Syn Bank

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 47

A

PROJECT REPORT

ON

“ONLINE BANKING”

SUBMITTED TO

IN PARTIAL FULFILLMENT FOR THE AWARD OF THE DEGREE


OF
BACHELOR OF TECHNOLOGY
IN
INFORMATION TECHNOLOGY

SESSION 2011-2012

Submitted To:
Submitted By:

Department of Information and Technology


PREFACE

With the rapid globalization of the Indian economy, enterprises are facing with
ever changing competitive environment. Enterprises are adopting strategies
aimed at developing competitive advantage based on enhanced customer value
in terms of product differentiation, quality, speed, service and costs. In the post
liberalization era, with the deregulation of Indian economy, the financial service
sector witnessing a complete metamorphosis and technology is playing a very
significant role in this record. Over the last decade India has been one of the
fastest adopters of information technology, particularly because of its capability
to provide software solution to organizations around the world. This capability
has provided a tremendous impetuous to the domestic banking industry in India
to deploy the latest in technology, particularly in the Internet banking and e-
commerce arenas. Banks are growing in size by mergers and acquisitions,
which have been driven by communication and technology. Technology is
playing a major role in increasing the efficiency, courtesy and speed of
customer service. It is said to be the age of E-banking. An Online Banking user
is expected to perform at least one of the following transactions online:

1. Checking account balance

2. Transaction

3. Paying bills

4. Transferring funds between accounts


5. Calculate EMI and Loan interests

From a bank’s perspective, using the Internet is more efficient than using other
distribution mediums because banks are looking for an increased customer base.
Using multiple distribution channels increases effective market coverage by
enabling different products to be targeted at different demographic segments.
Also Banks cannot risk losing customers to competitors within the aggressive
competition in the banking industry around the world. Moreover Internet
delivery offers customized service to suit the needs and the likes of each user.
Mass customization happens effectively through Online Banking. It reduces
cost and replaces time spent on routine errands with spending time on business
errands. Online Banking means less staff members, smaller infrastructure
demands, compared with other banking channels. From the customers’
perspective, Online Banking provides a convenient and effective way to manage
finances that is easily accessible 24 hours a day, seven days a week. In addition
information is up to date. Nevertheless Online Banking has disadvantages for
banks like how to work the technology, set-up cost, legal issues, and lack of
personal contact with customers. And for customers there are security and
privacy issues.
INDEX

S.NO. PARTCULAR PAGE NO.


Preface i

1. Project introduction 1-4

1.1 Purpose of document 1

1.2 Scope of developments 2

1.3 Overview 2

1.4 Business context 4

2. General Description 5-6

2.1 Product function 5

2.2 User problem statement 5

2.3 User objectives 6

3. System Analysis 6-26

3.1 Functional requirement 9

3.1.1 System requirement 10

3.1.2 Program requirement 10

3.1.3 Stability & speed 10

3.2 Feasibility study 10

3.2.1 Operational 17

3.2.2 Technical 18

3.2.3 Economic 26

4. System Design 26-38

4.1 Scope 27
4.2 Database design 27

4.3 Data flow diagram (DFD) 32

4.4 Entity relationship diagram(E-R diagram) 36

4.5 UML Diagram 37

4.6 Module description 38

5. Interface requirement 40-41

5.1 Graphical interface 40

5.2 Command line interface 40

5.3 Hardware interface 40

5.4 Software interface 41

6. Performance requirement 42-44

7. Non functional attributes 44-46

7.1 Security 44

7.2 Reliability 44

7.3 Maintainability 44

7.4 Portability 45

7.5 Reusability 45

7.6 Resource utilization 45

7.7 Stable and speed efficiency 46

8. Security 47-48

8.1 Description 47

8.2 Technical issues 47

8.3 Cost and schedule 47

8.4 Risk 48
1. INTRODUCTION
Internet banking is a product of e-commerce in the field of banking and
financial services. In what can be described as business to customer domain for
banking industry, Internet banking offers different online services like balance
enquiry, balance transfer, opening account, calculate EMI’s etc. Mostly, these
are traditional services offered through internet as a new delivery channel.
Banks are also offering payment services on the behalf of their customers who
shop in different e-shops, e-malls etc. Further, different banks have different
levels of such services offered, starting from level-1 where only information is
disseminated through internet to level-3 where online transactions are put
through.

1.1 PURPOSE OF THE SYSTEM

1. SECURITY: There is a lot of security of data on this content management


system. One cannot open our system without knowing the password.
Immediately after opening login screen will appear on screen. Only after
entering the correct username and password user can operate our system.

2. REFERENTIAL INTEGRITY: User cannot change the date in the


transaction files. Addition of data can be done only on the master files date in
transaction files cannot be entered until addition is done on the master files.

3. EASY RETRIEVAL OF DATA: Data is retrieved easily and quick using sql
commands. On line commands are used to retrieve huge amount of data.

4. GENERATION OF AUTOMATIC VALUES: In project in some screen


some fields generated automatically like Profile detail, Account number, etc.
1.2 SCOPE OF THE PROPOSED SYSTEM

Though there are many online systems available on internet but this can
compete with them with some advancement in its functionality and can be used
by any bank organization to maintain their customer’s account and online
transaction process.

The basic functionalities of the system are:

 Create Account
 Login
 Update Profile
 Password Recovery
 View Profile
 ATM Simulator
 Contact Form
 Amount Transaction
 EMI and Loan Calculator
 Delete account
 Logout

1.3 OVERVIEW OF PROPOSED SYSTEM

1. MENU DRIVEN:

The project uses menu throughout which we can choose required options.
Menus are self-explanatory, as they are very easy to use and user can go to any
other web page using the menu.
2. USER CONFIRMATION:

Whenever the user tries to delete or edit the data, the system asks for the
confirmation. This is used to avoid the accidental changes to the database. A
confirmation is also provided for the exit of the application.

3. GRAPHICAL USER INTERFACE:

User is provided with a graphical interface in which user can select from
various options and can perform desired operations with perfect understanding
of the menu selected.

4. MULTIPLE DOCUMENT INTERFACE:

The package provides a multiple document interface to the user. The user can
view more than one entry form or pages at the same time.

5. SECURITY AND ACCESS: A password form has been provided at the


beginning of the package. Entering the correct password will take user to the
main user page

1.4 BUSINESS CONTEXT

Existing banking system is a manual system, which leads to a number of


problems in maintaining proper records. These are:
1. PAPER WORK: All the activities that are performed by Management involve
a lot of paper work involving register consultations and entries. A separate file
has to be maintained for each kind of activity and for different periods of time.

2. TIME CONSUMPTION: A lot of time is consumed in referencing the


registers involved for particular activities and a lot of computation as well as
report verification activity is also paper based and time consuming.

3. COMPLEXITY: Complexity of information handling and the gathering and


determination of information is usually the most difficult problem faced.

4. REDUNDANCY: Maintaining separate files for each department can lead to


duplication of data present in files. This can lead to:

a) Inconsistencies

b) Update anomalies

c) Decentralization problems

5. HUMAN ERRORS: Human kind of errors may be generated in typing errors


and slow arithmetic calculations, fatigue and boredom.
6. ILLEGAL ACCESS: The security of a lot of documents, which are paper,
based if difficult may be in terms of illegal access or manipulation by malicious
personals either intentionally or by accident.

7. DYNAMIC ENVIRONMENT: As the working environment is dynamic and


company policies change time and again, changing the way of working will be
difficult.

2. General Description

2.1 Product function:


 Track Account Level Data: In this module, check the authentication of


users.

 Service Level Agreements: It contains the agreements of providing the


services related to users.

 User Contact Information: It maintains all the details (Personal, Official


and Contact) of the users.

 Product Access Right Details: It maintains the information that does


which user have the rights of using which service.

2.2 User problem statement

A problem statement is a concise description of the issues that need to be


addressed by a problem solving team and should be presented to them (or
created by them) before they try to solve the problem. When bringing together a
team to achieve a particular purpose provide them with a problem statement.
A good problem statement should answer these questions:

1. What is the problem? This should explain why the team is needed.
2. Who has the problem or who is the client/customer? This should explain
who needs the solution and who will decide the problem has been solved.
3. What form can the resolution be? What is the scope and limitations (in
time, money, resources, technologies) that can be used to solve the
problem? Does the client want a white paper? A web-tool? A new feature
for a product? A brainstormingon a topic?

The primary purpose of a problem statement is to focus the attention of the


problem solving team. However, if the focus of the problem is too narrow or the
scope of the solution too limited the creativity and innovation of the solution
can be stifling.

In project management, the problem statement is part of the project charter. It


lists what's essential about the project and enables the project manager to
identify the project scope as well as the project stakeholders.

A research-worthy problem statement is the description of an active


challenge (i.e. problem) faced by researchers and/or practitioners that does not
have adequate solutions available including the argumentation for its viability
based on solid peer-reviewed sources as well as theoretical foundation. The
research-worthy problem statement should address all six questions: what,
how, where, when, why, and who. On the other hand, a statement of the
problem is one or two sentences claim that outlines the problem that the study
addresses. The statement of the problem should briefly address the question:
What is the problem that the research will address?

2.3 User objectives

2.3.1 CREATE ACCOUNT


This module is used by the user to create a new account to join services of
online banking. The user is required to fill in a few details and is
automatically assigned as an user at the end of process.

