Purpose of The System
Purpose of The System
Though there are many online systems available on internet but this can compete with
them with some advancement in its functionality and can be used by any bank
organization to maintain their customer’s account and online transaction process.
Create Account
Login
Update Profile
Password Recovery
View Profile
ATM and Bank finder
Contact Form
Amount Transaction
EMI and Loan Calculator
Delete account
Logout
OVERVIEW OF PROPOSED SYSTEM
1. MENU DRIVEN:
The project uses menu throughout which we can choose required options. Menus are
self-explanatory, as they are very easy to use and user can go to any other web page
using the menu.
2. USER CONFIRMATION:
Whenever the user tries to delete or edit the data, the system asks for the confirmation.
This is used to avoid the accidental changes to the database. A confirmation is also
provided for the exit of the application.
User is provided with a graphical interface in which user can select from various
options and can perform desired operations with perfect understanding of the menu
selected.
The package provides a multiple document interface to the user. The user can view
more than one entry form or pages at the same time.
5. SECURITY AND ACCESS: A password form has been provided at the beginning
of the package. Entering the correct password will take user to the main user page.
BUSINESS CONTEXT
1. PAPER WORK: All the activities that are performed by Management involve a lot
of paper work involving register consultations and entries. A separate file has to be
maintained for each kind of activity and for different periods of time.
a) Inconsistencies
b) Update anomalies
c) Decentralization problems
5. HUMAN ERRORS: Human kind of errors may be generated in typing errors and
slow arithmetic calculations, fatigue and boredom.
6. ILLEGAL ACCESS: The security of a lot of documents, which are paper, based if
difficult may be in terms of illegal access or manipulation by malicious personals
either intentionally or by accident.
Product function:
Track Account Level Data: In this module, check the authentication of users.
User Contact Information: It maintains all the details (Personal, Official and
Contact) of the users.
Product Access Right Details: It maintains the information that does which user
have the rights of using which service.
1. What is the problem? This should explain why the team is needed.
2. Who has the problem or who is the client/customer? This should explain who
needs the solution and who will decide the problem has been solved.
3. What form can the resolution be? What is the scope and limitations (in time,
money, resources, technologies) that can be used to solve the problem? Does the
client want a white paper? A web-tool? A new feature for a product? A
brainstormingon a topic?
The primary purpose of a problem statement is to focus the attention of the problem
solving team. However, if the focus of the problem is too narrow or the scope of the
solution too limited the creativity and innovation of the solution can be stifling.
In project management, the problem statement is part of the project charter. It lists
what's essential about the project and enables the project manager to identify the
project scope as well as the project stakeholders.
User objectives
CREATE ACCOUNT
This module is used by the user to create a new account to join services of online
banking. The user is required to fill in a few details and is automatically assigned
as an user at the end of process.
LOGIN
This module is used by all the users to log into the account. The user is required
enter his/her user name and password. After login user will be redirected to the
user’s home page.
UPDATE PROFILE
Update profile module will be used to update or change any detail of user such as
address, phone number, city, state, etc.
PASSWORD RECOVERY
This module is used to recover the lost password by the user by entering his/her
valid email address. This email address will be matched from database and
automatically generated email will be sent to the user containing his/her user name
and password.
VIEW PROFILE
This module is the automatically generated page when user clicks the view profile
button. This contain the user account detail such as name, account balance, email
id, address, city.
This module is used to find the address and location of ATM and banks in the
selected city.
AMOUNT TRANSACTION
This module is the user view page after login where he/she can transfer the amount
to other account by providing the amount to be transferred and the account number
where to be transferred.
CONTACT FORM
This module is used by both registered and non-registered user to contact bank or
to give any feedback trough message. His/her message will be saved into the
database and further bank can contact him/her.
This module is used to calculate the interest amount of EMI and load by proving
the interest rate, total amount and duration.
DELETE ACCOUNT
This module is used to delete the user’s account by the confirmation of user.
