I Banking
I Banking
I Banking
i-Banking
DateofSubmission:18042012
Submittedby:
VIJAYJHA
CSE/10/447
VISHAKHAVASHISHT
CSE/10/448
(Approved by AICTE, Ministry of HRD, Govt of India & DTE, Govt of Haryana
INDEX
1. INTRODUCTION
1.1 Background
1.2 Objectives
1.3 Purpose and Scope
1.3.1 Purpose
1.3.2 Scope
2. SURVEY OF TECHNOLOGIES
3. REQUIREMENTS AND ANALYSIS
3.1 Problem Definition
3.2 Preliminary Product Description
3.3 Requirement Specification
3.4 Hardware and Software Requirements
3.5 Conceptual Models
3.5.1 Use Case Diagrams
3.5.2 Data Flow Diagrams
3.5.3 Entity Relationship Diagram
3.5.5 Data Structures
4. SECURITY MECHANISMS
5. FUTURE SCOPE
6. REFERENCES
1.
1.1
INTRODUCTION
Background
paper bills at
with
Account holder. But in regular system there are no more interactions with An
account holder or trustee. Authorities of Internet -Banking system can Provides
the greater knowledge on Internet -Banking and they can effectively Explain in
broader sense.
1.2 Objectives
As the name of the project is INTERNET Banking its main objective is to
provide an efficient and effective way to manage all information related to
customers who access account-specific information and possibly conduct
transactions from a remote location - such as at home or at the workplace.
The project has been developed to achieve the following objectives:
To have a central database which stores all the data at a single
place. If at all any changes need to be made it would it would
be done at a single place. In this way duplication of data is
reduced and hence helps in efficient space utilization.
Once you have logged into the E-Banking, a session can last as long as
10 minutes. After this time has elapsed, the system will logout requiring you to
sign on again. This feature is for your safety and protection. If you were to leave
your computer for any reason while still logged into the e-Banking, this feature
will allow only a short period of time to elapse for an unwanted person to access
your account information.
4. Easy to Signing In
Once you are at the Login screen you will need to enter your Customer
Code and Password.
1.3.2 Scope
The Internet banking portal of our bank, enables its retail banking customers to
operate their accounts all across India, removing the restrictions imposed by
geography and time. It's a platform that enables the customers to carry out their
banking activities from their desktop, aided by the power and convenience of the
Internet. Availing the Internet banking services, you can do the following normal
banking transactions online:
Self-account funds transfer .
Above all, you can transfer funds between your accounts held at several
locations. All this and much more from your desktop.
2.
SURVEY OF TECHNOLOGIES
.NET Framework
The .NET Framework is the infrastructure for the new Microsoft .NET Platform.
The .NET Framework is a common environment for building, deploying, and
running Web Services and Web Applications. The .NET Framework contains
common class libraries - like ADO.NET, ASP.NET and Windows Forms - to
provide advanced standard services that can be integrated into a variety of
computer systems. The .NET Framework is language neutral. Currently it
supports C++, C#, Visual Basic, JScript (The Microsoft version of JavaScript) and
COBOL. Third-party languages - like Eiffel, Perl, Python, Smalltalk, and others will also be available for building future .NET Framework applications.
The new Visual Studio.NET is a common development environment for the
new .NET Framework. It provides a feature-rich application execution
environment, simplified development and easy integration between a number of
different development languages.
Introduction to Microsoft ASP.NET
ASP.NET is the latest version of Microsoft's Active Server Pages technology
(ASP). ASP.NET is a part of the Microsoft .NET framework, and a powerful tool
for creating dynamic and interactive web pages. ASP.NET has better language
support, a large set of new controls and XML based components, and better user
authentication. ASP.NET provides increased performance by running compiled
code. ASP.NET code is not fully backward compatible with ASP. ASP.NET is a
programming framework built on the common language runtime that can be used
on a server to build powerful Web applications. ASP.NET is a server side
scripting technology that enables scripts (embedded in web pages) to be
executed by an Internet server.
ASP.NET File
An ASP.NET file is just the same as an HTML file
An ASP.NET file can contain HTML, XML, and scripts
Scripts in an ASP.NET file are executed on the server
An ASP.NET file has the file extension ".aspx"
MICROSOFT SQL SERVER
SQL (commonly expanded to Structured Query Language) is the most popular
computer language used to create, modify, retrieve and manipulate data from
relational database management systems. The language has evolved beyond its
original purpose to support object-relational database management systems. It is
an ANSI/ISO standard.
Microsoft SQL Server is a relational database management system (RDBMS)
produced by Microsoft. Its primary query language is Transact-SQL, an
implementation of the ANSI/ISO standard Structured Query Language (SQL)
used by both Microsoft and Sybase. SQL Server is commonly used by
businesses for small- to medium-sized databases, but the past five years have
seen greater adoption of the product for larger enterprise databases.
Sybase SQL Server was the name of Sybase Corporation's primary relational
database management system product from 1987 to 1995. It was originally
created for UNIX platforms in 1987.To adapt the SQL to Microsoft SQL Server,
the company developed Transact-SQL as Microsoft's implementation of SQL.
Transact-SQL is the language used internally by Microsoft SQL Server and
MSDE. Although SQL Server highly adheres to the SQL standards, it has some
internal details that may not be applied to other database systems like MySQL,
Oracle, or even Microsoft Access, etc; although they too fairly conform to the
standard. As a computer language, the SQL is used to give instructions to an
internal program called an interpreter.
CONNECTIVITY
SQLDirect .NET is an enhanced data provider for SQL Server that builds on
ADO.NET technology and SqlClient to present a complete solution for developing
SQL Server-based database applications. As part of the Core Lab database
application development framework, SQLDirect .NET offers both high
performance native connectivity to SQL Server and a number of innovative
development tools and technologies.SQLDirect .NET introduces new approaches
for designing application architecture, boosts productivity, and leverages
database application implementation.
ADO.NET Overview
ADO.NET is an evolution of the ADO data access model that directly
addresses user requirements for developing scalable applications. It was
7
designed specifically for the web with scalability, statelessness, and XML
in mind.
ADO.NET uses some ADO objects, such as the Connection and Command
objects, and also introduces new objects. Key new ADO.NET objects include the
DataSet, DataReader, and DataAdapter.
The important distinction between this evolved stage of ADO.NET and previous
data architectures is that there exists an object -- the DataSet -- that is separate
and distinct from any data stores. Because of that, the DataSet functions as a
standalone entity. You can think of the DataSet as an always disconnected
recordset that knows nothing about the source or destination of the data it
contains. Inside a DataSet, much like in a database, there are tables, columns,
relationships, constraints, views, and so forth.
A DataAdapter is the object that connects to the database to fill the DataSet.
Then, it connects back to the database to update the data there, based on
operations performed while the DataSet held the data. In the past, data
processing has been primarily connection-based. Now, in an effort to make multitiered apps more efficient, data processing is turning to a message-based
approach that revolves around chunks of information. At the center of this
approach is the DataAdapter, which provides a bridge to retrieve and save data
between a DataSet and its source data store. It accomplishes this by means of
requests to the appropriate SQL commands made against the data store.
The XML-based DataSet object provides a consistent programming model that
works with all models of data storage: flat, relational, and hierarchical. It does this
by having no 'knowledge' of the source of its data, and by representing the data
that it holds as collections and data types. No matter what the source of the data
within the DataSet is, it is manipulated through the same set of standard APIs
exposed through the DataSet and its subordinate objects.
While the DataSet has no knowledge of the source of its data, the managed
provider has detailed and specific information. The role of the managed provider
is to connect, fill, and persist the DataSet to and from data stores. The OLE DB
and SQL Server .NET Data Providers (System.Data.OleDb and
System.Data.SqlClient) that are part of the .Net Framework provide four basic
objects: the Command, Connection, DataReader and DataAdapter. In the
remaining sections of this document, we'll walk through each part of the DataSet
and the OLE DB/SQL Server .NET Data Providers explaining what they are, and
how to program against them.
The following sections will introduce you to some objects that have evolved, and
some that are new. These objects are:
3.2
Administrator:
proposed
system
categories
and
follows
these
functionalities
to
implement.
Create new account
Login Component
Balance Enquiry
Funds Transfer
Demand draft processing
Request for cheque books/change of address/stop payment of cheques.
Viewing Statements
System Help
Logout
Description:
CREATE NEW ACCOUNT :
In this module the new customer makes the request for creating new
account. For creating new account information is accepted from customer and
verified. After the verification of the information new account for the customer is
created and the account information is stored in account database. On the other
hand the employee will check for the details of the existing customer accounts
that can be retrieved from the account database.
LOGIN COMPONENT:
Customer must have a valid user id and password to the system.
If a wrong password is given thrice in succession that account will be locked
and the customer will not be able the use it .When an invalid password is
entered a warning is given to the user that his
locked.
After the valid user logs in he is shown the list of accounts he is the list of
accounts he has with the bank.
BALANCE ENQUIRY:
10
particular account
number.
FUNDS TRANSFER:
This interface
bank. User is provided with a transaction password which is different from the
login and password.
If the transaction is successful a notification should appear to the customer. In
case it is unsuccessful a proper message should be given to the customer as to
why it failed.
DEMAND DRAFT PROCESSING :
This module is responsible for the processing of Demand Drafts (DD). The
customer initially places the request for the creation of DDs and enters the details
for it. Once the details are entered employee verifies this and DD is generated
with the help of taking information from the account database about amount and
update it. DD information is stored in DD database.
VIEWING STATEMENTS:
User can view his monthly as well as annual statements. He can also take print
out of the same.
SYSTEM HELP:
Proper help is provided as and when requested by the user.
LOGOUT:
Logout from the system.
3.3 Requirement Specification
Internet banking is the new buzz word around the corner. Forget traditional
banking and the way you used up to queue to get the transactions done. Internet
banking is here to change that all. Now banking is no more taking out time from
your schedule and to start with finding a place in the car park and then waiting for
11
your turn to get to the counter. Internet banking gives you the freedom to do
banking at your finger clicks.
Introduce yourself to internet banking. Now you can do the transactions sitting
right into your office cubicle or from your home. It can be said that with this the
new era of banking has arrived and for the better of it. Internet banking is simple
for anyone who has a access to internet. It certainly is beneficial compared to the
traditional way of banking. You simply use internet instead of using paper or
phone to access your account and can enjoy it from virtually anywhere.
First, online banking is convenient. It allows you to perform transaction, pay bills
and cheque balances 24 hours a day , 7 days a week. The bank virtually never
closes because it is accessible at your PC or laptop computer.No matter where
you are in the country or in the world,you can visit your online bank and handle
money matters.
Second, online banking is fast,efficient and effective.Through the
internet,
a) Hardware:
1) HDD capacity
40 Gb with 3 Gb free
2) RAM
256 MB
3) CPU
b) Software:
1) Operating system
Windows XP
2) Tools
3) Database(Backend)
12
LOGIN
BAL ENQUIRY
TRANSACTIONS
REQ FOR
DEMAND DRAFT
ACCOUNT
HOLDER
ADMINISTRATOR
REQ FOR
CHEQUE BOOK
A/C CONTROL
CUSTOMER
CONTROL
LOGOUT
13
Data
Flow
Diagrams: These
diagrams describe
the
system
Customer
Administrator
BANKING
SYSTEM
DATABASE
14
Level-0 DFD
User ID/Password
UserID/Password
Customer
1. Login
Failure
Login
Success
Login
Success
Response
Administrator
Failure
Request
Request
Response
2. Bank
Account
Management
3. User
Account
Management
Banking Info
15
Level-1 DFD
Customer
User ID/Password
UserID/Password
Administrator
1.1 Login
Verification
Retry
Message
Failure
Login
Success
Retry
Message
Failure
Request
1.2 Show
Retry Login
Page
1.2. Show
Retry
Login Page
Login Info
Request
3.1 Show
Admin
Options Page
2.1 Show
User Options
Page
3.2
Create
Account
2.2 Choose
Account
2.2
Check
Balance
2.3
Fund
Transfe
r
2.4
View
Statem
ent
2.5
Reques
t for
DD
3.3
Update/
Delete
Account
2.6 Stop
Cheque
Payment
3.4
Manage
Pending
Request
s
2.7
Request
for
Cheque
book
Request Catalogue
16
Level-2 DFD
3.5.3 ENTITY RELATIONSHIP DIAGRAMS
ER Diagrams represent the relationship between the entities. An ER diagram is
composed of
Entity is shown by rectangle.
Attribute is shown by oval.
Relationships with rhombus.
Optional is shown by circle.
Compulsory with dash.
Primary key with underscore.
C_Phon
e
C_nam
e
C_id
C_Add
C_mail
Customer
ACC_I
D
Acc_ID
Acc_Type
Account
H
as
I
N
Perfor
m
Amount
T_ID
B_I
D
Branch
B_Tel
B_Name
B_Add
B_City
Transaction
T_dat
e
T_Typ
e
Pay_At
Balanc
e
T_Mode
Pay_to
Acc_I
D
17
Length
Cid
2
Cname
20
DOB
Address
20
City
10
State
10
PIN
6
Email
20
Telno
10
Mobno
10
Marital_status
1
Qualification
6
Password
10
Table: Customer_Account
Type
Number
Char
Date
Varchar
Char
Char
Number
Varchar
Number
Number
Char
Char
Varchar
Name
Length
Type
Acc_no
Pbookno
Acctype
DOC
Bid
10
10
10
5
Number
Number
Char
Date
Number
Balance
Acc_status
10
8
Float
Char
Integrity
Constraint
Primary Key
Integrity
Constraint
Unique
Unique
Foreign key
(Branch)
18
Cid
Number
Foreign Key
(Customer)
Table : Transaction
Name
Length
Type
Tid
Accno
Trdate
Type
PayAt
PayTo
Balance
Table: Branch
2
10
10
10
10
10
Number
Number
Date
Char
Number
Number
Float
Name
Length
Type
Bid
Bname
Baddress
Bcity
Bstate
Bpin
Btel
MgrID
Table: Employee
1
10
15
10
10
10
10
3
Number
Char
Varchar
Char
Char
Number
Number
Number
Name
Length
Type
Integrity
Constraint
Primary Key
Unique
Integrity
Constraint
Primary Key
Unique
Integrity
Constraint
Ename
Egender
EdoB
Eaddress
Ecity
Estate
Epin
E-Email
E-tel
Edesig
Emartial_status
Estatus
Table:Account_type
Name
15
1
20
10
10
10
20
10
10
10
10
Length
Char
Char
Date
Varchar
Char
Char
Char
Varchar
Number
Char
Char
Char
Type
Integrity
Constraint
19
Acc_Code
Acc_Type
Table:PassBook
3
10
Number
Char
Primary Key
Name
Length
Type
Integrity
Pbookno
Acc_no
Description
IssuedOn
AccBalance
Table:Request
10
10
20
10
Number
Number
Char
Date
Float
Name
Length
Type
Rid
RfromAccno
Rdesc
3
10
20
Number
Number
Char
Constraint
Unique
Unique
Integrity
Constraint
Primary Key
4. Security Mechanisms
A Security Mechanism is a mechanism designed to detect, prevent, or recover
from a security attack. These mechanisms need to be incorporated at
appropriate protocol layer. I enlist some of the mechanisms used in this report
are:
Decipherment- Transforming the data to a form that is not readily intelligible.
Access Control- A variety of mechanisms (ACLs, user permissions etc.) that
enforce access rights to resources
Data Integrity- A variety of mechanisms Hashing etc. used to assure the
integrity of data
Authentication Exchange- A mechanism intended to ensure the identity of an
entity by means of information exchange
Traffic Padding- Insertion of bits into gaps in a data stream to frustrate traffic
analysis attempts.
Routing Control- Enables selection of particular physically secure routes for
certain data and allows routing changes
20
6. REFERENCES
1. Study Material Provided By IGNOU
2. www.microsoft.com
3. http://www.santanu.in/forums/
4. www.dotnetspider.com
5. (Bipin 01) Bipin C. Desai, An Introduction to Database Systems
6. (Pankaj 98) Pankaj Jalote, Software Engineering , BPB Pub
21