Project Report On On Line Banking: Amritsar For The Partial Fulfillment of The Requirement For The Award of Degree of
Project Report On On Line Banking: Amritsar For The Partial Fulfillment of The Requirement For The Award of Degree of
Submitted to
Guru Nanak Dev University, Amritsar For the partial fulfillment of the Requirement for the award of degree of
Master of Information Technology (2013-2014)
Submitted To:
Ms.Sonia Grover (Assist.Professor In comp science dept of S.H.D.K.M.V)
Submitted By:
Rajdeep Kaur & Rajbir kaur
This is to certify that the project entitled Online Banking submitted by Rajdeep Kaur & Rajbir Kaur for the partial fulfillment of the degree of M.SC.IT(SEM-IV) is an authentic piece of work carried out under our supervision and guidance.
(H.O.D)
(Project Guide)
ACKNOWLEDGEMENT
We are short of words to express our thankfulness to all the distinguished people who during the course of our work gave us their unflinching support and valuable guidance, which helped us to make our endeavor a success.
We give our profound thanks as we cherish the inspiring ideas, constant encouragement and earnest interest shown by our project guide Ms.Sonia Grover. Inspite of her hectic schedule she was always approachable & took her time off to our problems & gave the appropriate advice.
We also express our profound sense of gratitude to Dr. Simmi Bagga (HOD comp sci, Deptt) and the whole computer staff for successful our project & for time to time enunciating concept related to it. completion of
In all we aim at building better professionals for tomorrow and for this purpose, we provide Training through skilled trainers. 1)Candidates get learn both the soft skills as well as the interview skills under the same roof which is extremely beneficial in shaping their career. 2) Innovation in Technology Training and Consulting. 3) Curriculums mapped with Industry Requirement. 4) State-of-the art IT laboratories and communication set-up.
5) To impart higher education along with moral and ethical values enshrined in our great scriptures. 6) To empower women through vocational and professional education. 7)To focus on developing the total personality of women so that they may become an asset for society and nation. 8)To preserve and apprise our students with rich spiritual and cosmopolitan heritage of India through education programmers. S.H.D.K.V College has started its journey with limited resources, but since the whole team was totally dedicated toward the development .Our college is one of the main college of rural section of Punjab.
INDEX
SR. NO. 1. 2. 3. 4. TITLE PAGE NUMBER 5-7 8 10-12 13-19
Introduction to project Objectives & Scope Modules Requirement & Analysis System Design
5.
20-41
Screen shots
6..
42-61
7. 8. 9. 10.
Introduction to Project
Online banking is one of the great conveniences of the 21st century. Instead of writing checks to pay bills, you just go to a website or your bank's bill paying program, and the money is sent directly from your account to the person you owe. Online banking also allows you to have your checks deposited electronically by your employer, and allows you to see an up-todate snapshot of your financial position in real time
Online banking is convenient because, unlike the brick and mortar bank, the online bank never closes. You can check your account, shop online, transfer funds from one account to another, all online. If you need cash, it's only as far away as the nearest ATM. Even if you are traveling, you have access to your accounts anywhere you can get Internet access.
Online banking is also quick. Do you need to transfer money to a spouse or partner but not have time to go to the bank? A couple of clicks on your online bank and it's done. You can also pay car loans, mortgage payments, utilities, and most any other regular payment online. Many companies now have payment portals where you can enter your account number and make a payment. You can even set up automatic payments so you don't even have to remember.
Many online banking accounts also offer features that make banking more enjoyable. You can often track portfolios, apply for loans, download transactions into Quicken or Money, develop a budget, or even find out your credit score without leaving your home.
About Application
Looking for an online comprehensive solution to manage Internet banking. This will be accessible to all customers who have a valid User Id and Password. This system provides the following facilities: * Balance Enquiry. * Funds Transfer to another account in the same bank. * Request for cheque book/change of address /stop payment of cheques. * Viewing Monthly and annual statements. The Traditional way of maintaining details of a user in a bank was to enter the details and record them. Every time the user need to perform some transactions he has to go to bank and perform the necessary actions, which may not be so feasible all the time. It may be a hardhitting task for the users and the bankers too. The project gives real life understanding of Online Banking System and activities performed by various roles in the supply chain. Here, we provide an automation for banking system through Internet. Online Banking System project captures activities performed by different roles in real life banking which provides enhanced techniques for maintaining the required information upto-date, which results in efficiency.
