Report of Online Banking System

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 75

[Type text]

A
MINOR PROJECT REPORT
ON
ONLINE BANKING
SUBMITTED TO
RAJASTHAN TECHNICAL UNIVERSITY
IN PARTIAL FULFILLMENT FOR THE AWARD OF THE DEGREE
OF
BACHELOR OF TECHNOLOGY
IN
INFORMATION TECHNOLOGY

SESSION 2011-2012
Submitted To:

Submitted By:

Mr. Arpit Chopra

Raj Negi

(H.O.D., IT Deptt.)

Praveen Bishnoi

Ms. Charu Chabra

Harikesh Shakya

(Project Coordinator)

B.Tech IV Yr. (IT)

Department of Information and Technology


APEX INSTITUTE OF ENGINEERING & TECHNOLOGY
[Type text]

[Type text]

Sitapura, Jaipur

CERTIFICATE
This is to certify that the Minor Project entitled Online Banking submitted by Raj Negi in
partial fulfillment of the requirements for the award of Bachelor of Technology in Information
and Technology in Apex Institute of Engineering and Technology, Sitapura Industrial Area,
Jaipur is an authentic work carried out by him under my supervision and guidance. To the best
of my knowledge, the matter embodied in the minor project has not been submitted to any other
University / Institute for the award of any Degree.

Date: 13 December 2011

Mr. Arpit Chopra


HOD (IT)
AIET, Sitapura, Jaipur

Ms. Charu Chabra


(Project Coordinator)

[Type text]

[Type text]

PREFACE

With the rapid globalization of the Indian economy, enterprises are facing with ever changing
competitive environment. Enterprises are adopting strategies aimed at developing competitive
advantage based on enhanced customer value in terms of product differentiation, quality, speed,
service and costs. In the post liberalization era, with the deregulation of Indian economy, the
financial service sector witnessing a complete metamorphosis and technology is playing a very
significant role in this record. Over the last decade India has been one of the fastest adopters of
information technology, particularly because of its capability to provide software solution to
organizations around the world. This capability has provided a tremendous impetuous to the
domestic banking industry in India to deploy the latest in technology, particularly in the Internet
banking and e-commerce arenas. Banks are growing in size by mergers and acquisitions, which
have been driven by communication and technology. Technology is playing a major role in
increasing the efficiency, courtesy and speed of customer service. It is said to be the age of Ebanking. An Online Banking user is expected to perform at least one of the following
transactions online:
1. Checking account balance

2. Transaction

3. Paying bills

[Type text]

[Type text]

4. Transferring funds between accounts

5. Calculate EMI and Loan interests


From a banks perspective, using the Internet is more efficient than using other distribution
mediums because banks are looking for an increased customer base. Using multiple distribution
channels increases effective market coverage by enabling different products to be targeted at
different demographic segments. Also Banks cannot risk losing customers to competitors
within the aggressive competition in the banking industry around the world. Moreover Internet
delivery offers customized service to suit the needs and the likes of each user. Mass
customization happens effectively through Online Banking. It reduces cost and replaces time
spent on routine errands with spending time on business errands. Online Banking means less
staff members, smaller infrastructure demands, compared with other banking channels. From
the customers perspective, Online Banking provides a convenient and effective way to manage
finances that is easily accessible 24 hours a day, seven days a week. In addition information is
up to date. Nevertheless Online Banking has disadvantages for banks like how to work the
technology, set-up cost, legal issues, and lack of personal contact with customers. And for
customers there are security and privacy issues.

[Type text]

[Type text]

ACKNOWLEDGEMENT

I would like to take this opportunity to express my profound sense of gratitude and respect to all
those who helped me throughout the duration of this project. The APEX INSTITUTE OF
ENGINEERING & TECHNOLOGY, JAIPUR in particular has been the source of
inspiration for me. I acknowledge the effort of those who have contributed significantly to my
project.
I feel privileged to offer my sincere thanks and deep sense of gratitude to

Mr. Manoj Kaira,

Project Coordinator (TechMaestro), for expressing his confidence in me by letting me work on a


project of this magnitude and using the latest technologies and providing his support, help &
encouragement in implementing this Project.

[Type text]

[Type text]

INDEX
S.NO
.

PARTCULAR

PAGE NO.

Certificate

Acknowledgement

ii

Preface

1.

2.

3.

iii

Project introduction

1-4

1.1

Purpose of document

1.2

Scope of developments

1.3

Overview

1.4

Business context

General Description

5-6

2.1 Product function

2.2 User problem statement

2.3 User objectives

System Analysis

6-26

3.1 Functional requirement

3.1.1 System requirement

10

3.1.2 Program requirement

10

3.1.3 Stability & speed

10

[Type text]

[Type text]

4.

5.

3.2 Feasibility study

10

3.2.1 Operational

17

3.2.2 Technical

18

3.2.3 Economic

26

System Design

26-38

4.1 Scope

27

4.2 Database design

27

4.3 Data flow diagram (DFD)

32

4.4 Entity relationship diagram(E-R diagram)

36

4.5 UML Diagram

37

4.6 Module description

38

Interface requirement

40-41

5.1 Graphical interface

40

5.2 Command line interface

40

5.3 Hardware interface

40

5.4 Software interface

41

6.

Performance requirement

42-44

7.

Non functional attributes

44-46

7.1 Security

44

7.2 Reliability

44

7.3 Maintainability

44

7.4 Portability

45

7.5 Reusability

45

7.6 Resource utilization

45

7.7 Stable and speed efficiency

46

[Type text]

[Type text]
8.

9.
10.

Security

47-48

8.1 Description

47

8.2 Technical issues

47

8.3 Cost and schedule

47

8.4 Risk

48

Annexure A- Screenshots

50-59

Annexure B- Sample Coding

60-68

Reference & Appendices

69

Conclusion

70

[Type text]

[Type text]

1. INTRODUCTION
Internet banking is a product of e-commerce in the field of banking and financial services. In
what can be described as business to customer domain for banking industry, Internet banking
offers different online services like balance enquiry, balance transfer, opening account, calculate
EMIs etc. Mostly, these are traditional services offered through internet as a new delivery
channel. Banks are also offering payment services on the behalf of their customers who shop in
different e-shops, e-malls etc. Further, different banks have different levels of such services
offered, starting from level-1 where only information is disseminated through internet to level-3
where online transactions are put through.

1.1 PURPOSE OF THE SYSTEM


1. SECURITY: There is a lot of security of data on this content management system. One
cannot open our system without knowing the password. Immediately after opening login screen
will appear on screen. Only after entering the correct username and password user can operate
our system.

[Type text]

[Type text]

2. REFERENTIAL INTEGRITY:

User cannot change the date in the transaction files.

Addition of data can be done only on the master files date in transaction files cannot be entered
until addition is done on the master files.

3. EASY RETRIEVAL OF DATA: Data is retrieved easily and quick using sql commands. On
line commands are used to retrieve huge amount of data.

4. GENERATION OF AUTOMATIC VALUES:

In project in some screen some fields

generated automatically like Profile detail, Account number, etc.

1.2 SCOPE OF THE PROPOSED SYSTEM


Though there are many online systems available on internet but this can compete with them
with some advancement in its functionality and can be used by any bank organization to
maintain their customers account and online transaction process.

The basic functionalities of the system are:


Create Account
Login
Update Profile
Password Recovery
View Profile
[Type text]

[Type text]

ATM and Bank finder


Contact Form
Amount Transaction
EMI and Loan Calculator
Delete account
Logout

1.3 OVERVIEW OF PROPOSED SYSTEM


1. MENU DRIVEN:
The project uses menu throughout which we can choose required options. Menus are selfexplanatory, as they are very easy to use and user can go to any other web page using the menu.

2. USER CONFIRMATION:
Whenever the user tries to delete or edit the data, the system asks for the confirmation. This is
used to avoid the accidental changes to the database. A confirmation is also provided for the exit
of the application.

3. GRAPHICAL USER INTERFACE:


User is provided with a graphical interface in which user can select from various options and
can perform desired operations with perfect understanding of the menu selected.

4. MULTIPLE DOCUMENT INTERFACE:


[Type text]

[Type text]

The package provides a multiple document interface to the user. The user can view more than
one entry form or pages at the same time.

5. SECURITY AND ACCESS: A password form has been provided at the beginning of the
package. Entering the correct password will take user to the main user page

1.4 BUSINESS CONTEXT


Existing banking system is a manual system, which leads to a number of problems in
maintaining proper records. These are:
1. PAPER WORK: All the activities that are performed by Management involve a lot of paper
work involving register consultations and entries. A separate file has to be maintained for each
kind of activity and for different periods of time.

2. TIME CONSUMPTION: A lot of time is consumed in referencing the registers involved for
particular activities and a lot of computation as well as report verification activity is also paper
based and time consuming.

3. COMPLEXITY: Complexity of information handling and the gathering and determination of


information is usually the most difficult problem faced.

4. REDUNDANCY: Maintaining separate files for each department can lead to duplication of
data present in files. This can lead to:

[Type text]

[Type text]

a) Inconsistencies
b) Update anomalies
c) Decentralization problems

5. HUMAN ERRORS: Human kind of errors may be generated in typing errors and slow
arithmetic calculations, fatigue and boredom.

6. ILLEGAL ACCESS: The security of a lot of documents, which are paper, based if difficult
may be in terms of illegal access or manipulation by malicious personals either intentionally or
by accident.

7. DYNAMIC ENVIRONMENT: As the working environment is dynamic and company


policies change time and again, changing the way of working will be difficult.

2. General Description
2.1 Product function:

Track Account Level Data: In this module, check the authentication of users.
Service Level Agreements: It contains the agreements of providing the services related to
users.
User Contact Information: It maintains all the details (Personal, Official and Contact) of
the users.
[Type text]

[Type text]

Product Access Right Details: It maintains the information that does which user have the
rights of using which service.

2.2 User problem statement


A problem statement is a concise description of the issues that need to be addressed by a
problem solving team and should be presented to them (or created by them) before they try to
solve the problem. When bringing together a team to achieve a particular purpose provide them
with a problem statement. A good problem statement should answer these questions:
1. What is the problem? This should explain why the team is needed.
2. Who has the problem or who is the client/customer? This should explain who needs the
solution and who will decide the problem has been solved.
3. What form can the resolution be? What is the scope and limitations (in time, money,
resources, technologies) that can be used to solve the problem? Does the client want a
white paper? A web-tool? A new feature for a product? A brainstormingon a topic?

The primary purpose of a problem statement is to focus the attention of the problem solving
team. However, if the focus of the problem is too narrow or the scope of the solution too limited
the creativity and innovation of the solution can be stifling.

In project management, the problem statement is part of the project charter. It lists what's
essential about the project and enables the project manager to identify the project scope as well
as the project stakeholders.

A research-worthy problem statement is the description of an active challenge (i.e. problem)


faced by researchers and/or practitioners that does not have adequate solutions available
including the argumentation for its viability based on solid peer-reviewed sources as well as
theoretical foundation. The research-worthy problem statement should address all six
questions: what, how, where, when, why, and who. On the other hand, a statement of the
problem is one or two sentences claim that outlines the problem that the study addresses. The
[Type text]

[Type text]

statement of the problem should briefly address the question: What is the problem that the
research will address?

2.3 User objectives


2.3.1 CREATE ACCOUNT
This module is used by the user to create a new account to join services of online banking.
The user is required to fill in a few details and is automatically assigned as an user at the end
of process.
2.3.2 LOGIN
This module is used by all the users to log into the account. The user is required enter his/her
user name and password. After login user will be redirected to the users home page.

2.3.3 UPDATE PROFILE


Update profile module will be used to update or change any detail of user such as address,
phone number, city, state, etc.

2.3.4 PASSWORD RECOVERY


This module is used to recover the lost password by the user by entering his/her valid email
address. This email address will be matched from database and automatically generated
email will be sent to the user containing his/her user name and password.

2.3.5 VIEW PROFILE


This module is the automatically generated page when user clicks the view profile button.
This contain the user account detail such as name, account balance, email id, address, city.
[Type text]

[Type text]

2.3.6 ATM AND BANK LOCATOR


This module is used to find the address and location of ATM and banks in the selected city.

2.3.7 AMOUNT TRANSACTION


This module is the user view page after login where he/she can transfer the amount to other
account by providing the amount to be transferred and the account number where to be
transferred.

2.3.8 CONTACT FORM


This module is used by both registered and non-registered user to contact bank or to give any
feedback trough message. His/her message will be saved into the database and further bank
can contact him/her.

2.3.9 EMI AND LOAD INTEREST CALCULATOR


This module is used to calculate the interest amount of EMI and load by proving the interest
rate, total amount and duration.

2.3.10 DELETE ACCOUNT


This module is used to delete the users account by the confirmation of user.

2.3.11 LOGOUT
[Type text]

[Type text]

This module is used to logout from the users session and redirected to the home page of
website.

3. SYSTEM ANALYSIS
3.1 Functional requirement
3.1.1 System requirement:

[Type text]

[Type text]

To view your accounts in Online Banking you will need internet access using one of the
following supported browsers:
Microsoft Internet Explorer 6 or higher
Firefox 3
Safari 3
To view your accounts in Online Cash Manager you will need internet access using one of the
following supported browsers:
Microsoft Internet Explorer 6 or higher
Firefox 3

3.1.2 Program requirement

The following are the most essential requirements for developing and hosting web applications:
(ii) Server-side Runtime Support - This includes support for network services and a runtime
for executing the applications.
(iii) Deployment Support Deployment is the process of installing the application on the
server. Deployment could also include customizing the application.

3.1.3 Stability & speed

SPEED delivers unparalleled analysis into the latest developments in payments systems, real
time gross settlement, straight-through-processing, securities trading, risk management and
banking technology.
It is the essential source of information policymakers and market participants like you read to
stay informed about the policy issues shaping settlements, payments, e-money and e-trading.

[Type text]

[Type text]

Few sources of information set out to analyse changes in the financial infrastructure as a whole.
They stay in their silo. Yet increasingly what happens in one area has far reaching implications
for all others.
SPEED aims to help you track these developments not just at a national or global level, but as
an integrated whole.

3.2 Feasibility study


3.2.1 Operational
Now almost all Banks branches are connected through the online banking facilities. The
transactions of a particular bank are transmitted through the Micro-Bank software from
INFLEX Solutions to the Head Office, where every data is stored in the database.
Real-time On-line any branch banking for the clients is used to facilitate the clients to deposit /
draw or remit funds to and from their accounts, from one bank to another.
Meanwhile, for the Smooth operation and efficient functioning of the system they have
completed the proper training to the related personnel

3.2.2 Technical
.NET Programming Framework
The .NET framework is a cluster of different technologies. It includes:

The .NET languages, which include C# and Visual Basic .NET, the object-oriented and
modernized successor to Visual Basic 6.0.

The Common Language Runtime (CLR), the .NET runtime engine that executes all
.NET programs, and provides modern services such as automatic memory management,
security, optimization, and garbage collection etc.

The .NET class library which collects thousands of pieces of pre-built functionality that
you can snap in to your applications. These are sometimes organized into technology sets,
such as ADO.NET (the technology for creating database applications) and Windows Forms
(the technology for creating desktop user interfaces)

[Type text]

[Type text]

ASP.NET, the platform services that allow you to program web applications and Web
Services in any .NET language, with almost any feature from the .NET class library.

Visual Studio .NET, an optional development tool that contains a rich set of productivity
and debugging features.

2. VB .NET, C#, and the .NET Languages


In fact, all the .NET languages are compiled to the same intermediate language, which isJust IL.
The CLR only runs IL code, which is the reason why the C# and VB .NET languages are so

Code in VB .

Code in C#

VB . compiler

C# compiler

Code in another . language

Appropriate compiler

IL (Intermediate Language) code

just-in-time execution

Figure 1:- Language compilation in .NET


similar (and perform essentially the same).

Figure 2:- The .NET Framework

[Type text]

[Type text]

.
data access

XML

Web forms

Windows forms

File I/O

(and so on)

Core system classes (threading, serialization, reflection, collections, and so on)

The . Class Library

Compiler and loader

Code verification and optimization

Memory management and garbage collection

Code access security

(Other managed code services)

The Common Language Runtime

Figure 2 The . framework

[Type text]

[Type text]

3. The Common Language Runtime


The Common Language Runtime (CLR) is the engine that supports all the .NET languages.
Most modern languages use runtimes, these runtimes may provide libraries used by the
language, or they may have the additional responsibility of executing the code (as with Java).
Runtimes are nothing new, but the CLR represents a radical departure from Microsofts
previous strategy. To start, the CLR and .NET framework are much larger and more ambitious.
The CLR also provides a whole set of related services such as code verification, optimization,
and garbage collection, and can run the code from any .NET language.
However, before it can be executed by the CLR, any source code that you develop (in C# or
some other language) needs to be compiled. Compilation occurs in two steps in .NET:

Compilation of source code to IL

Compilation of IL to platform-specific code by the CLR

This two-stage compilation process is very important, because the existence of the IL (managed
code) is the key to providing many of the benefits of .NET.

4. Features of Dot Net


Simple:
Dot Net framework supports a very user friendly IDE Visual Studio which makes dot net very
simple. Visual Studio supports a rich set of design tools, including a well known set of
debugging tools and IntelliSense, which catches errors and offers suggestions as you type.
It also supports the robust code-behind model, which separates the .NET code you write from
the web-page markup tags.
[Type text]

[Type text]

Platform independence:
First, it means that the same file containing IL code instructions can be placed on any platform;
at run-time the final stage of compilation can then be easily accomplished so that the code will
run on that particular platform. In other words, by compiling to IL you obtain platform
independence for .NET, in much the same way as compiling to Java byte code gives Java
platform independence.

Performance improvement:
Instead of compiling the entire application in one go (which could lead to a slow start-up time),
the JIT compiler simply compiles each portion of code as it is called (just-in-time). When code
has been compiled once, the resultant native executable is stored until the application exits; so
that it does not need to be recompiled the next time that portion of code is run.

Common Type System:


This data type problem is solved in .NET through the use of the Common Type System (CTS).
The CTS defines the predefined data types that are available in IL, so that all languages that
target the .NET Framework will produce compiled code that is ultimately based on these types.

Common Language Specification:


The Common Language Specification (CLS) works with the CTS to ensure language
interoperability. The CLS is a set of minimum standards that all compilers targeting .NET must
support. CLS works in two ways. First, it means that individual compilers do not have to be
powerful enough to support the full features of .NET this should encourage

[Type text]

[Type text]

the development of compilers for other programming languages that target .NET. Second, it
provides a guarantee that, if you restrict your classes to exposing only CLS-compliant features,
code written in any other compliant language can use your classes.
Garbage collection:
The .NET runtime relies on the garbage collector instead. This is a program whose purpose is
to clean up memory. The idea is that all dynamically requested memory is allocated on the heap
(that is true for all languages, although in the case of .NET, the CLR maintains its own managed
heap for .NET applications to use). , when .NET detects that the managed heap for a given
process is becoming full and therefore needs tidying up, it calls the garbage collector.

Security:
.NET can really excel in terms of complementing the security mechanisms provided by
Windows because it can offer code-based security, whereas Windows only really offers rolebased security.

Rich API (Application Programmers Interface) / Namespaces:


.Net API is very rich as compared to other languages.
Robust :

Most programs fail for one of the two reasons:


(i)

Memory Management

(ii)

Exceptional conditions at run time

While designing the language one of the aim was to ensure that .Net programs are as robust as
possible i.e. they should rarely fail. So due importance was given to the above two factors in the
.Net.

Better support for Dynamic Web Pages:


[Type text]

[Type text]

.Net offers an integrated support for web pages, using a new technology ASP.NET. With
ASP.Net, code in your page is compiled, and may be written in a any of the .Net languages like
C#, J# or VB.Net
Efficient Data Access:

A set of .Net components, collectively known as ADO.NET provides efficient access to


relational databases and variety of data sources. Components are also available to allow access
to the file system and to directories.

Object-Oriented:

C# is based on object-oriented paradigm. Object-oriented programs are organized around data


(i.e. objects) and a set of well-defined interfaces (public methods) to that data.

Introduction to Web Applications in Dot Net


1. Introduction
Web applications run on the Web Server. Web applications are accessed through web clients i.e.
web browsers like Internet Explorer or Netscape. Whenever you access some web site by
specifying the URL (Universal Resource Locator), you are accessing some web application. The
main components of a web application written in .net are:
ASP.Net (aspx files)
HTML
ASP.Net (aspx file) are also .net programs, which run on the Server and then send the
result/response to the client. Aspx pages can be thought of as a combination of HTML and C#
or VB. net or any .net compatible language code.
You access the web application by specifying the URL. If the URL corresponds to an
[Type text]

[Type text]

HTML page the web server simply returns the HTML page to the client, which then displays it.
If the URL corresponds to the aspx, then it is executed on the Server and the result/response is
returned to the client, which is then displayed by the client. A web application is nothing but a
web-site.
2. Web Client:
In web client based architectures, the user interaction layer is separated from the traditional
client

layer. Web browser manages the user interaction but leaves the rest to applications on

the server side, including the logic for driving the user interface, interacting with components in
the middle-tier, and accessing databases.
3. The HTTP Protocol:
The HTTP is an application level protocol (generally implemented over TCP/IP Connection).
The HTTP is a stateless protocol based on requests & responses. In this paradigm, client
application (such as your web browser) sends request to the server (such as the web server of an
online store) to receive info (such as downloading a catalog) or to initiate specific processing on
the server (such as placing an order).

4.The Requirements for Developing & Hosting Web Applications:


The following are the most essential requirements for developing and hosting web applications:
(ii) Server-side Runtime Support - This includes support for network services and a runtime
for executing the applications.
(iii) Deployment Support Deployment is the process of installing the application on the
server. Deployment could also include customizing the application.

[Type text]

[Type text]

For building and running web applications, the .NET provides the following to meet each of the
above requirements:
(i) ASPX Pages:

These are the building blocks for developing web Applications in .NET. ASPX pages can be
developed using any dot net compatible language.
(ii) Web development Server for Hosting Web Applications:

IIS is providing .NET runtime for providing all the facilities for writing web applications in
.NET. The IIS is responsible for initializing, invoking and managing the life cycle of ASPX files
(iii) Packaging Structure & Deployment Descriptor

The .NET specification defines a packaging structure for web applications. The specification
also defines a deployment descriptor for each web application. The deployment descriptor is an
XML file that lets you customize the web application at deployment time
ASP.NET Applications

ASP.NET applications are divided into multiple web pages. This division means that a user can
often enter an ASP.NET application at several different points, and follow a link out of your
application to another part of your web site or another web server.

3.2.3 Economic
Personal Banking including personal finance, banking on an international arena, banking on a
priority basis.
Transaction Banking includes management of cash, facilities related to credit availability and
services related to trade.
Relationship services with the investors.
[Type text]

[Type text]

Depository Services including dematerialized account openings and associated updates.


Internet Banking services comprising of account specifications, transaction details,
performance of monetary transactions, bill payment through electronic means, etc
Latest
All

the

News

and

information

updates
related

to

related
the

bank

to

the

under

the

market
head

(world/national)
of

About

Us

Specifications and online availability of loans, debit and credit cards, insurance and other
investment services.

4. System Design
4.1 Scope:
Though there are many online systems available on internet but this can compete with them
with some advancement in its functionality and can be used by any bank organization to
maintain their customers account and online transaction process.

The basic functionalities of the system are:


Create Account
Login
Update Profile
Password Recovery
View Profile
ATM and Bank finder
Contact Form
Amount Transaction
EMI and Loan Calculator
[Type text]

[Type text]

Delete account
Logout

4.2 Database design:


Database design is required to manage the large bodies of information. The management of data
involves both the definition of structure of the storage of information and provisions of
mechanism for the manipulation of information. in addition to the database system must provide
for the safety of information handled, despite the system crashes due to attempts art
unauthorized access. for developing an efficient data base , we will have to full fill certain
condition such as:

Control Redundancy

Ease of use
Accuracy and integrity
Avoiding inordinate delays
Recovery from failure
Privacy and security
Performance

There are 6 major steps in design process. The first 5 steps are usually done on paper and finally
the design is implemented.
Identify the tables and relationship
Identify the data that is needed for each table and relationship
[Type text]

[Type text]

Resolve the relationship


Verify the design

Implement the design

NORMALIZATION

Normalization is a technique that is more applicable to record based data models. Each of the
process can be carried out independently to arrive at normalized tables. Normalization refines
the data structure and data are group in simple way as possible. So later changes can be bring
about the least impact on database structure and eliminates data redundancy.

DATA INTEGRITY

Data integrity refers to the procedure that ensures correctness of the data entered in the
database. Functions have been provided in the software, which check data while being entered.
Integrity problems are occurred due to hardware or software malfunctions such as power failure
and disk crashes. Side effect from the program development may also be the reason.

DATA CONSISTENCY

Problem with data consistency occur when adding records without first checking for records
with same key or deleting records without deleting other related records. Likewise the software
is coded such that primary keys cant be duplicated. For developing an efficient database, we
have to fulfill certain conditions such as :
Control redundancy
Ease of use
[Type text]

[Type text]

Data independence
Privacy and security
Performance
For achieving the above criterias we have to make use of various features that are available
with DBMS such as:
Enforcing integrity constraints to ensure data integrity and to reduce data inconsistency.
Recovery from failures using backup facility.

DATABASE TABLES AND STORED PROCEDURES

* DATABASE TABLES
1. bk_register
This table has been included in many modules such as Login, register, Update, View Profile,
Transaction, Password Recovery.

[Type text]

[Type text]

2.contact
This table has been used in the contact page where user can submit the feedback and queries along with his
name and email id.

3.loc
[Type text]

[Type text]

This table has been used in the ATM and Bank finding Module where one can find the address of ATM or bank
by providing the type and the state.

* STORED PROCEDURES
A stored procedure is a subroutine available to applications accessing a relational database
system. Stored procedures (sometimes called a proc, sproc, StoPro, StoredProc, or SPS) are
actually stored in the database data dictionary.

Following are the stored procedures used in this system :


sps_contact
sps_forgot
Sps_Global
sps_loc
sps_register
[Type text]

[Type text]

sps_transac

Eg. Sample code of sps_contact

4.3 Data flow diagram (DFD)


Data Flow Diagrams - Introduction

Data flow diagrams can be used to provide a clear representation of any business function. The
technique starts with an overall picture of the business and continues by analyzing each of the
functional areas of interest. This analysis can be carried out to precisely the level of detail
required. The technique exploits a method called top-down expansion to conduct the analysis in
a targeted way.

[Type text]

[Type text]
Data Flow Diagrams Diagram Notation

There are only five symbols that are used in the drawing of business process diagrams (data
flow diagrams). These are now explained, together with the rules that apply to them.

This diagram represents a banking process, which maintains customer accounts. In this
example, customers can withdraw or deposit cash, request information about their account or
update their account details. The five different symbols used in this example represent the full
set of symbols required to draw any business process diagram.

External Entity

An external entity is a source or destination of a data flow which is outside the area of study.
Only those entities which originate or receive data are represented on a business process
diagram. The symbol used is an oval containing a meaningful and unique identifier.

Process

[Type text]

[Type text]

A process shows a transformation or manipulation of data flows within the system. The symbol
used is a rectangular box which contains 3 descriptive elements:
Firstly an identification number appears in the upper left hand corner. This is allocated
arbitrarily at the top level and serves as a unique reference.
Secondly, a location appears to the right of the identifier and describes where in the system the
process takes place. This may, for example, be a department or a piece of hardware. Finally, a
descriptive title is placed in the centre of the box. This should be a simple imperative sentence
with a specific verb, for example 'maintain customer records' or 'find driver'.

Data Flow

A data flow shows the flow of information from its source to its destination. A data flow is
represented by a line, with arrowheads showing the direction of flow. Information always flows
to or from a process and may be written, verbal or electronic. Each data flow may be referenced
by the processes or data stores at its head and tail, or by a description of its contents.

Data Store

A data store is a holding place for information within the system:


[Type text]

[Type text]

It is represented by an open ended narrow rectangle.


Data stores may be long-term files such as sales ledgers, or may be short-term accumulations:
for example batches of documents that are waiting to be processed. Each data store should be
given a reference followed by an arbitrary number.

Resource Flow

A resource flow shows the flow of any physical material from its source to its destination. For
this reason they are sometimes referred to as physical flows.
The physical material in question should be given a meaningful name. Resource flows are
usually restricted to early, high-level diagrams and are used when a description of the physical
flow of materials is considered to be important to help the analysis.

[Type text]

[Type text]

4.4 Entity relationship diagram(E- R diagram)

[Type text]

[Type text]

4.5 UML Diagram

[Type text]

[Type text]

4.6 Module description


4.6.1 CREATE ACCOUNT
This module is used by the user to create a new account to join services of online banking.
The user is required to fill in a few details and is automatically assigned as an user at the end
of process.
4.6.2 LOGIN
This module is used by all the users to log into the account. The user is required enter his/her
user name and password. After login user will be redirected to the users home page.
4.6.3 UPDATE PROFILE
Update profile module will be used to update or change any detail of user such as address,
phone number, city, state, etc.
4.6.4 PASSWORD RECOVERY
This module is used to recover the lost password by the user by entering his/her valid email
address. This email address will be matched from database and automatically generated
email will be sent to the user containing his/her user name and password.
4.6.5 VIEW PROFILE
This module is the automatically generated page when user clicks the view profile button.
This contain the user account detail such as name, account balance, email id, address, city.
4.6.6 ATM AND BANK LOCATOR
[Type text]

[Type text]

This module is used to find the address and location of ATM and banks in the selected city.
4.6.7 AMOUNT TRANSACTION
This module is the user view page after login where he/she can transfer the amount to other
account by providing the amount to be transferred and the account number where to be
transferred.
4.6.8 CONTACT FORM
This module is used by both registered and non-registered user to contact bank or to give any
feedback trough message. His/her message will be saved into the database and further bank
can contact him/her.
4.6.9 EMI AND LOAD INTEREST CALCULATOR
This module is used to calculate the interest amount of EMI and load by proving the interest
rate, total amount and duration.
4.6.10 DELETE ACCOUNT
This module is used to delete the users account by the confirmation of user.
4.6.11 LOGOUT
This module is used to logout from the users session and redirected to the home page of
website.

[Type text]

[Type text]

5. Interface requirement
5.1 Graphical interface
Internet Explorer
Google Chrome
Mozilla Firefox
Opera

5.2 Command line interface


Notepad ++
Dreamweaver
Visual Studio

5.3 Hardware interface


Intel Pentium-IV processor

256 MB RAM or higher

[Type text]

[Type text]

40 GB HDD or higher
Printer
UPS
LAN Connectivity (Assets Management should be accessible through Intranet)

5.4 Software interface


Microsoft Windows XP / 2000 or Above.
Dot Net framework 2.0 OR ABOVE
IIS
RDBMS (Back end): Sql Server
Web Browser: Internet Explorer6 or higher, Mozilla Firefox, Opera.
Front End: HTML and Asp.net, C#.
Editors: Visual Studio 2005 or Above

[Type text]

[Type text]

6. Performance requirement

The completion of a system is achieved only after it has been thoroughly tested. Though
this gives a feel the project is completed, there cannot be any project without going through this
stage. Hence in this stage it is decided whether the project can undergo the real time
environment execution without any break downs, therefore a package can be rejected even at
this stage.

6.1 SYSTEM TESTING


Testing is a set of activities that can be planned in advance and conducted systematically. The
proposed system is tested in parallel with the software that consists of its own phases of
[Type text]

[Type text]

analysis, implementation, testing and maintenance. Following are the tests conducted on the
system.

6.2 UNIT TESTING


During the implementation of the system each module of the system was tested separately to
uncover errors with in its boundaries. User interface was used as a guide in the process.

6.3 MODULE TESTING


A module is composed of various programs related to that module. Module testing is done to
check the module functionality and interaction between units within a module.
It checks the functionality of each program with relation to other programs within the same
module. It then tests the overall functionality of each module.

6.4 INTEGRATION TESTING


Integration testing is a systematic technique for constructing the program structure while
conducting tests to uncover errors associated with interfacing. The objective is to take unittested module and build a program structure that has been dictated by design.

6.5 ACCEPTANCE TESTING


[Type text]

[Type text]

The software has been tested with the realistic data given by the client and produced fruitful
results. The client satisfying all the requirements specified by them has also developed the
software within the time limitation specified. A demonstration has been given to the client and
the end-user giving all the operational features.

7. Non functional attributes


7.1 Security
Event management is the application of project management to the creation and development
of festivals, events ,extra vagenga and conferences.
Event management involves studying the intricacies of the brand, identifying the target
audience, devising the event concept, planning the logistics and coordinating the technical
aspects before actually executing the modalities of the proposed event. Post-event analysis and
ensuring a return on investment have become significant drivers for the event industry.
The recent growth of festivals and events as an industry around the world means that the
management can no longer be ad hoc. Events and festivals, such as the Asian Games, have a
large impact on their communities and, in some cases, the whole country.
[Type text]

[Type text]

The industry now includes events of all sizes from the Olympics down to a breakfast meeting
for ten business people. Many industries, charitable organization and interest groups will hold
events of some size in order to market themselves, build business relationships, raise money or
celebrate.

7.2 Reliability
Internet banking renders location and time irrelevant, and empowers customers with greater
control of their accounts. Banks achieve cost and efficiency gains in a large number of
operational areas. This paper addresses the aspects of reliability and accessibility from a
banking enterprise point of view and puts forth present day solutions to problems involving
these issues. An Indian perspective of Internet banking is also looked at in order to gaining a
better perspective regarding the situation.

