This action might not be possible to undo. Are you sure you want to continue?
We wish to express our heart-felt thanks to everyone who helped us to complete this project. We would like to thanks Mr ASHWANI KUMAR for providing us the opportunity to undertake our MCA Project. Everyone knows that efficient work is nothing but mutual coordination between two or more people. For us it was very difficult to make a real time project without the help of people surrounding us. We are extremely thankful to CMC LIMITED, NOIDA for providing us the project in their organization between the environments of project work. We would like to express gratitude towards Mrs. (Project Coordinator) and Mrs. Neetu ma’am(Trainer) for their logistic help. With the help of scientific people it is very easy to complete our project under these people in the organization. We would like to thank our parents for their moral support. Last but not least, thanks to the almighty that was always with us.
Table Of Contents
1. Organization Profile……………………………………..7-12 pages. 2. Abstract ………………………………………………….13-14 pages. 3. Modules………………………………………………….15-18 pages.
Administration Module In-house fabrication Module External large fabrication Module Existing System………………………..19-20 pages. Problem Domain……………………….21-22 pages. Proposed System……………………….22 page. Snapshot to MS Visual Studio .NET…..23-25 pages. System Requirement………………….. 25-26 pages. Feasibility Study……………………….27-32 pages.
3.3 External small fabrication Module
4. System Analysis ………………………………………….19-32 pages. 4.1 4.2 4.3 4.4 4.5 4.5
5. System Design……………………………………………33-76 pages.
5.1 System Design………………………... 33-38 page. 5.2 DFD (Data Flow Diagram)…………...39-49 pages. 5.3 ER-Diagrams………………………… 50-52 pages. 5.4 Table Description ………………………55-57 pages. 5.5 Data Modeling ………………………58-59 pages. 5.6 Data base Design …………………….60-76 pages. 5.7 Layout Design ……………………….77-96 pages.
11.1 Introduction…………………………….6. 10. 4 . Testing …………………………………………………. Security Measure & Maintenance.116-118 pages. 7.. 9. Conclusion…………………………………………………111 page.. Appendix…………………………………………………. 8.106-108 pages... System Implementation. Bibliography………………………………………………112 page..2 Test Strategy…………………………. Future Scope………………………………………………109-110 page.97-105 pages. 6. 6. Glossary………………………………………………….113page 12.
We are a part of the Tata group. services and business process outsourcing organizations. India's best-known business 5 . one of the world's leading information technology consulting.COMPANY PR@F!LE CMC Limited is a leading IT solutions company and a subsidiary of Tata Consultancy Services Limited (TCS Ltd ).
CMC Americas. In 1993.69 per cent of CMC’s equity to the General Insurance Corporation of India and its subsidiaries who. we acquired Baton Rouge International Inc. Africa and the Middle East.000 employees worldwide. The Government of India held 100 per cent of the equity share capital. As a part of the TATA group. sold part of their stake to the public in 1996. in turn. as the ‘Computer Maintenance Corporation Private Limited’. Following a spurt in the global demand for IT services in the early 1990s. Towards this end. CMC was incorporated on December 26. we perceived the need for total IT system solutions in India. we provide a wide spectrum of unique information technology solutions and services to a clientele of premier organizations in the government and private sectors. particularly in the United States. CMC took over the maintenance of IBM installations at over 800 locations around India and. 1975. 6 . services clients in the US. CMC’s shares were listed on the Hyderabad Stock Exchange and the Bombay Stock Exchange (BSE). maintenance of computers supplied by other foreign manufacturers as well. in 2003). the Indian government divested 16. In 1992. In 1980. we decided to expand our operations and market our product and service offerings in these markets. USA (it was subsequently renamed CMC Americas. one of the first cross-border acquisitions by an Indian IT firm. Inc.With 18 offices. To reflect our diversified business activities. 520 non-resident locations and over 3. it was converted into a public limited company. and acquired a ‘solutions’ orientation. when IBM wound up its operations in India. we renamed ourselves ‘CMC Limited’. we will align ourselves with the TCS vision: To be among the Global Top 10 by 2010. 1977. while our branch offices in the UK and Dubai market our products and services in Europe. our subsidiary. On August 19. We aligned our focus with the government’s thrust on IT development activities. in 1991. 1984. subsequently. In 1978. and obtained a fresh certificate of incorporation dated August 27. 150 service locations.
services and business process outsourcing organizations. 150 service locations. services clients in the US. our subsidiary. The next year. and CMC became a part of the TATA group. the government divested 51 per cent of CMC’s equity to TATA Sons Ltd. India’s best-known business conglomerate. we provide a wide spectrum of unique information technology solutions and services to a clientele of premier organizations in the government and private sectors.To service and develop our clientele in the UK and Europe. in 2000. CMC Americas. while our branch offices in the UK and Dubai market our products and services in Europe. Service Offering Data warehousing Education and training Event management Infrastructure development IT-enabled services Networking Software development Systems and hardware Systems study & design Systems integration Turnkey projects 7 . With 18 offices. we opened a branch office in London. Africa and the Middle East.000 employees worldwide. through a strategic sale. one of the world’s leading information technology consulting. We are a part of the TATA group. Corporate profile CMC Limited is a leading IT solutions company and a subsidiary of TATA Consultancy Services Limited (TCS Ltd). 520 non-resident locations and over 3.
WE OFFER WE OFFER: 8 .
Large and complex project management capabilities End-to-end solutions capability Extensive domain expertise and technological competencies Sizable resource pool with diverse skill sets Strong customer relationships Strong service delivery chain Large and complex project management capabilities End-to-end solutions capability Extensive domain expertise and technological competencies Sizable resource pool with diverse skill sets Strong customer relationships 9 .
About Project ABSTRACT About Project 10 .
In the world of this competitive environment and Technological development. The database connectivity is planned using the “SQL Connection” methodology. The standards of security and data protective mechanism have been given a big choice for proper usage. the banking infrastructure involves many different technologies in electronics (smartcards.E-banking is one of the most challenging tasks in computer science for many reasons. Second. Through E-Banking the Bank wants to introduce the core concept of IT based Enabled Services (ITES). networks. The application takes care of different modules and their associated reports. the number of end-users of this complex system is extremely high as e-payment concerns the whole world.. the bank has been totally computerized in the last 3 Years. Finally.. – is not very accessible.Net technologies. We can also identify many problems that limit some new developments and evolutions in the e-banking domain.). First. As a result it does not facilitate the global evolution of the e-banking chain. with this concept the bank wants to move very nearer to the customers and increase its basic operational strategies. Using the constructs of MS-SQLServer2005 and all the user interfaces has been designed using the ASP. The E-Banking is an application that has been developed for a well-established Bank... The industrial community in this area – banks. smartcards manufacturers. and to increase its customer base has started planning. Each manufacturer of an e-banking component has a partial knowledge on the global chain. payment terminal) and IT (server. financial transactions must be as secure as possible to limit frauds while providing a fast service to users. 11 . for a concept called as e-banking. Which are produced as per the applicable strategies and standards that are put? Forwarded by the administrative staff.
MODULES 3.MODULES: This project is having three modules: • • • Bank Master Module Transaction Module Reports module 12 .
13 . Customers and not for current account holders. Modifying. Transaction Module: This module deals with different types of transactions such as Deposit.3. Objectives Of The Project: The main objectives of the system is to provide a series of services to the customer through the Internet. Withdraw and Interest calculation related to customer as well as Bank. Deleting Account holder Details. and make the customer feel flexible in calling out simple tasks faster Instead of making visit to the bank every time The E-Banking services are executed only upon the customer. and these e-banking services would fully integrate with the core banking solution that is already in usage. Reports Module: This module deals with generation of reports for customer and Bank such as Daily reports. MODULE DESCRIPTION Bank Master Module: This module mainly deals with creation of new Account i. weakly reports and report for a particular period of time.e. Adding new Account Holders.2. The e-banking service is open only to savings bank. Other activities such as viewing.
Net technologies. manage and control financial transactions. The application takes care of different modules and their associated reports. The project has been planned to be having the view of distributed architecture. with centralized storage of the database.The customer is privileged to use most of the system only as a viewing phase. People use Internet bank to keep eye on their money matters. The details should include branch name and password etc to logon the system Modify the existing details of an office Add the specification of various components for displaying it to the customer Provide pre-defined queries Project organization: Project organization contains following activities which are related to “E-BANKING”: It providing electronic connection between bank and customer in order to prepare. easier and more reliable Services to customers of e-banking. Using the constructs of MSSQLServer2000 and all the user interfaces has been designed using the ASP. The application for the storage of the data has been planned. the only online transactions the customer can do are cheque book requisition and fund transfer among his personal accounts. The administration should include the following Add new branch details to the database. Provide administration to control and monitor various transactions. It providing faster. 14 . The database connectivity is planned using the “SQL Connection” methodology. view Account balance and check receiving payments from other parties. The standards of Security and data protective mechanism have been given a big choice for proper usage.
EXISTING SYSTEM 3. The client is focus problem with the existing system with respective two values.1 EXISTING SYSTEM In the Bank every Activity is handled manually. 15 . such as Opening Account. storing Account holder Details. such as time value and cost value. Transaction Details. The manual system is taken more time and the services to the Customer are slow and not accurate. and Reports Generation.
In addition Multiple users can access it at the same time.The online banking system is designed for financial institutions to deal with their basic banking services. The online banking system provides access 24 hours a day to customers' accounts information. the customers can move funds between bank accounts in a cost-free way According to standard of software industry. transfer funds between accounts and change personal information and passwords. and certificate of deposit accounts quickly and easily without interacting with bank clerks. Therefore customers can enjoy the convenience of financial controls of their accounts through Internet. savings. Any customer is able to scan interest details. rather than personally standing in h e s for ATM or banking clerks. Manual Process → Customer Physically visits the bank → 16 Inquires for an existing service or some specific information . In addition. dong with frequently requested information for checking. the system described above belongs to dynamic Web application. The system allows customers to open accounts. view account balances and statement details.
↓ Leaves ← Associated and integrates the ← the in charge clerk information as needed checks the specification and answer query → Customer → Raises a request for Physically visits the bank checkbook by filling in the Prescribed format ↓ Customer makes a counter sign and receives the cheque book ← The cheque book is send for manage initials ← The in charge clerk accepts the request and prepares cheque book with respect to given specification 17 .
PROBLEM DOMAIN Problem domain: • • In existing manual system. 18 . • • Manually the information may not be as secure as in automated system. Manual system may not handle easily the lot of calculations made during fabrication. it is difficult to maintain a large scale order transactions. In existing manual system huge expenditure and lot of time is spend in communicating the information across the external bank branches & the centralized system.
The system with respect to the necessities can identify all the history details of the trial participants along with their outcome of the results. The transaction service. The system can provide the bank administration with information on the Number of customers who are existing in the system. By introducing Automation system for Banking Information system.2 PROPOSED SYSTEM In proposed system we are concentrating the problems what ever a client faced with existing manual system. He has the right to know the account details of the users and bank reports. The administrator has the right to know everything. The system at any point of time can provide the information related to the executed transactions by the customer. This project is an attempt to make the task of administrator as well as customers easier. 4. The administrators have grates accessibility in collecting the consistent Information that is very much necessary for the system to exist and Coordinate. 6.3. 2. The client is provides fast services to the customer. Features of Proposed system : 19 . report generation service and every service is available at no delay. Requirement analysis is concerned with identifying the basic function of software component in a hardware & software system. The system can provide information related to the different types of accounts that are existing within the bank. 1. 5. The development of the new system contains the following activities which try to automate the entire process keeping in view of the database integration approach. The system at any point of time can give the customers information related To their Accounts and accounts status The balance enquiry the fund transfer standards The cheque book request 3.
Funds management. Quick and continuous access to information. The main benefit from the bank customers’ point of view is significant saving of time by the automation of banking services processing and introduction of an easy maintenance tools for managing customer’s money. All the banking transactions can be performed from the comfort of the home or office or from the place a customer wants to. E-banking facilities speed up cash cycle and increases efficiency of business processes as large variety of cash management instruments is available on Internet sites. The main advantages of e-banking for corporate customers are as follows : Reduced costs in accessing and using the banking services. Corporations will have easier access to information as. Speed. they can check on multiple accounts at the click of a button. Increased comfort and timesaving — transactions can be made 24 hours a day. therefore customers can actually wait till the last minute before concluding a fund transfer. Convenience. Automated e-banking services offer a perfect opportunity for maximizing profits. Better cash management. 20 . • • The main goal of every company is to maximize profits for its owners and banks are not any exception. Customers can download their history Of different accounts and do a “what-if” analysis on their own PC before affecting any transaction on the web. R This is in terms of the cost of availing and using the various banking products and services.There are following Features which are related to provide the E-Banking services for the customers. Project justification: Need for computerization: Project justifies the need of computerization which is used to act as the interface which provides following activities: educed costs. without requiring the physical interaction with the bank. This will lead to better funds management. The response of the medium is very fast.
It provides the security & secure data accessing 3. which provides the common language runtime and unified programming classes. but internet distributed. To provide a code execution environment that eliminates the performance problems of scripted or interpreted environment.NET framework is an integral windows component that supports building and running the next generation of applications and XML web services. 21 . Visual J#. such as Visual C#.net is the tool for rapidly building enterprise scale ASP. as well as number of additional technologies to simplify team.NET framework can integrate with any other code. Visual Basic.NET IT Platform – The Technological Aspect.based design.NET framework is designed to fulfill the following objectives: • To provide a consistent object-oriented programming environment whether object is stored and executed locally. To build all communication on industry standards to ensure that code based on the . To make the developer experience consistent across widely varying type of application.NET web applications and XML web services. and deployment your solutions.net and visual C++ .NET web applications and high performance desktop applications. Visual studio. To provide a code execution environment that promotes safe execution of code. such as windows based applications and web based applications. or executed remotely.Net framework. 3. The .1 INTRODUCTION Visual Studio.3 SNAPSHOT TO MS VISUAL STUDIO .net. including code created by an unknown or semi trusted third party. Security.NET uses this component to create ASP. The .net includes component based development tools. development.ASP. Visual studio supports the Microsoft. • • • • • To provide a code execution environment that minimizes software deployment and versioning conflicts.3.
3. and running XML web services and web applications. while code that does not target the runtime is called unmanaged code.3. 3. deploying. Runtime is an agent that manages code at execution time.NET framework.2 THE .NET framework. The .ASP. On the server the controls expose an object oriented programming model that brings the richness of object oriented programming to the web developer.NET framework is a Multilanguage environment for building.NET includes a set of controls that encapsulate common HTML user interface elements such as text boxes and drop down menus.NET also provides infrastructure services such as session state management and process recycling that further reduce the amount of code a developer must write and increase application 22 . the other main component of the .3. providing a web application model with a set of controls and infrastructure that make it simple to build asp web applications. It consists of 2 parts: 3.NET framework not only provides several runtime hosts but also supports the development of third party runtime hosts.3.3 COMMON LANGUAGE RUNTIME (CLR) The common language runtime is the foundation of the .NET ASP. thread management and remoting while also enforcing strict type safety and other forms of code accuracy that promote security and robustness.NET such as web forms and XML web services. providing core services such as memory management. In fact the concept of code management is a fundamental principle of runtime. The Class library. The .NET framework is a comprehensive object oriented collection of reusable types that you can use to develop applications ranging from traditional command line or graphical user interface (GUI) applications to applications based on the latest innovations provided by ASP. Code that targets the runtime is known as managed code.NET framework can be hosted by unmanaged components that load the common language runtime into their processes and initiate the execution of managed code thereby creating a software environment that can exploit both managed and unmanaged features. These controls run on the web server however and push their user interface as HTML to the browser.NET FRAMEWORK The .ASP.4 ASP.NET builds on the programming classes of the .
It uses various stored procedures as a compiled object. This makes it a good way to store information that needs the ability to change over time. 23 . which facilitates the design and development of database applications. SQL Server 2005 Express is designed to provide an easy-to-use database platform that can be freely distributed with your applications. Organizations that have developed MSDE applications will find it easy to move to SQL Server 2005 Express. 3. SQL is a query language that is used to interact with the database. In addition ASP. It replaces MSDE (Microsoft SQL Server 2000 Desktop Engine). Information stored in a SQL Server 2005 database hosted on a web server can be accessed from anywhere in the world with a computer.5 SQL Server 2005 • • • • • SQL SERVER 2005 is a Microsoft Product that is Software used to provide service that deals with the database. It can be accessed by most programming languages. • • • • • SQL Server has some differences from Oracle 9i such as the unique key can have at most one null value here. SQL Server 2005 Express is the free version of the Microsoft SQL Server 2005 database. Like MSDE. Some examples that can utilize SQL Server 2005 are a web message board or a customer's shipping status.3.NET uses these same components to enable developers to deliver software as a service.NET infrastructure to deliver that service via SOAP. but also needs to be accessed over the net. • • SQL Server 2005 Express is integrated with Microsoft Visual Studio.reliability. Using XML web services features we can write our own business logic and use the ASP. which was based on Microsoft SQL Server 2000. SQL Server 2005 Express includes the new SQL Server 2005 database engine enhancements and a new graphical user interface (GUI) tool called SQL Server 2005 Management Studio Express Edition.
and simplified deployment of applications. These changes have resulted in a number of important differences between SQL Server 2005 Express and MSDE. SQL Server 2005 Express has a number of important advantages over MSDE. XML data support. such as visual configuration tools.• • It is easy to move your MSDE applications to SQL Server 2005 Express. Some of these advantages are: • • • • Increased Maximum Database Size New Data Types SQL Service Broker Reporting Services 24 .
SYSTEM REQUIREMENT 25 .
The administration components are useful is managing the actual master date that may be necessary the maintain the consistency of the system. GUI’S In the flexibility of the uses the interface has been developed a graphics concept in mind. The GUI’S at the top level have been categorized i. The different parts of the present model were checked with three criteria in mind and overall it has been considered as a workable and balanced solution and would not be obsolete in very near future. Account Holder interface The Administration users interface concentrate on the consistent in that is practically part of organizational actuaries and which needs proper authentication for date collation.The total number of databases that were identified to build system is 17. Administration users interface ii. These interfaces to the visitors with all the transactional states lute date in date deletion and date updation only with the Date search capabilities. These databases purely used for the internal organizational needs and necessities. The balance was sought between technology and the real environment 27 . The customer’s components are scheduled accept parametrical information from the uses as per the system necessity. The customer interfaces also help the ordinary users in managing their own information. The Account holder interface helps the ordinary website visitors is transacting through the required services that provided upon the site. associated through a browses interface. The uses of customer components are designed to handle to transactional states that arises upon the system whereas customer makes a visit onto the portal for the same of a product purchase. The major parts of the databases are categorized as administration components and customer of based components.
5. Major benefits expected from this system are • • • • Increased speed of work with many of the mundane task being automatically done leaving more Less time consuming or in other words say that there is no time consuming to see the appropriate More accurate. 28 .3. COST SAVING BENEFITS This project reduces the administrative and operational cost. No extra software or hardware needs to be acquired because they already have the system and other relevant software. the new system is very much economically feasible. IMPROVE INFORMATION BENEFITS It provides better information in the stipulated space and time for decision-making. IMPRPVE SERVICE . As the benefits expected far outweigh the cost to be incurred.LEVEL BENEFITS Proposed system improves the system’s performance because the current system is based on manual processing while the proposed system is based on computer processing. Because of the reduction in the use of paper. computers are less prone to error than the human being.1 ECONOMIC FEASIBILITY The organization is fully capable of arranging all the basic software according to the requirement. More flexible. the cost also reduces. Certainly. The benefits of this project include four types: time for other things. reports as compare it with the manual system.
It is really time consuming and margin of error is more. which is currently working in the market.TIME SAVING BENEFITS It saves lots of time and provides the same result in a far lesser period of time. Yes. are done by manuals. • • Hardware: Hardware selected has been examined against the processing capacity. the current available personnel can develop this system but special training should be given to those personnel to improve their skills. filling. 29 . transactions.2 Technical Feasibility Meaning: Can the work for the project be done with current equipment existing software technology and available personnel? If new technology is needed. Yes new technology or software. memory requirement for current as well as near future workload.5. entries. is to be needed to develop this system. It can be developed easily with this software and for a long term it is working effectively and margin of error is less. what is the likelihood that it can be developed? Reply: In this project the work cannot be done by the current system because currently all the records. and the Software: Cost benefit analysis for this part was some challenging. 3.
Operational Feasibility: The project is easy to operate and it has a user-friendly interface. Feasibility Considerations: The analyst must consider the following feasibility step by step-Economic feasibility. 6. Time feasibility.Provide facility to transfer account within one workshop and from one workshop to another bank. If benefits outweigh costs. cash book. The most successful system projects are not necessarily the biggest or most visible in a business but rather those than truly meet user expectations. It is easy for the staff to adapt and use according to the proposed system.Provide facility for client to see the mail and send mail. A ready willingness is shown by the staff and the customer to use the proposed system. 5. cards. further justification or alternative in the proposed system will have to be made if it is to have a change of being approved. 3. Current Issues The current issues involve the following factors. the procedure is to determine the benefits and savings that are expected from a proposed system and compare them with costs. 1. 7.Provide facility to client for recruitment in organization. The working staff of the company can be trained easily. Economic Feasibility: Economic analysis’s most frequently used technique for evaluating the effectiveness of a proposed system.Provide facility to do registration for account management 2. Social Feasibility.Provide facility to request for the checkbook. a decision is taken to design and implement the system otherwise. Need Analysis: In need analysis the following factors are considered.FEASIBILITY STUDY Many feasibility studies are disillusioning for both users and analysts. 4. 30 .Provide facility for employee for sorting the request. Behavior Feasibility. Hence the system is operationally feasible. Management feasibility. Before the development of the Project titled “E-BANKING” the need to study the feasibility of the successful execution of the project was felt and thus the following factors are considered for a feasibility study.Provide facility for the last transactions. Operational Feasibility. More commonly known as cost/benefit analysis. Legal Feasibility. This is an ongoing effort that improves in accuracy at each phase of the system life cycle.
FEASIBILITY STUDY DOCUMENTATION 31 .
This Project aims the creation of a secure “E-BANKING” System which is accessible to all the customer of bank.The designed software is Web based application.HTML.NET. Latest technologies should be preferred. Management Summary and References: Important Findings: . Implementation environment: -ASP. Evaluation of Technical Risk: Since the technical team is efficient and the project though little bit complex there is maximum probability of execution of this project within stipulated time.This software will be very useful especially for bank & financial Managements Interface. 32 .This project is completed. Impact: . System Description: SQL Server is required Feasibility of allocated elements: .Feasibility Study Documentation Introduction: . Comments: .The software can be installed at Server and can be made available at different nodes. Recommendations:At least four persons should work on the entire project. Constraints: .SQL SERVER.The impact of the software will be immense and effective for the Administration as well as the client due to the flexibility in maintaining data.
DESIGN 33 .
They are there. The following are the contents of the data stores: Physical Objects: Login Form Registration Form Request Form The characteristics of each group mentioned above are listed one by one. Data Centered Approach. There are two main approaches to design: 1. Logical Design deals with aspects of design which can be implemented on any operating environment i. the output of logical design is implemented using the features of a particular environment. 2. These objects are inline with real life objects. In physical design. but processes cannot be touched or felt. In System Design phase the emphasis will be on how to do what a system should do.1 SYSTEM DESIGN In Analysis of the System. we have seen what a system should do.4. The principle of Object Oriented Design (OOD) is adapted where designing is defined as a collection of data and its associated characteristics (processes) as objects. Process Centered Approach The present project is designed based on Data Centered Approach as the modern school of thinking on this subject is that if data is organized effectively the processes can always be designed in such a way that the data is made available to them. Logical Design: Data Structured approach is being adapted since data can be associated with physical structures which can see and feel and it is therefore logical to start with data rather than processes which are invisible--. 34 .e. one need not know on which machine or operating system or database the system is going to be working.
DESIGN OF PROCEDURE DESIGN OF PROCEDURE 35 .
-The design should exhibit uniformity and integration. not after the fact. coding is not design. Independence is measured using two qualitative criteria: Cohesion and Coupling. -The design process should not suffer from “tunnel vision”.Cohesion is the measure of functional relatedness of elements within single module. -The design should not reinvent the wheel -The design should “minimize the intellectual distance” between the software and the problem as it exists in the real world. even when aberrant data. -The design should be assessed for quality as it is being created. COUPLING: 36 . modules are divided into a series of activities such as that the output of one module becomes the input to the next module and the chain continue.Software design is both a process and a model. -The design should be reviewed to minimize conceptual (semantic). Cohesion is a measure of the relative functional strength of a module. -The design should be structured to accommodate change. requiring little interaction with procedures being performed in order parts of a program . When dividing a system into modules. it must be ensured that the activities within the module are tightly bound to one another. -The design should be traceable to the analysis. Coupling is a measure of the relative interdependence among modules. events. -Design is not coding. There are some principles of software design. Basic design principles enable the software engineer to navigate the design process. or operating conditions are encountered. -The design should be structured to degrade gently. In Functional Cohesion. The design process is a sequence of steps that’s enable the designer to all aspects of the software to be built. Cohesion can be viewed as opposite of coupling. COHESION A Cohesion module performs a single task within a software procedure. all activities in the module are functionally related or they perform a similar function whereas in Sequential Cohesion.
the degree of coupling is low. -Data Coupling -Stamp Coupling -Control Coupling Data Coupling: In Data Coupling data is passed across modules through parameters. The overall objective is to keep the degree of coupling as low as possible. Process Flow 37 . Trainee Management System.Coupling is a measure of interconnection among modules in software structure. This is achieved by eliminating unnecessary relationships -By reducing the number of necessary relationships. and what data pass across the interface. If there is lot of dependence across modules. to reduce the degree of coupling between modules. In. In Trainee Management System Normal Coupling is used. data is passed across modules through parameters. Coupling depends on the interface complexity between modules. -By increasing the flexibility of necessary relationships.e. Data can be passed across modules in one of the three ways. the Functional Cohesion is coupled with functional cohesion in order to achieve best form of cohesion. The main criteria for deciding the modules from technical angle are to reduce the interdependencies between different modules i. In Normal Coupling. then the degree of coupling is high while if the dependencies between modules are far and few. the point at which entry or reference is made to a module. These parameters are basically elementary form of data. In the project Data Coupling is used.
Projects. Inet User can change their address. and Modules etcThis process is as below: At start up the Welcome Page will open that will send user to Home Page.Registration Form Will be available on the Home page. In Corporate Login part Only Employee of the Bank who has the Corporate Id can login Employee with corporate Id has authority to deny the request. INet User can do online transaction.static information of organization.send approval of request and vacancies of bank to the inet user by mail. In Home Page all the basic link will be available like login for customer/corporate. 38 . Corporate User has the facility to delete the record of any customer and can also see the report. balance of their account. e. cards .t.c If visitor wants to do registration for Inet Id . sorting of request of visitor and customer.A defined process is followed for the module activities that include Addition of new Member (either Guide or Trainee).c if the user has Inet Id he/she can enter in her/his account by the customer login page. request for cheque book.Recruitment. see the last transaction.t. Inet user has their own mailbox in which they can see their mails regarding to their request. e.Request form. bank jobs and schemes and advertisement of bank.
DATA FLOW DIAGRAM 39 .
Client act the source as all the request are generated by him. The DFD is intended to represent information flow but it is not a flowchart and is not intended to indicate decision-making. It may be further refined at preliminary design stage and is used as mechanism for creating a top level structural design for software. With the help of DFD we can identify the current information structure of the system. loops and other procedural aspects of the system. The record is held in the storage spaces depict by partially open rectangle. we redirect the flow of the information to make the system more efficient.2 DATA FLOW DIAGRAM The data flow diagrams depict the flow of the information within the system. DFD is a useful graphical tool and is applied at the earlier stages of requirements analysis. Arrows within the DFD show the flow of the information form one processing point to another. DFD is quit important as its records in a pictorial form all the information flow within the system.4. The structure of the system can thus be analyzed and it helps in making improvement within the current system. flow of control. The system and its user act as sink with all the information following into them. We can group a few processing sites together or reduce expenditure. 40 .
Data Flow Diagram 1: Level Zero DFD Server Database Retrieve User (id and password holder) Input Id/ Password E-Banking System Server Application Data Administrator 41 .
2: Level One DFD Server Database Server Database User Input ID /Password Authenticatio n Login Welcome Page Request Services 42 .
3: Level Two DFD Accounts Login Check A/C Status Change Password Change Password Authorized User DATABASE Provide Security Details Fund Transfer Cheques-book Request entry Security Cheques-Book Request Transfer 43 .
E-R DIAGRAMS 44 .
which are now considered as the standard form of representation.5. precise description that can be implemented in a DBMS.3. which describe the entity. 45 . These are the enhancements made to the ER diagrams that are widely used. The ER model describes the relation ship between various entities based on some relation ship. which is showed by a rhombus describing the relationship. The entities are related based on an attribute. The one represented here are URL diagrams. It provides useful concepts that allow us to move from an informal description of what users want from their database to a more detailed. Each entity will have a set of attributes. E-R DIAGRAMS The ER data model allows us to describe the data involved in the real world enterprise in terms of objects and is widely used to develop an initial design.
CUSTOMER Use r Pass wor d Cust_i d A/c type min_bal max_ba l Customer 1:n has m Has Account 1:nPerfo rms 1:nThroug h Transaction a/c no Amount Tr_id Tr_type 46 .
User_id Passwor d
User_ id Userna me Passwor d A/c no 1:nDes ign
1) Table Name: Column Name Bank_id Bank_name Bank_add 2) Table Name: Column Name Branch_id Branch_name Branch_add 3) Table Name: Column Name Bank_id Branch_id bank_master DataType int varchar(12) varchar(20) branch_master DataType int varchar(12) varchar(20) bank_branch DataType int int Constraints foreign key foreign Constraints primary key Constraints primary key
4) Table Name: Column Name Cust_id Cust_name Cust_add Cust_phone Cust_email
customer_details DataType int varchar(12) varchar(12) varchar(10) varchar(20) Constraints primary key,identity
5) Table Name: Column Name Cust_id Password FAQ Transpass Countno First_time_login
user_login DataType int varchar(10) varchar(50) varchar(20) int datetime Constraints foreign key
6) Table Name: Column Name
customer_acc_details DataType number(18,0) int int int datetime int nvarchar(20) varchar(20) varchar(20) varchar(20) Constraints primary key, identity foreign key foreign key foreign key
Cust_acc_no Cust_id Acc_branch_id cust_acc_type_id acc_opening_date acc_opening_bal current_bal acc_nominee_name nominee_relation_with_cust nominee_add
7) Table Name: Column Name Acctype_id Acc_name Acc_minbal Acc_maxbal
acctype_master DataType int varchar(20) int int Constraints primary key, identity
identity 9) Table Name: Column Name Trans_id Cust_acc_no Trans_type_id Trans_date cust_trans DataType int int int datetime Constraints primary key. identity foreign key 50 .8) Table Name: Column Name Trans_type_id Trans_type_name transaction_type DataType int varchar(20) Constraints primary key.
DATA MODELING 51 .
They should not be read like data flow diagram or flow chart.5. the entities of the system have been identified and taken tables have been constructed to represent each identity. • Second. the relationship between the entities has been identified and then current tables have been extended and new tables have been created to represent these relationship. the attributes of each entity have been identified and then the tables have been extended to include these attributes. • Third. Entity relationship Diagram does no depict flow or processing. The application of E-R Model has including the following steps: • First.4 DATA MODELING Implementation independent models are usually called logically models. This contrast some what with data flow diagram. which for most part illustrate data in motion.1 Entity Relationship Diagram Any Entity relationship diagram illustrate “Data at rest”. used or deleted.3. Data modeling has evolves into a logical system analysis technique can component process models (Data Flow Diagram ). 52 . 4. Data modeling is a very popular logical modeling technique. E-R Diagrams do not imply how that is implemented. Numerous data modeling technique exist but most popular is the Entity Relationship Diagram. modified. created.
DATABASE DESIGN 53 .
LAYOUT DESIGN 70 .
SECURITY AND CONTROL (TESTING) 91 .
Psychology of Testing The aim of testing is often to demonstrate that a program works by showing that it has no errors. if it exists. The results of testing are used later on during maintenance also. Stating formally. A good test case is one that has a high probability of finding error.Testing Testing is the process of detecting errors. Hence one should not start testing with the intent of showing that a program works. Testing Objectives The main objective of testing is to uncover a host of errors. Testing is the process of executing a program with the intent of finding errors. Testing is a process of executing a program with the intent of finding an error. The basic purpose of testing phase is to detect the errors that may be present in the program. Levels of Testing In order to uncover the errors present in different phases we have the concept of levels of testing. but the intent should be to show that a program doesn’t work. systematically and with minimum effort and time. The basic levels of testing are as shown below 92 . The tests are inadequate to detect possibly present errors. A successful test is one that uncovers an as yet undiscovered error. Testing performs a very critical role for quality assurance and for ensuring the reliability of software. The software more or less confirms to the quality and reliable standards. we can say.
every path is tested. Test cases are devised with this in mind. To follow this method we developed some test data that resulted in executing every instruction in the program and module i.Client needs nneeds Acceptance Testing Requirement s System Testing Integration Testing Design System Code testing is Unit Testing Testing The philosophy behind to find errors. Code Testing: This strategy examines the logic of the program. Systems are not designed as entire nor are they tested as single systems. A strategy employed for system testing is code testing.e. Types of Testing Unit Testing Link Testing 93 . To ensure that the coding is perfect two types of testing performed or for that matter is performed on all systems.
There are so many modules like Login. The goal here is to see if modules can be integrated properly. Link Testing Link testing does not test software but rather the integration of each module in system. length. BankAdmin.e. In this application developer tests the programs up as system. New User e. This testing activity can be considered as testing the design and hence the emphasis on testing module interactions. The primary concern is the compatibility of each module. When Integrating all the modules I have checked whether the integration effects working of any of the services by giving different combinations of inputs with 94 . Software units in a system are the modules and routines that are assembled and integrated to form a specific function.c. type etc.Unit Testing Unit testing focuses verification effort on the smallest unit of software i. Integration Testing After the unit testing we have to perform integration testing. In this project integrating all the modules forms the main system. Through this errors resulting from interaction between modules initially avoided. Giving different sets of inputs has tested each module. the module. Using the detailed design and the process specifications testing is done to uncover errors within the boundary of the module. independent of one another to locate errors. In this project each service can be thought of a module.t. When developing the module as well as finishing the development so that each module works without any error. The inputs are validated when accepting from the user. the emphasis being on testing interfaces between modules. Transactions . The Programmer tests where modules are designed with different parameters. Unit testing is first done on modules. All modules must be successful in the unit test before the start of the integration testing begins. This enables to detect errors.
which is used to check all possible combinations of execution paths through the code at every module level. 95 . taking care that every statement in the code is executed at least once. Testing here is focused on external behavior of the system. Here entire ‘E-Banking’ has been tested against requirements of project and it is checked whether all requirements of project have been satisfied or not. and the goal as to see if software meets its requirements. The reference document for this process is the requirements document. The white box testing is also called Glass Box Testing. In this project ‘Banking Management Of Database System’ I have collected some data and tested whether project is working correctly or not. sample data. White Box Testing This is a unit testing method where a unit will be taken at a time and tested thoroughly at a statement level to find the maximum possible errors. Test cases should be selected so that the largest number of attributes of an equivalence class is exercised at once. Acceptance Testing Acceptance Test is performed with realistic data of the client to demonstrate that the software is working satisfactorily. The testing phase is an important part of software development. I tested step wise every piece of code. the internal logic of program is not emphasized.which the two services run perfectly before Integration. I have generated a list of test cases. It is the process of finding errors and missing operations and also a complete verification to determine whether the objectives are met and the user requirements are satisfied. System Testing Here the entire software system is tested.
Criteria Satisfied by Test Cases 1) Test cases that reduced by a count that is greater than one. rather than an error associated only with the specific test at hand. 2) Test cases that tell us something about the presence or absence of classes of errors. Output for a given set of input combinations are forwarded to other modules. 6.Black Box Testing This testing method considers a module as a single unit and checks the unit at interface and communication with other modules rather getting into details at statement level. the number of additional test cases that much be designed to achieve reasonable testing.1 INTRODUCTION 96 . Here the module will be treated as a block box that will take some input and generate output.
After the development phase of the SDLC is complete.1. which was designed in phase 3. As the software has been implemented for performing all the tasks related to Client Information System and as a result it will reduce the complexity at work. Firstly install the software and start using. sql server 2005 database. 6. Any hardware that has been purchased will be delivered and installed. Due to our well-written documentation and user training methods developed by the experts will aid the user staff so that they can use the system efficiently and effectively. Internet connection. Software. Any person that will be using the program will also be trained this phase of the SLDC. the user will uncover problems that the developer has been unable to stimulate. will be installed on any PCs that require it.2 SECURITY ISSUES: 97 . Although the programmer will find and fix many problems. and programmed in phase 4 of the SLDC. and domain name registration. DATABASE IMPLEMENTATION A crucial phase in SLDC is the successful implementation of the system. implementation simply means bringing the new system into operation. 6. The System development life cycle during the implementation phase. the system is implemented. This leads on to the sixth and final stage. both the hardware and the software is tested.1 SITE PREPARATION For this we need web server.In the Implementation Phase. almost invariability. the project reaches fruition. web hosting (launching the webapplication on web server).
Also we are shortly going for SSL. We have thus categorized the security issue in three sections: • • • Internal Hacking External hacking Natural catastrophe For the external hacking purpose we have sophisticated firewalls which prevent any breach of security. This issue has now become even more critical with the world getting highly networked. We at Knowledge Torrent have always been very much appreciative of this problem and have done tried continuously to do the required to prevent any kind of untoward incident from happening. Security Mechanism: 98 . which can destroy our servers. We not only think about out side attack but also the natural catastrophes like earth quack and internal hacking. we have multiple servers which are continuously updated and are different geographical places. This issue has cropped up so as to facilitate online transaction. No matter what one does there always has been someone looking for ways to break that security wall that has been built for the software. Since our B2B exchange is in place so we have to go for payment gateways and this does make the SSL a very important issue.If there is one issue which has always pestered the computer software fraternity then that is that of security. Still as I said security on net is a tricky issue so we keep our self-updated on this front and make necessary change as and when required. As far as to prevent natural catastrophe. With these security measures we hope to counter any security beaches.
99 . The focus of the programmer on the security of material was to assist Member States in the establishment of systems necessary to prevent nuclear material and other radioactive sources from being diverted to unauthorized purposes.• • The capability to develop network-based integrated control and synchronization of various data acquisition systems have evolved with Internet technologies.
MAINTENANCE 100 .
The average life of system is 4-6 years. When the system is installed. files and database. Maintenance of the system after it is installed is concerned with an additional factor in hardware. System requirements may be revised as a result of system usage or changing operational needs. This is a typically a 90 day period after that time the purchaser has the option of acquiring maintenance from various sources. The system requires maintenance as there may be changes and requirements in the organizational needs. called third party maintenance companies. often small system deficiencies are found as a system is brought into operation and changes are made to remove them. Often the maintenance need arises to capture additional data for storage in a database or in transaction files or perhaps it may be necessary to add error detection features to prevent system users from in adversely taking an unwanted action. improved documentation and recording system components or greater efficiency.6. with the eldest applications often is used for over 10 years. The greatest amount of maintenance work is for user enhancement. Maintenance source excepting vendor is also available from companies specializing in providing the service.3 MAINTENANCE: Software maintenance is the last phase in the software Engineering process that eliminates errors in the working system during its work span and to tune the system to any variations in its working environment. hardware and software environment etc. Approximately 20% of all maintenance work is performed to accommodate changes in report. About 60% of all maintenance is for this purposed. Perhaps oversight that occurred during the development process needs to be corrected. it is generally used for long period. government policies. The need for debugging and correcting errors or failure on an emergency basic is comparatively low: less than 20% of the task of correction. Once the system is delivered and installed there is a brief warranty period during which time the vendor is responsible for maintenance. therefore the maintenance of the system also involved adoptions for earlier version of software. System and organization are in constant state of flux. 101 .
routine debugging. Using more effective methods for designing process logic and communicating it to Making better use of existing tools and techniques. changes in the external environment. future maintainability reliability enhancement. 6.1 MAINTAINABLE DESIGN The points to reduce the needs for maintenance are: More accurately defining the user’s requirements during the system development. Accommodation of changes to data and to hardware and software.Following table summarized the broad classes of maintenance found in development of information systems CATEGORY Corrective Adaptive Perfective Preventive ACTIVITY Emergency fixes. project team members. Assembling better system documentation. 102 . Routine service of transactions & inquiry prevent breakdowns. recovering design information to improve the overall quality. User enhancement.3. user recommendations for new capabilities. Managing the system engineering process effectively. improved documentation recording of computational efficiency.
FUTURE SCOPE 103 .
FUTURE SCOPE OF THE PROJECT:
The major part of the project is designed and developed by using ASP.NET. But in future .NET Framework and Active Server Pages will be incorporated to enhance the performance of the project. It will be evaluated and maintained by our own server and package. Login Id validation and implementation is also a future application, which will be incorporated. Optimization though is the age-old concept but is a principal motive to be achieved, for this each and every module is tested in isolation to check its workability and participation in the project. At now this project provides the following functionality: • • Banking System related information All transactions of payment & automate data flow for Bank Management and Customers Account Management are error free, through in the E-Banking System. In the future this project can be enhanced to include the following: • • • • Online balance inquiry Article search facility on the web application about the Bank System. Online amount transfer from one account to another. Online inquiry about the E-Banking working System.
The primary purpose of this project is to replace the existing manual processing with error free, high speed, and low cost and should improve the system capability. This is a well defined job of our team that has taken seven weeks to analyze the situation in which this project will work and the application of the Microsoft .NET that will use this project. It was a good experience for us to work in a team group that has a very friendly environment and learning atmosphere. Working on the project was good experience. I understand the importance of Planning and designing as a part of software development. But it’s very difficult to complete the program for single person. Developing the project has helped us some experience on real-time development Procedures. Well, it’s my pleasure to make project for the title of “E-BANKING”. .
In this project, I concern many book and study material. These are references: BOOKS CONSULTED: • ASP.NET 3.5 with C# By: Chris ullman,John Kauffman,chris Hart, Dave Sussman ,Daniel Maharry Publication: WROX. • ASP.NET Website Programming, C Sharp Edition By: Marco Bellinaso , Kevin Hoffman Publication: WROX. • • • Building ASP.NET and ADO.NET Publication: Microsoft Press ASP.Net 3.5 Black Book Publication: Dreamtech SQL SERVER 2005 Black Book.
SITES REFERRED: • • • • spiderdotnet.com wrox.com dynamicsdrive.com google.co.in
Appendix:  Time Progress Chart 35 30 D A Y S 25 20 15 10 5 0 MODULES Module data conversion to the back end access Module for information Generation for project undertaken Module for paper form design Module for report designing Module for interface Information system to cricket record package Lag time in module completion 107 .
 SYMBOL USED Symbol used for DFD are:- Source of data Data Flow Logical Data Flow Process that transform data flow Output as Document that is in printout through printer Any Data from data base Display on Screen 108 .
Predefined Process Alternate Process Component Used Tabled view in the table in database 109 .
Data Flow Movement of data in a system from a point of origin to specific destinations-indicated by a line and arrow.modification or destruction.GLOSSARY Analysis Attribute Breaking a problem into successively Manageable Parts for individual study. A data item that characterizes an object. Feasibility Study A procedure that identifies. disclosure. 110 . DBMSThe software that determines how data must be structured to produce the user’s view and maintain and update the system. describes and evaluate candidate system and select the best system for Implementation. Data security Protection of data from loss. File Collection of related records organized for a particular purpose also called a dataset. Design Process of developing the technical and operational specification of a candidate system for implements.
Form A physical carrier of data of information. A process of replacing a given file with its logical Equivalent the object is to derive simple files with no redundant elements.site preparation and file conversion for installing a candidate system. 111 . Operating System In database –machine based software that facilitates the availability of information or reprts through the DBMS. Record A collection of aggregates or related items of a data treated as a unit. Password Idenity authenticator a key that allow access to aprogram system a procedure. Gantt chart A static system model used for scheduling portrays output performance against time. Implementation In system development.Flow chart A graphic picture of the logical steps and sequence involved in a procedure or a program. Maintenace Normalization Restoring to its original condition.a phase that focuses on user training.
System Design Detailed concentration on the technical and other specification that will make the new system operatoional. System A Regular or orderly arrangements of components or parts in a connected and interrealed series or whole a group of components necessary to some operation. System Testing Testing the whole system by the user after major programs and subsystem have been tested. SDLC (System Development Life Cycle) A structured sequence of phases for implementing an information system. Checking the quality of software in both simulated and live environments.Source Code A Procedure or format that allow enhancements on a software package. Unit Testing Validation Testing changes made in an existing or new programs. 112 .
This action might not be possible to undo. Are you sure you want to continue?
We've moved you to where you read on your other device.
Get the full title to continue listening from where you left off, or restart the preview.