Embedded System:
An embedded system is a computer system designed for specific control functions within a larger system often with real-time computing constraints. It is embedded as a part of a complete device often including hardware and mechanical parts. By contrast, a general-purpose computer, such as a personal computer (PC), is designed to be flexible and to meet a wide range of end-user needs. Embedded systems control many devices in common use today. In this, the 8051 micro-controller Rs-232(serial port) interface, magnetic locks are linked together.
Users Demonstrable Needs :Here we identity the main objectives and functionalities of our system that are seeked by various end users. Our system must implement them successfully to be accepted by the user. 1. Customer must have a valid User Id and password to login to the system. 2. If a wrong password is given thrice in succession, that account will be locked and the customer will not be able to use it. When an invalid password is entered a warning is given to the user that his account is going to get locked. 3. After the valid user logs in he is shown the list of accounts he has with the bank. 4. On selecting the desired account he is taken to a page which shows the present balance in that particular account number. 5. User can request details of the last n number of transactions he has performed. 6. User can make a funds transfer to another account in the same bank. User is provided with a transaction password which is different from the login password. 7. User can transfer funds from his account to any other account with this bank. If the transaction is successful a notification should appear to the customer, in case it is unsuccessful, a proper message should be given to the customer as to why it failed. 8. User can request for cheque book/change of address/stop payment of cheques. FEATURES: Secure. Easy to Install. Reliable and Accurate. Graphical User Interface. Since benefits out base the cost, hence our project is economically feasible.
Flexiblity.
Modules
Login Module Allows user to enter his account by providing his ID and password to his account. If the provided id or password is incorrect the fields are cleared and user is asked to enter the id and password again.
There are some login modules explained as above. User can have facility to change password and change it to new one.
Our dot net program will communicate with the serial port to interact with the 8051 microcontroller which will further control the magnetic locks through relays. Basic C language is used for performing functioning of 8051 microcontroller.
PROJECT REQUIREMENTS
SOFTWARE REQUIREMENTS:
Front-End
HARDWARE REQUIREMENTS:
The software is to run under Windows 7 Operating System or above versions. 1 GB RAM and 300GB HD.
INTRODUCTION TO ASP.NET
.Net Framework
.NET is an environment/platform designed specially for Internet applications although Desktop applications are also possible. It is not platform independent. .NET Framework is: A component model for the Internet. The new approach to building large scale distributed systems for the Internet.
Provides the capability to integrate multiple devices. Built around the tools and protocols (XML, WSDL, SOAP, HTTP) that are becoming
Thus, .NET Framework is a collection of tools, technologies and languages which work together to communicate on multiple platforms. It is composed of classes and services that form a layer between applications and operating system. All applications developed under the .NET Framework; including ASP.NET applications, have certain key features that ensure compatibility, security and stability.
Design features:
Interoperability: Because computer systems commonly require interaction between new and older applications, the .NET Framework provides means to access functionality that is implemented in programs that execute outside the .NET environment. Common Language Runtime Engine: The Common Language Runtime (CLR) is the execution engine of the .NET Framework. All .NET programs execute under the supervision of the CLR, guaranteeing certain properties and behaviors in the areas of memory management, security, and exception handling. Language Independence: The .NET Framework introduces a Common Type System, or CTS. The CTS specification defines all possible data types and programming constructs supported by the CLR and how they may or may not interact with each other conforming to the Common Language Infrastructure (CLI) specification. Because of this feature, the .NET Framework supports the exchange of types and object instances between libraries and applications written using any conforming .NET language.
Base Class Library: The Base Class Library (BCL), part of the Framework Class Library (FCL), is a library of functionality available to all languages using the .NET Framework. The BCL provides classes which encapsulate a number of common functions,
including file reading and writing,graphic rendering database interaction, XML document manipulation and so on.
Simplified Deployment The .NET Framework includes design features and tools that help manage the installation of computer software to ensure that it does not interfere with previously installed software, and that it conforms to security requirements.
Security The design is meant to address some of the vulnerabilities, such as buffer overflows, that have been exploited by malicious software. Additionally, .NET provides a common security model for all applications.
Portability While Microsoft has never implemented the full framework on any system except Microsoft Windows, the framework is engineered to be platform agnostic, and cross-platform implementations are available for other operating systems (see Silver light and the Alternative implementations section below). Microsoft submitted the specifications for the Common Language Infrastructure (which includes the core class libraries, Common Type System, and the Common Intermediate Language), the C# language, and the C++/CLI language to both ECMA and the ISO, making them available as open standards. This makes it possible for third parties to create compatible implementations of the framework and its languages on other platforms.
ARCHITECTURE:
The following figure shows various components of .Net Framework Architecture:
ADO.NET
When working with classic asp we had ADO, object model for communication with the database. Microsoft.NET has introduced ADO.NET components that lets the developer communicate with the database more efficiently and easily. In this article we will see how we can make use of the ADO.NET classes to perform different operations on the database.
Query Analyzer:
The SQL Server Query Analyzer allows us to create adhoc queries and run them interactively. We may also execute Transact-SQL (T-SQL) statements stored in text files and view the result in result plane or result grid. The Query Analyzer also has a color-coded editor to assist the user with checking of syntax. It also has context sensitive help. Queries are processed in two steps:
Flow Diagram
Introduction The Data Flow Diagram (DFD) provides a graphical representation of the flow of data through a system. It shows logically what information is exchanged by our system processes and external interfaces or data stores, but it does not explicitly show when or in what sequence the information is exchanged. Data Flow Diagrams are one of the three essential perspectives of the Structured Systems Analysis and Design Method (SSADM) that predates the more recent object oriented design methods and notations such as UML. This does not mean that the DFD has lost its usefulness even for new analysis endeavors, and any business analyst is bound to encounter them while reviewing the original design documentation for legacy systems.
Introduction to DFD
The Data Flow Diagram (DFD) provides a graphical representation of the flow of data through a system. It shows logically what information is exchanged by our system processes and external interfaces or data stores, but it does not explicitly show when or in what sequence the information is exchanged. Data Flow Diagrams are one of the three essential perspectives of the Structured Systems Analysis and Design Method (SSADM) that predates the more recent object oriented design methods and notations such as UML. This does not mean that the DFD has lost its usefulness even for new analysis endeavors, and any business analyst is bound to encounter them while reviewing the original design documentation for legacy systems.
Context Diagram A System Context Diagram is the highest level view of a system, similar to Block Diagram, showing a (normally software-based) system as a whole and its inputs and outputs from/to external factors. The Context Diagrams show the interactions between a system and other actors with which the system is designed to face. They are also typically drawn using labeled boxes to represent each of the external entities and another labeled box to represent the system being developed. The relationship is drawn as a line between the entities and the system being developed [7].
Context Diagram is a data flow diagram showing data flows between a generalized application within the domain and the other entities and abstractions with which it communicates. One thing that differentiates the use of data flow diagrams in domain analysis from other typical uses is that the variability of the data flows across the domain boundary must be accounted for with either a set of diagrams or text describing the differences [8]. Before we construct the actual process model, we need to establish initial project scope. A project is scope defines what aspect of the business a system or application is supposed to support. It also defines how the system or application being modeled must interact with other systems and the business as a whole. A projects scope is documented with a context diagram [8].
USER
ADMIN
Description:
Here user or admin can enter to web based home access system and respectively user can check or edit the status of home and admin can view or update or add further details regarding users reference id or registration but if the user and admin are authenticated.
ADMIN
REFERENCE TABLE
REGISTRATION TABLE
Description:
Here admin will enter the login id and password. If it is valid then only the admin can logged in otherwise redirected to same Home page. After authentication of login process the admin can edit or update or add user details of reference id from reference table and registration data or details from registration table. After editing and adding user details the admin can LOGOUT.
USER
REGISTRATION TABLE
Description:
If the user is not registered then it goes for registration process and enters users profile information. it is added to registration table and after the registration successful message is displayed.
The second case is if the user is already registered then is to be logged in. after login authentication user can check lock status. If the user wants to edit the current door lock status then it can go to edit button on check status page. After that the user can directly logout from edit and check status page.
The third case is this after user login is authenticated it can edit its accounts information by clicking on my account link button. The user can edit account and change password.
MY ACCOUNT
REGISTRATION TABLE
Description:
After user login is authenticated it can edit its accounts information by clicking on my account link button. The user can edit account and change password. The edit user account information and change password is done from registration table. During password changes, the password is attempted to change with new password from an old existing password and it is done to be changed within registration table and after password changed successfully message is displayed.
After changing the password or editing the user account information the user can go to CHECK LOCK STATUS page or directly LOGOUT
USER
If Already Registered?
Yes
If Valid?
No CREATE AN ACCOUNT
REFERENCE TABLE
No
REGISTRATION TABLE
Database Design
The Data type that a Cell can hold:
Data Type Char (size) Description This data type is used to store character strings values of fixed length. The size in brackets determines the : number of characters the cell can hold. The maximum number of characters this data type can hold is 255 characters : This data type is used to store variable length alphanumeric data. The maximum this data type can
varchar (size)
hold is 2000 character. nvarchar (size) : This data type is used to store variable length alphanumeric data. The maximum this data type can hold can be specified in brackets. : The int data type is used to store numbers (fixed of floating point). Numbers of virtually any magnitude may be stored up to 10 digits of precision. : This data type is used to represent data and time. The standard format is DD-MM-YY as in 24-JAN-03. To enter dates other than the standard format, use the appropriate functions. Date Time stores date in the 24hour format. : This format is used to store date in a small format not to lengthy. : This data type is used to store variable length character strings containing up to 2GB. LONG data can be store arrays of binary data in ASCII format.
int (P, S)
DATE
Smalldatetime
Long
Description:
This table stores details of users who are provided with RefId in this website. Refid is allocated to the customers who are provided with HomeAcess System. Each user is given a unique RefId. RefId is the primary key field and it must have unique and not null value.
It stores the information of User. The Refid is the unique id provided to the user who has owned the Web Based Home Security System, Name of the User, Address of users house, is the special Id provided to user to access.
Description: The Registration table stores the details of users who are already registered this website. Each user is given a unique user_name. user_name key field and it must have unique and not null value. It stores the information of User. The RefId of the User, the first_name and last_name of the user, gender, date_of_birth, email, occupation, address, country, state, nationality, telephone, mobile_no , password and agreement fields.These all are to be filled necessarily by the user at the time of registration while completing the registration form. These fields are to be filled and not left empty as these fields are provided by not null constraint which means the field is must to be filled and cannot left empty. Here one important thing is to be noticed that in the registration table the refid is to be taken as Foreign Key. when the admin is to edit the reference id of the user for example is to remove the refid of user in case no longer need of the access system and respectively no need of refid.so the admin is to remove refid from Reference Table and correspondingly the changes will be reflected in the Registration table also.In the context of relational databases, a foreign key is a referential. in
is the primary
Description:
The User Log table is the table that contains all the information about the timings and dates of user logging in and log out. Here each user_id column describes the identity of the user, which is unique foe every user.This table contains seven columns, the first columns is reference id of integer type which is taken from registration table, nulls are allowed. The other columns are User_id, User_name, SID, Login_time, Logout_time, offline. The important thing about this table is that it is used in keeping tracks of the users with the help of date time datatype. It helps in reports generation in the admin panel. The refid belongs to the reference table, so there is a primary key/foreign relation \ship in these two tables. The refid is primary key in reference table and foreign key in User Log table.
Description:
The country table is made to display names of states according to their respective countries in the drop down list panel in the registration page of our website. The country table has two columns one is for displaying name of the country in registration table. His table stores of varchar(50) type data. Varchar data type is used to store variable length alphanumeric data. In this database table we used data type varchar with size 50.
Description:
The Feedback table,it has four columns namely name,Email, Subject, Feedback. The name specifies the name of the user who is going through the website, it is of varchar(50) type of data, and nulls are allowed throughout the whole table. The Email is the email id of the user it also stores varchar type of data.subject is the name of the topic. It is specific to the user,s feedback. Feedback is the information provided by the user in order to improve the website. It directly goes to the admin, and feedbacks are daily visited by the user.
Description:
The Profilepic table stores the information about the change of the profile picture by the user. It has three fields pid, last_name, image. Pid is incremented automatically as the user changes its profile picture. This table has no primary key/ foreign key relationship with any table. This table is made just to keep the the record of profile pictures changed by the users. This is just for user interactivity. The image column is of varbinary(max) type, it means it can store any kind of image format i.e. .jpeg, .gif, .png or any else.
Description:
Ozekimessagein table is used to store the information about the message sender receiver, message text; message sent and receives time, and message type. The message is sent to the users mobile number from the website by the admin. s
Description:
Ozekimessageout table is used to store the information about the message that has been sent by admin .It contains information about sender receiver, message text, message sent and receive time, status, error message and message type. Etc.
Home Access
Description: This Home Page Screen shots showing the room and kitchen pictures. Login Page
Description: This is login page. User/ admin both can login with his/her username and Password.
Description: Admin can login with his user name and password.
Description: Admin can Add New Users by Login as username and Password.
Users Detail
Description: Admin Can View Users detail. He can edit or delete is also.
Description: Admin can track the users who is online or offline at what time.
Feedback Form
Description: This form shows the Feedback given by users. Only admin can view this form.
Description: This form shows that registered user can login from here.
Registration Form
Description: User can registered with the help of register form by filling detail about him/her.
Users Login:
Description: This form shows the users Profile. This contains Account information, Status and Update Profile Picture etc.
Description: This form shows the process of changing picture of users profile.
Description: This form showing Changed Profile Picture as according to users requirement.
Edit Profile
Description: User can edit his/her Profile detail by clicking on My Account option. Update Profile Successfully
View Status
Description: By using this Form user can check/ edit doors status.
Description: After editing the status of door, when we check the door status it will display on screen.
Products
Description: User can see Products Detail from the Product page that is used.
Contact Us:
Description: User can Contact us through the give information in the form of Contact us.
About Us:
Implementation is the part of the process where software engineers actually program the code for the project. Implementation phase deals with the issues of quality, performance and debugging. Software testing is an integral and important part of the software development process. This part of the process ensures that defects are recognized as early as possible. Aim of testing is to identify all defects existing in the software product. Testing can be of following types: Black box testing also called functional testing in which test cases are designed using only the functional specification of the software.. One white box testing strategy is said to be stronger than another strategy, if all type of errors detected by the first testing strategy are also detected by the second testing strategy, and the second testing strategy additionally detects some more type of errors. When two testing strategies detect errors that are different at least with respect to some type of errors, then they are called complementary. Unit testing is the testing of different modules of a system in isolation. While, objective of integration testing is to test the module interfaces i.e. there are no errors in the parameter passing, when one module invokes another module. In it different modules are integrated in a planned manner. Integration test approaches are big-bang approach, top-down approach, bottom-up approach and mixed approach Using documents helps users in effectively using the system. Production of good documents helps the manager in effectively tracking the progress of the project. The project manager knows that measurable progress is achieved if a piece of work is done and the required documents have been produced and reviewed. It is very important to document everything in the project.
Description: if any of invalid user trying to login then error message will be displayed.
Forgot Password:
Description: If any of users forgot his/her password then he can regain it by following the instructions.
Description: User can collect his/she forgot password from the Email address.
Description: As we have checked from the Email Address we got password in its inbox.
My Account
Change Password
Description: This shows that the password has been changed by user successfully.
CONCLUSION
It is concluded that when we started working with asp.net in c#, the project we decided, its modules, its functioning and its designing all was done successfully under the guidance of
trainer. The researches and experiments e made all ads on to our knowledge and also helps us to improve the working of our projects.
The modules were finished within the time bounds we decided, and efficiently. We are thinking to carry our project work further. This Website is working efficiently for the security purpose as well. So at the end we are feeling glad to work with our team members, guidance of madam, and the project work and the enhancements in our skills.
Future Enhancement
This website is running according to our planned criteria, so we are thinking to carry it on in future with some more features and enhancements in its functioning.
For the recommendation in future we are thinking following enhancements in our projects.
The first thing we want to introduce is the concept of alarms; these alarms will work if someone is trying to enter the house without permission of the owner of the home. This we will do by using website, with the help of c#.
The next concept is informing the user that a guest is coming to its house, with the help of sensors.
This concept of using magnetic locks at home, an expand up to company level, we will make it more secure.
BIBLIOGRAPHY
BOOKS:
Learn ASP.Net
The MSDN Library is the essential reference for developers, with more than a gigabyte of technical programming information; including sample code,documentation,technical articles, the Microsoft Developer Knowledge Base, and anything else we might need to develop solutions that implement Microsoft technology.