7.3 Maintainability
The aptitude of a system to undergo repair and evolution.
(1) The ease with which a software system or component can be modified to correct
faults, improve performance or other attributes, or adapt to a changed environment.
(2) The ease with which a hardware system or component can be retained in, or restored
to, a state in which it can perform its required functions. [IEEE Std. 610.12]

7.4 Portability
Portability in high-level computer programming is the usability of the same software in
different environments. The prerequirement for portability is the
generalized abstraction between the application logic and system interfaces. When software
with the same functionality is produced for several computing platforms, portability is the key
issue for development cost reduction.

7.5 Reusability
[Type text]

[Type text]

In computer science and software engineering, reusability is the likelihood a segment of source
code that can be used again to add new functionalities with slight or no modification. Reusable
modules and classes reduce implementation time, increase the likelihood that prior testing and
use has eliminated bugs and localizes code modifications when a change in implementation is
required.
Subroutines or functions are the simplest form of reuse. A chunk of code is regularly organized
using modules or namespaces into layers. Proponents claim that objects and offer a more
advanced form of reusability, although it has been tough to objectively measure and define
levels or scores of reusability.
The ability to reuse relies in an essential way on the ability to build larger things from smaller
parts, and being able to identify commonalities among those parts. Reusability is often a
required characteristic of platform software. Reusability brings several aspects to software
development that do not need to be considered when reusability is not required.
Reusability implies some explicit management
of build, packaging, distribution, installation, configuration, deployment, maintenance and upgr
ade issues. If these issues are not considered, software may appear to be reusable
from design point of view, but will not be reused in practice.
Software reusability more specifically refers to design features of a software element (or
collection of software elements) that enhance its suitability for reuse.

7.6 Resource utilization


A supply chain network uses resources of various kinds: manufacturing resources (machines,
material handlers, tools, etc.); storage resources (warehouses, automated storage and retrieval
systems); logistics resources (trucks, rail transport, air-cargo carriers, etc.); human resources
(labor, scientific and technical personnel); and financial (working capital, stocks, etc.). The
objective is to utilize these assets or resources efficiently so as to maximize customer service
levels, minimize lead times, and optimize inventory levels.

7.7 Stable and speed efficiency

[Type text]

[Type text]

The implementation is the final and important phase. It involves User training, system testing
and successful running of the developed system. The users test the developed system when
changes are made according to the needs. The testing phase involves the testing of the
developed system using various kinds of data. An elaborate testing of data is prepared and
system is tested using the tests data.
Implementation is the stage where theoretical design turned into a working system.
Implementation is planned carefully to propose system to avoid unanticipated problems. Many
preparations involved before and during the implementation of proposed system. The system
needed to be plugged in to the organizations network then it could be accessed from anywhere,
after a user logins into the portal. The tasks that had to be done to implement the system were to
create the database tables in the organization database domain. Then the administrator was
granted his role so that the system could be accessed.

The next phase in the implementation was to educate the system. A demonstration of all the
functions that can be carried out by the system was given to examination department person,
who will make extensive use of the system.

8.Security

8.1 Description

[Type text]

[Type text]

Event management is the application of project management to the creation and development
of festivals, events ,extra vagenga and conferences.
Event management involves studying the intricacies of the brand, identifying the target
audience, devising the event concept, planning the logistics and coordinating the technical
aspects before actually executing the modalities of the proposed event. Post-event analysis and
ensuring a return on investment have become significant drivers for the event industry.
The recent growth of festivals and events as an industry around the world means that the
management can no longer be ad hoc. Events and festivals, such as the Asian Games, have a
large impact on their communities and, in some cases, the whole country.
The industry now includes events of all sizes from the Olympics down to a breakfast meeting
for ten business people. Many industries, charitable organization and interest groups will hold
events of some size in order to market themselves, build business relationships, raise money or
celebrate.

8.2 Technical issues


Software companies service event planners with a complete Tool, Hotel Booking Tool,
Travel Booking Tool, Budgeting Tool etc.
As far as the technical issues related to this project from security point of view, there is
no chance of steal the data until either we want or if there is any problem in the coding
section.

8.3 Cost and schedule


Merely we think of the cost estimation on the basis of the following points:
[Type text]

[Type text]

Static IP for WEB

----

Paper work & reports

null
---- Rs.400

Labour costs

----

null

Other expenses

----

Rs. 50

Now looking at the time limit of 15 days and working for 2 hours and work to do we can
divide our work in following parts and complete it.

8.4 Risk
Risk

is the term applied to a logical and semantic method of establishing the context,

identifying, analyzing, evaluating, treating, monitoring and communicating risks associated


with any activity, function or process in a way that will enable organizations to maximize
losses and minimize opportunities.

The complete RISK ANALYSIS is given below in the table :S.NO RISK ITEMS.

RISK MANAGEMENT TECHNIQUES.

.
1.

Personnel

Team comprises of the persons who are ignorant or novice in the

Shortfalls

security issues and also in the technology that we are going to


use for the implementation of the same.

2.

Unrealistic
Schedule
Budget

[Type text]

The term/ time span allotted is very short, quite insufficient and
and the things are really next to impossible to be in such a short span
of time, with the same working hours per day.

[Type text]

3.

Developing

the Mission Analysis is strong but what if a person or more gets

wrong

s/w diverted from.

functions
4.

User interface

For the user interface developed , even after getting it sanctioned


from the opposite side if it denies to accept the existing user
interface.

5.

Continuation
stream

What if the user side even after signing the contract are
of continuously asking for the changes and modification an undue

requirement

problem would be there in the development of the software and

changes.

undue time would be utilized for the same which can ultimately
result in a delay in the project.

Risk may occur with the WEB is


Internet speed
Proper security and communication for password and premium submission.
We have to take certain important measures to not face these risks to occur.