LOGOUT
This module is used to logout from the user’s session and redirected to the home
page of website.
SYSTEM ANALYSIS
Functional requirement
System requirement:
To view your accounts in Online Banking you will need internet access using one of
the following supported browsers:
To view your accounts in Online Cash Manager you will need internet access using
one of the following supported browsers:
Program requirement
The following are the most essential requirements for developing and hosting web
applications:
(ii) Server-side Runtime Support - This includes support for network services and a
runtime for executing the applications.
It is the essential source of information policymakers and market participants like you
read to stay informed about the policy issues shaping settlements, payments, e-money
and e-trading.
Few sources of information set out to analyse changes in the financial infrastructure as
a whole. They stay in their silo. Yet increasingly what happens in one area has far
reaching implications for all others.
SPEED aims to help you track these developments not just at a national or global
level, but as an integrated whole.
Feasibility study
Operational
Now almost all Banks branches are connected through the online banking facilities.
The transactions of a particular bank are transmitted through the Micro-Bank software
from INFLEX Solutions to the Head Office, where every data is stored in the
database.
Real-time On-line any branch banking for the clients is used to facilitate the clients to
deposit / draw or remit funds to and from their accounts, from one bank to another.
Meanwhile, for the Smooth operation and efficient functioning of the system they
have completed the proper training to the related personnel
Technical
The .NET languages, which include C# and Visual Basic .NET, the object-
oriented and modernized successor to Visual Basic 6.0.
The Common Language Runtime (CLR), the .NET runtime engine that
executes all .NET programs, and provides modern services such as automatic
memory management, security, optimization, and garbage collection etc.
The .NET class library which collects thousands of pieces of pre-built
functionality that you can snap in to your applications. These are sometimes
organized into technology sets, such as ADO.NET (the technology for creating
database applications) and Windows Forms (the technology for creating desktop
user interfaces)
ASP.NET, the platform services that allow you to program web applications and
Web Services in any .NET language, with almost any feature from the .NET class
library.
Visual Studio .NET, an optional development tool that contains a rich set of
productivity and debugging features.
VB .NET, C#, and the .NET Languages
In fact, all the .NET languages are compiled to the same intermediate language, which
isJust IL. The CLR only runs IL code, which is the reason why the C# and VB .NET
languages are so similar (and perform essentially the same).
Code in another
Code in VB .NET Code in C#
.NET language
Appropriate
VB .NET compiler C# compiler
compiler
IL (Intermediate
Language) code
CLR just-in-time
execution
XML
File I/O (and so on)
The Common Language Runtime (CLR) is the engine that supports all the .NET
languages. Most modern languages use runtimes, these runtimes may provide libraries
used by the language, or they may have the additional responsibility of executing the
code (as with Java).
Runtimes are nothing new, but the CLR represents a radical departure from
Microsoft’s previous strategy. To start, the CLR and .NET framework are much
larger and more ambitious. The CLR also provides a whole set of related services such
as code verification, optimization, and garbage collection, and can run the code from
any .NET language.
However, before it can be executed by the CLR, any source code that you develop (in
C# or some other language) needs to be compiled. Compilation occurs in two steps in
.NET:
Platform independence:
First, it means that the same file containing IL code instructions can be placed on any
platform; at run-time the final stage of compilation can then be easily accomplished so
that the code will run on that particular platform. In other words, by compiling to IL
you obtain platform independence for .NET, in much the same way as compiling to
Java byte code gives Java platform independence.
Performance improvement:
Instead of compiling the entire application in one go (which could lead to a slow start-
up time), the JIT compiler simply compiles each portion of code as it is called (just-in-
time). When code has been compiled once, the resultant native executable is stored
until the application exits; so that it does not need to be recompiled the next time that
portion of code is run.
the development of compilers for other programming languages that target .NET.
Second, it provides a guarantee that, if you restrict your classes to exposing only CLS-
compliant features, code written in any other compliant language can use your classes.
Garbage collection:
The .NET runtime relies on the garbage collector instead. This is a program whose
purpose is to clean up memory. The idea is that all dynamically requested memory is
allocated on the heap (that is true for all languages, although in the case of .NET, the
CLR maintains its own managed heap for .NET applications to use). , when .NET
detects that the managed heap for a given process is becoming full and therefore needs
tidying up, it calls the garbage collector.
Security:
.NET can really excel in terms of complementing the security mechanisms provided
by Windows because it can offer code-based security, whereas Windows only really
offers role-based security.
.Net offers an integrated support for web pages, using a new technology ASP.NET.
With
ASP.Net, code in your page is compiled, and may be written in a any of the .Net
languages like C#, J# or VB.Net
Efficient Data Access:
Object-Oriented:
C# is based on object-oriented paradigm. Object-oriented programs are organized
around data (i.e. objects) and a set of well-defined interfaces (public methods) to that
data.
Introduction to Web Applications in Dot Net
1. Introduction
Web applications run on the Web Server. Web applications are accessed through web
clients i.e. web browsers like Internet Explorer or Netscape. Whenever you access
some web site by specifying the URL (Universal Resource Locator), you are accessing
some web application. The main components of a web application written in .net are:
You access the web application by specifying the URL. If the URL corresponds to an
HTML page the web server simply returns the HTML page to the client, which then
displays it. If the URL corresponds to the aspx, then it is executed on the Server and
the result/response is returned to the client, which is then displayed by the client. A
web application is nothing but a web-site.
2. Web Client:
In web client based architectures, the user interaction layer is separated from the
traditional client layer. Web browser manages the user interaction but leaves the rest
to applications on the server side, including the logic for driving the user interface,
interacting with components in the middle-tier, and accessing databases.
(ii) Server-side Runtime Support - This includes support for network services and a
runtime for executing the applications.
For building and running web applications, the .NET provides the following to meet
each of the above requirements:
These are the building blocks for developing web Applications in .NET. ASPX pages
can be developed using any dot net compatible language.
IIS is providing .NET runtime for providing all the facilities for writing web
applications in .NET. The IIS is responsible for initializing, invoking and managing
the life cycle of ASPX files
The .NET specification defines a packaging structure for web applications. The
specification also defines a deployment descriptor for each web application. The
deployment descriptor is an XML file that lets you customize the web application at
deployment time
ASP.NET Applications
ASP.NET applications are divided into multiple web pages. This division means that
a user can often enter an ASP.NET application at several different points, and follow a
link out of your application to another part of your web site or another web server.
3.2.3 Economic
Scope:
Though there are many online systems available on internet but this can compete with
them with some advancement in its functionality and can be used by any bank
organization to maintain their customer’s account and online transaction process.
Create Account
Login
Update Profile
Password Recovery
View Profile
ATM and Bank finder
Contact Form
Amount Transaction
EMI and Loan Calculator
Delete account
Logout
Database design:
Control Redundancy
Ease of use
Performance
There are 6 major steps in design process. The first 5 steps are usually done on paper
and finally the design is implemented.
Identify the data that is needed for each table and relationship
NORMALIZATION
Normalization is a technique that is more applicable to record based data models. Each
of the process can be carried out independently to arrive at normalized tables.
Normalization refines the data structure and data are group in simple way as possible.
So later changes can be bring about the least impact on database structure and
eliminates data redundancy.
DATA INTEGRITY
Data integrity refers to the procedure that ensures correctness of the data entered in
the database. Functions have been provided in the software, which check data while
being entered. Integrity problems are occurred due to hardware or software
malfunctions such as power failure and disk crashes. Side effect from the program
development may also be the reason.
DATA CONSISTENCY
Problem with data consistency occur when adding records without first checking for
records with same key or deleting records without deleting other related records.
Likewise the software is coded such that primary keys can’t be duplicated. For
developing an efficient database, we have to fulfill certain conditions such as :
• Control redundancy
• Ease of use
• Data independence
• Performance
For achieving the above criteria’s we have to make use of various features that are
available with DBMS such as:
* DATABASE TABLES
1. bk_register
This table has been included in many modules such as Login, register, Update, View
Profile, Transaction, Password Recovery.
2.contact
This table has been used in the contact page where user can submit the feedback and
queries
* STORED PROCEDURES
sps_contact
sps_forgot
Sps_Global
sps_loc
sps_register
sps_transac
Eg. Sample code of sps_contact
External Entity
An external entity is a source or destination of a data flow which is outside the area of
study. Only those entities which originate or receive data are represented on a business
process diagram. The symbol used is an oval containing a meaningful and unique
identifier.
Process
A data flow shows the flow of information from its source to its destination. A data
flow is represented by a line, with arrowheads showing the direction of flow.
Information always flows to or from a process and may be written, verbal or
electronic. Each data flow may be referenced by the processes or data stores at its head
and tail, or by a description of its contents.
Data Store
Resource Flow
A resource flow shows the flow of any physical material from its source to its
destination. For this reason they are sometimes referred to as physical flows.
The physical material in question should be given a meaningful name. Resource flows
are usually restricted to early, high-level diagrams and are used when a description of
the physical flow of materials is considered to be important to help the analysis.
LOGIN
This module is used by all the users to log into the account. The user is required
enter his/her user name and password. After login user will be redirected to the
user’s home page.
UPDATE PROFILE
Update profile module will be used to update or change any detail of user such as
address, phone number, city, state, etc.
PASSWORD RECOVERY
This module is used to recover the lost password by the user by entering his/her
valid email address. This email address will be matched from database and
automatically generated email will be sent to the user containing his/her user name
and password.
VIEW PROFILE
This module is the automatically generated page when user clicks the view profile
button. This contain the user account detail such as name, account balance, email
id, address, city.
This module is used to find the address and location of ATM and banks in the
selected city.
AMOUNT TRANSACTION
This module is the user view page after login where he/she can transfer the amount
to other account by providing the amount to be transferred and the account number
where to be transferred.
CONTACT FORM
This module is used by both registered and non-registered user to contact bank or
to give any feedback trough message. His/her message will be saved into the
database and further bank can contact him/her.
This module is used to calculate the interest amount of EMI and load by proving
the interest rate, total amount and duration.
DELETE ACCOUNT
This module is used to delete the user’s account by the confirmation of user.
LOGOUT
This module is used to logout from the user’s session and redirected to the home
page of website.
Interface requirement
Graphical interface
Internet Explorer
Google Chrome
Mozilla Firefox
Opera
Notepad ++
Dreamweaver
Visual Studio
Hardware interface
40 GB HDD or higher
Printer
UPS
Software interface
IIS
Though this gives a feel the project is completed, there cannot be any project without
going through this stage. Hence in this stage it is decided whether the project can
undergo the real time environment execution without any break downs, therefore a
SYSTEM TESTING
systematically. The proposed system is tested in parallel with the software that
UNIT TESTING
During the implementation of the system each module of the system was tested
separately to uncover errors with in its boundaries. User interface was used as a guide
in the process.
MODULE TESTING
done to check the module functionality and interaction between units within a module.
It checks the functionality of each program with relation to other programs within the
while conducting tests to uncover errors associated with interfacing. The objective is
to take unit-tested module and build a program structure that has been dictated by
design.
ACCEPTANCE TESTING
The software has been tested with the realistic data given by the client and produced
fruitful results. The client satisfying all the requirements specified by them has also
developed the software within the time limitation specified. A demonstration has been
given to the client and the end-user giving all the operational features.
