Академический Документы
Профессиональный Документы
Культура Документы
ON
10. Conclusion 36
1
1. INTRODUCTION
Internet banking is a product of e-commerce in the field of banking and financial services. In
what can be described as business to customer domain for banking industry, Internet banking
offers different online services like balance enquiry, balance transfer, opening account, calculate
EMI’s etc. Mostly, these are traditional services offered through internet as a new delivery
channel. Banks are also offering payment services on the behalf of their customers who shop in
different e-shops, e-malls etc. Further, different banks have different levels of such services
offered, starting from level-1 where only information is disseminated through internet to level-3
where online transactions are put through.
2. REFERENTIAL INTEGRITY: User cannot change the date in the transaction files.
Addition of data can be done only on the master files date in transaction files cannot be entered
until addition is done on the master files.
3. EASY RETRIEVAL OF DATA: Data is retrieved easily and quick using sql commands. On
line commands are used to retrieve huge amount of data.
2. USER CONFIRMATION:
3
Whenever the user tries to delete or edit the data, the system asks for the confirmation. This is
used to avoid the accidental changes to the database. A confirmation is also provided for the exit
of the application.
5. SECURITY AND ACCESS: A password form has been provided at the beginning of the
package. Entering the correct password will take user to the main user page
2. TIME CONSUMPTION: A lot of time is consumed in referencing the registers involved for
particular activities and a lot of computation as well as report verification activity is also paper
based and time consuming.
4. REDUNDANCY: Maintaining separate files for each department can lead to duplication of
data present in files. This can lead to:
a) Inconsistencies
b) Update anomalies
c) Decentralization problems
5. HUMAN ERRORS: Human kind of errors may be generated in typing errors and slow
arithmetic calculations, fatigue and boredom.
6. ILLEGAL ACCESS: The security of a lot of documents, which are paper, based if difficult
may be in terms of illegal access or manipulation by malicious personals either intentionally or
by accident.
2. General Description
2.1 Product function:
Track Account Level Data: In this module, check the authentication of users.
Service Level Agreements: It contains the agreements of providing the services related to
users.
User Contact Information: It maintains all the details (Personal, Official and Contact) of
the users.
Product Access Right Details: It maintains the information that does which user have the
rights of using which service.
1. What is the problem? This should explain why the team is needed.
2. Who has the problem or who is the client/customer? This should explain who needs the
solution and who will decide the problem has been solved.
3. What form can the resolution be? What is the scope and limitations (in time, money,
resources, technologies) that can be used to solve the problem? Does the client want a
white paper? A web-tool? A new feature for a product? A brainstormingon a topic?
The primary purpose of a problem statement is to focus the attention of the problem solving
team. However, if the focus of the problem is too narrow or the scope of the solution too limited
the creativity and innovation of the solution can be stifling.
In project management, the problem statement is part of the project charter. It lists what's
essential about the project and enables the project manager to identify the project scope as well
as the project stakeholders.
including the argumentation for its viability based on solid peer-reviewed sources as well as
theoretical foundation. The research-worthy problem statement should address all six
questions: what, how, where, when, why, and who. On the other hand, a statement of the
problem is one or two sentences claim that outlines the problem that the study addresses. The
statement of the problem should briefly address the question: What is the problem that the
research will address?
This module is the user view page after login where he/she can transfer the amount to other
account by providing the amount to be transferred and the account number where to be
transferred.
2.3.11 LOGOUT
This module is used to logout from the user’s session and redirected to the home page of
website.
8
3. SYSTEM ANALYSIS
3.1 Functional requirement
3.1.1 System requirement:
To view your accounts in Online Banking you will need internet access using one of the
following supported browsers:
To view your accounts in Online Cash Manager you will need internet access using one of the
following supported browsers:
(ii) Server-side Runtime Support - This includes support for network services and a runtime
for executing the applications.
(iii) Deployment Support – Deployment is the process of installing the application on the
server. Deployment could also include customizing the application.
SPEED delivers unparalleled analysis into the latest developments in payments systems, real
time gross settlement, straight-through-processing, securities trading, risk management and
banking technology.
It is the essential source of information policymakers and market participants like you read to
stay informed about the policy issues shaping settlements, payments, e-money and e-trading.
Few sources of information set out to analyse changes in the financial infrastructure as a whole.
They stay in their silo. Yet increasingly what happens in one area has far reaching implications
for all others.
SPEED aims to help you track these developments not just at a national or global level, but as an
integrated whole.
9
3.2.2 Technical
.NET Programming Framework
The .NET framework is a cluster of different technologies. It includes:
The .NET languages, which include C# and Visual Basic .NET, the object-oriented and
modernized successor to Visual Basic 6.0.
The Common Language Runtime (CLR), the .NET runtime engine that executes all
.NET programs, and provides modern services such as automatic memory management,
security, optimization, and garbage collection etc.
The .NET class library which collects thousands of pieces of pre-built functionality that
you can snap in to your applications. These are sometimes organized into technology sets,
such as ADO.NET (the technology for creating database applications) and Windows Forms
(the technology for creating desktop user interfaces)
ASP.NET, the platform services that allow you to program web applications and Web
Services in any .NET language, with almost any feature from the .NET class library.
Visual Studio .NET, an optional development tool that contains a rich set of productivity
and debugging features.
IL ( Intermediate
Language ) Code
CLR just-in-time
execution
This two-stage compilation process is very important, because the existence of the IL (managed
code) is the key to providing many of the benefits of .NET.
Simple:
Dot Net framework supports a very user friendly IDE Visual Studio which makes dot net very
simple. Visual Studio supports a rich set of design tools, including a well known set of
debugging tools and IntelliSense, which catches errors and offers suggestions as you type.
It also supports the robust code-behind model, which separates the .NET code you write from the
web-page markup tags.
Platform independence:
First, it means that the same file containing IL code instructions can be placed on any platform;
at run-time the final stage of compilation can then be easily accomplished so that the code will
run on that particular platform. In other words, by compiling to IL you obtain platform
independence for .NET, in much the same way as compiling to Java byte code gives Java
platform independence.
13
Performance improvement:
Instead of compiling the entire application in one go (which could lead to a slow start-up time),
the JIT compiler simply compiles each portion of code as it is called (just-in-time). When code
has been compiled once, the resultant native executable is stored until the application exits; so
that it does not need to be recompiled the next time that portion of code is run.
Garbage collection:
The .NET runtime relies on the garbage collector instead. This is a program whose purpose is to
clean up memory. The idea is that all dynamically requested memory is allocated on the heap
(that is true for all languages, although in the case of .NET, the CLR maintains its own managed
heap for .NET applications to use). , when .NET detects that the managed heap for a given
process is becoming full and therefore needs tidying up, it calls the garbage collector.
14
Security:
.NET can really excel in terms of complementing the security mechanisms provided by Windows
because it can offer code-based security, whereas Windows only really offers role-based
security.
Object-Oriented:
C# is based on object-oriented paradigm. Object-oriented programs are organized around data
(i.e. objects) and a set of well-defined interfaces (public methods) to that data.
1. Introduction
15
Web applications run on the Web Server. Web applications are accessed through web clients i.e.
web browsers like Internet Explorer or Netscape. Whenever you access some web site by
specifying the URL (Universal Resource Locator), you are accessing some web application. The
main components of a web application written in .net are:
You access the web application by specifying the URL. If the URL corresponds to an
HTML page the web server simply returns the HTML page to the client, which then displays it.
If the URL corresponds to the aspx, then it is executed on the Server and the result/response is
returned to the client, which is then displayed by the client. A web application is nothing but a
web-site.
2. Web Client:
In web client based architectures, the user interaction layer is separated from the traditional client
layer. Web browser manages the user interaction but leaves the rest to applications on the server
side, including the logic for driving the user interface, interacting with components in the
middle-tier, and accessing databases.
(ii) Server-side Runtime Support - This includes support for network services and a runtime
for executing the applications.
(iii) Deployment Support – Deployment is the process of installing the application on the
server. Deployment could also include customizing the application.
For building and running web applications, the .NET provides the following to meet each of the
above requirements:
ASP.NET Applications
ASP.NET applications are divided into multiple web pages. This division means that a user can
often enter an ASP.NET application at several different points, and follow a link out of your
application to another part of your web site or another web server.
3.2.3 Economic
Personal Banking including personal finance, banking on an international arena, banking on a
priority basis.
Transaction Banking includes management of cash, facilities related to credit availability and
services related to trade.
Relationship services with the investors.
17
4. System Design
4.1 Scope:
Though there are many online systems available on internet but this can compete with them with
some advancement in its functionality and can be used by any bank organization to maintain
their customer’s account and online transaction process.
Ease of use
Performance
There are 6 major steps in design process. The first 5 steps are usually done on paper and finally
the design is implemented.
Identify the tables and relationship
Identify the data that is needed for each table and relationship
NORMALIZATION
Normalization is a technique that is more applicable to record based data models. Each of the
process can be carried out independently to arrive at normalized tables. Normalization refines the
data structure and data are group in simple way as possible. So later changes can be bring about
the least impact on database structure and eliminates data redundancy.
DATA INTEGRITY
Data integrity refers to the procedure that ensures correctness of the data entered in the database.
Functions have been provided in the software, which check data while being entered. Integrity
problems are occurred due to hardware or software malfunctions such as power failure and disk
crashes. Side effect from the program development may also be the reason.
DATA CONSISTENCY
Problem with data consistency occur when adding records without first checking for records with
same key or deleting records without deleting other related records. Likewise the software is
coded such that primary keys can’t be duplicated. For developing an efficient database, we have
to fulfill certain conditions such as :
• Control redundancy
20
• Ease of use
• Data independence
• Privacy and security
• Performance
For achieving the above criteria’s we have to make use of various features that are available with
DBMS such as:
• Enforcing integrity constraints to ensure data integrity and to reduce data inconsistency.
• Recovery from failures using backup facility.
* DATABASE TABLES
1. bk_register
This table has been included in many modules such as Login, register, Update, View Profile,
Transaction, Password Recovery.
2.contact
This table has been used in the contact page where user can submit the feedback and queries
along with his name and email id
21
3.loc
This table has been used in the ATM and Bank finding Module where one can find the address of
ATM or bank by providing the type and the state
* STORED PROCEDURES
A stored procedure is a subroutine available to applications accessing a relational database
system. Stored procedures (sometimes called a proc, sproc, StoPro, StoredProc, or SPS) are
actually stored in the database data dictionary.
sps_forgot
Sps_Global
sps_loc
sps_register
sps_transac
technique starts with an overall picture of the business and continues by analyzing each of the
functional areas of interest. This analysis can be carried out to precisely the level of detail
required. The technique exploits a method called top-down expansion to conduct the analysis in
a targeted way.
External
Entity Process Data store
Process
Data Store
There are only five symbols that are used in the drawing of business process diagrams (data flow
diagrams). These are now explained, together with the rules that apply to them.
2 Counter
Enquiries
Customer D2 Account Details
CASH Deposits &
Withdrawals
External Entity
Customer
23
An external entity is a source or destination of a data flow which is outside the area of study.
Only those entities which originate or receive data are represented on a business process
diagram. The symbol used is an oval containing a meaningful and unique identifier.
Process
2 Counter
Enquires
Deposits and Withdrawals
A process shows a transformation or manipulation of data flows within the system. The symbol
used is a rectangular box which contains 3 descriptive elements:
Firstly an identification number appears in the upper left hand corner. This is allocated arbitrarily
at the top level and serves as a unique reference.
Secondly, a location appears to the right of the identifier and describes where in the system the
process takes place. This may, for example, be a department or a piece of hardware. Finally, a
descriptive title is placed in the centre of the box. This should be a simple imperative sentence
with a specific verb, for example 'maintain customer records' or 'find driver'.
24
Data Flow
ACCOUNT
INFORMATION
A data flow shows the flow of information from its source to its destination. A data flow is
represented by a line, with arrowheads showing the direction of flow. Information always flows
to or from a process and may be written, verbal or electronic. Each data flow may be referenced
by the processes or data stores at its head and tail, or by a description of its contents.
Data Store
D2 Account Details
Resource Flow
Cash
A resource flow shows the flow of any physical material from its source to its destination. For
this reason they are sometimes referred to as physical flows.