[Type text]

[Type text]

Annexure A Screenshot

[Type text]

[Type text]

LOGIN PAGE WITH ATM AND BANK FINDER

[Type text]

[Type text]

USER HOME PAGE

[Type text]

[Type text]

REGISTRATION PAGE

[Type text]

[Type text]

UPDATE FORM

[Type text]

[Type text]

PASSWORD RECOVERY

[Type text]

[Type text]

VIEW PROFILE

[Type text]

[Type text]

TRANSACTION PAGE

[Type text]

[Type text]

DELETE PROFILE

[Type text]

[Type text]

EMI AND LOAN INTEREST CALCULATOR

[Type text]

[Type text]

[Type text]

[Type text]

CONTACT FORM

Annexure B Sample Coding


Script of SQL query
USE [raj1]
GO
/****** Object: Table [dbo].[loc]
Script Date: 12/13/2011 00:11:21 ******/
SET ANSI_NULLS ON
GO
SET QUOTED_IDENTIFIER ON
GO
CREATE TABLE [dbo].[loc](
[state] [nvarchar](50) NULL,
[address] [nvarchar](max) NULL,
[type] [nvarchar](10) NULL
) ON [PRIMARY]
GO
/****** Object: Table [dbo].[contact]
Script Date: 12/13/2011 00:11:21 ******/
SET ANSI_NULLS ON
GO
SET QUOTED_IDENTIFIER ON
GO
CREATE TABLE [dbo].[contact](
[name] [nvarchar](max) NOT NULL,
[email] [nvarchar](max) NOT NULL,
[msg] [nvarchar](max) NULL
) ON [PRIMARY]
GO
/****** Object: Table [dbo].[bk_register]
Script Date: 12/13/2011 00:11:21 ******/
SET ANSI_NULLS ON
GO
SET QUOTED_IDENTIFIER ON
GO
CREATE TABLE [dbo].[bk_register](
[fname] [nvarchar](max) NOT NULL,
[lname] [nvarchar](max) NOT NULL,
[acc_no] [nvarchar](50) NOT NULL,
[userid] [nvarchar](50) NOT NULL,
[passwd] [nvarchar](max) NOT NULL,
[confirmpw] [nvarchar](max) NOT NULL,
[dob] [datetime] NOT NULL,
[street] [nvarchar](max) NOT NULL,
[city] [nvarchar](max) NOT NULL,
[zip] [int] NOT NULL,
[state] [nvarchar](max) NOT NULL,
[email] [nvarchar](max) NOT NULL,
[contactno] [nvarchar](50) NULL,
[amount] [int] NOT NULL,
CONSTRAINT [PK__bk_regis__9A20FDBB1A14E395] PRIMARY KEY CLUSTERED
(
[acc_no] ASC

[Type text]

[Type text]
)WITH (PAD_INDEX = OFF, STATISTICS_NORECOMPUTE = OFF, IGNORE_DUP_KEY = OFF,
ALLOW_ROW_LOCKS = ON, ALLOW_PAGE_LOCKS = ON) ON [PRIMARY],
CONSTRAINT [IX_bk_register] UNIQUE NONCLUSTERED
(
[userid] ASC
)WITH (PAD_INDEX = OFF, STATISTICS_NORECOMPUTE = OFF, IGNORE_DUP_KEY = OFF,
ALLOW_ROW_LOCKS = ON, ALLOW_PAGE_LOCKS = ON) ON [PRIMARY]
) ON [PRIMARY]
GO
/****** Object: StoredProcedure [dbo].[sps_transac]
Script Date: 12/13/2011 00:11:22
******/
SET ANSI_NULLS ON
GO
SET QUOTED_IDENTIFIER ON
GO
CREATE PROCEDURE [dbo].[sps_transac]
@firstacc nvarchar(50),
@Amount int,
@Secondacc nvarchar(50)
AS
BEGIN
declare

@currentAmount

int

select @currentAmount = amount from dbo.bk_register where acc_no = @Secondacc


if (@currentAmount >1000)
begin
update dbo.bk_register
-- update secone per account
set amount=@currentAmount + @Amount where acc_no= @Secondacc
declare @netAmount int
select @netAmount = Amount from dbo.bk_register where acc_no=@firstacc
update dbo.bk_register
-- update secone per account
set amount =@netAmount -@Amount where acc_no = @firstacc
end
else
begin
print 'Transaction not completed'
end
END
GO
/****** Object: StoredProcedure [dbo].[sps_register]
******/
SET ANSI_NULLS ON
GO
SET QUOTED_IDENTIFIER ON
GO
CREATE PROCEDURE [dbo].[sps_register]
@flag int,
@fname nvarchar(max),
@lname nvarchar(max),
@acc_no nvarchar(50),
@user_id nvarchar(max),
@passwd nvarchar(max),
@confirmpw nvarchar(max),
@dob datetime,

[Type text]

Script Date: 12/13/2011 00:11:22

[Type text]
@street nvarchar(max),
@city nvarchar(max),
@zip int,
@state nvarchar(max),
@email_id nvarchar(max),
@contact nvarchar(50)
AS
BEGIN
if (@flag=1)
begin
if exists (select userid,passwd from dbo.bk_register where userid=@user_id and
passwd=@passwd)
begin
select fname from dbo.bk_register where userid=@user_id
end
else
begin
print 'invalid username or password'
end
end
if(@flag=2)
begin
insert into dbo.bk_register values
(@fname,@lname,@acc_no,@user_id,@passwd,@confirmpw,@dob,@street,@city,@zip,@state,@email_i
d,@contact,'10000')
end
if(@flag=3)
begin
update bk_register set fname=@fname, lname=@lname, passwd=@passwd,
confirmpw=@confirmpw, dob=@dob,
street=@street, city=@city, zip=@zip, state=@state, email=@email_id,
contactno=@contact where userid=@user_id
end
END
GO
/****** Object: StoredProcedure [dbo].[sps_loc]
Script Date: 12/13/2011 00:11:22
******/
SET ANSI_NULLS ON
GO
SET QUOTED_IDENTIFIER ON
GO
CREATE PROCEDURE [dbo].[sps_loc]
@state nvarchar(max),
@add nvarchar(max)
AS
BEGIN
select address,state from dbo.loc where state like '%'+@state+'%' and type =@add
END
GO
/****** Object: StoredProcedure [dbo].[Sps_Global]
Script Date: 12/13/2011 00:11:22
******/
SET ANSI_NULLS ON
GO
SET QUOTED_IDENTIFIER ON
GO
CREATE PROCEDURE [dbo].[Sps_Global]
@flag int,

[Type text]

[Type text]
@value nvarchar(100)
AS
BEGIN
if(@flag=1)
begin
select acc_no from dbo.bk_register where
end

userid=@value

if(@flag=2)
BEGIN
select fname,lname,acc_no,amount,state,email from dbo.bk_register where
userid=@value
END
if(@flag=3)
BEGIN
select
fname,lname,acc_no,userid,passwd,confirmpw,dob,street,city,zip,state,email,contactno from
dbo.bk_register where userid=@value
END
if(@flag=4)
begin
delete from dbo.bk_register where userid=@value
end
if(@flag=5)
BEGIN
select fname,lname,email from dbo.bk_register where userid=@value
END
END
GO
/****** Object: StoredProcedure [dbo].[sps_forgot]
Script Date: 12/13/2011 00:11:22
******/
SET ANSI_NULLS ON
GO
SET QUOTED_IDENTIFIER ON
GO
CREATE PROCEDURE [dbo].[sps_forgot]
@email nvarchar(max)
AS
BEGIN
if exists (select email from dbo.bk_register where email=@email)
begin
select email,userid,passwd from dbo.bk_register where email=@email
end
END
GO
/****** Object: StoredProcedure [dbo].[sps_contact]
******/
SET ANSI_NULLS ON
GO
SET QUOTED_IDENTIFIER ON
GO
CREATE PROCEDURE [dbo].[sps_contact]

