0% found this document useful (0 votes)
49 views

Project Report On On Line Banking: Amritsar For The Partial Fulfillment of The Requirement For The Award of Degree of

This document summarizes a project report on an online banking system submitted for a master's degree program. The report was submitted by Rajdeep Kaur and Rajbir Kaur to their project guide Ms. Sonia Grover at Guru Nanak Dev University, Amritsar. The project aims to develop an online banking application that allows users to perform basic banking tasks securely from anywhere via the internet. It includes modules for user login, viewing account balances and transaction histories, funds transfers between accounts, and requests for banking services like cheque books or address changes. The system was designed to make banking more convenient and improve efficiency over traditional in-person methods.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
49 views

Project Report On On Line Banking: Amritsar For The Partial Fulfillment of The Requirement For The Award of Degree of

This document summarizes a project report on an online banking system submitted for a master's degree program. The report was submitted by Rajdeep Kaur and Rajbir Kaur to their project guide Ms. Sonia Grover at Guru Nanak Dev University, Amritsar. The project aims to develop an online banking application that allows users to perform basic banking tasks securely from anywhere via the internet. It includes modules for user login, viewing account balances and transaction histories, funds transfers between accounts, and requests for banking services like cheque books or address changes. The system was designed to make banking more convenient and improve efficiency over traditional in-person methods.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 70

Project Report On On line Banking

Submitted to

Guru Nanak Dev University, Amritsar For the partial fulfillment of the Requirement for the award of degree of
Master of Information Technology (2013-2014)

Submitted To:
Ms.Sonia Grover (Assist.Professor In comp science dept of S.H.D.K.M.V)

Submitted By:
Rajdeep Kaur & Rajbir kaur

Dept. of Computer Science and engineering

This is to certify that the project entitled Online Banking submitted by Rajdeep Kaur & Rajbir Kaur for the partial fulfillment of the degree of M.SC.IT(SEM-IV) is an authentic piece of work carried out under our supervision and guidance.

Dr. Simmi Bagga

Ms. Sonia Grover

(H.O.D)

(Project Guide)

ACKNOWLEDGEMENT

We are short of words to express our thankfulness to all the distinguished people who during the course of our work gave us their unflinching support and valuable guidance, which helped us to make our endeavor a success.

We give our profound thanks as we cherish the inspiring ideas, constant encouragement and earnest interest shown by our project guide Ms.Sonia Grover. Inspite of her hectic schedule she was always approachable & took her time off to our problems & gave the appropriate advice.

We also express our profound sense of gratitude to Dr. Simmi Bagga (HOD comp sci, Deptt) and the whole computer staff for successful our project & for time to time enunciating concept related to it. completion of

Rajdeep Kaur & Rajbir Kaur

S.H.D.K.M.V Kala Sanghian


A college has unique role to play in shaping the personalities of students who are considered to be the future of a nation. Sant Hira Dass Kanya Mahavidyalaya, Kala Sanghian has carved out a creditable niche for itself not only in Kapurthala but whole rural section of Punjab. Sant Hira Dass Kanya Mahavidyalaya came into existence in 1986.This institution not only caters the need of the education but also fulfils the cultural, religious and moral values. The main objective of this institution is the overall development of personality of students. Due to this, this college is touching new heights for the last 25 years. It is gratifying to note that during its journey of 25 years. It is continuously growing and spreading its wings in different fields. From a single faculty, it has grown into a multi faculty post graduate institution and facilitating the moments of the society to get higher education. The keep pace with the modernity the IT department is well furnished with latest internet facility, Audio visual aids and overhead are available for IT/computer students. To avail the facility for better teaching methods the college has setup the modern Wi-Fi system to provide the internet connectivity to students at all corners of college. To provide the well education for IT students. There are Hi-fi computer labs and provide other facilities related with education. There is well qualified staff which provides the better education to students. Students of IT department complete their projects under the guidance of our experienced faculty.
Goals &Objectives of college

In all we aim at building better professionals for tomorrow and for this purpose, we provide Training through skilled trainers. 1)Candidates get learn both the soft skills as well as the interview skills under the same roof which is extremely beneficial in shaping their career. 2) Innovation in Technology Training and Consulting. 3) Curriculums mapped with Industry Requirement. 4) State-of-the art IT laboratories and communication set-up.

5) To impart higher education along with moral and ethical values enshrined in our great scriptures. 6) To empower women through vocational and professional education. 7)To focus on developing the total personality of women so that they may become an asset for society and nation. 8)To preserve and apprise our students with rich spiritual and cosmopolitan heritage of India through education programmers. S.H.D.K.V College has started its journey with limited resources, but since the whole team was totally dedicated toward the development .Our college is one of the main college of rural section of Punjab.

INDEX
SR. NO. 1. 2. 3. 4. TITLE PAGE NUMBER 5-7 8 10-12 13-19

Introduction to project Objectives & Scope Modules Requirement & Analysis System Design

5.

Data Flow Diagrams E-R Diagram Data Base Design

20-41

Screen shots
6..

42-61

Admins Screen Shots Users Screen Shots


62-67 68 69 70

7. 8. 9. 10.

Testing & Implementation Conclusion Future Scope Bibliography

Introduction to Project
Online banking is one of the great conveniences of the 21st century. Instead of writing checks to pay bills, you just go to a website or your bank's bill paying program, and the money is sent directly from your account to the person you owe. Online banking also allows you to have your checks deposited electronically by your employer, and allows you to see an up-todate snapshot of your financial position in real time

Online banking is convenient because, unlike the brick and mortar bank, the online bank never closes. You can check your account, shop online, transfer funds from one account to another, all online. If you need cash, it's only as far away as the nearest ATM. Even if you are traveling, you have access to your accounts anywhere you can get Internet access.

Online banking is also quick. Do you need to transfer money to a spouse or partner but not have time to go to the bank? A couple of clicks on your online bank and it's done. You can also pay car loans, mortgage payments, utilities, and most any other regular payment online. Many companies now have payment portals where you can enter your account number and make a payment. You can even set up automatic payments so you don't even have to remember.

Many online banking accounts also offer features that make banking more enjoyable. You can often track portfolios, apply for loans, download transactions into Quicken or Money, develop a budget, or even find out your credit score without leaving your home.

About Application
Looking for an online comprehensive solution to manage Internet banking. This will be accessible to all customers who have a valid User Id and Password. This system provides the following facilities: * Balance Enquiry. * Funds Transfer to another account in the same bank. * Request for cheque book/change of address /stop payment of cheques. * Viewing Monthly and annual statements. The Traditional way of maintaining details of a user in a bank was to enter the details and record them. Every time the user need to perform some transactions he has to go to bank and perform the necessary actions, which may not be so feasible all the time. It may be a hardhitting task for the users and the bankers too. The project gives real life understanding of Online Banking System and activities performed by various roles in the supply chain. Here, we provide an automation for banking system through Internet. Online Banking System project captures activities performed by different roles in real life banking which provides enhanced techniques for maintaining the required information upto-date, which results in efficiency.

Embedded System:
An embedded system is a computer system designed for specific control functions within a larger system often with real-time computing constraints. It is embedded as a part of a complete device often including hardware and mechanical parts. By contrast, a general-purpose computer, such as a personal computer (PC), is designed to be flexible and to meet a wide range of end-user needs. Embedded systems control many devices in common use today. In this, the 8051 micro-controller Rs-232(serial port) interface, magnetic locks are linked together.

Objectives & Scope


Here we define the scope and boundary of the automation of the current system. We also define human machine interface.

Users Demonstrable Needs :Here we identity the main objectives and functionalities of our system that are seeked by various end users. Our system must implement them successfully to be accepted by the user. 1. Customer must have a valid User Id and password to login to the system. 2. If a wrong password is given thrice in succession, that account will be locked and the customer will not be able to use it. When an invalid password is entered a warning is given to the user that his account is going to get locked. 3. After the valid user logs in he is shown the list of accounts he has with the bank. 4. On selecting the desired account he is taken to a page which shows the present balance in that particular account number. 5. User can request details of the last n number of transactions he has performed. 6. User can make a funds transfer to another account in the same bank. User is provided with a transaction password which is different from the login password. 7. User can transfer funds from his account to any other account with this bank. If the transaction is successful a notification should appear to the customer, in case it is unsuccessful, a proper message should be given to the customer as to why it failed. 8. User can request for cheque book/change of address/stop payment of cheques. FEATURES: Secure. Easy to Install. Reliable and Accurate. Graphical User Interface. Since benefits out base the cost, hence our project is economically feasible.

Flexiblity.

Feedback requirement is clear. Easy to acess. Tesing is quick and easy.

Modules
Login Module Allows user to enter his account by providing his ID and password to his account. If the provided id or password is incorrect the fields are cleared and user is asked to enter the id and password again.

a) User Login module Signup/registration Login Change password Forget password

There are some login modules explained as above. User can have facility to change password and change it to new one.

Online Banking information module

Hardware and Embedded System

Our dot net program will communicate with the serial port to interact with the 8051 microcontroller which will further control the magnetic locks through relays. Basic C language is used for performing functioning of 8051 microcontroller.

PROJECT REQUIREMENTS
SOFTWARE REQUIREMENTS:

Front-End

ASP.NET using VisualStudio2010 with C#.

Back-End Sql Server 2008.

HARDWARE REQUIREMENTS:

The software is to run under Windows 7 Operating System or above versions. 1 GB RAM and 300GB HD.

INTRODUCTION TO ASP.NET
.Net Framework
.NET is an environment/platform designed specially for Internet applications although Desktop applications are also possible. It is not platform independent. .NET Framework is: A component model for the Internet. The new approach to building large scale distributed systems for the Internet.

Provides the capability to integrate multiple devices. Built around the tools and protocols (XML, WSDL, SOAP, HTTP) that are becoming

standard on the Internet.

Thus, .NET Framework is a collection of tools, technologies and languages which work together to communicate on multiple platforms. It is composed of classes and services that form a layer between applications and operating system. All applications developed under the .NET Framework; including ASP.NET applications, have certain key features that ensure compatibility, security and stability.

Design features:
Interoperability: Because computer systems commonly require interaction between new and older applications, the .NET Framework provides means to access functionality that is implemented in programs that execute outside the .NET environment. Common Language Runtime Engine: The Common Language Runtime (CLR) is the execution engine of the .NET Framework. All .NET programs execute under the supervision of the CLR, guaranteeing certain properties and behaviors in the areas of memory management, security, and exception handling. Language Independence: The .NET Framework introduces a Common Type System, or CTS. The CTS specification defines all possible data types and programming constructs supported by the CLR and how they may or may not interact with each other conforming to the Common Language Infrastructure (CLI) specification. Because of this feature, the .NET Framework supports the exchange of types and object instances between libraries and applications written using any conforming .NET language.

Base Class Library: The Base Class Library (BCL), part of the Framework Class Library (FCL), is a library of functionality available to all languages using the .NET Framework. The BCL provides classes which encapsulate a number of common functions,

including file reading and writing,graphic rendering database interaction, XML document manipulation and so on.

Simplified Deployment The .NET Framework includes design features and tools that help manage the installation of computer software to ensure that it does not interfere with previously installed software, and that it conforms to security requirements.

Security The design is meant to address some of the vulnerabilities, such as buffer overflows, that have been exploited by malicious software. Additionally, .NET provides a common security model for all applications.

Portability While Microsoft has never implemented the full framework on any system except Microsoft Windows, the framework is engineered to be platform agnostic, and cross-platform implementations are available for other operating systems (see Silver light and the Alternative implementations section below). Microsoft submitted the specifications for the Common Language Infrastructure (which includes the core class libraries, Common Type System, and the Common Intermediate Language), the C# language, and the C++/CLI language to both ECMA and the ISO, making them available as open standards. This makes it possible for third parties to create compatible implementations of the framework and its languages on other platforms.

ARCHITECTURE:
The following figure shows various components of .Net Framework Architecture:

Fig: .NET Framework Architecture

Common Language Infrastructure (CLI)


The purpose of the Common Language Infrastructure (CLI) is to provide a language-neutral platform for application development and execution, including functions for Exception handling, Garbage Collection, security, and interoperability. By implementing the core aspects of the .NET Framework within the scope of the CLI, this functionality will not be tied to a single language but will be available across the many languages supported by the framework. Microsoft's implementation of the CLI is called the Common Language Runtime, or CLR.

Visual overview of the Common Language Infrastructure

Common Language Runtime (CLR):

It is an environment that manages the execution of code. Functions: Memory Management

Garbage Collection To support multiple languages

.NET Framework Class Library:


It includes reusable, Object Oriented and extensible classes. It is integrated with CLR and is common set of classes across programming languages. These classes can be used to create new classes, to develop the application and to implement cross language inheritance. Classes in it are organized in hierarchical form. At the top most of the hierarchy is the system namespace which contains classes that enable you to perform the following tasks: Converting data types Manipulating parameters Invoking local and remote programs Managing application environment

Asp.net Web Applications:


Asp.net is based on the .NET framework for building web applications. Since Asp.net is a part of the Microsoft. NET Framework it has the ability to take advantage of rich class libraries provided by Microsoft. The question is that why one should use Asp.net and not use classic asp or any other web programming technology. Here are some of the features of Asp.net that makes it the best web application technology.

ADO.NET
When working with classic asp we had ADO, object model for communication with the database. Microsoft.NET has introduced ADO.NET components that lets the developer communicate with the database more efficiently and easily. In this article we will see how we can make use of the ADO.NET classes to perform different operations on the database.

ADO. NET Classes:


ADO .NET classes are put in the System.Data namespace. You can access the classes using the following code: using System.Data.SqlClient; using System.Data.Odbc;

using System.Data.OleDb; using System.Data.Oracle;

Different classes are used for different purpose.


System.Data.SqlClient: This class is used to communicate with the Sql Server database. The database can be version 7.0 or version 2000. System.Data.SqlClient: This class is used to perform operations on the MySQL databases. System.Data.OleDb: This class is used to perform operations on the Access Database. System.Data.Oracle: This class is used to perform operations on the Oracle database.

Query Analyzer:
The SQL Server Query Analyzer allows us to create adhoc queries and run them interactively. We may also execute Transact-SQL (T-SQL) statements stored in text files and view the result in result plane or result grid. The Query Analyzer also has a color-coded editor to assist the user with checking of syntax. It also has context sensitive help. Queries are processed in two steps:

Interpret- First, the queries are checked for syntax.

Execute- Then, the processing takes place.

Flow Diagram
Introduction The Data Flow Diagram (DFD) provides a graphical representation of the flow of data through a system. It shows logically what information is exchanged by our system processes and external interfaces or data stores, but it does not explicitly show when or in what sequence the information is exchanged. Data Flow Diagrams are one of the three essential perspectives of the Structured Systems Analysis and Design Method (SSADM) that predates the more recent object oriented design methods and notations such as UML. This does not mean that the DFD has lost its usefulness even for new analysis endeavors, and any business analyst is bound to encounter them while reviewing the original design documentation for legacy systems.

Introduction to DFD
The Data Flow Diagram (DFD) provides a graphical representation of the flow of data through a system. It shows logically what information is exchanged by our system processes and external interfaces or data stores, but it does not explicitly show when or in what sequence the information is exchanged. Data Flow Diagrams are one of the three essential perspectives of the Structured Systems Analysis and Design Method (SSADM) that predates the more recent object oriented design methods and notations such as UML. This does not mean that the DFD has lost its usefulness even for new analysis endeavors, and any business analyst is bound to encounter them while reviewing the original design documentation for legacy systems.

Context Diagram A System Context Diagram is the highest level view of a system, similar to Block Diagram, showing a (normally software-based) system as a whole and its inputs and outputs from/to external factors. The Context Diagrams show the interactions between a system and other actors with which the system is designed to face. They are also typically drawn using labeled boxes to represent each of the external entities and another labeled box to represent the system being developed. The relationship is drawn as a line between the entities and the system being developed [7].

Context Diagram is a data flow diagram showing data flows between a generalized application within the domain and the other entities and abstractions with which it communicates. One thing that differentiates the use of data flow diagrams in domain analysis from other typical uses is that the variability of the data flows across the domain boundary must be accounted for with either a set of diagrams or text describing the differences [8]. Before we construct the actual process model, we need to establish initial project scope. A project is scope defines what aspect of the business a system or application is supposed to support. It also defines how the system or application being modeled must interact with other systems and the business as a whole. A projects scope is documented with a context diagram [8].

DATA FLOW DIAGRAMS: - LEVEL DATA FLOW DIAGRAM)

CHECK/EDIT STATUS IN CASE OF AUTHENTICATED USER

USER

VIEW/UPDATE/ADD DETAILS IN CASE OF AUTHENTICATED ADMIN

ADMIN

Description:
Here user or admin can enter to web based home access system and respectively user can check or edit the status of home and admin can view or update or add further details regarding users reference id or registration but if the user and admin are authenticated.

(1-LEVEL DATA FLOW DIAGRAM TO VIEW USER DETAILS BY ADMIN) ADMIN

REFERENCE TABLE REGISTRATION TABLE

(1-LEVEL DATA FLOW DIAGRAM TO EDIT/UPDATE/ADD DETAILS OF USER BY ADMIN)

ADMIN

REFERENCE TABLE

REGISTRATION TABLE

Description:
Here admin will enter the login id and password. If it is valid then only the admin can logged in otherwise redirected to same Home page. After authentication of login process the admin can edit or update or add user details of reference id from reference table and registration data or details from registration table. After editing and adding user details the admin can LOGOUT.

(1-LEVEL DATA FLOW DIAGRAM TO REGISTER/EDIT/CHECK STATUS OF LOCKS/ACCOUNT INFORMATION)


If not registered

USER

REGISTRATION TABLE

Description:

If the user is not registered then it goes for registration process and enters users profile information. it is added to registration table and after the registration successful message is displayed.

The second case is if the user is already registered then is to be logged in. after login authentication user can check lock status. If the user wants to edit the current door lock status then it can go to edit button on check status page. After that the user can directly logout from edit and check status page.

The third case is this after user login is authenticated it can edit its accounts information by clicking on my account link button. The user can edit account and change password.

(1-LEVEL DATA FLOW DIAGRAM TO EDIT USER ACCOUNT INFORMATION)

MY ACCOUNT

REGISTRATION TABLE

Description:
After user login is authenticated it can edit its accounts information by clicking on my account link button. The user can edit account and change password. The edit user account information and change password is done from registration table. During password changes, the password is attempted to change with new password from an old existing password and it is done to be changed within registration table and after password changed successfully message is displayed.

After changing the password or editing the user account information the user can go to CHECK LOCK STATUS page or directly LOGOUT

ENTITY RELATIONSHIP DIAGRAMS:

USER

If Already Registered?

PASSWORD USER NAME

Yes

If Valid?

No CREATE AN ACCOUNT

REFERENCE TABLE

HAVE REFERENCE ID?

No

REGISTRATION TABLE yes

REGISTRATION TABLE

Database Design
The Data type that a Cell can hold:
Data Type Char (size) Description This data type is used to store character strings values of fixed length. The size in brackets determines the : number of characters the cell can hold. The maximum number of characters this data type can hold is 255 characters : This data type is used to store variable length alphanumeric data. The maximum this data type can

varchar (size)

hold is 2000 character. nvarchar (size) : This data type is used to store variable length alphanumeric data. The maximum this data type can hold can be specified in brackets. : The int data type is used to store numbers (fixed of floating point). Numbers of virtually any magnitude may be stored up to 10 digits of precision. : This data type is used to represent data and time. The standard format is DD-MM-YY as in 24-JAN-03. To enter dates other than the standard format, use the appropriate functions. Date Time stores date in the 24hour format. : This format is used to store date in a small format not to lengthy. : This data type is used to store variable length character strings containing up to 2GB. LONG data can be store arrays of binary data in ASCII format.

int (P, S)

DATE

Smalldatetime

Long

Database Table Name: LOGIN TABLE

Description:

This table stores details of users who are provided with RefId in this website. Refid is allocated to the customers who are provided with HomeAcess System. Each user is given a unique RefId. RefId is the primary key field and it must have unique and not null value.

It stores the information of User. The Refid is the unique id provided to the user who has owned the Web Based Home Security System, Name of the User, Address of users house, is the special Id provided to user to access.

Database Table Name: - Registration Table

Database Table Name: check avalibity

Description: The Registration table stores the details of users who are already registered this website. Each user is given a unique user_name. user_name key field and it must have unique and not null value. It stores the information of User. The RefId of the User, the first_name and last_name of the user, gender, date_of_birth, email, occupation, address, country, state, nationality, telephone, mobile_no , password and agreement fields.These all are to be filled necessarily by the user at the time of registration while completing the registration form. These fields are to be filled and not left empty as these fields are provided by not null constraint which means the field is must to be filled and cannot left empty. Here one important thing is to be noticed that in the registration table the refid is to be taken as Foreign Key. when the admin is to edit the reference id of the user for example is to remove the refid of user in case no longer need of the access system and respectively no need of refid.so the admin is to remove refid from Reference Table and correspondingly the changes will be reflected in the Registration table also.In the context of relational databases, a foreign key is a referential. in

is the primary

Database Table Name: - Card 1

Description:

The User Log table is the table that contains all the information about the timings and dates of user logging in and log out. Here each user_id column describes the identity of the user, which is unique foe every user.This table contains seven columns, the first columns is reference id of integer type which is taken from registration table, nulls are allowed. The other columns are User_id, User_name, SID, Login_time, Logout_time, offline. The important thing about this table is that it is used in keeping tracks of the users with the help of date time datatype. It helps in reports generation in the admin panel. The refid belongs to the reference table, so there is a primary key/foreign relation \ship in these two tables. The refid is primary key in reference table and foreign key in User Log table.

Database Table Name: - Card Query1

Description:
The country table is made to display names of states according to their respective countries in the drop down list panel in the registration page of our website. The country table has two columns one is for displaying name of the country in registration table. His table stores of varchar(50) type data. Varchar data type is used to store variable length alphanumeric data. In this database table we used data type varchar with size 50.

Database Table Name: - Feedback

Description:
The Feedback table,it has four columns namely name,Email, Subject, Feedback. The name specifies the name of the user who is going through the website, it is of varchar(50) type of data, and nulls are allowed throughout the whole table. The Email is the email id of the user it also stores varchar type of data.subject is the name of the topic. It is specific to the user,s feedback. Feedback is the information provided by the user in order to improve the website. It directly goes to the admin, and feedbacks are daily visited by the user.

Database Table Name: - Presedental

Description:
The Profilepic table stores the information about the change of the profile picture by the user. It has three fields pid, last_name, image. Pid is incremented automatically as the user changes its profile picture. This table has no primary key/ foreign key relationship with any table. This table is made just to keep the the record of profile pictures changed by the users. This is just for user interactivity. The image column is of varbinary(max) type, it means it can store any kind of image format i.e. .jpeg, .gif, .png or any else.

Database Table Name: - Ozekimessagein

Description:
Ozekimessagein table is used to store the information about the message sender receiver, message text; message sent and receives time, and message type. The message is sent to the users mobile number from the website by the admin. s

Database Table Name: - Ozekimessageout

Description:
Ozekimessageout table is used to store the information about the message that has been sent by admin .It contains information about sender receiver, message text, message sent and receive time, status, error message and message type. Etc.

Home Access

Description: This Home Page Screen shots showing the room and kitchen pictures. Login Page

Description: This is login page. User/ admin both can login with his/her username and Password.

Admins Login View


Admins Login

Description: Admin can login with his user name and password.

Add New Member

Description: Admin can Add New Users by Login as username and Password.

Users Detail

Description: Admin Can View Users detail. He can edit or delete is also.

Track Users detail:

Description: Admin can track the users who is online or offline at what time.

Feedback Form

Description: This form shows the Feedback given by users. Only admin can view this form.

Users Login View


Users Login

Description: This form shows that registered user can login from here.

Registration Form

Description: User can registered with the help of register form by filling detail about him/her.

Users Login:

Description: This form shows the users Profile. This contains Account information, Status and Update Profile Picture etc.

Profile Picture Changed

Description: This form shows the process of changing picture of users profile.

After Changing Profile Picture

Description: This form showing Changed Profile Picture as according to users requirement.

Edit Profile

Description: User can edit his/her Profile detail by clicking on My Account option. Update Profile Successfully

Description: This form shows Updated Profile message.

View Status

Description: By using this Form user can check/ edit doors status.

Before Edit Status:

Description: User can edit doors status by edit status.

After Edit Status

Description: This form shows that the door is opened by user.

Check Status after editing:

Description: After editing the status of door, when we check the door status it will display on screen.

Products

Description: User can see Products Detail from the Product page that is used.

Contact Us:

Description: User can Contact us through the give information in the form of Contact us.

About Us:

Description: About us form gives detail about Website.

Testing & Implementation

Implementation is the part of the process where software engineers actually program the code for the project. Implementation phase deals with the issues of quality, performance and debugging. Software testing is an integral and important part of the software development process. This part of the process ensures that defects are recognized as early as possible. Aim of testing is to identify all defects existing in the software product. Testing can be of following types: Black box testing also called functional testing in which test cases are designed using only the functional specification of the software.. One white box testing strategy is said to be stronger than another strategy, if all type of errors detected by the first testing strategy are also detected by the second testing strategy, and the second testing strategy additionally detects some more type of errors. When two testing strategies detect errors that are different at least with respect to some type of errors, then they are called complementary. Unit testing is the testing of different modules of a system in isolation. While, objective of integration testing is to test the module interfaces i.e. there are no errors in the parameter passing, when one module invokes another module. In it different modules are integrated in a planned manner. Integration test approaches are big-bang approach, top-down approach, bottom-up approach and mixed approach Using documents helps users in effectively using the system. Production of good documents helps the manager in effectively tracking the progress of the project. The project manager knows that measurable progress is achieved if a piece of work is done and the required documents have been produced and reviewed. It is very important to document everything in the project.

Testing in case of invalid user

Description: if any of invalid user trying to login then error message will be displayed.

Forgot Password:

Description: If any of users forgot his/her password then he can regain it by following the instructions.

Description: User can collect his/she forgot password from the Email address.

Email in Users Inbox

Description: As we have checked from the Email Address we got password in its inbox.

My Account
Change Password

Description: User can change his/ her password from my account.

Password Changed successfully

Description: This shows that the password has been changed by user successfully.

CONCLUSION
It is concluded that when we started working with asp.net in c#, the project we decided, its modules, its functioning and its designing all was done successfully under the guidance of

trainer. The researches and experiments e made all ads on to our knowledge and also helps us to improve the working of our projects.

The modules were finished within the time bounds we decided, and efficiently. We are thinking to carry our project work further. This Website is working efficiently for the security purpose as well. So at the end we are feeling glad to work with our team members, guidance of madam, and the project work and the enhancements in our skills.

Future Enhancement
This website is running according to our planned criteria, so we are thinking to carry it on in future with some more features and enhancements in its functioning.

For the recommendation in future we are thinking following enhancements in our projects.

The first thing we want to introduce is the concept of alarms; these alarms will work if someone is trying to enter the house without permission of the owner of the home. This we will do by using website, with the help of c#.

The next concept is informing the user that a guest is coming to its house, with the help of sensors.

This concept of using magnetic locks at home, an expand up to company level, we will make it more secure.

BIBLIOGRAPHY
BOOKS:

ASP .Net By Peter Norton

Mastering ASP.Net TECHMEDIA

Learn ASP.Net

Black book ASP.Net.

LIBRARY: MSDN MSDN Library Visual Studio .Net release

The MSDN Library is the essential reference for developers, with more than a gigabyte of technical programming information; including sample code,documentation,technical articles, the Microsoft Developer Knowledge Base, and anything else we might need to develop solutions that implement Microsoft technology.

You might also like