The physical material in question should be given a meaningful name. Resource flows are
usually restricted to early, high-level diagrams and are used when a description of the physical
flow of materials is considered to be important to help the analysis.
25
Withdrawal Request
Identity
Account Balance
Audit log
4.5.2 LOGIN
This module is used by all the users to log into the account. The user is required enter his/her
user name and password. After login user will be redirected to the user’s home page.
4.5.3 UPDATE PROFILE
Update profile module will be used to update or change any detail of user such as address,
phone number, city, state, etc.
4.5.4 PASSWORD RECOVERY
This module is used to recover the lost password by the user by entering his/her valid email
address. This email address will be matched from database and automatically generated
email will be sent to the user containing his/her user name and password.
4.5.5 VIEW PROFILE
This module is the automatically generated page when user clicks the view profile button.
This contain the user account detail such as name, account balance, email id, address, city.
4.5.6 ATM AND BANK LOCATOR
This module is used to find the address and location of ATM and banks in the selected city.
4.5.7 AMOUNT TRANSACTION
This module is the user view page after login where he/she can transfer the amount to other
account by providing the amount to be transferred and the account number where to be
transferred.
4.5.8 CONTACT FORM
This module is used by both registered and non-registered user to contact bank or to give any
feedback trough message. His/her message will be saved into the database and further bank
can contact him/her.
4.5.9 EMI AND LOAD INTEREST CALCULATOR
This module is used to calculate the interest amount of EMI and load by proving the interest
rate, total amount and duration.
4.5.10 DELETE ACCOUNT
This module is used to delete the user’s account by the confirmation of user.
4.5.11 LOGOUT
This module is used to logout from the user’s session and redirected to the home page of
website
27
5. Interface requirement
Google Chrome
Mozilla Firefox
Opera
Dreamweaver
Visual Studio
40 GB HDD or higher
Printer
UPS
IIS
6. Performance requirement
The completion of a system is achieved only after it has been thoroughly tested. Though this
gives a feel the project is completed, there cannot be any project without going through this
stage. Hence in this stage it is decided whether the project can undergo the real time environment
execution without any break downs, therefore a package can be rejected even at this stage.
Testing is a set of activities that can be planned in advance and conducted systematically. The
proposed system is tested in parallel with the software that consists of its own phases of analysis,
implementation, testing and maintenance. Following are the tests conducted on the system.
During the implementation of the system each module of the system was tested separately to
uncover errors with in its boundaries. User interface was used as a guide in the process.
A module is composed of various programs related to that module. Module testing is done to
check the module functionality and interaction between units within a module.
It checks the functionality of each program with relation to other programs within the same
Integration testing is a systematic technique for constructing the program structure while
conducting tests to uncover errors associated with interfacing. The objective is to take unit-tested
module and build a program structure that has been dictated by design.
The software has been tested with the realistic data given by the client and produced fruitful
results. The client satisfying all the requirements specified by them has also developed the
software within the time limitation specified. A demonstration has been given to the client and
7.1 Security
Event management is the application of project management to the creation and development
of festivals, events ,extra vagenga and conferences.
Event management involves studying the intricacies of the brand, identifying the target audience,
devising the event concept, planning the logistics and coordinating the technical aspects before
actually executing the modalities of the proposed event. Post-event analysis and ensuring a return
on investment have become significant drivers for the event industry.
The recent growth of festivals and events as an industry around the world means that the
management can no longer be ad hoc. Events and festivals, such as the Asian Games, have a
large impact on their communities and, in some cases, the whole country.
The industry now includes events of all sizes from the Olympics down to a breakfast meeting for
ten business people. Many industries, charitable organization and interest groups will hold events
of some size in order to market themselves, build business relationships, raise money or
celebrate.
7.2 Reliability
Internet banking renders location and time irrelevant, and empowers customers with greater
control of their accounts. Banks achieve cost and efficiency gains in a large number of
operational areas. This paper addresses the aspects of reliability and accessibility from a banking
enterprise point of view and puts forth present day solutions to problems involving these issues.
An Indian perspective of Internet banking is also looked at in order to gaining a better
perspective regarding the situation.
7.3 Maintainability
The aptitude of a system to undergo repair and evolution.
(1) The ease with which a software system or component can be modified to correct
faults, improve performance or other attributes, or adapt to a changed environment.
(2) The ease with which a hardware system or component can be retained in, or restored
to, a state in which it can perform its required functions. [IEEE Std. 610.12]
7.4 Portability
Portability in high-level computer programming is the usability of the same software in
different environments. The prerequirement for portability is the generalized abstraction between
the application logic and system interfaces. When software with the same functionality is
31
produced for several computing platforms, portability is the key issue for development cost
reduction.
7.5 Reusability
In computer science and software engineering, reusability is the likelihood a segment of source
code that can be used again to add new functionalities with slight or no modification. Reusable
modules and classes reduce implementation time, increase the likelihood that prior testing and
use has eliminated bugs and localizes code modifications when a change in implementation is
required.
Subroutines or functions are the simplest form of reuse. A chunk of code is regularly organized
using modules or namespaces into layers. Proponents claim that objects and offer a more
advanced form of reusability, although it has been tough to objectively measure and define levels
or scores of reusability.
The ability to reuse relies in an essential way on the ability to build larger things from smaller
parts, and being able to identify commonalities among those parts. Reusability is often a required
characteristic of platform software. Reusability brings several aspects to software
development that do not need to be considered when reusability is not required.
Reusability implies some explicit management
of build, packaging, distribution, installation, configuration, deployment, maintenance and upgra
de issues. If these issues are not considered, software may appear to be reusable
from design point of view, but will not be reused in practice.
Software reusability more specifically refers to design features of a software element (or
collection of software elements) that enhance its suitability for reuse.
Implementation is the stage where theoretical design turned into a working system.
Implementation is planned carefully to propose system to avoid unanticipated problems. Many
preparations involved before and during the implementation of proposed system. The system
needed to be plugged in to the organization’s network then it could be accessed from anywhere,
after a user logins into the portal. The tasks that had to be done to implement the system were to
create the database tables in the organization database domain. Then the administrator was
granted his role so that the system could be accessed.
The next phase in the implementation was to educate the system. A demonstration of all the
functions that can be carried out by the system was given to examination department person, who
will make extensive use of the system.
33
8.Security
8.1 Description
Event management is the application of project management to the creation and development
of festivals, events ,extra vagenga and conferences.
Event management involves studying the intricacies of the brand, identifying the target audience,
devising the event concept, planning the logistics and coordinating the technical aspects before
actually executing the modalities of the proposed event. Post-event analysis and ensuring a return
on investment have become significant drivers for the event industry.
The recent growth of festivals and events as an industry around the world means that the
management can no longer be ad hoc. Events and festivals, such as the Asian Games, have a
large impact on their communities and, in some cases, the whole country.
The industry now includes events of all sizes from the Olympics down to a breakfast meeting for
ten business people. Many industries, charitable organization and interest groups will hold events
of some size in order to market themselves, build business relationships, raise money or
celebrate.
Software companies service event planners with a complete Tool, Hotel Booking Tool,
Travel Booking Tool, Budgeting Tool etc.
As far as the technical issues related to this project from security point of view, there is
no chance of steal the data until either we want or if there is any problem in the coding
section.
Merely we think of the cost estimation on the basis of the following points:
Now looking at the time limit of 15 days and working for 2 hours and work to do we can
divide our work in following parts and complete it.
8.4 Risk
Risk is the term applied to a logical and semantic method of establishing the context,
identifying, analyzing, evaluating, treating, monitoring and communicating risks associated with
any activity, function or process in a way that will enable organizations to maximize
losses and minimize opportunities.
Internet speed
Proper security and communication for password and premium
submission.
We have to take certain important measures to not face these risks to occur.
36
www.google.com
10. Conclusion
This project was successfully completed within the time span allotted. The project Online
Banking has been developed in asp.net. All the modules are tested separately and put together to
form the main system. Finally the system is tested with real data and everything worked
successfully. Thus the system has fulfilled the entire objective identified.
The system had been developed in an attractive dialogs fashion. So user with minimum
knowledge about computers can also operate the system easily. It will make easy interactions
between users and store. The speed and accuracy are maintained in proper way.