[Type text]

Script Date: 12/13/2011 00:11:22

[Type text]
@flag int,
@name nvarchar(max),
@email nvarchar(50),
@msg nvarchar(max)
AS
BEGIN
if(@flag=1)
begin
insert into dbo.contact values (@name,@email,@msg)
end
END
GO

Style.css code
html {background: #fff url(../img/body_back.jpg) repeat-x;
font: normal 75%/1.5em "Helvetica", Arial, sans-serif;color: #333; /* <-- main font color */}
body { text-align: left; }
/* -- UTILITY -- */
.padd10 {padding: 10px;}
.padd20 {padding: 20px;}
.padd30 {padding: 0px 40px;

width: 225px;}

.padd40 {padding: 0px 40px; width: 550px;line-height:30px;margin-left:30px;}


.rty{padding: 10px 10px 10px 10px; width: 550px;line-height:30px;margin-left:30px; float:left;}
.clear {clear:both;display:block;overflow:hidden;width:0;height:0}
.col1, .col2, .col3, .col4, .smallcol1, .maincol,.maincol1, .subcol1, .subcol2 { display:inline;
float:left; position:relative; }
.col1 { width: 960px; }
.col2 { width: 560px; }
.col3 { width: 480px; }
.col4 { width: 400px; }
[Type text]

[Type text]
/* -- COLUMNS SECTION -- */
.smallcol1 { width: 286px;

top: 0px;

left: 0px;}

.maincol { width: 639px; border-right: 1px solid #ccc;


.maincol1 { width: 639px; border-right: 1px solid #ccc;

top: 0px;
top: 0px;

left: 0px;

height: 839px;}

left: 0px;

height: 446px;}

.subcol1 { width: 248px; }


.subcol2 { width: 391px;

top: 0px;

left: 0px;}

.smallcol1.center { width: 328px;border-left: 1px solid #ccc;border-right: 1px solid #ccc;


0px;

left: -10px;}

/* -- END COLUMNS SECTION -- */..

Masterpage.master code
<%@ Master Language="C#" AutoEventWireup="true" CodeFile="MasterPage.master.cs"
Inherits="MasterPage" %>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head id="Head1" runat="server">
<title></title>
<link href="img/logo.png" rel="Shortcut Icon" />
<link rel="stylesheet" href="css/reset-min.css" type="text/css" media="all" />
<link rel="stylesheet" href="css/style.css" type="text/css" media="all" />
<!--[if IE 6]>
<link rel="stylesheet" href="css/ie.css" type="text/css" media="all" />
<![endif]-->
<meta name="description" content="" />
[Type text]

top:

[Type text]
<meta name="keywords" content="" />
<meta name="author" content="Simone Maranzana" />
<meta name="robots" content="all" />
<%--For logout session--%>
<meta http-equiv="cache-control" content="no-store"/>
<meta http-equiv="expires" content="0"/>
<meta http-equiv="pragma" content="no-cache"/>
<!--[if lt IE 7]>
<script type="text/javascript" src="js/unitpngfix.js"></script>
<![endif]-->
<script type="text/javascript" src="js/jquery-1.3.2.min.js"></script>
<script type="text/javascript" src="js/easySlider1.7.js"></script>
<h1>Shutterstock <span class="alt">Bank</span></h1>
<p id="slogan">At the service of your ideas</p>
</div>
<!-- END HEADER -->
<span class="clear"></span>
<!-- BEGIN PAGE -->
<div id="page">
<!-- BEGIN NAVIGATION -->
<div id="nav" class="col1">
<ul>
<li ><asp:HyperLink ID="hy_home" runat="server"
NavigateUrl="~/bk_home.aspx">Home</asp:HyperLink></li>
[Type text]

[Type text]
<asp:Button ID="hy_logout" runat="server" Text="Logout" onclick="hy_logout_Click"
Width="100px" class="morebtnl" />
</div>
<!-- END NAVIGATION -->
<span class="clear"></span>
<div>
<asp:ContentPlaceHolder id="ContentPlaceHolder1" runat="server">
</asp:ContentPlaceHolder>
</div>
<span class="clear"></span>
<!-- BEGIN FOOTER -->
<div id="footer" class="col1">
<div class="padd10">
<div id="secnav">
<ul>
<li ><asp:HyperLink ID="ft_home" runat="server"
NavigateUrl="~/bk_home.aspx">Home</asp:HyperLink></li>
<li> <asp:HyperLink ID="ft_logout" runat="server"
NavigateUrl="~/bk_home.aspx">Logout</asp:HyperLink></li>
</ul>
</div>
<div id="copy">
<p>Copyright 2011 shutterstock.com All Rights Reserved.</p>
</div>

[Type text]

[Type text]
</div>
</div>
<!-- END FOOTER -->
</div> <!-- END PAGE -->
</div> <!-- end wrapper -->
<span class="clear"></span>
</form>
</body>
</html>

MasterPage.master.cs
using
using
using
using
using
using
using
using

System;
System.Collections.Generic;
System.Linq;
System.Web;
System.Web.UI;
System.Web.UI.WebControls;
NAM;
System.Data;

public partial class MasterPage : System.Web.UI.MasterPage


{
protected void Page_Load(object sender, EventArgs e)
{
Response.Cache.SetCacheability(HttpCacheability.NoCache);
Response.AppendHeader("Cache-Control", "no-store");
}
protected void hy_logout_Click(object sender, System.EventArgs e)
{
[Type text]

[Type text]
Session.Abandon();
Session.Clear();
Session["userid"] = null;
Response.Redirect("bk_home.aspx");
}
}

9. Reference & Appendices

BOOKS REFERRED
The following books were used extensively for the project development and implementation.

Matthew Mac Donald: The Complete Reference ASP.NET

Kalen Delaney: Inside MS SQL Server 2005/2008

James A. Sam : Database Management System

Roger S. Pressman : "Software Engineering

James Hoffman: Introduction to Structured Query Language,4th Edition

[Type text]

[Type text]

John Stubbe, Marvin Gore: Elements of System Analysis

Microsoft ASP.NET QuickStart Tutorial

WEBSITES REFERRED

The following links were searched and exploited extensively for the project development and
implementation.
http://www.w3schools.com/aspnet/default.asp
http://www.w3schools.com/sql/default.asp

10. Conclusion

This project was successfully completed within the time span allotted. The project Online
Banking has been developed in asp.net. All the modules are tested separately and put together
to form the main system. Finally the system is tested with real data and everything worked
successfully. Thus the system has fulfilled the entire objective identified.

[Type text]

[Type text]

The system had been developed in an attractive dialogs fashion. So user with minimum
knowledge about computers can also operate the system easily. It will make easy interactions
between users and store. The speed and accuracy are maintained in proper way.

[Type text]

You might also like