Professional Documents
Culture Documents
Online Banking Document
Online Banking Document
1. Abs tr act
4. Intr oduction
4.2 Scope
7. Behavior al D es cr iption
8. Functional D es cr iption
10. D es ign
10.3 E- R D iagr am s
If the customer login password and id is stolen by someone else, he can see the details but he
can’t perform online transaction or transfer. Apart from the transaction password the customer
needs to get verified by providing the grid values present on is debit card which would be asked
randomly. So there is no chance for the person whose steals the password details to make
transaction because he also needs to enter the values which are present on the customer’s debit
card.
Number of Modules:
The system after careful analysis has been identified to be presented with the following modules:
The Modules involved are
1. Admin.
2. User
3. Registration
4. Security and Authentication
SOFTWARE DEVELOPMENT METHODOLOGY:
The methodology used to develop this project is object-oriented methodology is
based on function and procedures. It can be said as the development of software by building self-
contained modules as objects that can be easily replaced, modified and reused. In this
environment software is a collection of discrete objects that encapsulate their data as well as the
functionality to model real world “objects”. Each object has attribute and methods. Objects are
grouped into classes. Here each object is responsible for itself.
1. Analysis
2. Design
ANALYSIS:
Class diagrams
Object diagrams
State transition diagram
Module diagram
Process diagram
Interaction diagram
BOOTCH used the large set of symbols. Even though BOOTCH defines a lot of symbols to
document almost every design decision, if we work with his method, you will notice that you
never use all these symbols and diagrams; this is this main drawback of the BOOTCH
METHOD. In 1991 Jim Raumbaugh develop the OMT (Object Modeling Technique) with the
help of his team It covers analysis, Design and implementation of the system.
Object Model
Presented by the Object Model and the data dictionary.
Dynamic model
Presented by the State diagrams and Event flow diagrams.
Functional Model
By using the use case model we will find the External users, External users are the users who
will interact with our system to complete the task. Every single use case should describe one
main flow of events. An exceptional additional flow of events could be added.
OBJECT ORIENTED SOFTEWARE ENGINEERING
Object oriented software engineering also called, as the objector. It is build around several
models:
USE CASE MODEL: The use-case model defines the outside (actor) and
inside (use case) of the systems behavior.
Activity diagrams are used to document workflows in a system, from the business level
down to the operational level. When looking at an Activity diagram, you'll notice elements from
state diagram, the Activity diagram is a variation of the state diagram where the "states"
represent operations, and the transitions represent the activities that happen when the operation is
complete. The general purpose of Activity diagrams is to focus on flows driven by internal
processing vs. external events.
SEQUENCE DIAGRAMS:
UML sequence diagrams model the flow of logic within your system in a visual
manner, enabling you both to document and validate your logic, and are commonly used for both
analysis and design purposes. Sequence diagrams are the most popular UML artifacts for
dynamic modeling, which focuses on identifying the behavior within your system.
CLASSDIAGRAMS:
A class diagram describes the static structure of the symbols in your new system.
It is a graphic presentation of the static view that shows a collection of declarative (static) model
elements, such as classes, types, and their contents and relationships. Classes are arranged in
hierarchies sharing common structure and behavior, and are associated with other classes
Use cases
Actors
A use case is the specification of sequences of actions, including variant sequences and error
sequences, which a system, subsystem or a class can perform by interacting with outside actors.
An actor may be anything that interact with the system, human, hardware device or another
system etc.
Scope
In the existing system, we can perform all the operations using a single user id password. Once
this password is stolen it is easy for the others to access all the operations like transfer of money
etc. Till now the password will be set by the user and will be reset depending upon the
requirement of the user which can be easily hacked and there is no good security for your
mailing service
So that the customer could pay a huge loss. Thus it is not secured up to mark.
In our project, we provide much security to the customer while using the online banking service
in the following ways.
The customer using the online banking service would be given user id along with
two other passwords. One called Login Password and the other called transaction password.
By using login password the customer can login to be account and we can perfume
only some (limited) operations like saving A/C balance and personal details etc.
But to perform transfer or online transaction, he needs to provide the transaction
password.
If the customer login password and id is stolen by someone else, he can see the
details but he can’s perfume online transaction or transfer. Apart from the transaction password
the customer needs to get verified by providing the grid values present on is debit card which
would be asked randomly
So there is no chance for the person whose steals the password details to make
transaction because he also needs to enter the values which are present on the customer’s debit
card
In the proposed system we will be able to provide an opportunity for the user to make the
mailing service to be highly secured by generating a random password each and every time he
wants to logon and encrypted random password will be forwarded to the Personal mail id of the
user where will be giving a link to forward his decrypted password to the mail.
ACC:Account
Pwd:password
Uid:user id
Facc:From Account
Tacc:To Account
Overall Description:
Specification requirements:
Software requirements :
Front End : C# 2008
Data Base : SQL Server 2005
Technology : .Net
Hardware Requirements:
ASP.NET,C#,MS SQL,
DATA FLOW
1) A Data Flow has only one direction of flow between symbols. It may flow in both
directions between a process and a data store to show a read before an update. The
later is usually indicated however by two separate arrows since these happen at
different type.
