Professional Documents
Culture Documents
Netnew
Netnew
1.INTRODUCTION
1.1 ABOUT THE PROJECT
The technological revolution has caused a greater boom in the field of computers.
Since it relieves from the work load, the demand for computerizing every field of
work is increasing. Through Online Bank Transaction System , the main idea is to offer
a series of services to customer through the internet which would make it easy to
carry out simple tasks faster instead of making a visit to the bank every time. The
Online Bank Transaction System services would fully integrate with core banking
solution already implemented at the bank.
The objectives of the project is to substitute the existing computer aided non online
system to fully computerized online system. The proposed system is designed to meet
all the disadvantages of the existing one and to provide a permanent solution to
them. In the computerized system all the details regarding creating an account
whether SB/FD/Current/Recurring deposit cash, withdraw cash, ATM, Loan application
etc are provided online ie through the internet. The proposed system will be very
easy, efficient, simple, fault free and secure. This will provide an easier interface with
the user and also make data access easy.It reduces the loss of data and will give
faster access to the data.It is user friendly. It takes less time for execution and
provides greater security.
1
2. Opening of new Saving Bank Accounts:-
The customers can open Bank Accounts with a specified opening balance by
assigning proper account numbers.
5. Fund Transfer:-
Customers would often want to transfer funds from one account of others to
another. The Account Numbering scheme now identifies the Bank branch to which the
account belongs.The transfer of funds between accounts of the same customer will
now be facilitated through the Net Banking service.
7. Other Information:-
1. The customer may also look for information on interest rates on Fixed term
deposits which often change from time to time.
2. Online Bank Transaction System also provides information to the customers
about the various bank branches.
3. Customers can also request for new ATM centers.
4. Customers have an option to apply for loan.
2
CHAPTER II
2. SYSTEM ENVIRONMENT
2.1 HARDWARE SPECIFICATION :
2.2:SOFTWARE SPECIFICATION
Operating System : WINDOWS XP
Front End : VB.NET
Backend : Microsoft SQL Server2000
Services : ASP.NET XML Web Services
3
2.3 SOFT WARE DESCRIPTION
VISUAL STUDIO .NET FEATURES
The Microsoft.NET strategy was presented by Microsoft officials to the rest of the world in
June 2008:
.NET is Microsoft's new Internet and Web strategy
.NET is NOT a new operating system
.NET is a new Internet and Web based infrastructure
.NET delivers software as Web Services
.NET is a framework for universal services
.NET is a server centric computing model
.NET will run in any browser on any platform
.NET is based on the newest Web standards
.NET Framework
The .NET Framework is the infrastructure for the new Microsoft .NET Platform.
The .NET Framework is a common environment for building, deploying, and running
Web Services and Web Applications.
The .NET Framework contains common class libraries - like ADO.NET, ASP.NET
and Windows Forms - to provide advanced standard services that can be integrated into a
variety of computer systems.
The .NET Framework is language neutral. Currently it supports C++, C#, Visual
Basic, and JScript (The Microsoft version of JavaScript). Third-party languages like
COBOL, Eiffel, Perl, Python, Smalltalk, and others - will also be available for building
future .NET Framework applications. The new Visual Studio.NET is a common development
environment for the new .NET Framework. It provides a feature-rich application execution
environment, simplified development and easy integration between a numbers of different
development languages.
4
Common Language Runtime (CLR)
The common language runtime is the execution engine for .NET Framework
applications.
It provides a number of services, including the following:
Code management (loading and execution)
Application memory isolation
Verification of type safety
Conversion of IL to native code
Access to metadata (enhanced type information)
Managing memory for managed objects
Enforcement of code access security
Exception handling, including cross-language exceptions
Interoperation between managed code, COM objects, and pre-existing DLLs (unmanaged
code and data)
Automation of object layout
Support for developer services (profiling, debugging, and so on)
5
Microsoft Intermediate Language (MSIL)
MSIL is the CPU-independent instruction set into which .NET Framework programs are
compiled. It contains instructions for loading, storing, initializing, and calling methods on
objects.
Combined with metadata and the common type system, MSIL allows for true cross-language
integration.
Prior to execution, MSIL is converted to machine code. It is not interpreted.
Assembly
An assembly is the primary building block of a .NET Framework application. It is a
collection of functionality that is built, versioned, and deployed as a single implementation
unit (as one or more files). All managed types and resources are marked either as accessible
only within their implementation unit or as accessible by code outside that unit. Assemblies
are self-describing by means of their manifest, which is an integral part of every assembly.
The manifest:
Establishes the assembly identity (in the form of a text name), version, culture, and digital
signature (if the assembly is to be shared across applications). Defines what files (by name
and file hash) make up the assembly implementation. Specifies the types and resources that
make up the assembly, including which are exported from the assembly.
The self-describing nature of assemblies also helps makes zero-impact install and XCOPY
deployment feasible.
6
Options are available to deploy my .NET applications
The .NET Framework simplifies deployment by making zero-impact install and XCOPY
deployment of applications feasible. Because all requests are resolved first to the private
application directory, simply copying an application's directory files to disk is all that is
needed to run the application. No registration is required.
This scenario is particularly compelling for Web applications, Web Services, and self-
contained desktop applications. However, there are scenarios where XCOPY is not sufficient
as a distribution mechanism. An example is when the application has little private code and
relies on the availability of shared assemblies, or when the application is not locally installed
(but rather downloaded on demand). For these cases, the .NET Framework provides
extensive code download services and integration with the Windows Installer. The code
download support provided by the .NET Framework offers several advantages over current
platforms, including incremental download, code access security (no more Authenticode
dialogs), and application isolation (code downloaded on behalf of one application doesn't
affect other applications). The Windows Installer is another powerful deployment mechanism
available to .NET applications. All of the features of Windows Installer, including
publishing, advertisement, and application repair will be available to .NET applications in
Windows Installer 2.0.
Garbage collection
Garbage collection is a mechanism that allows the computer to detect when an object can no
longer be accessed. It then automatically releases the memory used by that object (as well as
calling a clean-up routine, called a "finalize," which is written by the user). Some garbage
collectors like the one used by .NET, compact memory and therefore decrease your
program's working set.
7
Specifically, COM components are accessed from the .NET Framework by use of a runtime
callable wrapper (RCW). This wrapper turns the COM interfaces exposed by the COM
component into .NET Framework-compatible interfaces. For OLE automation interfaces, the
RCW can be generated automatically from a type library. For non-OLE automation
interfaces, a developer may write a custom RCW and manually map the types exposed by the
COM interface to .NET Framework-compatible types.
New in ASP.NET:
New Language Support
Programmable Controls
Event Driven Programming
XML Based Components
User Authentication
User Accounts and Roles
High Scalability
Compiled Code
Easy Configuration
Easy Deployment
Not ASP Compatible
Includes ADO.NET
You can read more about ASP.NET and ADO.NET in our ASP.NET Tutorial.
Visual Studio.NET
The latest version of Visual Studio - Visual Studio.NET - incorporates ASP.NET,
ADO.NET, Web Services, Web Forms, and language innovations for Visual Basic. The
development tools have deep XML support, an XML-based programming model and new
Object-oriented programming capabilities.
8
Visual Basic.NET
Visual Basic.NET has added language enhancements, making it a full Object-oriented
programming language.
SQL Server 2000
SQL Server 2000 is a fully web-enabled database.
SQL Server 2000 has strong support for XML and HTTP which are two of the main
infrastructure technologies for .NET.
Some of the most important new SQL Server features are direct access to the Database from
a browser, query of relational data with results returned as XML, As well as storage of XML
in relational formats.
9
BACKEND TOOL
SQL SERVER -2010 FEATURES
Editions of SQL server
• Enterprise (Developer)
• Standard
• Personal
Components
• Server Components
• Components
Server Components
• SQL Server Engine
• SQL Server Agent
• Distributed Transaction Coordinator (DTC)
• Microsoft Search Engine
• SQL Mail
• English Query
• Data Transformation Services (DTS)
• Analysis Services
10
Distributed Transaction Coordinator (DTC)
• It is a process that handles dual phase commits for transactions that span multiple SQL
Servers.
Data Transformation Services (DTS)
• It moves data among nearly any types of data sources.
• DTS is extremely useful during data conversions, collecting data from many dissimilar data
sources, or gathering for data warehousing.
• Analysis Services
• It enables the developer to define cubes that are similar to excel pivot tables or Access cross
tab queries.
Stored Procedures:-
• A batch is stored with a name within the database.
• These are compiled and are the fastest possible means of executing a batch or query. •
Executing the processing at the server instead of the desktop greatly reduces network traffic.
• These offer modularity and are an easy means of deploying features and code changes.
• These can be an important component in database.
• These are managed by means of the DDL commands: Create, Alter and Drop.
• A stored procedure can return a record set.
• Stored procedures compile and are stored in memory the first time they are executed. If the
server reboots, all the compiled stored procedures are lost. They are again compiled, when
they are called.
• SQL Server uses the Mater.dbo.SysCacheObjects table to track compiled objects.
• Select Cast(C.Sql as char(35)) as StoredProcedure, cacheobject, usecounts as Counts • The
stored procedure text is saved in the SysComments table. The text is not stored for the
execution of the stored procedures, but only so that it may be retrieved later, if the store d
procedures need to be modified.
• The Sp_helptext system stored procedure will extract the original text of the stored
procedure. • If the stored procedure is created with the with encryption option, the stored
procedure text in SysComments is not directly readable.
• The dSQLSRVD freeware utility enables any user in the SysAdmin role to decrypt
encrypted objects.
11
• System stored procedures are stored in Master database. Any procedures beginning with
Sp_ that are in Master database can be executed from any database. If the name conflicts,
then local procedure will be executed.
• A stored procedure is more useful if it can be manipulated by parameters.
Dynamic Memory:-
If SQL Server is set to dynamic memory then SQL Server’s memory footprint can
grow or be reduced as needed within the minimum and maximum constraints based on the
physical memory available and the workload. SQL Server will try to maintain its requirement
and 3 to 10MB extra memory.
Reconfigure:-
After a configuration setting is changed with sp_configure, the reconfigure command
causes the changes to take effect. Some configuration changes only take effect after SQL
Server is restarted.
12
Query Wait:-
If the memory is unavailable to execute a large query, SQL Server will wait for the
estimated amount of time necessary to execute the query. During this time the query will hold
any locks and an undetectable deadlock may occur.
Index Memory:-
The amount of memory SQL Server uses to perform sorts when creating an index is
generally self-configuring. However, it can be controlled by using sp_configure.
Affinity Mask:-
In a multi-CPU server the operating system can move processes to CPUs as the load
requires. The SQL Server processor affinity, or the relationship between a task and a CPU,
can be configured on a per-CPU basis. By enabling the affinity between SQL Server and a
CPU, that CPU will be available to SQL Server, but it is not dedicated to SQL Server. In
code, the individual CPUs are enables by means of setting the affinity mask bits using
sp_configure.
Priority Boost:-
Different processes in windows operate at different priorities levels, ranging from 0 to
31. The highest priorities are executed first and reserved for the operating system processes.
Typically windows scheduling priority level settings for applications are 4 (low), 7 (normal),
13 (high). By default, SQL Server installs with a windows scheduling priority level of 7.
Lightweight Pooling:-
This option in multi-processing helps reduce the overhead of frequently switching
processes among the CPUs. The NT fiber threads option is used to create fewer process
threads, but those threads are associated with additional fibers or lightweight threads, that
stay associated with their thread. The smaller no. of threads helps reduce process-switching
and improve performance.
13
Parallelism:-
The Enterprise edition(Developer) of SQL Server will execute complex queries using
several processors in parallel instead of serially. Longer queries benefit the most from
parallelism. However, parallel queries are amazingly fast.
C2 Security:-
If this property is enabled, the SQL Server will refuse to continue if it is unable to
write the security-audit log.
Server Security:
SQL Server uses a two-phase security authentication scheme. The user is first
authenticated to the SQL server. Once the user is “in” the server, access can be granted to the
individual databases.
SQL Server stores all login information within the master database.
Windows Authentication:-
It is superior to mixed mode because the user does not need to learn yet another
password.
The use of windows authentication means that users exist as windows users to be
recognized by SQL Server. The windows SID (Security Identifier) is passed from windows to
SQL Server.
It is very robust that it will authenticate not only windows users, but also users within
windows user groups.
15
CHAPTER III
3. SYSTEM STUDY
The Project entitled “Online Bank Transaction System“ is developed for Coimbatore
bank. Through Online Bank Transaction System, the main idea is to offer a series of
services to its customers through the internet which would make it easy to carry out
tasks faster instead of making a visit to the Bank every time.
System analysis is a detailed study of the various operations performed by the system
and their relationships within and outside the system. During analysis data are
collected on the available files, decision points and transactions handled by the
existing system. In order to avoid confusion some important tools are used during the
analysis. Data Flow Diagrams data dictionary Decision trees, decision Tables are
Examples.
Biased in the data collection and interpretation can be a problem. During this analysis
information is collected in the form of answers to the questions for collecting
information from existing documents.
16
SYSTEM STUDY:
System study is the process of gathering and interpreting facts, using the information
for further studies on the system.It is a problem solving activity.It does various
feasibility studies.In these studies, a rough figure of the system activity can be
obtained from which the decisions about the strategies to be followed for effective
system study and the analysis can be taken.Preliminary study also identifies the
method collection to be followed.
17
The major advantages of the proposed system are:
1.Menu Driven and User Friendly.
Many option are designed so that they will ensure to give valid output the users
needs.
2. Authorized entry through on line code.
3. The system will accept valid data as input and gives valid output.
4.Easy to use.
5. Better speed and Performance
6. Messages are displayed on the screen.
1. Economical Feasibility
2. Technical Feasibility
3. Behavioural Feasibility
4. Operational Feasibility
ECONOMIC FEASIBILITY
Economic analysis a most frequently used method for evaluating the effectiveness of
the candidate system. More commonly known as cost benefit analysis, the producer is
to determine the benefits and the saving that are expected from a candidate system
and compare them with costs.if the benefits outweigh costs then the decision is made
to design and implement the system. Othewise further justifications are alternative in
the proposed system will have to be made.
In the Online Bank Transaction System project the cost required for the design and
implementation are first considered along with the benefits provided by the project. If
the benefits out weigh costs then the decision is made to design and implement the
18
system. Since the systems benefits outweighs the cost requirements the decisions were
made to design and implement the system.
TECHNICAL FEASIBILITY
Technical Feasibility is the phase in which the design is adapted to the technical
architecture used describing and documenting the functioning of each unit of the
software. It involves financial considerations to accommodate technical enhancements.
Technical Feasibility centers around the existing computer system and to what extend
it can support the proposed addition. If the budget is a serious constraint, then the
project is judged not feasible. The system has been developed using Microsoft Visual
Studio 2005 as the front end and Microsoft SQL Server as its back end.The
proposed system has the technical capability to hold the data required to use the new
system.
BEHAVIOURAL FEASIBILITY
People are inherently resistant to change and computer have been known to facilitate
change. Keeping in pace with a philosophy of responsive customer service, the Bank
decided to offer Net Banking services to its customers. The idea is to offer a serious
of services to the customers through the internet which would make it easy to carry
out simple tasks faster.
OPERATIONAL FEASIBILITY
The proposed project is beneficial as it meets the organization operation requirements.
The proposed system is a graphical user interface. It is a user friendly system where
the user can easily operate or use the system in an effective manner. The proposed
system produces accurate and optimized result. Since the system is user friendly only
a basic learning is needed to use it. It takes less time for execution and provide
greater security by preventing unauthorized access with the help of online code. The
system is also economical feasibility.
19
CHAPTER IV
4. SYSTEM DESIGN
In Net Banking system input details invlude, the information about the account
of the user, fund transfer,ATM request, loan application etc. Administrators can view
all the recent fund fund transfers, ATM pending requests and loan applications. New
users are able to create accounts in both Bank and Website by providing the user
credentials.
During the first stages an analysis determines which data the application produce and
how to organize and present the data. In output designing the emphasis is on
producing a hard copy of information requested as well as displaying the output on
CRT screens in a predefined format.
20
Fund transactions details,status of pending loan applications,personal account
details,entire account information about the users are the main outputs of the system
which are displayed on the screen. Users can be able to view the balances in their
account and the recent fund transfers details also. Administrators can be able to view
all the ATM request, recent fund transfer reports,loan application, new account
registration,transaction details.
password Varchar 50
21
Table Name :User Registration
Description :This table is used to store user Details
Attribute Data Type Width Constraint
userid Int 50 Primary key
username Varchar 20
firstname Varchar 20
lastname Varchar 20
address Varchar 50
landlineno Varchar 50
mobile no Varchar 50
Dob Varchar 50
occupation Varchar 50
e-mail Varchar 50
status Varchar 50
state Varchar 50
salary Int 50
Table Name : Account Registration
Description : This table is used to store the details when the user opens new
SB accounts.
Attribute Datatype Width
account no Int 10 Primary key
Balance Int 20
22
Table Name :Branch
Description : This table is used to store branch details
Attribute Datatype Width Constraint
branchid Varchar 20 Primary key
branch name Varchar 20
23
Table Name : Loan application
Description : This table is used to store the details when the user applies for
a loan
Attribute Datatype Width Constraint
loan amount Float 20
interestrate Int 50
installment Int 50
On a DFD, data items flow from an external data source or an internal data store to an
internal data store or an external data sink, via an internal process.
The main DFD symbols are:
24
CHAPTER V
5. SYSTEM DEVELOPMENT
The project entitled “Online Bank Transaction System” is developed using Microsoft
Visual Studio 2005 as front end and Microsoft SQL Server as its back end.Our
application includes an easy to use interface which has master pages for minimizing
the amount of information typed in by the user and/or by the administrator.
After successful completion of the design phase,the next step is developing the system
according to the specified requirements.The main procedure of this phase is coding
the designed system in order to meet the user requirements.The system is developed
in a structured manner along with coding without complicating the basics of the
program. The software is chosen for coding is C# due to its flexibility.
When the user approaches the software he should give the user anme and password.
If he is not a registered user he should sign up the registration form. Then he can
open the particular account,namely saving deposit or fixed deposit complying the
formats specified in the screen.Then he can avail the following banking facilities.
1.Registration of new customers.
2.Opening of new SB accounts.
3.Depositing and Withdrawal of transactions.
4.Querying of account details.
5.Fund Transfer
6.E-Cheque Book Facility
7.ATM facility
8.Home loan
When an administrator login with his username and password should login to the
system with a user name and password.Then the following facilities are open to him.
1.Accept the user through accepting the user registreation form.
2.Sanction an account and provide the user with account no.
3.Update the user account for all the transactions.
4.Sanction ATM requests.
5.Sanction Home loans.
6.Overview and sanction the various transactions.
25
CHAPTER VI
6. SYSTEM TESTING
System Teting is aimed at ensuring the system works accurately and efficiently before
live operation commences.For any software that is newly developed,prime importance
is given to testing the system.It is the last opportunity for the developer to detect the
possible error in the software before handling over to the clients.
The increased viability of the software “Online Bank Transaction System” and the
lower attendant costs associated with software failure is well proved by the successful
acceptance test.Testing is the process by which a developer will generate a set of
test data,which gives maximum probability of finding all types of errors that can
occur in the software.
In this software Online Bank Transaction System the errors, that can creep in the
client/server system due to its distributed nature, are offset by its unique design. The
software Net Banking has under gone rigorous testing strategies after development of
the software.
The standard test done on newly developed software are Unit testing, Integration
testing, White Box, Black Box testing and finally Acceptance testing and this software
has passed all the above tests. Test at site is also proposed as the ‘pre-commissioning
tests’ in the section System implementation.
Unit Testing
In computer programming, unit testing is a procedure used to validate that individual
units of source code are working properly. A unit is the smallest testable part of an
application. In procedural programming a unit may be an individual program, function,
procedure, etc while in object-oriented programming, the smallest unit is a method; which
may belong to a base/super class, abstract class or derived/child class.
The primary goal of unit testing is to take the smallest piece of testable software in the
application, isolate it from the remainder of the code, and determine whether it behaves
exactly as expected. Each unit is tested separately before integrating them into modules to
test the interfaces between modules.
26
The smallest piece of testable software in each module is taken, isolated it from the
remainder of the code, and determined that it behaves exactly as expected. Each unit is tested
separately before integrating them into modules to test the interfaces between modules.
Integration Testing
Integration testing, also known as integration and testing(I&T),is a software
development process in which program units are combined and tested as groups in multiple
ways. In this context, a unit is defined as the smallest testable part of an application.
Integration testing can expose problems with the interfaces among program components
before trouble occurs in real world program execution. Integration testing is a component of
Extreme Programming (XP), a pragmatic method of software development that takes a
meticulous approach to building a product by means of continual testing and revision.
Integration testing is performed on the software. The units that have already been
tested are combined into a component and the interface between them is tested. Integration
testing identifies problems that occur when units are combined.
White-Box Testing
White-box testing, sometimes called glass-box testing, is a test case design method
that uses the control structure of the procedural design to derive test cases. White box testing
is a security testing method that can be used to derive test cases. White box testing is a
security testing method that can be used to derive test cases. White box testing is a security
testing method that can be used to validate whether code implementation follows intended
design, to validate implemented security functionality, and to uncover exploitable
vulnerabilities. Using white-box testing methods, the software engineer can derive test cases
that(1)guarantee that all independent paths within a module have been exercised at least once,
27
(2)exercise all logical decisions on their true and false sides,(3)execute all loops at their
boundaries and within their operational bounds, and (4)exercise internal data structures to
ensure their validity.
White-box testing is performed on the software. Source code is analyzed carefully and
it is ensured that code implementation followed intended design.
There are many benefits to white box testing, including the following:
1.Analyzing source code and developing tests based on the implementation details enables
testers to find programming errors quickly.
2. Executing some (hard to set up) black box tests as white box tests reduces complexity in
test setup and execution.
3. Validating design decisions and assumptions quickly through white box testing increases
effectiveness.
4. Finding “unintended” feature can be quicker during white box testing.
In this project Online Bank Transaction System White Box testing is passed to
validate whether code implementation follows intended design and flow of control is
intact as contemplated by the designer- e.g , when the user applies his account no with
password he can access to of all his banking facilities with accurate flow of control.
Black-Box Testing
Black box testing is a testing strategy, which does not need any knowledge of internal
design or code etc. As the name “black box” suggests, no knowledge of internal logic or code
structure is required. The types of testing under this strategy are totally based/focused on the
testing for requirements and functionality of the work product/software application. Black
box testing is sometimes also called as “Opaque Testing”,” Functional/Behavioral testing”
and “Closed Box testing”.
Black box testing takes an external perspective of the test object to derive test cases.
These tests can be functional or non-functional, though usually functional. The test designer
selects valid and invalid input and determines the correct output. There is no knowledge of
the test object’s internal structure.
28
This method of test design is applicable to all levels of software testing; unit,
integration, functional, system and acceptance. The higher the level, and hence the bigger and
more complex the box, the more one is forced to use black box testing to simplify. While this
method can uncover unimplemented parts of the specification, one cannot be sure that all
existent paths are tested.
Black box testing is performed on the software. Inputs are applied and obtained outputs are
compared with the expected results. Software is tested using other people and data outside of
the specified input range should be tested to check the robustness of the program.
User Acceptance Testing is often the final step before rolling out the application.
Usually the end users who will be using the applications test the application before
‘accepting’ the application. This type of testing gives the end users the confidence that the
application being delivered to them meets their requirements. Before the user Acceptance
testing can be done the application is fully developed. Various levels of testing (Unit,
Integration and System) are already completed before User Acceptance Testing is done. As
various levels of testing have been completed most of the technical bugs have already been
fixed before UAT.User acceptance testing is performed on the software and the acceptance of
the software by its clients lead to the success. User is ensured that the software that is
delivered to them meets all their requirements. In this project ‘Net Banking’ keen attention
is given for imparting client-satisfaction by achieving error free operation with top
system security features contemplated in Banking sector and with minimum down
time.
29
CHAPTER VII
7. SYSTEM IMPLEMENTATION
Implementation is the stage in the project where the theoretical design is turned
into a working system. It is crucial phase in a software development cycle for
introducing the new system design. Implementation simply means converting a new
system design into operation.
There are two styles of implementation of this software Online Bank
Transaction System:
1.Implementation of the new software by replacing the manual system. The
problems encountered are file conversion ,user training etc.
2. Implementation of the new software replacing the existing computerized
system. This is usually a difficult process.
The following are the activities in connection with the implementation stage:
File conversion:
It is a process of converting the files in the old system to the new system.It invoves
collecting data and creating computer files from existing files.Changes are mainly
happening in the data processing areas.It ranges from initial input to the output it
produces,after processing.The existing system contains a lot of files,of these some of
them may be needed in the new system.So the first step is to identify the files
which are to be transferred from old system.In the next step specify the data to be
converted into the system to determine the files to be transferred.
30
Data entry and audit control should be done properly. Otherwise,chance for errors in
the system will be more.Care should be taken to ensure that only legal data are
entering into the system .An audit control trail helps to determine frauds and mistakes.
Neccessary security should be provided to prevent the accidental loss of information.
Testing at site:
Testing of programs can be done using a test file.This file is created in the old
system,then copied to the new system and used for program testing.It should offer
predictable results,previously determined output results,error handling routines and
printed results.Selection of the best records for testing is handled by the user.
The analyst decides how program testing should be done,for instance which module
should be tested first.
User Training
User should be trained to use the system efficiently.For scheduling a training
program the main points that should be considered are user capability and nature of
systems.
Training elements:-
1.Fact sheets:-
It is a one page summary of important functions about the software Net Banking.It
provides a meaning of codes and information required to start the system.The user
can refer the fact through out the life of the software.
2.Training demonstrations:
Live demonstration is a good method to learn a concept easily.It is useful to convey
and discuss more information in a limited time.Expert knowledge of the software
Online Bank Transaction System and advanced planning and organization of referenced
materials,procedures and technology are required.
Resident expert:
He shall be well trained in the software ‘Online Bank Transaction System’.
31
CHAPTER VIII
8.SYSTEM MAINTENANCE
32
3.Perfective maintenance includes modifying programs to achieve the users or
changing needs.it is more costly and time consuming than above two types.
Security Measures
Any system developed should be secured and protected againstpossible
hazards.Security measures are provided to prevent unauthorized access of the database
at various levels. An uninteruupted simple security should be provided so that power
failure or voltage fluctuations will not lose the data in the file.
System security refers to the technical innovations and procedures applied to the
hardware and operating system to protect against deliberate or accidental damage from
defined threat.
Passsword protection and simple procedures to prevent the unauthorized access are
provided to the users.The system allows the users to enter into the system only
through proper username and password.
Data privacy and security are issues that go beyond the scope of system
development.An organization that depends heavily on the issue of database requires
special controls to maintain viable information.These controls are classified into two
general categorized.
1.Physical security or protection from fire,fllod,and other physical damage.
2.Database integrity through passwords,encryption and monitoring users on a regular
basis.
33
CHAPTER IX
9. FUTURE DEVELOPMENT
Day by day trends in the IT industry are changing rapidly.So software developers
must be able to cope up with the growing trends of the banking sector.The present
system is developed in such a way that it will be able to undergo future
enhancements in a simple.reliable,secure and efficient manner.
If any development is necessary for the software in future,it can be done without
affecting the design by adding modules to the system.New functions and activities can
be added to the software to enhance the capacity.
Here in this project ‘Net Bankoing’ uses HTTP protocol.But it can be enhanced using
HTTPS (Hyper Text Transfer Protocol Secured).Here data transfers,account
registration,ATM request etc. are transferred as plain text,where as it is transferred as
encrypted format in this software.
This project has been completed in partial fulfillment and it came as a success in
satisfyimg requiremants to great extent.
34
CHAPTER X
10. CONCLUSION
As a part of the project a detailed study has been made about the designing and
development aspects of the project ‘Net Banking’ which is an opening to the
competent world of computerizations.The study has given a deep insight to the
current trends and methodologies in the banking sector.
The objectives of the project are to substitute the existing computer aided non online
system to fully computerize online system.I have tried my level best to achieve all the
goals and I am proud to fulfill user satisfaction.The project has to meet all the
requirements that were collected duringanalysis and design phase.
35
11.BIBLIOGRAPHY
BOOKS:
1. ELEMENTS OF SYSTEM ANALYSIS, Fourth Edition,Galgotia Book
source,2002 by Marvin Gore,John.W.Stubbe
2. SOFTWARE ENGINEERING,Third Edition,McGraw Hill International, by
Roger.S.Pressman
3. OBJECT ORIENTED PROGRAMMING IN C#,by Donal Laffery &
Vinny Cahill
4. SYSTEM ANALYSIS AND DESIGN by Kennath.E.Kendall&
Julie.E.Kendall
5. ASP.NET 2.0 with C#- Chris Hart ,John Kauffman ,David Sussman
WEBSITES:
www.JISC infoNet.com
www.wikipedia.com
www.business directory.com
www.bitpipe.com
www.worldstart.com
www.computerworld.com
36
12.APPENDIX
Form Name : User Account Details
37
Form Name : Account Request
38
Form Name : Account Details
39
Form Name : ATM List
40
Form Name : Change Password
41
Form Name : Fund Transfer Details
42
Form Name : Loan Details
43
ADMINISTRATOR’S FORMS
Form Name : Login Form
44
Form name : ATM Application
45
Form Name : Bank contact Details
46
Form Name : Deposit Details
47
FORM NAME : FUND TRANSFER
48
FORM NAME : HOME LOAN
49
FORM NAME : USER LOGIN
50
FORM NAME : USER REGISTRATION
51
FORM NAME : DEPOSIT FORM
52
FORM NAME :WITHDRAWAL FORM
53
FORM NAME : VIEW BANK ACCOUNTS
54
<%@ Page Language="C#" MasterPageFile="~/MasterPage.master" AutoEventWireup="true"
CodeFile="Home.aspx.cs" Inherits="e_Business" Title="Welcome to Distibuted data mining" %>
<tr>
<p class="MsoNormal"
style="margin: 0in 0in 0pt; mso-layout-grid-align: none; height: 81px; width: 980px;">
entities that perform some set of tasks on behalf of users with some degree of
a certain amount
of</span>
</p>
</p>
<p class="MsoNormal"
55
style="margin: 0in 0in 0pt; mso-layout-grid-align: none; height: 409px; width:
870px;">
</p>
<p class="MsoNormal"
</p>
<p class="MsoNormal"
</span>
</p>
<p class="MsoNormal"
</p>
<p class="MsoNormal"
</p>
<p class="MsoNormal"
</p>
</p>
</p>
56
<p class="MsoNormal" style="margin: 0in 0in 0pt; mso-layout-grid-align: none">
</p>
computing and communication over wired and wireless networks have resulted in
distributed applications. The held of distributed data mining (DDM) deals with
<o:p></o:p>
</span>
</p>
</asp:Panel>
</td>
</tr>
<tr>
</td>
</tr>
57