The Development Of Application For Booking The Meeting Rooms Essay

Function and Purpose

Clinch that important deal the customer have always dreamed of, via this application, meeting and meeting rooms. we develop a web-meeting notification applications for booking the meeting venue and time. The system has three users, admin and employees. Each user has separate login id and password. Admin will create the id and password for the users. The employees can download the application and register their name using this id and password. The manager of each department can book the meeting room by inserting the details such as department name, date, time, meeting room number, and number of employees. He can select the duration of meeting by selecting the time slot. The booked time slot will be highlighted and no one can access the same time on that particular date. Once he completes the booking process an automatic notification will send to the employees web. They can accept or reject the notification. The manager can see the employers notification status.

Environmental Considerations

Meeting room allocation is a space management system which is a powerful tool for space managers to understand how your organization is using its physical spaces, and a necessity for large organizations with a portfolio of facilities. Provide space management software can rely on as a space management professional. this application tools operate under a unified platform. You have to track data for many business units and ensure to the utmost capacity. Devote fewer man-hours to retrieving information.


This section consists of specific requirements which are used in the implementation of the web-meeting notification applications for booking the meeting venue and time. The technologies that are to be used in the project for a proper implementation will be PHP language, HTML, CSS, Java Script, MySql etc.

Furthermore, the developer used all the five stages which is to ensure the proper functioning of the system through analysis requirements, design, implementation, test, and maintenance. The requirements specification is an announcement of the application utilitarian and operational necessities. It fills in as an agreement between the developer and the client for whom the framework is being produced also satisfied the agreements . The prerequisites of the particulars incorporate subtle elements of the principle elements of the electronic framework and the necessities to research each element in the framework, including the intuitive condition and the requirements for the completion of non-functional tasks and functional functions as shown in the following paragraphs :Designing and developing the application system. Reduces “churn” and increase cost savings through better space utilizationImproves quality assurance management and regulatory complianceBetter manages reporting via graphical query capabilitiesEasily access information and share it across departments.

Evaluating the product in all subsequent phases of the lifecycleDetermining the success of the projectHardware RequirementsTo be used efficiently, all systems software needs certain hardware components or other software resources to be present on a computer to ensure the fastest operation of the system. The above hardware details have been set according to the software system requirement.

Software Requirements

The software requirements are the integral part of a system. All are very much important in each and every developing and implementation stage of the system. The basic needs that need to be fulfilled first in order to process developing a system followed by software requirements like PHP, Xampp, Editors, HTML, CSS etc all that software’s are highly implemented on developing the system. The PHP programming language is used extensively throughout the project.

The editors help in writing codes on the programming phase to develop the system, the HTML used in structuring page building, to make the contents etc and the CSS is used in designing, styling, look and field for the project. The operating system gives the platform where the programs can run. Networking hardware also known as network equipment are physical devices which are required for communication and interaction between devices on a computer network.

Functional Requirements

It fills in as an assention between the engineer and the customer for whom the system is being delivered. The essentials of the particulars fuse inconspicuous components of the guideline components of the electronic structure and the necessities to inquire about every component in the system, including the instinctive condition and the prerequisites for the finishing of non-utilitarian undertakings and practical capacities as appeared in the accompanying sections:

  • Analysis ,Designing and building up the application framework
  • Evaluating the item in every ensuing period of the lifecycle
  • Determining the achievement of the undertaking
  • Interface Requirements.

They specify the way the user shall interact with the systems as well as define the necessary hardware interfaces and the communication interfaces required by the software to store and retrieve data.

User Interfaces

The user interfaces shall follow basic windows style and functionality conventions. The interface in the current project has six tabs on the top left corner of the system. The six tabs in the system were explained as:

Home Page: The home page will show the details of the system with its functions and specifications

Room Listing Page: This page tells brief introduction for showing the rooms list.

Departments Page: System facilitate admin can manage departments.

Managers page: System enhances management of managers list.

Employee Page: System enhances management of employee list.

Register: In this tab, the system allows the customer to make the registration

Meeting Report:in this tab, the system enhances manage the details of Meeting room status.