2) A join in DFD means that exactly the same data comes from any of two or more
different processes data store or sink to a common location.
3) A data flow cannot go directly back to the same process it leads. There must be at
least one other process that handles the data flow produce some other data flow
returns the original data into the beginning process.
4) A Data flow to a data store means update (delete or change).
5) A data Flow from a data store means retrieve or use.
A data flow has a noun phrase label more than one data flow noun phrase can appear on a single
arrow as long as all of the flows on the same arrow move together as one package.
A data flow diagram is graphical tool used to describe and analyze movement of data through a
system. These are the central tool and the basis from which the other components are developed.
The transformation of data from input to output, through processed, may be described logically
and independently of physical components associated with the system. These are known as the
logical data flow diagrams. The physical data flow diagrams show the actual implements and
movement of data between people, departments and workstations. A full description of a system
actually consists of a set of data flow diagrams. Using two familiar notations Yourdon, Gane
and Sarson notation develops the data flow diagrams. Each component in a DFD is labeled with
a descriptive name. Process is further identified with a number that will be used for
identification purpose. The development of DFD’s is done in several levels. Each process in
lower level diagrams can be broken down into a more detailed DFD in the next level. The lop-
level diagram is often called context diagram. It consists a single process bit, which plays vital
role in studying the current system. The process in the context level diagram is exploded into
other process at the first level DFD.
The idea behind the explosion of a process into more process is that understanding at one
level of detail is exploded into greater detail at the next level. This is done until further
explosion is necessary and an adequate amount of detail is described for analyst to understand
the process.
Larry Constantine first developed the DFD as a way of expressing system requirements
in a graphical from, this lead to the modular design.
A DFD is also known as a “bubble Chart” has the purpose of clarifying system
requirements and identifying major transformations that will become programs in system design.
So it is the starting point of the design to the lowest level of detail. A DFD consists of a series of
bubbles joined by data flows in the system.
DFD SYMBOLS:
In the DFD, there are four symbols
Data flow
Data Store
CONSTRUCTING A DFD:
1. Process should be named and numbered for an easy reference. Each name should be
representative of the process.
2. The direction of flow is from top to bottom and from left to right. Data traditionally flow
from source to the destination although they may flow back to the source. One way to indicate
this is to draw long flow line back to a source. An alternative way is to repeat the source symbol
as a destination. Since it is used more than once in the DFD it is marked with a short diagonal.
2. When a process is exploded into lower level details, they are numbered.
3. The names of data stores and destinations are written in capital letters. Process and dataflow
names have the first letter of each work capitalized
A DFD typically shows the minimum contents of data store. Each data store should contain all
the data elements that flow in and out.
Questionnaires should contain all the data elements that flow in and out. Missing interfaces
redundancies and like is then accounted for often through interviews.
1. The DFD shows flow of data, not of control loops and decision are controlled
considerations do not appear on a DFD.
2. The DFD does not indicate the time factor involved in any process whether the dataflow
take place daily, weekly, monthly or yearly.
3. The sequence of events is not brought out on the DFD.
PROCESS
1) No process can have only outputs.
2) No process can have only inputs. If an object has only inputs than it must be a sink.
3) A process has a verb phrase label.
DATA STORE
1) Data cannot move directly from one data store to another data store, a process must
move data.
2) Data cannot move directly from an outside source to a data store, a process, which
receives, must move data from the source and place the data into data store
3) A data store has a noun phrase label.
SOURCE OR SINK
1) Data cannot move directly from a source to sink it must be moved by a process
2) A source and /or sink has a noun phrase land
Design
Sequence and Collaboration Diagrams:
Valid pin
Successfully login
Succcessfully
View reports
Riports
Display the
Logout
Logout successfully
Vallid password
Successfully login
Amount
Enter transaction id
Transaction id is
Verifying
Vallid
Grid values is
Verifing
Verified
Transaction completed
Current balence
Display balnce
Logout
Logout successfully
Rigister
Enter user id
Change password
Change profile
View profile
Transaction
Update amount
log out
Testing Concepts
Testing
Testing Methodologies
Levels of Testing
Unit Testing.
Module Testing.
Integration Testing.
System Testing.
User Acceptance Testing.
Types Of Testing
Smoke Testing.
Sanitary Testing.
Regression Testing.
Re-Testing.
Static Testing.
Dynamic Testing.
Alpha-Testing.
Beta-Testing.
Monkey Testing.
Compatibility Testing.
Installation Testing.
Ado Testing.
Ext….
TCD (Test Case Documentation
SLC
Test Planning.
Test Development.
Test Execution.
Result Analysis.
Bug-Tracing.
Reporting.
Manual Testing
Win Runner.
Test Director.
TESTING:
The process of executing a system with the intent of finding an error.
Testing is defined as the process in which defects are identified, isolated, subjected
for rectification and ensured that product is defect free in order to produce the
quality product and hence customer satisfaction.
Quality is defined as justification of the requirements
Defect is nothing but deviation from the requirements
Defect is nothing but bug.
Testing --- The presence of bugs
Testing can demonstrate the presence of bugs, but not their absence
Debugging and Testing is not the same thing!
Testing is a systematic attempt to break a program or the AUT
Debugging is the art or method of uncovering why the script /program did not
execute properly.
Testing Methodologies:
Black box Testing: is the testing process in which tester can perform testing
on an application without having any internal structural knowledge of
application.
Usually Test Engineers are involved in the black box testing.
White box Testing: is the testing process in which tester can perform testing
on an application with having internal structural knowledge.
Usually The Developers are involved in white box testing.
Gray Box Testing: is the process in which the combination of black box and
white box tonics are used.
Levels of Testing:
Test Planning
1.Test Plan is defined as a strategic document which describes the procedure how to
perform various testing on the total application in the most efficient way.
3. Objective of testing,
4. Areas that need to be tested,
Used….
Test cases)
Of application.
application
> Smoke Testing: is the process of initial testing in which tester looks for the
availability of all the functionality of the application in order to perform detailed testing
on them. (Main check is for available forms)
> Regression Testing: is one of the best and important testing. Regression testing is
the process in which the functionality, which is already tested before, is once again tested
whenever some new change is added in order to check whether the existing functionality
remains same.
Static Testing: is the testing, which is performed on an application when it is not been
executed.ex: GUI, Document Testing
Compatibility testing: it is the testing process in which usually the products are tested
on the environments with different combinations of databases (application servers,
browsers…etc) In order to check how far the product is compatible with all these
environments platform combination.
Installation Testing: it is the process of testing in which the tester try to install or try to
deploy the module into the corresponding environment by following the guidelines
produced in the deployment document and check whether the installation is successful or
not.
Ado Testing: Ado Testing is the process of testing in which unlike the formal testing
where in test case document is used, without that test case document testing can be done
of an application, to cover that testing of the future which are not covered in that test case
document. Also it is intended to perform GUI testing which may involve the cosmetic
issues.
TCD (Test Case Document):
This is the sample test case document for the Academic details of student project:
Test scope:
Test coverage is provided for the screen “ Academic status entry” form of a
student module of university management system application
Areas of the application to be tested
Test Scenario:
When the office personals use this screen for the marks entry, calculate the status
details, saving the information on student’s basis and quit the form.
Test Procedure:
The procedure for testing this screen is planned in such a way that the data entry,
status calculation functionality, saving and quitting operations are tested in terms
of Guy testing, Positive testing, Negative testing using the corresponding Guy test
cases, Positive test cases, Negative test cases respectively
Test Cases:
Testing
Testing Methodologies
Levels of Testing
Unit Testing.
Module Testing.
Integration Testing.
System Testing.
User Acceptance Testing.
Types Of Testing
Smoke Testing.
Sanitary Testing.
Regression Testing.
Re-Testing.
Static Testing.
Dynamic Testing.
Alpha-Testing.
Beta-Testing.
Monkey Testing.
Compatibility Testing.
Installation Testing.
Ado Testing.
Ext….
TCD (Test Case Documentation)
STLC
Test Planning.
Test Development.
Test Execution.
Result Analysis.
Bug-Tracing.
Reporting.
Microsoft Windows – Standards
Manual Testing
Automation Testing (Tools)
Win Runner.
Test Director
.
Testing:
The process of executing a system with the intent of finding an error.
Testing is defined as the process in which defects are identified, isolated, subjected
for rectification and ensured that product is defect free in order to produce the
quality product and hence customer satisfaction.
Quality is defined as justification of the requirements
Defect is nothing but deviation from the requirements
Defect is nothing but bug.
Testing --- The presence of bugs
Testing can demonstrate the presence of bugs, but not their absence
Debugging and Testing is not the same thing!
Testing is a systematic attempt to break a program or the AUT
Debugging is the art or method of uncovering why the script /program did not
execute properly.
Testing Methodologies:
Black box Testing: is the testing process in which tester can perform testing on
an application without having any internal structural knowledge of application.
Usually Test Engineers are involved in the black box testing.
White box Testing: is the testing process in which tester can perform testing on
an application with having internal structural knowledge.
Usually the Developers are involved in white box testing.
Gray Box Testing: is the process in which the combination of black box and
white box techniques are used.
Levels of Testing:
Sample Code
Transfer:
SqlConnection con = new SqlConnection("user
id=sa;password=amith;database=bank");
SqlCommand cmd;
SqlDataReader dr;
int curbal = 0;
cmd = new SqlCommand("select userbalance from customer where userid =
'"+Session["uname"].ToString()+"'",con);
con.Open();
dr = cmd.ExecuteReader();
if (dr.Read())
{
curbal = Convert.ToInt32(dr[0].ToString());
}
con.Close();
else
{
Label1.Text = "Invalid Transaction Password";
}
con.Close();
}
}
Register:
da = new SqlDataAdapter("select accno from customer",con);
DataSet ds = new DataSet();
da.Fill(ds,"x");
if (ds.Tables[0].Rows.Count == 0)
{
nacno = "10000001";
TextBox1.Text = nacno;
}
else
{
int k = ds.Tables[0].Rows.Count;
con.Open();
}
View Transactions: