You are on page 1of 55

KARNATAKA STATE OPEN UNIVERSITY MANASA GANGOTHRI, MYSORE- 570006

A PROJECT REPORT (e-bankin )

for

Master of Computer Applications


S!b"i##e$ b%
&Me 'ana Ke$a(i) &**+,,-.MCA0+7)

In /a(#ia0 1!01i00"en# 21 #'e (e3!i(e"en# 42( #'e a5a($ 21 #'e $e (ee Un$e( #'e !i$an6e 21
&78S8Kannan 9i()

S'a(a$a Vika9 T(!9#


N28+50:*:*+, ,n$ 1022(8 .ak9'"i 62"/0e;, *0#' "ain ,7#' 6(299, +#' b026k, Ja%ana a(, <an a02(e-**

CERTI4ICATE

This is to certify that this project entitled (name of the project) ..submitted by(name of the student) with roll no(reg no)on (month/ year). to the KARNATAKA STATE OPEN UNIVERSITY, in partial fulfillment of the requirements for the award of MASTER O4 COMPUTER APP.ICATIONS, is a record of bonafied work undertaken by her/him.

( T!"#$T) ignature' $ame' "ate' ( T!"( )#$T*#) ignature' $ame' "ate' eal of tudy )entre'

(%!&"#) ignature/date' "esignation' "esignation'

Acknowledgement
Nothing in life is ever successful without the co-operate effort of many Gifted people who are willing to network and submit their talent, experience and passion for a common goal. This work is a product of countless individuals whose thoughts, ideas, perspectives and work have given us the exposure to knowledge. The satisfaction and happiness we feel at the successful completion of my project entitled e-banking would be incomplete if did not remember the people who made it possible and crowned our efforts with success. take the privilege of thanking my !roject Guide and ncharge Shri. D.S.Kannan sir for his help and his care with which he guided me during the study. "nd am really grateful to all our lecturers of # CA Department. Lastly, I raise my mind and heart in gratitude to the Almighty od for !howering "is #lessings on me. Thanks to my family who have rendered constant support, concern and understanding.

TA<.E O4 CONTENTS *8 In#(2$!6#i2n a. +roject ,-er-iew (.im) b. +roject cope (/unctions) ,8 S%9#e" Ana0%9i9 a. $eed for the system b. +roposed system c. /easibility study d. oftware requirement specification i. &ntroduction - +urpose, "ocument con-ersion, intended users, product scope, benefits / objecti-es, goals etc., ii. ,-erall "escription - +roduct perspecti-es, /unctions, !ser )lass and )lassification - ,perating system details - 0ardware requirement - "esign and &mplementation - !ser "ocumentation -8 S%9#e" $e9i n "ataflow diagram

"atabase design +8 In/!# an$ 2!#/!# S6(een9 58 Te9#in 68 C2n60!9i2n 78 G0299a(% Re1e(en6e9

*.In#(2$!6#i2n In the current Internet age, every application is being ported to web and allows the users to connect with the system and work online. It has allowed people to remove the barriers of time and distance. Competition and changes in technology and lifestyles have changed the face of banking. anking being the main financial backbone of any economy cannot stay behind. !owadays, banks are seeking alternative ways to provide and differentiate their services. Customers, both corporate and retail, are no longer willing to "ueue in banks, or wait on phones, for the most basic of services. #hey demand and e$pect to be able to transact their financial dealings where and when they wish. %ith the number of computers increasing every year, the electronic delivery of banking services is becoming the ideal way for banks to meet their client&s e$pectations.

'nline banking or e-banking can be defined as online systems which allow customers to plug into a host of banking services from a personal computer by connecting with the bank&s computer over telephone wires. #echnology continues to make online banking easier for average consumers. anks use a variety of names for online banking services, such as (C banking, home banking, electronic banking or Internet banking. )egardless of the name, these systems offer certain advantages over traditional banking methods. #his application is designed to implement the banking solution on the web to enable the customers to transact, sitting at their (C, making their account available to them *+ hours a day. %hile the customer has all the options of transactions online, the administrative functions are still limited to the bank officials.

#he system should allow the customers to perform the following tasks online, -. *. 0. +. 1. .iew /ccount alance 'nline #ransfers between account Che"ue book issue re"uest DD Issue re"uest Change the personal details

#he system should also allow the bank officials to do the following operations, -. *. 0. +. 'pen a new account and create a new user Service the che"ue book issue re"uest Service the DD issue re"uest 2ree3e 4 unfree3e an account

1.1 Project Overview %ith rapid advances in telecommunication systems and digital

technology, it is difficult to predict how Internet banking will improve and e$pand in coming years. ut with the number of computers increasing every year, the electronic delivery of services is becoming popular in the banking sector. #he Indian e$perience of 5 6 banking is gradually merging with its international counterparts. %hile the private sector and multi-national banks have been first and fast in adopting internet technology in client servicing, there is a gradual trend for the ma7or public sectors and numerous co-operative units to move in the same direction. / mi$ of policy support and security assurance should propel further 5 6 banking adoption in India. Aim

'b7ective of this pro7ect is to allow the bank to e$pose its functionality on the web, making their service available to the user 6 Customers. %hile the customers can en7oy operating their account sitting in their homes, the bank officials, working as administrators of the system are e$posed to the service areas of the application. / Customer can have multiple accounts with the bank and use the same user name and password to access them. #he user name and password is provided to the customer on successful opening of the account. 'n acceptance of the details, an account is opened and the user name and password is created and given to them. Customers can change the password at their on leisure. Customers can modify their personal 4 account details or change their password. 'nce a transaction is saved, the account balances must be ad7usted accordingly and the new balance must be shown. Issue of che"ue book and DD48# re"uires interaction of the bank officials and hence it can only be re"uested. #he re"uest will be seen by the bank official during their business hours and processed. It might be re"uired for the bank to free3e someone&s account due to legal 4 police actions and hence a facility must be provided to this effect and the customer whose accounts are fro3en should not be allowed to interact with the system.

Existing system

2or any type of transaction a person has to go to bank. It is a very timeconsuming process. ecause if a person is out of station then a person has to come to a particular branch of bank for any type of transaction. It means that a person who wants to do any type of transaction such as he wants to open a new account then he has to come to the bank himself manually. /ll tasks such as deposit and withdrawal of money, opening a new account, applying for car loan,

educational loan, house loan etc. are processed by the employees of a bank. If an employee is busy then a customer has to wait for a while, so this is very time consuming for the customer to do a particular transaction with the bank. If more than one person come for transaction then person has to wait in a "ueue for a long time. In e$isting system there is a limitation of time for doing a transaction, because a person has to walk with the bank timing specified by the bank. /nd if a person who wants to transfer his money from his account to another account of a person, then it takes time to be processed.

Drawbacks in the existing system:

#here are a few drawbacks in the e$isting system like, -. #he main drawback of e$isting system is ,its time consuming. *. #he second drawback is it uses pen and paper techni"ue.

1.2 Project Scope

#o overcome the problems of e$isting system. #o develop computeri3ed system to handle all types of transactions

occurring in the bank.

#o reduce time and cost.

(otential areas where 5- anking can be used are as follows, /nywhere anking, Citi3en can deposit or withdraw their money anywhere

in country irrespective of the branch where their parent account is held. #his will give greater security for traveling business people to deposit money collected from traders4clients. /#8s is another mode of anywhere banking, consumer can use services of /#8s anywhere in country, reducing burden of carrying money while traveling. Smart Card Solutions, Smart cards will give helpful in bringing governmental services and banking more closer to people. 2ramer service centers are e$ample of this initiative. Smart cards will be greater fle$ibility to users reducing the frauds and malpractices what debit cards and credit cards are not able to offer. 'n the other hand smart card can be used as identification card for number of other services like driving licence, passport, election id card and other things. 'nline /ccount 8anagement, Citi3ens can manage their account online. anking, it will reduce the time delays and dependency on bank staff ill (ayment, Internet banking is fre"uently used for ta$ payments. S!9 /nytime

and timing of operations. 'nline ill payments like of electricity, water, municipal and telephones. 8any public sector companies are offering online payment services, for e.g. 8#!9, etc. Indian )ailways has started online reservation system for credit card and debit cardholders. In coming future even persons having Internet bank account can book seat online at ease of their home. 'nline rokerage, Strong financial markets are always backbone of any economy. #hrough 5- anking channels stock trading can reach to the people who want to invest their money in financial markets but due to time constraints they are not able to visit the broker.

/dvantage, Customer

Consumers can use their computer and a telephone modem to dial in from

home or any site where they access to a computer. #he services are available seven days a week, *+ hrs a day

#ransactions are e$ecuted and confirmed almost instantaneously.

/lso, the range of transactions available is fairly broad. Consumers can do

everything from simply checking on an account balance to applying for a mortgage. #ime saving and convenience.

/dvantage, 'rgani3ations Improve customer access

2acilitate the offering of more services

Increase customer loyalty

/ttract new customers

Increase customer satisfaction

)eduction in costs, as the need for physical branches is reduced

*+ $ : client-servicing- for general services

)eduction in cost, as the need for manpower is reduced

#ransparent and fast response

Directly reflected on the account statement, need for data entry is

eliminated.

he Do!s o" #et $anking

)59/#I'!S;I( ,

anks and other financial institutions in India cannot go

completely virtual, physical branches help forge a <relationship& with the customer that a virtual bank cannot. 8ost customers in India prefer direct, personal contact with their banker.

(5)S'!/9I=/#I'! ,

anking Solutions become truly personali3ed when they

are able to respond to the changing customer needs. 2or 5$ample, Software that might tell you which credit card balance to pay off first, or alert you in advance when your che"ue will bounce. #his level of personali3ation is still lacking in the banking solutions offered by Indian banks. I!#5)>)/#I'!, /nother importance aspect is integration customer service and channels, so that the customer deals with a single channel that caters to diverse needs such as kiosks, /#8&s, %eb #., mobile phones, pagers and branch counters. anks need to be <one stop shops& for an entire range of personal finance products 6 from loans and insurance to mutual funds and even ta$ savings instruments. #his is being done by <account aggregators& such as ?odlee, Corillian, e alance and .ertical one that lets you log into website and

track information as diverse as bank and credit card balances, value of investments, and fre"uents-flier miles from several sites, each of which has it&s own username and password. I!!'./#I'!, !owadays, banks need to depend on product innovation, e$panding their range of their products and service offerings. /part from 7ust online accounts, e-banking would need to tailor specific products for the Internet, like online bill presentment or credit card with instant online in offering innovative products like 5gg card 6 a credit card that features an introductory 3ero percent interest rates. Sec%rity &ss%es

'ne of the ma7or issues concerning customers and organi3ations is the security aspect of 5-banking. It is only natural that business customers show concern about sending their personal details and account numbers over the Internet. #he security measures are implemented partly by the bank and partly by the customers themselves through their own vigilance.

#)/!S/C#I'! S5C@)I#?, #he data e$changed between bank and the customer is coded or encrypted using secure servers with +A4-*B bit SS9 servers, which sit behind firewalls. #he likelihood of a computer hacker breaking these security measures is very remote. /CC5SS S5C@)I#?, 'n registration, normally two levels of security are used each time the customer accesses their account details, a user ID and password. / third level of authentication can be built in also, to protect misuse, for e$ample "uerying user&s date-of-birth.

