100ms TTL=120
Reply from 209.165.200.225: bytes=32 time=110ms TTL=120
Ping statistics for 209.165.200.225:
Packets: Sent = 4, Received = 4, Lost = 0 (0% loss),
Approximate round trip times in milli-seconds:
Minimum = 97ms, Maximum = 118ms, Average = 106ms
e. From privileged EXEC mode on Firewall_2, save the running
configuration to the startup configuration using the copy run start
command.

f. Click the Check Results button at the bottom of this instruction


window to check your work.

12
2. COMPUTER SYSTEM:
We have HP , i7 7th generation WITH INBUILT WINDOWS 10 Operating system of 3.20 GHz
INTEL Pentium Core processor with i7 technology computer ( PC ).
HP Desktops and all-in-one PCs are designed with innovative technology and
latest features .

3. OFFICE SOFTWARE PACKAGES:


We have used MS word 2019 for creating our report to show about how we
created this website .For performing of this project we have used MICROSOFT
WORD OFFICE OF 2019 version. Microsoft Office 2019 is a version of Microsoft
Office, a productivity suite for Microsoft Windows. It is the successor
to Microsoft Office 2019 and the predecessor to Microsoft Office 2019.
4. Actual Methodology Followed:
 First we have discussed with each group member for what work should
done by which group member.
 Then we have collected required informations from many of websites ,
Books and from internet about Queue With its implementation using
Array.
 Then we have created a menu driven program of some examples of n
Queue With its implementation using Array program to Demonstrate the
use of Queue in C language and checked the programs using Visual
Studio Code compiler as shown is fig below.

13
 After understanding of some programs we have created a report to
present our programs about how we used n Queue implementation
using Array program of C language .
 After completing this report we have submitted it to our guidance .

5. Actual Resources Used:


S. Name of
Specifications Qty Remarks
No. Resource/material
https://prepinsta.com/c- -
WEBSITES program/implementation-
1
of-queues-using-linked-list
Visual Studio Code , 01/01
2 SOFTWARES GOOGLE CHROME
BROWSER .
HP, core-i7 processor with 01
3 Computer
windows 10 operating
system
system.

14
Office software -
4 MS WORD office 2019
packages
5 Reference to literature -
C program code
review
6 Algorithm , As reference to literature -
Flowchart review
6. Outputs of the Micro-Project:

7. Skill Developed / learning out of this Micro-Project:


 Skill developed from this micro-project is that to understanding the
concept of Queue using C Language .
 We have learned from out of this project that to solve our real-life
problems using C Language .
 And to resolve our problems into small partitions using C Language .

8. Applications of this Micro-Project:


 When multiple processes require CPU at the same time, various CPU
scheduling algorithms are used which are implemented using Queue
data structure.
 We see a queue at a Railway reservation counter, or movie theater
tickets counter, cashier counter.
 Before getting the service, one has to visit to wait in the queue.
 After receiving the service, one leaves the queue.
15
9. Area of Future Improvement:
 In future we can add some more examples and more inhancement in
this micro-project to demonstrate and understand the concept of
Queue.
 Also we can adding more functions that has been discovered soon in
our world and adding more resources .

**************

16

You might also like