Non functional attributes
Security
The recent growth of festivals and events as an industry around the world means that
the management can no longer be ad hoc. Events and festivals, such as the Asian
Games, have a large impact on their communities and, in some cases, the whole
country.
The industry now includes events of all sizes from the Olympics down to a breakfast
meeting for ten business people. Many industries, charitable organization and interest
groups will hold events of some size in order to market themselves, build business
relationships, raise money or celebrate.
Reliability
Internet banking renders location and time irrelevant, and empowers customers with
greater control of their accounts. Banks achieve cost and efficiency gains in a large
number of operational areas. This paper addresses the aspects of reliability and
accessibility from a banking enterprise point of view and puts forth present day
solutions to problems involving these issues. An Indian perspective of Internet
banking is also looked at in order to gaining a better perspective regarding the
situation.
Maintainability
Portability
Reusability
The implementation is the final and important phase. It involves User training, system
testing and successful running of the developed system. The users test the developed
system when changes are made according to the needs. The testing phase involves the
testing of the developed system using various kinds of data. An elaborate testing of
data is prepared and system is tested using the tests data.
Implementation is the stage where theoretical design turned into a working system.
Implementation is planned carefully to propose system to avoid unanticipated
problems. Many preparations involved before and during the implementation of
proposed system. The system needed to be plugged in to the organization’s network
then it could be accessed from anywhere, after a user logins into the portal. The tasks
that had to be done to implement the system were to create the database tables in the
organization database domain. Then the administrator was granted his role so that the
system could be accessed.
The next phase in the implementation was to educate the system. A demonstration of
all the functions that can be carried out by the system was given to examination
department person, who will make extensive use of the system.
Security
Description
The recent growth of festivals and events as an industry around the world means that
the management can no longer be ad hoc. Events and festivals, such as the Asian
Games, have a large impact on their communities and, in some cases, the whole
country.
The industry now includes events of all sizes from the Olympics down to a breakfast
meeting for ten business people. Many industries, charitable organization and interest
groups will hold events of some size in order to market themselves, build business
relationships, raise money or celebrate.
Technical issues
Merely we think of the cost estimation on the basis of the following points:
Now looking at the time limit of 15 days and working for 2 hours and work to
do we can divide our work in following parts and complete it.
Risk
Risk is the term applied to a logical and semantic method of establishing the context,
identifying, analyzing, evaluating, treating, monitoring and communicating risks
associated with any activity, function or process in a way that will enable
organizations to maximize losses and minimize opportunities.
The complete RISK ANALYSIS is given below in the table :-
4. User interface For the user interface developed , even after getting it
sanctioned from the opposite side if it denies to accept the
existing user interface.
5. Continuation What if the user side even after signing the contract are
stream of continuously asking for the changes and modification an
requirement undue problem would be there in the development of the
changes. software and undue time would be utilized for the same
which can ultimately result in a delay in the project.
Internet speed
Proper security and communication for password and premium
submission.
We have to take certain important measures to not face these risks to occur.
Annexure A – Screenshot
UPDATE FORM
PASSWORD RECOVERY
VIEW PROFILE
TRANSACTION PAGE
DELETE PROFILE
EMI AND LOAN INTEREST CALCULATOR
Conclusion
This project was successfully completed within the time span allotted. The project
Online Banking has been developed in asp.net. All the modules are tested separately
and put together to form the main system. Finally the system is tested with real data
and everything worked successfully. Thus the system has fulfilled the entire objective
identified.
The system had been developed in an attractive dialogs fashion. So user with
minimum knowledge about computers can also operate the system easily. It will make
easy interactions between users and store. The speed and accuracy are maintained in
proper way.
BIBILOGRAPHY
BOOKS REFERRED
The following books were used extensively for the project development and
implementation.
WEBSITES REFERRED
The following links were searched and exploited extensively for the project
development and implementation.
http://www.w3schools.com/aspnet/default.asp
http://www.w3schools.com/sql/default.asp