/CC'@!# ;'9D5)&S .I>I9/!C5, ;owever tight the banks make their security systems, it is not sufficient on its own. usiness customers need to play their part too and e$ercise caution when banking online like not divulging their pin number or password to any third party, or not leaving their pin lying around. '%t%re o" E(banking %ith rapid advances in telecommunication systems and digital

technology, it is difficult to predict how e banking will improve and e$pand in coming years. 2or e$ample, Internet anking via mobile phones using %ireless /pplication (rotocol C%/(D or banking services through the #. screen via the new interactive #. channels may become established. It is likely that the number of customers wanting to bank online will increase which could lead to high street banks offering personali3ed services and better online customer care. #o combat computer crime and increase security levels, banks may consider new security measures such as iris, voice and fingerprint recognition, smart cards and electronic signatures. #he anking sector, as a whole, is undergoing a transformation, primarily because of the advent of the internet. 2inancial institutions are reali3ing that ebanking is not 7ust another distribution channel for their services, but a revolution as the Internet and its associate development challenge the traditional banking practices and core business units. Corporate banks are carefully considering the best way forward and many are viewing the e-banking phenomenon an opportunity and not a threat. Smaller banks need to look at how they can best compete in their market. Developing their own Internet solutions is rarely possible and so they must look at other options to facilitate e-banking and e-commerce initiatives.

2. S)S E* Ana+ysis &nitia+ st%,y: #his involves the investigation of the e$isting system which is time consuming with the user and is insufficient depth. #his also includes the collection and study of detailed information and literature regarding the complete e$isting procedure. #he detailed initial study properly documented and the failing and problems are noted separately. #he system is properly designed and proper outline of the proposed computeri3ed system is prepared. #he proposed design is brought against all the known facts and further proposals are made. .arious resources including the software, hardware and manpower re"uirements are decided and are mentioned in the report.

2.1 #ee, "or the System. e in accord with macro and micro level activities of a !et ank. e user-friendly and shall facilitate smooth functioning of an e-/ssembly application. )educe operating costs and saves time. 5nable online 6status review. e fle$ible and adaptable to the e$isting process. /llow some amount of customi3ation. (rovide for seamless integration of all the modules.

2.2 Propose, System: 9imitations faced in the e$isting system can be overcome with the concept of 5- anking. /ll tasks performed manually can be done with computeri3ed systems nowadays. #oday 5- anking has become the most efficient way to do a transaction very fast. 8a7ority of the transactional services will be provided by way of Internet. !et- ased banking comes at only -AE of the operating costs of conventional banking and services. / cost comparison study done by I 8 >lobal Services Consulting >roup shows the advantage of using Internet as medium for anking Services over other traditional medium. /s per the recent survey traditional anks spend FAE of the revenues generated to run a branch where as the cost of providing the

same services via Internet comes out to be only -1E. #his is a huge savings for anks and Consumers. Consumers will access the same Services with more efficiency at low cost. / research shows that a large population use Internet for gathering information about different financial products like (ersonal 9oan, Credit Card, Insurance etc. thus reducing cost of printing, promotion and distribution. #he 8a7or prospect of this pro7ect is to make web enabled application, which is administrative based to provide the complete information about all the internal activities taking place in side a bank. #his application is also aimed to provide the information for the account holders to know all there transactions. $ene"its o" Propose, System #he main benefit is, customers can en7oy operating their account sitting in their homes, the bank officials, working as administrators of the system are e$posed to the service areas of the application. It allows us to build a uni"ue personal payee list on-line and schedule payments to be made on time. #otally compressive, yet customi3able by each and every user ,bill pay thorough !et advantage providers the convenient, accessibility, reliability and security demanded by today&s banking customer.

2.- 'easibi+ity St%,y #he prime focus of the feasibility study is evaluating the practicality of the proposed system keeping in mind a number of factors. the new system, #he following factors are taken into account before deciding in favor of

Economic 'easibi+ity:

#he proposed )esume #racking System will save lots of paper work and 2acilitate magnetic record keeping thereby reducing the costs incurred on above heads. #his reduction in cost prompts the company to go for such computer-based system. echnica+ 'easibi+ity /s the saying goes, Gto err is humanG. Keeping in view the above fact, bowa-days all organi3ations are automating the repetitive and monotonous works done by humans. #he key process areas of current system are nicely amenable to automation and hence the technical feasibility is proved beyond doubt. Operationa+ 'easibi+ity: ( #he day to day maintenance of the )esume details is error prone and timeconsuming. #he computeri3ation will not only increase the operational efficiency of the staff.

ime an, .eso%rce 'easibi+ity: ( #his system helps the user to find in the best usage of resources keeping in track of all the resume details over a period of time, thereby reducing the decision making process easier and worthwhile. /cts to be a solution provider in determining the best allocation of resources and finding out the way for time reduction.

2./ So"tware .e0%irement Speci"ications:

2./.1 &ntro,%ction /ctual user community participation and their re"uirements analysis is key to success of any new information system. #o carry out this work, identification of users who will actually use the system is foremost. @sers at every level were even an opportunity to define their goals, ob7ectives and their respective information needs. In addition to this e$ercise a critical through investigation of present reports and "uery generated, were carried out to define any other additional re"uirements that can be useful to the others. #he findings of users and other related e$ercise to access particular user needs are summari3ed below concisely, #he System must provide a graphical user interface. )edundancy must be reduced at the ma$imum level. Discrepancies should be avoided Security systems must be provided

System design provides the understandings and procedural details necessary for implementing the system recommended in the system study. 5mphasis is on the translating the performance re"uirements into design specifications. #he design phase is a transition from a user-oriented document CSystem proposalD to a document oriented to the programmers or database personnel. System design goes through two phases of development, -D *D 9ogical Design (hysical Design

/ data flow diagram shows the logical flow of the system. 2or a system it describes the input CsourceD, output CdestinationD, database Cdata storesD and procedures Cdata flowsD all in a format that meets the user&s re"uirement. %hen analysis prepare the logical system design, they specify the user needs at a level of detail that virtually determines the information flow into an out of the system and the re"uired data resources. #he logical design also specifies input forms and screen layouts. #he activities following logical design are the procedure followed in the physical design e.g., producing programs, software, file and a working system. Design specifications instruct the user about what the system should do.

1ogica+ an, O%tp%t Design: #he logical design of an information system is analogous to an engineering blue print of an automobile. It shows the ma7or features and how they are related to oe another. #he detailed specification for the new system was drawn on the bases of user&s re"uirement data. #he outputs inputs and databases are designed in this phase. 'utput design is one of the most important features of the information system. %hen the outputs is not of good "uality the users will be averse to use the newly designed system and may not use the system. #here are many types of output, all of which can be either highly useful or can be critical to the users, depending on the manner and degree to which they are used. 'utputs from computer system are re"uired primarily to communicate the results of processing to users, #hey are also used to provide a permanent hard copy of these results for later consultation. .arious types of outputs re"uired can be listed as below, 5$ternal 'utputs, whose destination is outside the organisation Internal outputs, whose destination is with the organisation

'perational outputs, whose use is purely with in the computer department

e.g., program-listing etc. Interactive outputs, which involve the user is communicating directly with

the computer, It is particularly important to consider human factor when designing computer outputs. 5nd user must find outputs easy to use and useful to their 7obs, %ithout "uality output, user may find the entire system unnecessary and avoid using it. #he term H'utputI in any information system may apply to either printer or displayed information. During the designing the output for this system, it was taken into consideration, whether the information to be presented in the form of "uery of report or to create documents etc. 'ther important factors that were taken into consideration are, #he 5nd user, who will use the output. #he actual usage of the planned information #he information that is necessary for presentation %hen and how often output and their format is needed. %hile designing

output for pro7ect based /ttendance Compilation System, the following aspects of outputs designing were taken into consideration. #he outputs Ci.e., well formatted table outputs in the screen itselfD designed

are simple to read and interpret. 2ormat of each output was another important point taken into

consideration. 'utput media, for each output appropriate media is decided whether it will be displayed on screen or will be taken to printer or both. 'ther output design related specifications, i.e., how fre"uently the outputs

will be generated, how many pages or sheets appro$imately it will keep up, what is its planned use and output distribution to users are also taken into account. #hese were a few ma7or designing issues, which were taken into consideration, while deciding the output specifications for the system. /s direct

beneficiary of reports is the user community, they were consulted constantly at every level. 2ormats and screen design for various reports were identified, taking into account the user re"uirements. efore finalising these were given to users for any improvement and suggestions. 5nd users issues taken into consideration were )eadability, )elevance and /cceptability. 'nce all the output reports to be generated by /CS system were identified, they were given to users for their acceptance. 2or prototyping various outputs, final outputs models were created with dummy data, before they were finalised.

O%tp%t So%rces: 'utput contents originate from these sources, )etrieval from a data source. #ransmission from a process or system activity. Directly from an input source.

#he information produced in an output can be presented as #abular contents >raphic format @sing Icons

O%tp%t De"inition: #he output should be defined in terms of, #ypes of outputs Content-headings, numeric, alphanumeric, etc.,

2ormat-hardcopy, screen, microfilm, etc., 9ocation-local, remote, transmitted, etc., 2re"uency-daily, weekly, hourly, etc., )esponse-immediate with in a period, etc.,

Data items #he name given to each data item should be recorded and its characteristics described clearly in a standard form, %hether alphanumeric or numeric 9egitimate and specific range of characteristics !umber of characters (ositions of decimal point, arithmetic design, etc.,

&np%t Design: #he input design is the link that ties the information system into the user&s world. Input specifications describe the manner in which data enters the system for processing. Input design features can ensure the reliability of the system and produce results from accurate data, or they can result in the production of erroneous information.

Input Design consists of Developing specifications and procedures for data preparation Steps necessary to put data into a usable form for processing. Data entry, the activity of putting data into the computer processing.

Objectives o" &np%t ,esign 2ive ob7ectives of design input focus on Controlling the amount of input re"uired /void delay /voiding errors in data /voiding e$tra steps. Keeping the process simple.

Input stages several activities have to be carried out as part of te overall input process. #hey include some or all of te following. Data recording Ci.e., collection of dataD Data encapsulation Ci.e., transfer of dataD Data conversion Ci.e., controlling the flow of dataD Data transmission Ci.e., transporting the dataD Data validation Ci.e., checking te input dataD Data correction Ci.e., correcting the errorsD

Input (erforma were designed, after a careful discussion with users. It was attempted to cover all user re"uirements. Designed (erforma were given to user for any suggestion and final approval. .arious data items were identified and wherever necessary were recorded. /s the data concerning of /CS is voluminous in nature and number of case will grow dynamically in future, proper care was taken for accuracy and consistency of data.

Input designs are aimed at reducing the chances of mistakes of errors. /s the human beings are prone to errors there is always a possibility of occurrence of chance of errors. /de"uate validation checks are incorporated to ensure error free data storage. Some of the data validation checks applied are as following, )edundancy of data is checked. It means the records of primary key do not

occur twice. (rimary key field of any table must not be left blank. %herever items are coded, input code is checked for it&s validly with

respect to several checks. @tmost care has been taken to incorporate the validation at each stage of

the system. 5.g. when entering records into employee information table for employee, it is checked that whether the corresponding employee e$ists in the employee information table etc., 5nough messages and dialogue bo$es are provided while design screen, which does guide user at the time of any errors, or at time of entry. #his feature provides a user-friendly interface to native users. It can be emphasi3ed that input deigns of /CS system is so designed that it ensures easy and error free data entry mechanism. 'nce one is sure of input data the output formatting becomes an routine work.

*o,%+es o" the project, 5-banking has in all * modules and shall be implemented in phases. #he number of phases and the modules will be implemented as follows.

8odule--

/dmin 8odule

8odule-*

@ser 8odule

TA<.E 7ESIGN

.ccount *equest
S08N 2
1.

4ie0$ Na"e
*equest &d

7a#a T%/e
$umber

.en #'
12

72"ain
234

C2n9#(ain#9
+rimary 5ey

7e96(i/#i2n
*equest &" for the

6.

.ccount #7isting

$umber

231 234,a39,.3 :

$ot $ull

request .lready e7isting user or not .ccount $umber of the user ha-ing an account already )ard $umber of the user ha-ing an account already

8.

.ccount $umber

Te7t

12

;.

)ard $umber

Te7t

62

234,3,< = 234,a39,.3 : 234,a39,.3 : a39, .3: a39, .39 a39, .39 a39, .39 234 234 234, a39, .3: 234, a39, .3: a39, .3:

>. @. A. B. 4. 12. 11. 16. 18. 1;.

ecret ?uestion ecret .nswer /irst $ame econd $ame e7 #mail id *esidence +hone $umber ,ffice +hone $umber 0ouse name )ity

Te7t Te7t Te7t Te7t Te7t Te7t Te7t Te7t Te7t Te7t

;2 ;2 62 62 12 12 16 16 62 62

$ot null $ot null $ot null $ot $ull $ot $ull $ot $ull $ot $ull $ot $ull $ot $ull $ot $ull

ecret ?uestion ecret .nswer /irst $ame of the requested person econd $ame of the requested person e7 of the requested person #mail id of the requested person +hone number of the requested person +hone number of the requested person 0ouse name of the requested person )ity where the requested person is Cranch where the requested person wants to start account .ge of the requested person Time from which requested person is free Time up to which

1>.

Cranch

Te7t

62

$ot $ull

1@.

.ge

$umber

234 234, .,+,D 234,

$ot $ull

1A. 1B.

tart time #nd time

Te7t Te7t

> >

$ot $ull $ot $ull

.,+,D

requested person is free )ountry where the $ot $ull $ot $ull requested person lea-es tatus of the requested

14. 62.

)ountry tatues

Te7t $umber

62 6

a39, .3: 231

*egister information
S08N2
1.

4ie0$ Na"e
*egister &d

7a#a T%/e
$umber

.en #'
12

72"ain
234

C2n9#(ain#9 7e96(i/#i2n
+rimary 5ey *eferences *egister &" of the user *equest &" of the request /irst $ame of the requested person econd $ame of the requested person e7 of the requested person #mail id of the requested person +hone number of the requested person +hone number of the requested person 0ouse name of the requested person )ity where the requested person is .ge of the requested person )ountry where the requested person lea-es

6.

*equest &d

$umber

12

234

.ccount *equest(reque st id)

8. ;. >. @. A. B. 4. 12. 11.

/irst $ame econd $ame e7 #mail id *esidence +hone $umber ,ffice +hone $umber 0ouse name )ity .ge

Te7t Te7t Te7t Te7t Te7t Te7t Te7t Te7t $umber

62 62 12 12 16 16 62 62 8

a39, .3: a39, .39 a39, .39 a39, .39 234 234 234, a39, .3: 234, a39, .3: 234

$ot null $ot $ull $ot $ull $ot $ull $ot $ull $ot $ull $ot $ull $ot $ull $ot $ull

16.

)ountry

Te7t

62

a39, .3:

$ot $ull

.ccount 0older &nformation


S08N2
1.

4ie0$ Na"e
.ccount $umber

7a#a T%/e
Te7t

.en #'
12

72"ain
234,a39,.3 :

C2n9#(ain#9 7e96(i/#i2n
.ccount $umber of +rimary 5ey *eferences the user ha-ing an account already .ccount *equest(reque st id) $ot null *egister id of the account holder Eoint .ccount details )ard $umber of the user ha-ing an account already Cranch where the

6.

*egister &d

$umber

12

234

8. ;.

.ccount Type )ard $umber

$umber Te7t

6 62

234 234,3,< =

>.

Cranch

Te7t

62

a39, .3:

$ot $ull

requested person

@.

Calance

$umber

1>

234

$ot $ull

wants to start account Calance amount in the account

Fogin &nformation
S08N2
1.

4ie0$ Na"e
.ccount $umber

7a#a T%/e
Te7t

.en #'
12

72"ain
234,a39,.3 :

C2n9#(ain#9 7e96(i/#i2n
.ccount $umber of +rimary 5ey *eferences the user ha-ing an account already .ccount *equest(reque st id) *egister id of the account holder +ass word of the user $ot null $ot null ha-ing an account already ecret ?uestion

6.

*egister &d

$umber

12

234

8. ;.

+ass word ecret ?uestion

Te7t Te7t

12 ;2

234,a39,.3 : 234,a39,.3

>. @.

ecret .nswer *ole

Te7t Te7t

;2 12

: 234,a39,.3 : a39, .3:

$ot null $ot null

ecret .nswer !ser/admin

Transaction &nformation
S08N2
1.

4ie0$ Na"e
Transaction &d .ccount $umber Transaction "ate "ebit .mount )redit .mount

7a#a T%/e
$umber

.en #'
12

72"ain
234 234,a39,.3 : 234,3,.3 9,a39 234 234

C2n9#(ain#9 7e96(i/#i2n
+rimary 5ey Transaction id of the account holder .ccount $umber of the user ha-ing an account already "ate on which transaction is done .mount "ebited .mount )redited

6.

Te7t

12

+rimary 5ey

8. ;. >.

"ate $umber $umber

16 > >

$ot null

"" *equest
S08N2
1.

4ie0$ Na"e
*equest id

7a#a T%/e
$umber

.en #'
12

72"ain
234

C2n9#(ain#9
+rimary 5ey *eferences

7e96(i/#i2n
*equest &" of the "" .ccount $umber of the user who request for "" "" $umber &n fa-or of whom +ayable at where )ommission for "" .mount of ""

6.

.ccount $umber

Te7t

12

.3:, a39,23 1 234 .3:, a39 .3:, a39 234 234

account holder information(ac count number) $ot null $ot null $ot null $ot null $ot null

8. ;. >. @. A.

"" $umber &n fa-or ,f +ayable at )ommission .mount .mount

$umber Te7t Te7t number number

12 82 >2 ; ;

B. 4.

"ate tatus

"ate $umber

16 6

234, 3, a39, .3: 231 $ot null

"ate of "" taken tatus of "" request

)heque *equest &nformation


S08N2
1.

4ie0$ Na"e
*equest id

7a#a T%/e
$umber

.en #'
12

72"ain
234

C2n9#(ain#9
+rimary 5ey *eferences

7e96(i/#i2n
*equest &" of the )heque

6.

.ccount $umber

Te7t

12

.3:, a39,23 1 234, 3, a39, .3: 234 234 234 231

account holder information(ac count number)

.ccount $umber of the user who request for cheque "ate of cheque issued )heque book $umber )heque book starting $umber )heque book ending $umber tatus of "" request

8. ;. >. @. A.

"ate Cook $umber tart $umber #nd $umber tatus

"ate $umber $umber $umber $umber

16 > 12 12 6

$ot null $ot null $ot null $ot null $ot null

Foan *equest &nformation


S08N2
1.

4ie0$ Na"e
*equest &d

7a#a T%/e
$umber

.en #'
12

72"ain
234

C2n9#(ain#9
+rimary 5ey *eferences

7e96(i/#i2n
*equest &" for the request .ccount $umber of the user requested for loan )ard $umber of the

6.

.ccount $umber

Te7t

12

234,a39,.3:

.ccount holder information(ac count number)

8. ;.

)ard $umber /irst $ame

Te7t Te7t

62 62

234,3,< = a39, .3: $ot null

user ha-ing an account already /irst $ame of the

>. @. A. B. 4. 12. 11. 16. 12. 16. 62.

econd $ame +rofession .nnual &ncome *esidence +hone $umber ,ffice +hone $umber 0ouse name )ity +in #mail id +urpose tatues

Te7t Te7t Te7t Te7t Te7t Te7t Te7t Te7t Te7t Te7t $umber

62 82 6> 16 16 62 62 12 12 62 6

a39, .39 a39, .39 234,G,H,a39, .39 234 234 234, a39, .3 : 234, a39, .3 : 234 a39, .39 a39, .3: 231

$ot $ull $ot $ull $ot $ull $ot $ull $ot $ull $ot $ull $ot $ull $ot null $ot $ull $ot $ull $ot $ull

requested person econd $ame of the requested person +rofession of the requested person .nnual income of the requested person +hone number of the requested person +hone number of the requested person 0ouse name of the requested person )ity where the requested person is +in code of the requested person #mail id of the requested person +urpose for taking the loan tatus of the requested

echno+ogy 2 oo+s se+ection

#he system should be developed using a web technology and should be developed as such that deployment of the system is east and effortless. /lso, the technology used should be as such that interactions for the customers are very easy and user friendly. %e had plenty of options to select the technology and tools. #he selection criteria we set are as detailed below,

-. *. 0. +. 1.

#he technology should be widely accepted in the industry. #his makes the #he platform should be easy to develop and allow rapid development. #he technology selected should be platform independent. #he language should be easy and robustJ making is simpler to learn for the #he application must be browser independent. %ith all these details in mind, we selected KS( CKava Server (agesD as it

maintenance and upgrading the system very easy and less costly.

newer members.

stands out on all the points mentioned above. 3A4A $EA#S #he 7ava beans specification allows s4w components to be written in Kava which encapsulate the logic behind the web application and remove the bulk of the code that would otherwise clutter up KS(&s. #he result is KS( code that is simpler, easier to maintain and which is more readily accessible to non programmers. / bean user properties to describe internal data that effects how it works and what it shows. In 7ava the actual bean property data is usually a private and protected field which can be edited by publicly available methods. In other words beans allow access to internal data via public get and set methods. #his confirms to ob7ect orientation norms which hide internal data from users and e$plore it only through accessor methods. /nother aspect of this component is that it should be able to communicate with other ob7ects or beans. Kava beans accomplish this by firing events and listening to them. / bean that is interested in what happens to an ob7ect e$ternal to itself can register itself as a listener for various events in that ob7ect. Conversely an e$ternal ob7ect can register

itself to listen to that bean. #his concept is really the key to providing standalone s4w components. $O5#D P.OPE. &ES 'ne way of e$porting events is to use bound properties. %hen a property value changes a bound property can inform other parts of the application that its value is changed. $EA# E4E# S #he property change support class should cater for most of the needs. ;owever on many occasions beans will still need to communicate even though no property change activity has occurred. $EA# PE.S&S A#6E A#D S O.A7E 2or a component to be really useful it must be possible to save it and any values it may contain and reload it to the same state at a later date. !o matter how wonderful the component we create it will not be used much if it has to reset every time it is retrieved. Kava beans use the seriali3able interface to address this issue. #he seriali3able interface has no methods to implement. It is simply on indicator to the compiler that ob7ect may be made persistence by seriali3ation. 'n practice seriali3ation generally means saving the bean to file using the ob7ect 'utput stream class. #hen to restore the bean to read from the same file using ob7ect Input stream. #o make 7ava bean to be seriali3able we need to do is add the seriali3able interface in the class declaration.

3D$6 #here are many classifications of databases available as ;ierarchal databases, !etwork databases )elational databases, ob7ect databases and so on. Due their fle$ibility )elational database management systems are most successful bread of databases in the history of computing . 5$ample, ')/C95, I 8db*, 8IC)'S'2# SL9 S5).5). / technology that enables KS( based engines is called Kava Database connectivity and is an integral part of Kava platform. KD C4KS( based web application especially access the database through a finite number of database connections. #hese connections must be managed carefully by the application especially if a large number of concurrent users may be accessing them. #o make this performance optimi3ation KD C uses a mechanism called connection pooling. #he evaluation of this open database access technology has let to a of driver architecture )PE1 Drivers KD C 'D C )ID>5 D)I.5)S . the K*S5 M K*55 KDK&s include this #ype- Driver as a part of their distribution. y definition they are not -AAE Kava drivers.

)PE 2 D.&4E.S #hese are .eeners over the e$isting native code drivers from the database .endors. #hey are "uick M easy to implement. #?(5* Drivers that uses the .endors 'wn optimi3ed data access protocol in the shortest amount of time without having to deal with any restrictions that may be imposed by 'D C bridging. Kava. )PE - D.&4E.S #hese are really non drivers. #hey are front-end for database access servers M connectors. 2or e$ample the pro$y driver talks to the middle tier concentrator or access server . the concentrator or access sever in turn uses 'D C or .endor specific protocol to talk to the actual database. #he re"uirement for collaborating middle tier server is often cumbersome and very e$pensive too. )PE / D.&4E.S #hese are true-AAE pure Kava real KD C drivers. /ll the mechanism of the client access is coded completely in Kava. #here are no calls out off or into the virtual machine and native code and there is no need for some costly server in the middle. #ype + drivers are different for different )D 8S and are available for almost all ma7or )D 8S vendors. y definition these are also not -AAE pure

In#e(a6#i2n 21 JSP 5i#' J7<C


)lient machine )lient Dachine .pplication ser-er machine .pplication er-er Dachine Ieb ser-er
Crowser with 0TDF E + #ngine E"C) "ri-er

"atabase er-er Dachine

*"CD er-er

;ere the browser using the web application is not re"uired to support Kava at all. #he KS( has full control over how many KD C connections are made

to the server. #his client never makes direct KD C connection to the server. #his solution can work readily through a firewall, only standard ;ttp is used between the web server and the client. /s a bonus this solution lends itself to an easily secured information. Simply by adding secured socket layer support to the web server. ecause of this separation of the presentation from the business logic which is separated from the database. 9ogic, this sort of system is often called three tiers of the system. /lthough the application server and database server can also running on the same server machine. #here is still one minor problem with this senario. (ro7ect personal accessing the KS( page containing the embedded KD C code can easily and inadvertently modify the database access code and this may result in an erroneous application or even corrupted database. #here are * solutions for this. -. Create Kava beans or Kava classes that encapsulate all the KD C operations. #his is significantly better solution. ut instantiation, initiali3ation and parameteri3ation of the Kava class or the beans can still represent a significant amount of embedded Kava code with in the KS(. *. Create a tag e$tension set to <pushdown& all the database access logic. #he data access logic programmers write the set of custom tags. #he KS( application logic designers will then use the set of custom tags to create their application.

E + #ngine E +<

)ustomer tag

)ustom Ea-a

#7tension

beans/)lasses

E"C) "ri-er

,ther "C access technologies

SO4T=ARE RE>UIREMENT? Concept #echnologies 2ront-5nd #ool NO %eb /pplication NO Client-Server #echnology NO ;#89, KavaScript, KS(, Kava ean

ack-5nd #oolNO ')/C95 B 5nvironment NO Internet

HAR7=ARE RE>UREMENTS? Dachine ;DD )/8 CD )'8 Clock Speed 2loppy Drive JG &ntel B27 NO +.0 > NO F+8 NO +B P NO +1A 8;3 NO -.++ 8

-8 S%9#e"

7e9i n

-8*

7ATA 4.O= 7IAGRAM

F#K#F 2'
!nregistered !ser *egistered !ser .dministrator -iew 1 +ro-ide info. Fogin Fogin Canking .cti-ity )hange info. !nregistered !ser

*egistered !ser

.dministrator

LEVEL 1:
1 .dministrator .dministrator )heck *equest "6 *equest

%rant/*eject *equest 1 .dministrator Fogin 8 .dministrator +ost diff. schemes a-ailable

registration !nregistered !ser "etails *egistered !ser 6 "etails !ser Fogin

!ser *egistration

!ser "etails "1 Fogin

Kalid !ser 8 !ser "6 Transfer /unds *equest "etails .ccount

!ser

"8

*equest for check/"" > !ser "8 *equest "etails

*equest for )heck

!ser *equest for )redit )ard

"8

*equest "etails

F#K#F 6'
1 !nregistered !ser 1.1 *egister !ser Fogin details 1.6 !ser +ersonal &nfo. "6 "1
Fogin "etails

!nregistered !ser

+ersonal "etails

6 *egistered !ser

Transfer of /unds 6.1 Kalidate source L "estination addr. 6.6 +erform truncation +rocess )heck *equest .ccount "8 "etails .ccount "etails

"8

.dministrator

8.1 "elete *equest 8.6 +rocess *equest

!pdated

";

+olicy

!pdated policy

.dministrator

">

"> /eedback

=eb 7e9i n C2n9#(ain#9


#he following design constraints were kept in mind while designing the pages for the whole application. -. *. #he pages should be consistent and easy to operate. It should be designed in such a way that an average user who does not

have much idea about /S( and related technology can still be able to access the information needed. 0. +. 1. F. #he !avigation should be easy and stepwise. / customer may have multiple accounts and should be able to access all /ll the re"uests where a ank must take some action, a re"uest number

the accounts with a single password. should be generated so that it is east to refer to it at a later date. #he entire bank official should work as administrators and should have access to all the service areas 4 pages of the application by the transaction areas 4 pages are accessible to only customers whose accounts are not fro3en.

7e9i n

%ith the above constraints in mind, we have designed an interface for the pages that is consisting of three different components, namely, *8 Hea$e( ;eader contains information about the bank and like. ,8 Na@i a#i2n Pane0 !avigation panel has all the options available to the user. /t any point of time, any of these options can be selected and used. /ll these options are hyperlinks and connect to different KS( files used.

-8

Main 52(kin /ane0 8ain working panel is the area on the screen that is used by the application

to allow user to interact with it. #here are some pages where some relative actions must be taken. #hese actions are denoted as buttons so that it standsout from the hyperlinks and are easy to use. #o accomplish the state structure, two framed pages are used - one for the customers and another one for the administrators. /s the two types of users have different set of operations to perform in the system, it demanded two separate pages for the purpose. #hese frame pages are called depending on the login process.

+.&np%t an, O%tp%t screens

68 SYSTEM TESTING AN7 IMP.IMENTATION

#he philosophy behind testing is to fine errors. #he common view of testing is that it is performed to prove that there are no errors in a program. ;owever it is virtually impossible to prove that no program will be free and clear of errors. #herefore the most useful approach and practical approach is with the understanding that testing is the process of e$ecuting a program with e$plicit intention of finding errors, that is, making the program fail. 5$ecuting a program in a simulated environment performs verification. It is sometimes called /lpha #esting. .alidation is the process of using the software in a live environment in order to find errors. It can be called as eta #esting.

System testing is the stage of implementation, which aims at ensuring that the system works accurately and efficiently before actual operation commences. !o program or system design is perfectJ communication between the user and the designer is not always complete or clear, and time is usually short. #he result is errors and more errors. #he number and nature of errors in a design depend on several factors, Communication between the user and the designer. #he programmers& ability to generate a code that reflects e$actly. #he system specification. #he time frame for the design.

8hy system testing9 #esting is vital to the success of the system. System testing makes a logical assumption that if all the parts of the system are correct, the goal will be successively achieved. Inade"uate testing or non-testing leads to errors that may not appear month later. #his creates two problems, -. #he time lag between the cause and appearance of the problem. *. #he effect of system errors on files and records with in the system. / small system error can conceivably e$plode into a much larger problem. 5ffective testing early in the process translates directly into long-term cost saving a reduced number of errors. /nother reason for system testing is its utility as a user-oriented vehicle before implementation. #he best program is worthless if it does not meet the user needs. #he system should be tested properly to see whether it meet the user needs. #he system should be tested properly to see whether it meets user re"uirements.

#esting is carried at the following states during development. 2unction 9evel 8odule 9evel 2unction 9evel testing is carried out during individual program development to test the functionality of the entire system and the efficiency of the system, while working with large volume of data. Individual models were checked for system and programming errors. %hether the module is doing the intended work according to the re"uirement specification was also tested with help of sample data. 8odule testing was carried out with under mentioned ob7ectives, 8odule interface has to be tested after compete development. #o test whether all the features provided in the module are performing

satisfactorily. #o check if on receipt of erroneous data appropriate error message are

generated. /fter the completion of the above mentioned testing, acceptance testing is carried out. /cceptance testing is running the system with live data by the actual user. In acceptance testing issues like performance, user friendliness etc., are considered.

ES &#7 S .A E7&ES: #here are two general strategies for testing software. #here are follows -. *. Code #esting Specification #esting

6o,e esting: #his e$amines the logic of the program. #o follow this test, cases are developed such that very path of the program is tested. Speci"ication testing: Specification testing e$amines the specifications starting what the program should do and how it should perform under various conditions. #hen test cases are developed for each conditions and combinations of conditions and to be submitted for processing.

6onc+%sion It is believed that in the future Internet anking will recede in importance as a strategic application to become a competitive necessity that must be adopted by most of the government departments. India is striding smoothly towards integrated 5->overnance. In ne$t five years situation will be entirely different. 8ost of the anking and >overnmental transactions will be web based. #his is 7ust a transformation phase towards knowledge economy. #here is a great role to paid by the citi3ens of the country to adopt 5->overnance and should not resist to change. Luick adoption emerging pro-active knowledge society, the Central >overnment and the State >overnment will have no choice to constantly improvise to bring in greater efficiency, /ccountability and #ransparency in their functioning. %ith the development of asynchronous technologies and secured electronics transaction technologies, more banks and departments are using Internet for transactional and information medium. @sers of 5- anking can perform common banking tasks such as writing checks, paying bills, transferring funds, printing statements in balance in"uiry etc. Internet anking has evolved into <'ne stop service and information unit& that promises great benefits to all.

.e"erences $ooks :1; !aughton Schildt - Kava * #he complete reference :2; Kames Keogh - K*55 #he complete reference

8eb sites Q-R www.sbi.com Q*R www.statebankofindia.com Q0R www.hsbc.co.in Q+R www.icicibank.com '%t%re Enhancement In this pro7ect only part of the e-banking features are implemented. In the future the complete features of the banking process can be built into this system.

You might also like