2.3.2 LOGIN
This module is used by all the users to log into the account. The user is
required enter his/her user name and password. After login user will be
redirected to the user’s home page.

2.3.3 UPDATE PROFILE

Update profile module will be used to update or change any detail of user
such as address, phone number, city, state, etc.

2.3.4 PASSWORD RECOVERY

This module is used to recover the lost password by the user by entering
his/her valid email address. This email address will be matched from
database and automatically generated email will be sent to the user
containing his/her user name and password.

2.3.5 VIEW PROFILE

This module is the automatically generated page when user clicks the view
profile button. This contain the user account detail such as name, account
balance, email id, address, city.

2.3.6 ATM SIMULATOR


This module is used to simulation of ATM for credit and debit both.

2.3.7 AMOUNT TRANSACTION

This module is the user view page after login where he/she can transfer the
amount to other account by providing the amount to be transferred and the
account number where to be transferred.

2.3.8 CONTACT FORM

This module is used by both registered and non-registered user to contact


bank or to give any feedback trough message. His/her message will be saved
into the database and further bank can contact him/her.

2.3.9 EMI AND LOAD INTEREST CALCULATOR

This module is used to calculate the interest amount of EMI and load by
proving the interest rate, total amount and duration.

2.3.10 DELETE ACCOUNT

This module is used to delete the user’s account by the confirmation of user.

2.3.11 LOGOUT

This module is used to logout from the user’s session and redirected to the
home page of website.
3. SYSTEM ANALYSIS

3.1 Functional requirement


3.1.1 System requirement:

To view your accounts in Online Banking you will need internet access using
one of the following supported browsers:

 Microsoft Internet Explorer 6 or higher


 Firefox 3
 Safari 3
To view your accounts in Online Cash Manager you will need internet access
using one of the following supported browsers:

 Microsoft Internet Explorer 6 or higher


 Firefox 3

3.1.2 Program requirement

The following are the most essential requirements for developing and hosting
web applications:

(ii) Server-side Runtime Support - This includes support for network


services and a runtime for executing the applications.

(iii) Deployment Support – Deployment is the process of installing the


application on the server. Deployment could also include customizing the
application.

3.1.3 Stability & speed

SPEED delivers unparalleled analysis into the latest developments in payments


systems, real time gross settlement, straight-through-processing, securities
trading, risk management and banking technology.

It is the essential source of information policymakers and market participants


like you read to stay informed about the policy issues shaping settlements,
payments, e-money and e-trading.

Few sources of information set out to analyse changes in the financial


infrastructure as a whole. They stay in their silo. Yet increasingly what happens
in one area has far reaching implications for all others.

SPEED aims to help you track these developments not just at a national or
global level, but as an integrated whole.

3.2 Feasibility study


3.2.1 Operational

Now almost all Banks branches are connected through the online banking
facilities. The transactions of a particular bank are transmitted through the
Micro-Bank software from INFLEX Solutions to the Head Office, where every
data is stored in the database.
Real-time On-line any branch banking for the clients is used to facilitate the
clients to deposit / draw or remit funds to and from their accounts, from one
bank to another.
Meanwhile, for the Smooth operation and efficient functioning of the system
they have completed the proper training to the related personnel

3.2.2 Technical

1. Software Environment is a technical specification of requirement of


software product. This specifies the environment for development, operation
and maintenance of the product.

Technology used:

XAMPP
SQL
HTML
PHP

XAMPP:

XAMPP is one of the widely used cross-platform web servers, which helps
developers to create and test their programs on a local webserver. It was developed
by the Apache Friends, and its native source code can be revised or modified by
the audience. It consists of Apache HTTP Server, MariaDB, and interpreter for the
different programming languages like PHP and Perl. It is available in 11 languages
and supported by different platforms such as the IA-32 package of Windows & x64
package of macOS and Linux.
What is XAMPP?
XAMPP is an abbreviation where X stands for Cross-Platform, A stands for Apache, M
stands for  MYSQL, and the Ps stand for PHP and Perl, respectively. It is an open-source
package of web solutions that includes Apache distribution for many servers and command-
line executables along with modules such as Apache server, MariaDB, PHP, and Perl.

XAMPP helps a local host or server to test its website and clients via computers and laptops
before releasing it to the main server. It is a platform that furnishes a suitable environment to
test and verify the working of projects based on Apache, Perl, MySQL database, and PHP
through the system of the host itself. Among these technologies, Perl is a programming
language used for web development, PHP is a backend scripting language, and MariaDB is
the most vividly used database developed by MySQL. The detailed description of these
components is given below.

Components of XAMPP
As defined earlier, XAMPP is used to symbolize the classification of solutions for
different technologies. It provides a base for testing of projects based on different
technologies through a personal server. XAMPP is an abbreviated form of each
alphabet representing each of its major components. This collection of software
contains a web server named Apache, a database management system
named MariaDB and scripting/ programming languages such as PHP and Perl. X
denotes Cross-platform, which means that it can work on different platforms such
as Windows, Linux, and macOS.

Many other components are also part of this collection of software and are explained
below.

1. Cross-Platform: Different local systems have different configurations of


operating systems installed in it. The component of cross-platform has been
included to increase the utility and audience for this package of Apache
distributions. It supports various platforms such as packages of Windows,
Linus, and MAC OS.

2. Apache: It is an HTTP a cross-platform web server. It is used worldwide for


delivering web content. The server application has made free for installation
and used for the community of developers under the aegis of Apache
Software Foundation. The remote server of Apache delivers the requested
files, images, and other documents to the user.

3. MariaDB: Originally, MySQL DBMS was a part of XAMPP, but now it has been
replaced by MariaDB. It is one of the most widely used relational DBMS,
developed by MySQL. It offers online services of data storage, manipulation,
retrieval, arrangement, and deletion.
4. PHP: It is the backend scripting language primarily used for web
development. PHP allows users to create dynamic websites and applications.
It can be installed on every platform and supports a variety of database
management systems. It was implemented using C language. PHP stands
for Hypertext Processor. It is said to be derived from Personal Home Page
tools, which explains its simplicity and functionality.

5. Perl: It is a combination of two high-level dynamic languages, namely Perl 5


and Perl 6. Perl can be applied for finding solutions for problems based on
system administration, web development, and networking. Perl allows its
users to program dynamic web applications. It is very flexible and robust.

6. phpMyAdmin: It is a tool used for dealing with MariaDB. Its version 4.0.4 is
currently being used in XAMPP. Administration of DBMS is its main role.

7. OpenSSL: It is the open-source implementation of the Secure Socket Layer


Protocol and Transport Layer Protocol. Presently version 0.9.8 is a part of
XAMPP.

8. XAMPP Control Panel: It is a panel that helps to operate and regulate upon
other components of the XAMPP. Version 3.2.1 is the most recent update. A
detailed description of the control panel will be done in the next section of the
tutorial.

9. Webalizer: It is a Web Analytics software solution used for User logs and
provide details about the usage.

10.Mercury: It is a mail transport system, and its latest version is 4.62. It is a


mail server, which helps to manage the mails across the web.

11.Tomcat: Version 7.0.42 is currently being used in XAMPP. It is a servlet


based on JAVA to provide JAVA functionalities.

12.Filezilla: It is a File Transfer Protocol Server, which supports and eases the
transfer operations performed on files. Its recently updated version is 0.9.41.
PHP:

PHP started out as a small open source project that evolved as more and more
people found out how useful it was. Rasmus Lerdorf unleashed the first version of
PHP way back in 1994.
 PHP is a recursive acronym for "PHP: Hypertext Preprocessor".
 PHP is a server side scripting language that is embedded in HTML. It is used
to manage dynamic content, databases, session tracking, even build entire
e-commerce sites.
 It is integrated with a number of popular databases, including MySQL,
PostgreSQL, Oracle, Sybase, Informix, and Microsoft SQL Server.
 PHP is pleasingly zippy in its execution, especially when compiled as an
Apache module on the Unix side. The MySQL server, once started, executes
even very complex queries with huge result sets in record-setting time.
 PHP supports a large number of major protocols such as POP3, IMAP, and
LDAP. PHP4 added support for Java and distributed object architectures
(COM and CORBA), making n-tier development a possibility for the first time.
 PHP is forgiving: PHP language tries to be as forgiving as possible.
 PHP Syntax is C-Like.

Common uses of PHP


 PHP performs system functions, i.e. from files on a system it can create,
open, read, write, and close them.
 PHP can handle forms, i.e. gather data from files, save data to a file, through
email you can send data, return data to the user.
 You add, delete, modify elements within your database through PHP.
 Access cookies variables and set cookies.
 Using PHP, you can restrict users to access some pages of your website.
 It can encrypt data.

Characteristics of PHP
Five important characteristics make PHP's practical nature possible −

 Simplicity
 Efficiency
 Security
 Flexibility
 Familiarity
SQL:

The name SQL stands for Structural Query Language. SQL is a data
access language, like any other language, it is used for communication. SQL
communicates with database manager. The database manager could be Oracle,
Informix, DB2 and SQL database. SQL is easy to learn. Despite the fact that
SQL is a computer programming language, it is much simpler than traditional
programming language like COBOL, BASIC, FORTRAN or API. This is due to the
fact that SQL is a non-procedural language.

SQL is one of the Oracle facilities. It is important to understand in each


case its differences, purpose and place in the Oracle family.

o SQL is the language used to access a relational database,


including Oracle.

o SQL May be used with each of the Oracle tools, where access to
the database is required.

Overview of SQL:

A database management system requires a query language to enable


users to access data. Structured Query Language (SQL – pronounced ‘sequel’)
is the language used by most relational database systems.

IBM developed the SQL language in a prototype relational database


management system –System R – in the mid-1970s. In 1979, Oracle
Corporation introduced the first commercially available implementation of SQL.

Features of SQL:

 SQL is an English-like language. It uses words such as select,


insert, delete as part of its command set.

 SQL is a non-procedural language: you specify what information


you require, not how to get it. In other words, SQL does not
require you to specify the access method to the data. All SQL
statements use the query optimizer – a part of the RDBMS – to
determine the fastest means of retrieving the specified data. This
feature makes it easier for you to concentrate on obtaining the
desired result.

 SQL processes sets of records rather than a single record at a time.


The most common form of a set of records is a table.

 A range of user including DBAs, application programmers,


management personnel, and many other types of end users can
use SQL.

 SQL provides commands for a variety of tasks including:

 Querying data

 Inserting, updating and deleting rows in a table

 Creating, modifying and deleting database objects

 Controlling access to the database and database objects

 Guaranteeing database consistency.

SQL Processing Capabilities:

SQL is composed of a definition language a Data Manipulation Language


and a Data Control Language. These three languages support the complete
spectrum of Relational Data processing activity. In fact most SQL based product
all access to the data through SQL.

1. Data Definition Language:

DDL allows creation, Deletion and Modification of data structure for bar
system. These structures include tables, databases and indexes.

Ex: Create, Drop and Alter.

2. Data Manipulation Language:


These commands are used to manipulate the data in tables directly or
through views. There are four standard DML statements. They are select,
delete, insert and update.

3. Data control language:

These commands are used to control usage and access of data. The most
commonly found one’s will include grant, revoke.

Why to Use?

Oracle greatly supports RDBMS features. Also it supports high security to


the data and faster accessing capability. It can be run on a variety of platforms
and operating systems. One can develop an application easily by providing
user-friendly environment.

The features of oracle are portability and compatibility.

HTML:

The extended reach of information and services to customers that the Internet has
enabled, has created a new challenge for the developer. The developer should develop a
user interface that is distributable, available on multiple platforms and supports a wide
range of client environments from handheld wireless devices to high-end workstations.
So to maintain a broad reach to client environments and to achieve greatest
compatibility with all browsers, this system uses standard HTML.

Hyper Text Markup Language is the standard language for creating


documents for the World Wide Web. An HTML document is a text file, which
contains the elements, in the form of tags that a web browser uses to display
text, multimedia objects, and hyperlinks using HTML; we can format a
document for display and add hyperlinks to other documents.

The user interface has been designed in HTML hence can be browsed in
any web browser.
Cascading Style Sheets:

These have been used to separate data form presentation. By using these style sheets
throughout the project, a uniform look and feel can be maintained for all the HTML
elements and tags that have been used in the project. If there is any revamp the way
the content has been presented in the website, the changes can be made to the
appropriate style sheet, which will be reflected across all the style sheets.

4. System Design

4.1 Scope:

Though there are many online systems available on internet but this can
compete with them with some advancement in its functionality and can be used
by any bank organization to maintain their customer’s account and online
transaction process.

The basic functionalities of the system are:

 Create Account
 Login
 Update Profile
 Password Recovery
 View Profile
 ATM Simulator
 Contact Form
 Amount Transaction
 EMI and Loan Calculator
 Delete account
 Logout

4.2 Database design:

Database design is required to manage the large bodies of information. The


management of data involves both the definition of structure of the storage of
information and provisions of mechanism for the manipulation of information.
in addition to the database system must provide for the safety of information
handled, despite the system crashes due to attempts art unauthorized access. for
developing an efficient data base , we will have to full fill certain condition such
as:

 Control Redundancy

 Ease of use

 Accuracy and integrity

 Avoiding inordinate delays

 Recovery from failure

 Privacy and security

 Performance

There are 6 major steps in design process. The first 5 steps are usually done on
paper and finally the design is implemented.

 Identify the tables and relationship

 Identify the data that is needed for each table and relationship
 Resolve the relationship

 Verify the design

 Implement the design

NORMALIZATION

Normalization is a technique that is more applicable to record based data


models. Each of the process can be carried out independently to arrive at
normalized tables. Normalization refines the data structure and data are group in
simple way as possible. So later changes can be bring about the least impact on
database structure and eliminates data redundancy.

DATA INTEGRITY

Data integrity refers to the procedure that ensures correctness of the data
entered in the database. Functions have been provided in the software, which
check data while being entered. Integrity problems are occurred due to hardware
or software malfunctions such as power failure and disk crashes. Side effect
from the program development may also be the reason.

DATA CONSISTENCY

Problem with data consistency occur when adding records without first
checking for records with same key or deleting records without deleting other
related records. Likewise the software is coded such that primary keys can’t be
duplicated. For developing an efficient database, we have to fulfill certain
conditions such as :
• Control redundancy

• Ease of use

• Data independence

• Privacy and security

• Performance

For achieving the above criteria’s we have to make use of various features that
are available with DBMS such as:

• Enforcing integrity constraints to ensure data integrity and to reduce data


inconsistency.

• Recovery from failures using backup facility.

* STORED PROCEDURES

A stored procedure is a subroutine available to applications accessing a


relational database system. Stored procedures (sometimes called a proc, sproc,
StoPro, StoredProc, or SPS) are actually stored in the database data dictionary.

Following are the stored procedures used in this system :

 sps_contact

 sps_forgot

 Sps_Global
 sps_loc

 sps_register

 sps_transac

Eg. Sample code of sps_contact

4.3 Data flow diagram (DFD)

Data Flow Diagrams - Introduction


Data flow diagrams can be used to provide a clear representation of any
business function. The technique starts with an overall picture of the business
and continues by analyzing each of the functional areas of interest. This analysis
can be carried out to precisely the level of detail required. The technique
exploits a method called top-down expansion to conduct the analysis in a
targeted way.

Data Flow Diagrams – Diagram Notation


There are only five symbols that are used in the drawing of business process
diagrams (data flow diagrams). These are now explained, together with the rules
that apply to them.
   

This diagram represents a banking process, which maintains customer accounts.


In this example, customers can withdraw or deposit cash, request information
about their account or update their account details. The five different symbols
used in this example represent the full set of symbols required to draw any
business process diagram.

External Entity

                   

An external entity is a source or destination of a data flow which is outside the


area of study. Only those entities which originate or receive data are represented
on a business process diagram. The symbol used is an oval containing a
meaningful and unique identifier.

Process

                           
A process shows a transformation or manipulation of data flows within the
system. The symbol used is a rectangular box which contains 3 descriptive
elements:
Firstly an identification number appears in the upper left hand corner. This is
allocated arbitrarily at the top level and serves as a unique reference.
Secondly, a location appears to the right of the identifier and describes where in
the system the process takes place. This may, for example, be a department or a
piece of hardware. Finally, a descriptive title is placed in the centre of the box.
This should be a simple imperative sentence with a specific verb, for example
'maintain customer records' or 'find driver'.

Data Flow

                             

A data flow shows the flow of information from its source to its destination. A
data flow is represented by a line, with arrowheads showing the direction of
flow. Information always flows to or from a process and may be written, verbal
or electronic. Each data flow may be referenced by the processes or data stores
at its head and tail, or by a description of its contents.

Data Store

                            

A data store is a holding place for information within the system:


It is represented by an open ended narrow rectangle.
Data stores may be long-term files such as sales ledgers, or may be short-term
accumulations: for example batches of documents that are waiting to be
processed. Each data store should be given a reference followed by an arbitrary
number.
Resource Flow

                              

A resource flow shows the flow of any physical material from its source to its
destination. For this reason they are sometimes referred to as physical flows.
The physical material in question should be given a meaningful name. Resource
flows are usually restricted to early, high-level diagrams and are used when a
description of the physical flow of materials is considered to be important to
help the analysis.

4.4 Entity relationship diagram(E- R diagram)


4.5 UML Diagram
4.6 Module description

4.6.1 CREATE ACCOUNT


This module is used by the user to create a new account to join services of
online banking. The user is required to fill in a few details and is
automatically assigned as an user at the end of process.

4.6.2 LOGIN
This module is used by all the users to log into the account. The user is
required enter his/her user name and password. After login user will be
redirected to the user’s home page.

4.6.3 UPDATE PROFILE

Update profile module will be used to update or change any detail of user
such as address, phone number, city, state, etc.

4.6.4 PASSWORD RECOVERY

This module is used to recover the lost password by the user by entering
his/her valid email address. This email address will be matched from
database and automatically generated email will be sent to the user
containing his/her user name and password.

4.6.5 VIEW PROFILE

This module is the automatically generated page when user clicks the view
profile button. This contain the user account detail such as name, account
balance, email id, address, city.

4.6.6 ATM SIMULATOR

This module is used to find the address and location of ATM and banks in
the selected city.

4.6.7 AMOUNT TRANSACTION


This module is the user view page after login where he/she can transfer the
amount to other account by providing the amount to be transferred and the
account number where to be transferred.

4.6.8 CONTACT FORM

This module is used by both registered and non-registered user to contact


bank or to give any feedback trough message. His/her message will be saved
into the database and further bank can contact him/her.

4.6.9 EMI AND LOAD INTEREST CALCULATOR

This module is used to calculate the interest amount of EMI and load by
proving the interest rate, total amount and duration.

4.6.10 DELETE ACCOUNT

This module is used to delete the user’s account by the confirmation of user.

4.6.11 LOGOUT

This module is used to logout from the user’s session and redirected to the
home page of website.
5. Interface requirement

5.1 Graphical interface

 Internet Explorer

 Google Chrome

 Mozilla Firefox

 Opera

5.2 Command line interface

 Notepad ++

 Dreamweaver

5.3 Hardware interface

 Intel Pentium-IV processor

 256 MB RAM or higher

 40 GB HDD or higher

 Printer

 UPS
 LAN Connectivity (Assets Management should be accessible through

Intranet)

5.4 Software interface

 Microsoft Windows 7 or Above.

 XAMPP

 RDBMS (Back end): Sql Server

 Web Browser: Internet Explorer6 or higher, Mozilla Firefox, Opera.

 Front End: HTML and PHP.


6. Performance requirement

The completion of a system is achieved only after it has been thoroughly

tested. Though this gives a feel the project is completed, there cannot be any

project without going through this stage. Hence in this stage it is decided

whether the project can undergo the real time environment execution without

any break downs, therefore a package can be rejected even at this stage.

6.1 SYSTEM TESTING

Testing is a set of activities that can be planned in advance and conducted

systematically. The proposed system is tested in parallel with the software that

consists of its own phases of analysis, implementation, testing and maintenance.

Following are the tests conducted on the system.

6.2 UNIT TESTING


During the implementation of the system each module of the system was tested

separately to uncover errors with in its boundaries. User interface was used as a

guide in the process.

6.3 MODULE TESTING

A module is composed of various programs related to that module. Module

testing is done to check the module functionality and interaction between units

within a module.

It checks the functionality of each program with relation to other programs

within the same module. It then tests the overall functionality of each module.

6.4 INTEGRATION TESTING

Integration testing is a systematic technique for constructing the program

structure while conducting tests to uncover errors associated with interfacing.

The objective is to take unit-tested module and build a program structure that

has been dictated by design.

6.5 ACCEPTANCE TESTING

The software has been tested with the realistic data given by the client and

produced fruitful results. The client satisfying all the requirements specified by
them has also developed the software within the time limitation specified. A

demonstration has been given to the client and the end-user giving all the

operational features.

7. Non functional attributes

7.1 Security

Event management is the application of project management to the creation and


development of festivals, events ,extra vagenga and conferences.

Event management involves studying the intricacies of the brand, identifying


the target audience, devising the event concept, planning the logistics and
coordinating the technical aspects before actually executing the modalities of
the proposed event. Post-event analysis and ensuring a return on investment
have become significant drivers for the event industry.

The recent growth of festivals and events as an industry around the world means
that the management can no longer be ad hoc. Events and festivals, such as
the Asian Games, have a large impact on their communities and, in some cases,
the whole country.
The industry now includes events of all sizes from the Olympics down to a
breakfast meeting for ten business people. Many industries, charitable
organization and interest groups will hold events of some size in order to market
themselves, build business relationships, raise money or celebrate.

7.2 Reliability

Internet banking renders location and time irrelevant, and empowers customers
with greater control of their accounts. Banks achieve cost and efficiency gains
in a large number of operational areas. This paper addresses the aspects of
reliability and accessibility from a banking enterprise point of view and puts
forth present day solutions to problems involving these issues. An Indian
perspective of Internet banking is also looked at in order to gaining a better
perspective regarding the situation.

7.3 Maintainability

 The aptitude of a system to undergo repair and evolution.


 (1) The ease with which a software system or component can be modified
to correct faults, improve performance or other attributes, or adapt to a
changed environment.
 (2) The ease with which a hardware system or component can be retained
in, or restored to, a state in which it can perform its required functions.
[IEEE Std. 610.12]

7.4 Portability

Portability in high-level computer programming is the usability of the


same software in different environments. The prerequirement for portability is
the generalized abstraction between the application logic and system
interfaces. When software with the same functionality is produced for
several computing platforms, portability is the key issue for development cost
reduction.
7.5 Reusability

In computer science and software engineering, reusability is the likelihood a


segment of source code that can be used again to add new functionalities with
slight or no modification. Reusable modules and classes reduce implementation
time, increase the likelihood that prior testing and use has eliminated bugs and
localizes code modifications when a change in implementation is required.
Subroutines or functions are the simplest form of reuse. A chunk of code is
regularly organized using modules or namespaces into layers. Proponents claim
that objects and offer a more advanced form of reusability, although it has been
tough to objectively measure and define levels or scores of reusability.
The ability to reuse relies in an essential way on the ability to build larger things
from smaller parts, and being able to identify commonalities among those parts.
Reusability is often a required characteristic of platform software. Reusability
brings several aspects to software development that do not need to be
considered when reusability is not required.
Reusability implies some explicit management
of build, packaging, distribution, installation, configuration, deployment, mainte
nance and upgrade issues. If these issues are not considered, software may
appear to be reusable from design point of view, but will not be reused in
practice.
Software reusability more specifically refers to design features of a software
element (or collection of software elements) that enhance its suitability for
reuse.

7.6 Resource utilization

A supply chain network uses resources of various kinds: manufacturing


resources (machines, material handlers, tools, etc.); storage resources
(warehouses, automated storage and retrieval systems); logistics resources
(trucks, rail transport, air-cargo carriers, etc.); human resources (labor, scientific
and technical personnel); and financial (working capital, stocks, etc.). The
objective is to utilize these assets or resources efficiently so as to maximize
customer service levels, minimize lead times, and optimize inventory levels.
7.7 Stable and speed efficiency

The implementation is the final and important phase. It involves User training,
system testing and successful running of the developed system. The users test
the developed system when changes are made according to the needs. The
testing phase involves the testing of the developed system using various kinds
of data. An elaborate testing of data is prepared and system is tested using the
tests data.

Implementation is the stage where theoretical design turned into a working


system. Implementation is planned carefully to propose system to avoid
unanticipated problems. Many preparations involved before and during the
implementation of proposed system. The system needed to be plugged in to the
organization’s network then it could be accessed from anywhere, after a user
logins into the portal. The tasks that had to be done to implement the system
were to create the database tables in the organization database domain. Then the
administrator was granted his role so that the system could be accessed.

The next phase in the implementation was to educate the system. A


demonstration of all the functions that can be carried out by the system was
given to examination department person, who will make extensive use of the
system.

8.Security

8.1 Description
Event management is the application of project management to the creation and
development of festivals, events ,extra vagenga and conferences.

Event management involves studying the intricacies of the brand, identifying


the target audience, devising the event concept, planning the logistics and
coordinating the technical aspects before actually executing the modalities of
the proposed event. Post-event analysis and ensuring a return on investment
have become significant drivers for the event industry.

The recent growth of festivals and events as an industry around the world means
that the management can no longer be ad hoc. Events and festivals, such as
the Asian Games, have a large impact on their communities and, in some cases,
the whole country.

The industry now includes events of all sizes from the Olympics down to a
breakfast meeting for ten business people. Many industries, charitable
organization and interest groups will hold events of some size in order to market
themselves, build business relationships, raise money or celebrate.

8.2 Technical issues

 Software companies service event planners with a complete Tool, Hotel


Booking Tool, Travel Booking Tool, Budgeting Tool etc.
 As far as the technical issues related to this project from security point
of view, there is no chance of steal the data until either we want or if
there is any problem in the coding section.

8.3 Cost and schedule

Merely we think of the cost estimation on the basis of the following points:
Static IP for WEB ---- null
Paper work & reports ---- Rs.400
Labour costs ---- null
Other expenses ---- Rs. 50

Now looking at the time limit of 15 days and working for 2 hours and
work to do we can divide our work in following parts and complete it.

8.4 Risk

Risk is the term applied to a logical and semantic method of establishing the


context, identifying, analyzing, evaluating, treating, monitoring and
communicating risks associated with any activity, function or process in a way
that will enable organizations to maximize losses and minimize opportunities.

The complete RISK ANALYSIS is given below in the table :-

S.NO. RISK ITEMS. RISK MANAGEMENT TECHNIQUES.


1. Personnel Team comprises of the persons who are ignorant
Shortfalls or novice in the security issues and also in the
technology that we are going to use for the
implementation of the same.
2. Unrealistic The term/ time span allotted is very short, quite
Schedule and insufficient and the things are really next to
Budget impossible to be in such a short span of time, with
the same working hours per day.
3. Developing the Mission Analysis is strong but what if a person or
wrong s/w more gets diverted from.
functions
4. User interface For the user interface developed , even after
getting it sanctioned from the opposite side if it
denies to accept the existing user interface.
5. Continuation What if the user side even after signing the
stream of contract are continuously asking for the changes
requirement and modification an undue problem would be there
changes. in the development of the software and undue time
would be utilized for the same which can
ultimately result in a delay in the project.

Risk may occur with the WEB is

 Internet speed

 Proper security and communication for password and


premium submission.

We have to take certain important measures to not face these risks to occur.

You might also like