Login: The login tab allows the user to enter the system after feeding ID and password.

Hardware Interface

The application can run on any hardware which supports Windows. The system must have at least 200 megabytes of free disk space to install the program and 500MB-1GB memory is required to load the application. The program does not write information directly to the user’s computer, but instead uses a database which is located on a network server. The user’s computer transfers and receives data from the server using basic networking protocols.

Software Interfaces

The system requires a properly configured version of Windows 2000 or windows XP or windows 8 to run the application. These computers must have Microsoft NET Framework 1. The system’s server can use either Windows, Linux or UNIX, but it must have MySQL, properly installed and configured. Operational Requirementsas the feasibility study is very important to know the usefulness or efficiency of the system in achieving the objectives that was designed to achieve an application for phones or a website access on the meeting rooms and try to reserve or cancel the meeting time or day with the name of the meeting room for all insurance product plays an important role in addressing and solving many of the problems faced by the bahrain large and medium corporate, Entrepreneurs ,Managers, and employees. As the system incorporates many features that develop the mechanism of work and make it more flexible and easy and accountable.


RequirementsSecurity requirements are defined internally by IT. For example, many organizations have security requirements related to sensitive software development procedures, such as preventing fraud or harm when code is migrated into production. Separation of duties would be an appropriate security control for these requirements; it means that a person who develops a piece of code cannot also move that piece of code into the production environment.

In an important form of risk management, we need to prioritize security requirements to determine the appropriate level of security. Project teams should evaluate the likelihood of security threats (such as unauthorized access to data or network resources), identify the appropriate security controls to mitigate the risk, and test early and often to ensure that the controls are established.Many organizations involve a business risk officer as well as an information security officer in decisions about the appropriate level of security enforcement. Establishing and maintaining security can be costly. For those security requirements not arising from regulation, or to protect health or human safety, risk and security officers may have to make trade-offs between the costs of achieving security and the likelihood of a breach.

Quality Requirements

Software quality requirements (SQR) play a central role in software quality (SQ) success. The importance of mastering SQR can be seen as obvious, however, when it comes to customer satisfaction, end-users are often dissatisfied with SQ. quality requirement refers to a condition or a capability that must be present in a requirement. They represent that which is needed to validate the successful completion of a project deliverable.

The easiest of quality requirements to capture are the express ones. Examples include ones written in the contract or charter and ones set forth by code or statute. Implied quality requirements can be more 3.13Verification & Validation Requirements

Validating Requirements

To validate means to confirm that the requirements meet the operational and system level needs of a program. Validating Requirements ensures that:The set of requirements is correct, complete, and consistent,A model can be created that satisfies the requirements, andA real-world solution can be built and tested to prove that it satisfies the requirements.Verifying Requirements Requirement must be verified to prove that each one satisfies their stated requirement. Verification can be done by Logical argument, Modeling & Simulation, Analysis , Test and Evaluation (T&E),Demonstration,etc.3.14Network requirements specification Proper network planning can save time and expense, and can ensure a timely deployment. Network planning involves: knowing the number of telephone lines and the types of associated services and equipment that are needed to support telephony (voice-only) applications; anticipating increased TCP/IP network traffic; and subsequently determining the optimal network architecture needed for the system.

In addition, the following services or devices may be required. TCP/IP Network.A physical TCP/IP network is required for MSS. All MSS computers, Web servers and load balancers communicate using this network. Install at least one network adapter in each computer running MSS. The use of a firewall between MSS computers is not supported. To determine network planning requirements. Connection to the Internet A stable, high-speed (wired or wireless) Internet connection is required for online testing. The response time for each assessment depends on the reliability and speed of your school’s network. You will need to verify your network settings.

Wireless Security

Due to the sensitivity of test-related data, encryption is required. It is highly recommended that wireless traffic use WPA2/AES data encryption. Because encryption/decryption is part of the data exchange process, there may be a slight decrease in the overall speed of the network. The Local Caching Software (LCS) is an optional tool that can be used to help reduce networking issues and increase your local testing capacity.

How to cite this essay: