2.net banking project document.doc

download 2.net banking project document.doc

of 60

Transcript of 2.net banking project document.doc

  • 8/10/2019 2.net banking project document.doc

    1/60

    1. INTRODUCTION

    The main objective of the proposed solution is to be automated the various functions and

    activities of the bank through Internet. The solution will facilitate to the bank employees and

    the account holders with the different modules. This solution is very much necessary for the private sector banks and the corporate sector. The banking industry will take a new shape and

    explore like never before. Using the solution the bankers and account holders can generate

    various kinds of reports.

    1.1 PURPOSE:

    Internet banking is a huge step forward in terms of convenience and safety in the banking

    world. Most banks have website and most of these web sites have areas for online banking

    customers. Though it cannot take care of every type of transaction for you, it does provide agreat deal of ease for tedious tasks that would re uire you to go to the bank fre uently.

    !ou can manage all of your accounts this way and transfer money in between them. It

    will show the history of an account for the last thirty days. If you need the date beyond then

    and you do not have your paper statement, you will have to go to the bank. Tellers can print

    you out the previous month. "eyond one month, the supervisor will have to assist you. #ith

    online banking, though, it reduces your need for this.

    1.2 SCOPE:The scope of this project is limited to the activities of the operations unit of the banking

    system.#hich include opening of $ccount, %eposit of funds, #ithdrawal of funds and

    transfer.

    The Internet provides a secure medium for transferring funds electronically between bank

    accounts, and also for making banking transaction over the Internet. $ll banking activities

    that were conventionally carried by visiting a bank can now be done through a computer with

    Internet access. &redit cards transactions are a form on Internet "anking.

    #ith 'et("anking, you can not only view your account balance but also open a )ixed

    %eposit, transfer funds, pay your electricity, telephone or mobile phone bills and much

    more.$nd now, through 'et("anking, you can view not only your "ank accounts but also

    your other "ank accounts. *o you can actually view many banks at the same time on one

    screen

    + 'et "anking

  • 8/10/2019 2.net banking project document.doc

    2/60

    1.3 Model diagram

    )ig +.+ Model diagram for 'et "anking1.4 Over view of !e "ro#e$ :

    Internet banking gives you access to your personal and business accounts online anytime,

    anywhere. It s the perfect way to do your banking whether from home, the office or when

    travelling because the service is available - hours a day, / days a week. Internet banking

    gives you the freedom to choose your own banking hours giving you greater control of your

    finances. It0s secure, fast and easy to use.

    !ou can transact on all accounts linked to your $uto "ank, Master&ard, "usiness $uto"ank and 1 2lan cards. !ou can also view statements, make payments, apply to increase or

    decrease an overdraft limit, and open investment and savings accounts.

    'et banking, also referred to as on the net banking, has changed the way banking small

    business is executed around the globe. "anking transactions is usually executed anytime from

    anyplace. + can test account balances, apply for time deposits, and avail other banking expert

    services even while sitting at your home or at workplace. 'ot like ahead of exactly where

    persons needed to jostle for time to stop by a bank, now they merely demand a desktopcomputer they carry out their ordinary banking transactions.

    - 'et "anking

  • 8/10/2019 2.net banking project document.doc

    3/60

    DI%IT&' M&R(ETER )'O% :

    Internet banking has also given an impetus to e(commerce. The banking sector in

    association along with the authorities, have formulated a set of regulations and legal

    guidelines that curb on line fraudulent practices. #hat s more, utmost confidentiality is taken

    care of in determining and allocating pin codes and login ids of internet based banking and

    instruments like debit and charge cards. "anks have also designed it obligatory for potential

    customers to ac uire relevant safety measures to safeguard their online lender accounts. $s an

    illustration, it s compulsory for your clients to vary their login specifics on fortnightly or

    regular monthly foundation. 1ach one of these initiatives collectively have instilled faith and

    self(confidence. In people today they transact from world wide web.

    )olks are actually progressively carrying out over the internet shopping for and

    selling transactions predominantly while in the areas of expert services. $s an illustration,

    internet reserving of motion picture tickets is known as a general feature. #hile in

    exceptional days like 3alentine s %ay and %iwali, greeting cards and bou uets web pages

    witness maximum people load eager to deliver over the internet greetings and register for

    bou uet delivery at a selected deal with ahead of time. $ll this happens to be likely because

    of to safe and extremely fast online banking.

    To create over the internet banking safer, you ll be able to also consider measures, like

    putting in an anti(virus plus a firewall, to protected your personal personal

    computer from hacking.The web banking was released during the eighties but it

    only ac uired momentum while in the +445s. The banking people at first started

    applying web based expert services for simple transactions like checking account

    balances and digital funds transfer. To motivate extra participation, banks to

    begin with furnished the solutions free of cost of cost and also carried out

    exercise programs to lead persons on how to use online banking. In India, I&I&I

    financial institution was the +st institution to start it underneath the identify of

    Infinity.

    3ia the internet banking also supplied respite to banking institutions since it

    has minimi6ed the everyday load of clients going to them for smaller and easier

    transactions like concern of bank statements.

    "anking transactions where done with the online system, known as internet

    banking becomes more popular. This is because you can do most of your banking transactions

    without leaving the house, whenever you want to perform the transaction. Internet banking issafe and convenient way to handle your money.

    7 'et "anking

    http://www.digitalmarketinglabs.org/http://www.digitalmarketinglabs.org/
  • 8/10/2019 2.net banking project document.doc

    4/60

    Internet "anking is very useful for the businessman who has a mobility and must often travel

    on business. They have no spare time to spend to go to banks and do their banking

    transactions . Therefore the choice of an online transaction is a must and very easy to them.

    Many banks are now developing the online banking system . "ecause customers will get more

    convenience than other bank customers who do not have these services. *ooner or later, most

    people would be hard to resist and escape from this online banking system when all banks are

    already adopting and using these systems as their banking facilities. 1ven so there are many

    parties who do not know what exactly is online internet banking .

    There are two types of banks that conduct banking transactions online via the Internet 8

    9nline. "anks and Union banks are now starting to offer online banking services . These

    banks are still possible for a customer to go to the building or office of a bank to conduct

    their transactions personally and is served by a teller or customer service. 9r they can take

    advantage of internet banking services through the bank web sites which are available. #hile

    virtual banks do not have a location or office or building where the customer physically able

    to enter and be served by a teller or customer service in banking transactions. They can only

    do their banking business and transactions through the Internet. *uch kind of bank does not

    provide options for customers to be able to visit a branch office and make a deposit or other

    banking activities.

    3irtual banks charge a small fee for their internet banking service . Internet banking service

    might be performed even for free. 3irtual banks are able to do this because they do not have

    the physical building and human resources in large number that must be considered and

    maintained, so that the operational costs were relatively lower. "anks and credit unions also

    charge a small fee for their online services.

    &onduct banking transactions online has a small level of risk, because there are many stages

    and password that must be passed before the online banking transactions done successfully.

    This is to ensure the security of transactions and to prevent any leakage. 2rudence is the key

    word when it decided to enter and access the internet banking system. If you already have an

    account online, you will have a complex password. $nd there are a series of security options

    that only you know the password. 9thers will not be given the opportunity to be able to break

    through. In fact, when the option of transaction which will be done is high risk, then the

    security will be getting more complex again. May be complicated for many people, but the

    choice is safety and comfort.

    *ome of the benefits that can be retrieved by performing internet banking, !ou can do varioustransactions through internet banking. !ou can pay bills directly from your account. !ou also

    'et "anking

  • 8/10/2019 2.net banking project document.doc

    5/60

    get a longer span of time in paying bills. The process is much faster without the need to

    ueue. )unds can be transferred directly from your account. 1ase of filling any loan

    applications. !ou can even use internet banking to invest.

    The huge and strongly felt of the benefits is the ease of doing banking transactions without a

    limited time and place. !ou can perform banking transactions whenever you want. In fact,

    you can add software to your computer so it can download information from your internet

    banking account to register the virtual check of your internet banking activities. In addition,

    you can access internet banking account anytime, day or night. $s long as you have an

    internet connection, when you are in business trip. !ou can conduct your banking transactions

    from a laptop in a hotel room, or from your home computer. !ou0ll find it easy to find

    information and conduct transactions that you want. #ith the ease of it, welcome to the world

    of online banking .

    : 'et "anking

  • 8/10/2019 2.net banking project document.doc

    6/60

    2. 'ITER&TURE SUR*E+

    2.1 &)OUT ,&*&

    Initially the language was called as ;oak< but it was renamed as ;=ava< in +44:. The

    primary motivation of this language was the need for a platform(independent >i.e.,

    architecture neutral? language that could be used to create software to be embedded in various

    consumer electronic devices.

    =ava is a programmer0s language.

    =ava is cohesive and consistent.

    1xcept for those constraints imposed by the Internet environment, =ava

    gives the programmer, full control.

    )inally, =ava is to Internet programming where & was to system programming.

    IMPORT&NCE O- ,&*& TO T E INTERNET

    =ava has had a profound effect on the Internet. This is because@ =ava expands the

    Universe of objects that can move about freely in &yberspace. In a network, two categories of

    objects are transmitted between the *erver and the 2ersonal computer. They areA 2assive

    information and %ynamic active programs. The %ynamic, *elf(executing programs causeserious problems in the areas of *ecurity and probability. "ut, =ava addresses those concerns

    and by doing so, has opened the door to an exciting new form of program called the $pplet.

    ,&*& C&N )E USED TO CRE&TE T/O T+PES O- PRO%R&MS

    &PP'IC&TIONS &ND &PP'ETS: $n application is a program that runs on our

    &omputer under the operating system of that computer. It is more or less like one creating

    using & or &BB. =ava0s ability to create $pplets makes it important. $n $pplet is an

    application designed to be transmitted over the Internet and executed by a =ava Ccompatible

    web browser. $n applet is actually a tiny =ava program, dynamically downloaded across the

    network, just like an image. "ut the difference is, it is an intelligent program, not just a media

    file. It can react to the user input and dynamically change.

    2.1.1 -E&TURES O- ,&*&

    SECURIT+1very time you that you download a ;normal< program, you are risking a viral

    infection. 2rior to =ava, most users did not download executable programs fre uently, and

    D 'et "anking

  • 8/10/2019 2.net banking project document.doc

    7/60

    those who did scanned them for viruses prior to execution. Most users still worried about the

    possibility of infecting their systems with a virus. In addition, another type of malicious

    program exists that must be guarded against. This type of program can gather private

    information, such as credit card numbers, bank account balances, and passwords. =ava

    answers both these concerns by providing a ;firewall< between a network application and

    your computer.#hen you use a =ava(compatible #eb browser, you can safely download =ava applets

    without fear of virus infection or malicious intent. PORT&)I'IT+

    )or programs to be dynamically downloaded to all the various types of platforms

    connected to the Internet, some means of generating portable executable code is needed .$s

    you will see, the same mechanism that helps ensure security also helps create portability.

    Indeed, =ava0s solution to these two problems is both elegant and efficient.

    T E )+TE CODE

    The key that allows the =ava to solve the security and portability problems is that the

    output of =ava compiler is "yte code. "yte code is a highly optimi6ed set of instructions

    designed to be executed by the =ava run(time system, which is called the =ava 3irtual

    Machine >=3M?. That is, in its standard form, the =3M is an interpreter for byte code.

    Translating a =ava program into byte code helps makes it much easier to run a

    program in a wide variety of environments. The reason is, once the run(time package exists

    for a given system, any =ava program can run on it.

    $lthough =ava was designed for interpretation, there is technically nothing about =ava

    that prevents on(the(fly compilation of byte code into native code. *un has just completed its

    =ust In Time >=IT? compiler for byte code. #hen the =IT compiler is a part of =3M, it

    compiles byte code into executable code in real time, on a piece(by(piece, demand basis. It isnot possible to compile an entire =ava program into executable code all at once, because =ava

    performs various run(time checks that can be done only at run time. The =IT compiles code,

    as it is needed, during execution.

    ,&*& *IRTU&' M&C INE0,*M

    "eyond the language, there is the =ava virtual machine. The =ava virtual machine is an

    important element of the =ava technology. The virtual machine can be embedded within aweb browser or an operating system. 9nce a piece of =ava code is loaded onto a machine, it is

    / 'et "anking

  • 8/10/2019 2.net banking project document.doc

    8/60

    verified. $s part of the loading process, a class loader is invoked and does byte code

    verification makes sure that the code that0s has been generated by the compiler will not

    corrupt the machine that it0s loaded on. "yte code verification takes place at the end of the

    compilation process to make sure that is all accurate and correct. *o byte code verification is

    integral to the compiling and executing of =ava code.

    Overall De $ri" io

    )ig -.+ 2icture showing the development process of =$3$ 2rogram

    =ava programming uses to produce byte codes and executes them. The first box

    indicates that the =ava source code is located in a. =ava file that is processed with a =ava

    compiler called javac. The =ava compiler produces a file called a. class file, which contains

    the byte code. The. &lass file is then loaded across the network or loaded locally on your

    machine into the execution environment is the =ava virtual machine, which interprets and

    executes the byte code

    2.1. 2 ,&*& &RC ITECTURE

    =ava architecture provides a portable, robust, high performing environment for

    development. =ava provides portability by compiling the byte codes for the =ava 3irtual

    Machine, which is then interpreted on each platform by the run(time environment. =ava is a

    dynamic system, able to load code when needed from a machine in the same room or across

    the planet.

    2.1.3COMPI'&TION O- CODE

    #hen you compile the code, the =ava compiler creates machine code >called byte

    code? for a hypothetical machine called =ava 3irtual Machine >=3M?. The =3M is supposed

    to execute the byte code. The =3M is created for overcoming the issue of portability. The

    E 'et "anking

    Java Source Java byte code JavaVM

    =ava .&lass

  • 8/10/2019 2.net banking project document.doc

    9/60

    code is written and compiled for one machine and interpreted on all machines. This machine

    is called =ava 3irtual Machine.

    )ig -.- compilation of code %uring run(time the =ava interpreter tricks the bytecode file into thinking that it is

    running on a =ava 3irtual Machine. In reality this could be a Intel 2entium #indows 4: or

    *un*$F& station running *olaris or $pple Macintosh running system and all could receive

    code from any computer through Internet and run the $pplets.

    SIMP'E

    =ava was designed to be easy for the 2rofessional programmer to learn and to use

    effectively. If you are an experienced &BB programmer, learning =ava will be even easier.

    "ecause =ava inherits the &8&BB syntax and many of the object oriented features of &BB.

    Most of the confusing concepts from &BB are either left out of =ava or implemented in a

    cleaner, more approachable manner. In =ava there are a small number of clearly defined ways

    to accomplish a given task.

    O),ECT ORIENTED

    =ava was not designed to be source(code compatible with any other language. This

    allowed the =ava team the freedom to design with a blank slate. 9ne outcome of this was a

    4 'et "anking

    SourceCode....

    ..

    PC Compiler

    MacintoshCompiler

    SPARC

    Compiler

    Java

    Byte code

    (Platformindependent)

    JavaInterpreter(PC)

    JavaInterpreter(Macintosh)

    JavaInterpreter(Sparc)

  • 8/10/2019 2.net banking project document.doc

    10/60

    clean usable, pragmatic approach to objects. The object model in =ava is simple and easy to

    extend, while simple types, such as integers, are kept as high(performance non(objects.

    RO)UST

    The multi(platform environment of the #eb places extraordinary demands on a

    program, because the program must execute reliably in a variety of systems. The ability to

    create robust programs was given a high priority in the design of =ava. =ava is strictly typed

    language@ it checks your code at compile time and run time.

    =ava virtually eliminates the problems of memory management and deallocation,

    which is completely automatic. In a well(written =ava program, all run time errors can Cand

    should Cbe managed by your program.

    2.2 SER*'ETS

    INTRODUCTION

    The =ava web server is =ava*oft s own web *erver. The =ava web server is just a part

    of a larger framework, intended to provide you not just with a web server, but also with

    tools. To build customi6ed network servers for any Internet or Intranet client8server

    system. *ervlets are to a web server, how applets are to the browser.

    &)OUT SER*'ETS

    *ervlets provide a =ava(based solution used to address the problems currently

    associated with doing server(side programming, including inextensible scripting solutions,

    platform(specific $2Is, and incomplete interfaces.

    *ervlets are objects that conform to a specific interface that can be plugged into a

    =ava(based server. *ervlets are to the server(side what applets are to the client(side ( object

    byte codes that can be dynamically loaded off the net. They differ from applets in that they

    are faceless objects >without graphics or a GUI component?. They serve as platform

    independent, dynamically loadable, plugable helper byte code objects on the server side that

    can be used to dynamically extend server(side functionality.

    )or example, an HTT2 *ervlets can be used to generate dynamic HTM content. #hen you

    use *ervlets to do dynamic content you get the following advantagesA

    They0re faster and cleaner than &GI scripts

    They use a standard $2I >the *ervlets $2I?

    +5 'et "anking

  • 8/10/2019 2.net banking project document.doc

    11/60

    They provide all the advantages of =ava >run on a variety of servers without

    needing to be rewritten?.

    &TTR&CTI*ENESS O- SER*'ETS

    There are many features of *ervlets that make them easy and attractive to use. TheseincludeA

    1asily configured using the GUI(based $dmin tool

    &an be loaded and invoked from a local disk or remotely across the network.

    &an be linked together, or chained, so that one *ervlets can call another

    *ervlets, or several *ervlets in se uence.

    &an be called dynamically from within HTM pages, using server(side

    include tags.$re secure ( even when downloading across the network, the *ervlets security

    model and *ervlets sandbox protect your system from unfriendly behavior.

    &D*&NT&%ES O- SER*'ET &PI

    9ne of the great advantages of the *ervlet $2I is protocol independence. It assumes

    nothing aboutA

    The protocol being used to transmit on the net

    How it is loaded

    The server environment it will be running in

    These ualities are important, because it allows the *ervlet $2I to be embedded in

    many different kinds of servers. There are other advantages to the *ervlet $2I as well. These

    includeA

    It0s extensible ( you can inherit all your functionality from the base classes

    made available to you.

    it s simple, small, and easy to use.

    -E&TURES O- SER*'ETS

    *ervlets are fast. *ince *ervlets only need to be loaded once, they offer much

    better performance over their &GI counterparts.

    ++ 'et "anking

    http://var/www/apps/conversion/tmp/scratch_2/load.htmlhttp://var/www/apps/conversion/tmp/scratch_2/filter.htmlhttp://var/www/apps/conversion/tmp/scratch_2/ssinclude.htmlhttp://var/www/apps/conversion/tmp/scratch_2/ssinclude.htmlhttp://var/www/apps/conversion/tmp/scratch_2/api.htmlhttp://var/www/apps/conversion/tmp/scratch_2/load.htmlhttp://var/www/apps/conversion/tmp/scratch_2/filter.htmlhttp://var/www/apps/conversion/tmp/scratch_2/ssinclude.htmlhttp://var/www/apps/conversion/tmp/scratch_2/ssinclude.htmlhttp://var/www/apps/conversion/tmp/scratch_2/api.html
  • 8/10/2019 2.net banking project document.doc

    12/60

    *ervlets are platform independent.

    *ervlets are extensible. =ava is a robust, object(oriented programming

    language, which easily can be extended to suit your needs

    *ervlets are secure.*ervlets can be used with a variety of clients.

    'O&DIN% SER*'ETS*ervlets can be loaded from three places from a directory that is on the & $**2$TH. The

    & $**2$TH of the =ava#eb*erver includes service root8classes8 which is where the system

    classes reside.)rom the J*1F3I&1KF99T 8*ervlets8 directory. This is LnotL in the server s class

    path. $ class loader is used to create *ervlets from this directory. 'ew *ervlets can be added (

    existing *ervlets can be recompiled and the server will notice these changes.

    )rom a remote location. )or this a code base like httpA 88 nine.eng 8 classes 8 foo 8 is

    re uired in addition to the *ervlets class name. Fefer to the admin GUI docs on *ervlet

    section to see how to set this up.

    9$%I'G F1M9T1 *1F3 1T*

    Femote *ervlets can be loaded byA

    +. &onfiguring the $dmin Tool to setup automatic loading of remote *ervlets

    -. *etting up server side include tags in .shtml files

    7. %efining a filter chain configuration

    I'39 I'G *1F3 1T*

    $ *ervlet invoker is a *ervlet that invokes the NserviceN method on a named *ervlet. If

    the *ervlet is not loaded in the server, then the invoker first loads the *ervlet >either from

    local disk or from the network? and the then invokes the NserviceN method. $lso like applets,

    local *ervlets in the server can be identified by just the class name. In other words, if a

    *ervlet name is not absolute, it is treated as local.

    $ client can invoke *ervlets in the following waysA

    The client can ask for a document that is served by the *ervlet.

    The client >browser? can invoke the *ervlet directly using a UF , once it has

    been mapped using the *ervlet $liases section of the admin GUI.

    The *ervlet can be invoked through server side include tags.

    The *ervlet can be invoked by placing it in the *ervlets8 directory.

    +- 'et "anking

    http://var/www/apps/conversion/tmp/administration/servlet_load.htmlhttp://var/www/apps/conversion/tmp/scratch_2/ssinclude.htmlhttp://var/www/apps/conversion/tmp/scratch_2/filter.htmlhttp://var/www/apps/conversion/tmp/administration/servlet_alias.htmlhttp://var/www/apps/conversion/tmp/administration/servlet_alias.htmlhttp://var/www/apps/conversion/tmp/administration/servlet_alias.htmlhttp://var/www/apps/conversion/tmp/scratch_2/ssinclude.htmlhttp://var/www/apps/conversion/tmp/administration/servlet_load.htmlhttp://var/www/apps/conversion/tmp/scratch_2/ssinclude.htmlhttp://var/www/apps/conversion/tmp/scratch_2/filter.htmlhttp://var/www/apps/conversion/tmp/administration/servlet_alias.htmlhttp://var/www/apps/conversion/tmp/scratch_2/ssinclude.html
  • 8/10/2019 2.net banking project document.doc

    13/60

    The *ervlet can be invoked by using it in a filter chain.

    2.3 ,&*&SCRIPT

    =ava*cript is a script(based programming language that was developed by 'etscape&ommunication &orporation. =ava*cript was originally called ive *cript and renamed as

    =ava*cript to indicate its relationship with =ava. =ava*cript supports the development of both

    client and server components of #eb(based applications. 9n the client side, it can be used to

    write programs that are executed by a #eb browser within the context of a #eb page. 9n the

    server side, it can be used to write #eb server programs that can process information

    submitted by a #eb browser and then updates the browser0s display accordingly

    1ven though =ava*cript supports both client and server #eb programming, we prefer

    =ava*cript at &lient side programming since most of the browsers supports it. =ava*cript is

    almost as easy to learn as HTM , and =ava*cript statements can be included in HTM

    documents by enclosing the statements between a pair of scripting tags

    J*&FI2T*O..J8*&FI2TO.

    J*&FI2T $'GU$G1 P ;=ava*cript

  • 8/10/2019 2.net banking project document.doc

    14/60

    #hile =ava*cript is best suited o simple applications and adding interactive features to

    #eb pages@ =ava can be used for incredibly complex applications.

    There are many other differences but the important thing to remember is that =ava*cript and

    =ava are separate languages. They are both useful for different things@ in fact they can be usedtogether to combine their advantages.

    &D*&NT&%ES

    =ava*cript can be used for *ever(side and &lient(side scripting.

    It is more flexible than 3"*cript.

    =ava*cript is the default scripting languages at &lient(side since all the

    browsers supports it.

    +PERTE T M&R(UP '&N%U&%EHypertext Markup anguage >HTM ?, the languages of the #orld #ide #eb

    >###?, allows users to produces #eb pages that include text, graphics and pointer to other

    #eb pages >Hyperlinks?.

    HTM is not a programming language but it is an application of I*9 *tandard EE/4,

    *GM >*tandard Generali6ed Markup anguage?, but speciali6ed to hypertext and adapted to

    the #eb. The idea behind Hypertext is that instead of reading text in rigid linear structure, we

    can easily jump from one point to another point. #e can navigate through the information

    based on our interest and preference. $ markup language is simply a series of elements, each

    delimited with special characters that define how text or other items enclosed within the

    elements should be displayed. Hyperlinks are underlined or emphasi6ed works that load to

    other documents or some portions of the same document.

    HTM can be used to display any type of document on the host computer, which can

    be geographically at a different location. It is a versatile language and can be used on any

    platform or desktop.

    HTM provides tags >special codes? to make the document look attractive. HTM

    tags are not case(sensitive. Using graphics, fonts, different si6es, color, etc., can enhance the

    presentation of the document. $nything that is not a tag is part of the document itself.

    )&SIC TM' T&%S

    5677 778 *pecifies comments

    5&8999.5 &8 &reates hypertext links

    5)8999.5 )8 )ormats text as bold

    + 'et "anking

  • 8/10/2019 2.net banking project document.doc

    15/60

    5)I%8999.5 )I%8 )ormats text in large font.

    5)OD+895 )OD+8 &ontains all tags and text in the HTM document

    5CENTER8...5 CENTER8 &reates text

    5DD895 DD8 %efinition of a term

    5D'8...5 D'8 &reates definition list

    5-ONT895 -ONT8 )ormats text with a particular font

    5-ORM8...5 -ORM8 1ncloses a fill(out form

    5-R&ME8...5 -R&ME8 %efines a particular frame in a set of frames

    5 ;895 ;8 &reates headings of different levels

    5 E&D8...5 E&D8 &ontains tags that specify information about a document

    5 R8...5 R8 &reates a hori6ontal rule

    5 TM'895 TM'8 &ontains all other HTM tags

    5MET&8...5 MET&8 2rovides meta(information about a document

    5SCRIPT895 SCRIPT8 &ontains client(side or server(side script

    5T&)'E895 T&)'E8 &reates a table

    5TD895 TD8 Indicates table data in a table

    5TR895 TR8 %esignates a table row

    5T 895 T 8 &reates a heading in a table

    &D*&NT&%ES$ HTM document is small and hence easy to send over the net. It is small because it

    does not include formatted information.HTM is platform independent.HTM tags are not case(sensitive.

    2.4 ,D)C

    =%"& is a =ava $2I for executing *Q statements. >$s a point of interest, =%"& is a

    trademarked name and is not an acronym@ nevertheless, =%"& is often thought of as standingfor =ava %atabase &onnectivity. It consists of a set of classes and interfaces written in the

    =ava programming language. =%"& provides a standard $2I for tool8database developers and

    makes it possible to write database applications using a pure =ava $2I.

    Using =%"&, it is easy to send *Q statements to virtually any relational database.

    9ne can write a single program using the =%"& $2I, and the program will be able to send

    *Q statements to the appropriate database. The combinations of =ava and =%"& lets a

    programmer write it once and run it anywhere.

    -UNCTIONS O- ,D)C

    +: 'et "anking

  • 8/10/2019 2.net banking project document.doc

    16/60

    *imply put, =%"& makes it possible to do three thingsA

    1stablish a connection with a database

    *end *Q statements

    2rocess the results. =%"& 31F*U* 9%"&

    $t this point, Microsoft s 9%"& >9pen %atabase &onnectivity? $2I is that probably

    the most widely used programming interface for accessing relational databases. It offers the

    ability to connect to almost all databases on almost all platforms.

    *o why not just use 9%"& from =avaR The answer is that you can use 9%"& from =ava,

    but this is best done with the help of =%"& in the form of the =%"&(9%"& "ridge, which we

    will cover shortly. The uestion now becomes N#hy do you need =%"&RN There are several

    answers to this uestionA

    +. 9%"& is not appropriate for direct use from =ava because it uses a & interface. &alls

    from =ava to native & code have a number of drawbacks in the security, implementation,

    robustness, and automatic portability of applications.

    -. $ literal translation of the 9%"& & $2I into a =ava $2I would not be desirable. )or

    example, =ava has no pointers, and 9%"& makes copious use of them, including the

    notoriously error(prone generic pointer Nvoid LN. !ou can think of =%"& as 9%"&

    translated into an object(oriented interface that is natural for =ava programmers.

    7. 9%"& is hard to learn. It mixes simple and advanced features together, and it has

    complex options even for simple ueries. =%"&, on the other hand, was designed to keep

    simple things simple while allowing more advanced capabilities where re uired.

    . $ =ava $2I like =%"& is needed in order to enable a Npure =avaN solution. #hen

    9%"& is used, the 9%"& driver manager and drivers must be manually installed on

    every client machine. #hen the =%"& driver is written completely in =ava, however,

    =%"& code is automatically installable, portable, and secure on all =ava platforms from

    network computers to mainframes.

    T/O7TIER &ND T REE7TIER MODE'S

    The =%"& $2I supports both two(tier and three(tier models for database access. In the

    two(tier model, a =ava applet or application talks directly to the database. This re uires a

    =%"& driver that can communicate with the particular database management system being

    accessed. $ user s *Q statements are delivered to the database, and the results of those

    +D 'et "anking

  • 8/10/2019 2.net banking project document.doc

    17/60

    statements are sent back to the user. The database may be located on another machine to

    which the user is connected via a network. This is referred to as a client8server configuration,

    with the user s machine as the client, and the machine housing the database as the server. The

    network can be an Intranet, which, for example, connects employees within a corporation, or

    it can be the Internet.

    In the three(tier model, commands are sent to a Nmiddle tierN of services, which then send

    )ig -.7 Three tier model

    *Q statements to the database. The database processes the *Q statements and sends the

    results back to the middle tier, which then sends them to the user. MI* directors find the

    three(tier model very attractive because the middle tier makes it possible to maintain controlover access and the kinds of updates that can be made to corporate data. $nother advantage is

    that.

    when there is a middle tier, the user can employ an easy(to(use higher(level $2I which is

    translated by the middle tier into the appropriate low(level calls. )inally, in many cases the

    three(tier architecture can provide performance advantages

    +/ 'et "anking

    JAVA Application

    JDBC

    DBMS

    Client machine

    DBMS-proprietary protocol

    Database server

  • 8/10/2019 2.net banking project document.doc

    18/60

    )ig -. Middle tier architecture

    Until now the middle tier has typically been written in languages such as & or &BB, which

    offer fast performance. However, with the introduction of optimi6ing compilers that translate

    =ava byte code into efficient machine(specific code, it is becoming practical to implement the

    middle tier in =ava. This is a big plus, making it possible to take advantage of =ava s

    robustness, multithreading, and security features. =%"& is important to allow database access

    from a =ava middle tier.

    ,D)C DRI*ER T+PES

    The =%"& drivers that we are aware of at this time fit into one of four categoriesA

    =%"&(9%"& bridge plus 9%"& driver

    'ative($2I partly(=ava driver

    =%"&('et pure =ava driver

    'ative(protocol pure =ava driver

    +E 'et "anking

    Java applet orHtml browser

    ApplicationServer (

    Java) JDBC

    DBMS

    Client machine (GUI)

    HTTP, RMI, or CORBA calls

    Server machine (business Logic)

    DBMS-proprietary protocol

    Database server

  • 8/10/2019 2.net banking project document.doc

    19/60

    ,D)C7OD)C )RID%EIf possible, use a 2ure =ava =%"& driver instead of the "ridge and an 9%"& driver. This

    completely eliminates the client configuration re uired by 9%"&. It also eliminates the

    potential that the =ava 3M could be corrupted by an error in the native code brought in by the

    "ridge >that is, the "ridge native library, the 9%"& driver manager library, the 9%"& driver

    library, and the database client library?. ,D)C7 OD)C )RID%E

    The =%"&(9%"& "ridge is a =%"& driver, which implements =%"& operations by

    translating them into 9%"& operations. To 9%"& it appears as a normal application

    program. The "ridge implements =%"& for any database for which an 9%"& driver is

    available. The "ridge is implemented as the sun.jdbc.odbc =ava package and contains a native

    library used to access 9%"&. The "ridge is a joint development of Intersolv and =ava*oft.

    2.< ,&*& SER*ER P&%ES0,SP

    =ava server 2ages is a simple, yet powerful technology for creating and maintaining

    dynamic(content web pages. "ased on the =ava programming language, =ava *erver 2ages

    offers proven portability, open standards, and a mature re(usable component model .The =ava

    *erver 2ages architecture enables the separation of content generation from content

    presentation. This separation not eases maintenance headaches, it also allows web teammembers to focus on their areas of expertise. 'ow, web page designer can concentrate on

    layout, and web application designers on programming, with minimal concern about

    impacting each other0s work.

    -E&TURES O- ,SP

    PORT&)I'IT+

    =ava *erver 2ages files can be run on any web server or web(enabled application

    server that provides support for them. %ubbed the =*2 engine, this support involves

    recognition, translation, and management of the =ava *erver 2age lifecycle and its interaction

    components.

    COMPONENTS

    It was mentioned earlier that the =ava *erver 2ages architecture can include reusable

    =ava components. The architecture also allows for the embedding of a scripting language

    +4 'et "anking

  • 8/10/2019 2.net banking project document.doc

    20/60

    directly into the =ava *erver 2ages file. The components current supported include =ava

    "eans, and *ervlets.

    PROCESSIN%

    $ =ava *erver 2ages file is essentially an HTM document with =*2 scripting or tags.

    The =ava *erver 2ages file has a =*2 extension to the server as a =ava *erver 2ages file.

    "efore the page is served, the =ava *erver 2ages syntax is parsed and processed into a *ervlet

    on the server side. The *ervlet that is generated outputs real content in straight HTM for

    responding to the client.

    &CCESS MODE'S

    $ =ava *erver 2ages file may be accessed in at least two different ways. $ client0s

    re uest comes directly into a =ava *erver 2age. In this scenario, suppose the page

    accesses reusable =ava "ean components that perform particular well(defined

    computations like accessing a database. The result of the "eans computations, called

    result sets is stored within the "ean as properties. The page uses such "eans to generate

    dynamic content and present it back to the client.

    In both of the above cases, the page could also contain any valid =ava code. =ava *erver

    2ages architecture encourages separation of content from presentation.

    STEPS IN T E E ECUTION O- & ,SP &PP'IC&TION

    + The client sends a re uest to the web server for a =*2 file by giving the name of the

    =*2 file within the form tag of a HTM page.

    - This re uest is transferred to the =ava #eb *erver. $t the server side =ava #eb *erver

    receives the re uest and if it is a re uest for a jsp file server gives this re uest to the

    =*2 engine.

    7 =*2 engine is program which can understands the tags of the jsp and then it converts

    those tags into a *ervlet program and it is stored at the server side. This *ervlet is

    loaded in the memory and then it is executed and the result is given back to the =ava

    #eb *erver and then it is transferred back to the result is given back to the =ava #eb

    *erver and then it is transferred back to the client

    -5 'et "anking

  • 8/10/2019 2.net banking project document.doc

    21/60

    ,D)C CONNECTI*IT+

    The =%"& provides database(independent connectivity between the =-11 platform

    and a wide of tabular data sources. =%"& technology allows an $pplication &omponent

    2rovider range toA

    2erform connection and authentication to a database server

    Manager transactions

    Move *Q statements to a database engine for preprocessing and execution

    1xecute stored procedures

    -+ 'et "anking

  • 8/10/2019 2.net banking project document.doc

    22/60

    3. S+STEM &N&'+SIS

    3.1 E ISTIN% S+STEM:

    In the existing system the transactions are done only manually but in proposed system

    we have to computeri6e all the banking transaction using the software 9nline "anking.

    3.1.1 DIS7&D*&NT&%ES:

    +. ack of security of data.-. More man power 7. Time consuming. %amage of machines due to lack of attention.

    :. &onsumes large volume of pare work.3.2 PROPOSED S+STEM:

    The aim of proposed system is to develop a system of improved facilities. The proposed

    system can overcome all the limitations of the existing system. The system provides proper

    *ecurity and reduce the manual work. The proposed system can be accessed from any part of

    the world, as opposed to stand alone or manual system, and provides information at anytime,

    anywhere round the clock to the customers

    3.2.1 &D*&NT&%ES:

    The following are the advantages of proposed system

    1. The user can access the system at any time, because it0s - (hour online from anywhere in

    the world.2. The customer can save his money and time that is a valuable one in today0s day( to C day

    life.3. It provides easy to use and user friendly interface for the user.4. Minimum time re uired

  • 8/10/2019 2.net banking project document.doc

    23/60

    4. SO-T/&RE &ND &RD/&RE SPECI-IC&TIONS

    SO-T/&RE RE?UIREMENTS

    9perating system A windows xp with sp-.

    anguage >front end? A java >jdk+.:8+.D?

    *erver A apache tomcat :.:8D.5

    #eb technology A html, java script, css.

    %atabase >back end? A oracle +5g.

    $rchitecture A 7(tier architectur

    &RD/&RE RE?UIREMENTS

    2rocessor A2entium -. GH6 or above

    *peed AE55 MH6

    Hard %isk AE5 G"

    F$M A:+- M"

    < S+STEM DESI%N

    -7 'et "anking

  • 8/10/2019 2.net banking project document.doc

    24/60

    + G" F$M recommended?

    7. Hard disk with minimum + G" free space

    . 'I& >network interface card? connected to network pentium III

    :. Fam A D M".

    D. Hard disk A +5.- G".

    /. Monitor A *3G$ color monitor.

    E. eyboard A +5: standard mouse.

  • 8/10/2019 2.net banking project document.doc

    25/60

    Credi Card

    &ustomer needs to open a savings8current account bank account before opening the

    credit card account. &redit card account will be linked with their savings8current account.

    &ustomer needs to give their account detail when applying for the credit card.

    I "A

    &ustomer account details

    OA "A

    $lert message

    Term De"o i

    Term %eposit can be of two typesA )lexible deposit and &umulative deposit.

    -leBi le De"o i

    )lexible deposit has links with the savings bank account.

    I "A

    &ustomer details

    $mount

    2eriod

    o !ears

    o Months

    o %ays

    Fenewal 9ption

    o Fepay the deposit

    o $uto Fenewal

    2rincipal only

    2rincipal along with interest

    OA "A

    -: 'et "anking

  • 8/10/2019 2.net banking project document.doc

    26/60

    $lert message.

    CAmAla ive De"o i

    I "A

    &ustomer details

    $mount

    2eriod

    o !ears

    o Months

    o %ays

    OA "A

    $lert message

    Re$Arri g De"o i

    I "A

    &ustomer details

    2eriod

    Installment amount

    OA "A

    $lert message

  • 8/10/2019 2.net banking project document.doc

    27/60

    Interest *tatement

    Un &leared &he ue

    &$$oA SAmmar@

    &ustomer can go to the Teller option and select the $ccount *ummary. It provides

    account summary of the customer. $ccount summary will be grouped asA

    Fegular $ccounts

    Investment $ccounts

    oan $ccounts

    &redit card $ccount

    9n selecting the account summary field, the type of accounts field will be displayed.

    Here the customer selects their account type and the account number will be entered further.

    9n entering these, the account summary is displayed. )urther, customer can enter from and to

    dates to see the opening balance and the closing balance.

    I "A

    $ccount Type

    $ccount 'umber

    *tatement %uration

    OA "A

    %ate

    %escription

    &redit8%ebit

    $mount

    "alance

  • 8/10/2019 2.net banking project document.doc

    28/60

    I "A

    $ccount type

    $ccount number

    2eriod of transaction

    OA "A

    Transaction history for the specified period

    Card Tra a$ io

    The card transaction option will be provided for displaying the card transaction

    details.

    I "A

    &ard Type

    &ard 'umber

    2eriod of transaction

    OA "A

    &ard 'umber

    $ccount 'umber

    1xpiry %ate

    %ate of transaction

    2ay To

    $mount

  • 8/10/2019 2.net banking project document.doc

    29/60

    $ccount 'umber

    Interest type >accrued8credited8debited?

    )rom and to dates

    OA "A

    %ate

    %escription >loan no. or flexi deposit no etc?

    Interest $ccrued8&redited8%ebited

    Interest credited during last year

    Interest credited during the current year

  • 8/10/2019 2.net banking project document.doc

    30/60

    -A d Tra fer

    &ustomers can use this service for regular payment from one account to another.

    I "A

    9rigin account number

    %estination account number

    %estination "ank

    %estination "ranch

    Transfer $mount

    )re uency >9ne Time8Monthly8Quarterly8!early?

    Transfer %ate

    OA "A

    &ler me age. In case if there is no sufficient fund in the origin account, the same

    must be alerted to the customer.

    TaB Pa@me

    The Tax 2ayment component facilitates the customer to calculate tax payment amount

    and remit the same to the tax collecting authority.

    9ptions provided to the customer includeA

    Tax 2ayment re uest

    Tax 2ayment modification

    Tax 2ayment &ancellation

    I "A

    $ccount Type

    $ccount 'umber

    Tax 2ayer I%

    75 'et "anking

  • 8/10/2019 2.net banking project document.doc

    31/60

    Taxing 2eriod

    Income during the above period

    Tax 2ayment amount

    Tax &ollecting $uthority

    OA "A

    $lert message.

  • 8/10/2019 2.net banking project document.doc

    32/60

    $lert message will be displayed to the user showing the service charge amount that

    will be debited from his account.

  • 8/10/2019 2.net banking project document.doc

    33/60

    MaGi g remi a $e .

    *ervice charges will be displayed for the customer to avail the facility and will be

    determined by the bank.

    I "A

    The customer provides following detailsA

    2ayee name

    2ayee bank name and branch

    2ayee account number

    $mount

    $ccount type

    $ccount 'o.

    "ranch

    OA "A

    $lert message showing the service charge to be debited from the customer0s account.

  • 8/10/2019 2.net banking project document.doc

    34/60

    $ccount 'o.

    OA "A

    $lert message showing the service charge to be debited from the customer0s

    account.

    New Card Re Ae

    In this process, the customer re uests for a new card when he has lost his current card.

    I "A

    &ard 'o.

    &ard Type

    ost on %ate

    OA "A

    $lert message showing the service charge to be debited from the customer0s account.

    Draf Ca !ier C!e Ae

    The customer re uests bank to issue draft8cashier0s che ue. "ank may deliver the

    %%8cashier0s che ue at users0 doorstep or payee0s doorstep. "ank will charge customer

    accordingly.

    I "A

    9ptions to userA

    %raft

    &ashier0s che ue

    )urther, customer enters the following detailsA

    2ayee name

    %rawn on

    $mount

    %elivery options

    7 'et "anking

  • 8/10/2019 2.net banking project document.doc

    35/60

    o %eliver at customer0s doorstep

    o %eliver at payee0s doorstep

    2ayee0s address

    o %oor 'o.

    o *treet

    o $rea

    o &ity

    o 2I'

    OA "A

    $lert message showing the service charge to be debited from the customer0s account.

    S o" Pa@me

    In this process, the customer informs the bank to hold payment for the che ues he has

    issued.

    I "A

    $ccount 'umber

    "ranch

    &he ue 'o

    OA "A

    9n entering the che ue number, following will be displayedA

    2ayee 'ame

    %ate of issue

    "ranch

    $lert message also will be displayed to the customer with service charge.

  • 8/10/2019 2.net banking project document.doc

    36/60

    9pen another account

    &lose account

    Modify account info

    Modify customer info

    O"e & o !er &$$oA

    In this process, an existing customer opens another account.

    I "A

    &ustomer I%

    &ustomer details

    OA "A

    $lert message showing the new account number.

    Clo e &$$oA

    In this process, an existing account holder closes his account.

    I "A

    $ccount type

    $ccount number

    "ranch

    Feason

    )or remittance of balance

    o $ccount Transfer

    $ccount number

    "ank name

    "ranch

    o &ashier0s che ue details

    7D 'et "anking

  • 8/10/2019 2.net banking project document.doc

    37/60

    OA "A

    $ccount summary will be presented to the customer. &heck list will be provided to

    the customer regarding pending standing instructions, pending &he ue etc.

    Modif@ &$$oA I fo

    In this process, a customer modifies his account information.

    I "A

    &ustomer has to enter the following informationA

    $ccount type

    $ccount number

    "ranch

    Mode of operation

    $ccount link

    Threshold

    OA "A

    $lert message displaying that the account details have been modified.

    Modif@ CA omer I fo

    In this process, the customer wants to change information about him such as

    address, phone number etc.

    I "A

    $ccount type

    $ccount number

    "ranch

    $pplicant number

    &ustomer details

    7/ 'et "anking

  • 8/10/2019 2.net banking project document.doc

    38/60

    OA "A

    $lert message showing that the customer0s details have been modified.

  • 8/10/2019 2.net banking project document.doc

    39/60

    I "A

    $ccount number

    $mount

    *tart date

    Maturity date

    "ank

    "ranch

    OA "A

    $lert message displaying that the customer0s re uest was processed.

    :.7 UM' Diagram :

    U e $a e diagram for $rea e ill "a@me o !er "a@me a d aB "a@me

    74 'et "anking

  • 8/10/2019 2.net banking project document.doc

    40/60

    Bill Payments

    Other Payments

    Tax Payment

    Card Transactions

    Account Summary

    Funds Transfer

    Requests

    Transactions

    Credit Card Payment

    New A/c Ty e

    Customer

    New A/c Creation

    !aintenance Ser"ices

    #nterest Statement

    Ban$

    Fixed %e osit !aturity

    -ig. :.+ Use case diagram for create, bill payment, other payments and tax payment

    Se Ae $e diagram for ew a$$oA $rea io :

    5 'et "anking

  • 8/10/2019 2.net banking project document.doc

    41/60

    )ig.D.7.- se uence diagram for customer operations

    New AccountCreation & Ban$

    #n ut Screen Transactions AccountSummary

    '& Choose A/c Ty e (& A/c %etails )& Tran Ty e

    *& +alidation

    ,& -et Tran %et.

    )ig:.- A se uence diagram for new account creation

    Cla diagram for di $A io of oA "A

    + 'et "anking

  • 8/10/2019 2.net banking project document.doc

    42/60

    - # Com onent

    !enu

    O tions

    #n ut Screen

    Re ort

    %ata !ani ulator

    %ata Store

    Account0Ty es

    ser0Acc0Ty esFunds0Transfers

    Bill0Payments %raft0Cheque

    Tax0Payments Accounts

    1oan0Ty es

    1oans

    Credit0Cards

    CustomersCheque0Reorder

    1oan0#ssue

    Nominee

    Transactions

    22instantiates3322uses33

    New Account

    Transaction Ser"ices

    Bill Payments!aintenance

    Teller Ser"ices

    ser Alerts

    Requests

    Re orts

    )ig. :.7.A class diagram for discussion of output

    S a e $!ar diagram for aA !e i$a io

    - 'et "anking

  • 8/10/2019 2.net banking project document.doc

    43/60

    )ig.:. A state chart diagram for authentication

    S a e $!ar diagram for valida io

    )ig :.:A *tate chart diagram for valid

    =. IMP'EMENT&TION

    Implementation is the process of having systems personnel check out and put new

    e uipment into use, train users, install the new app %epending on the si6e of the

    organi6ation that will be involved in using the application and the risk associated with its use,

    systems developers may choose to test the operation in only one area of the firm, say in one

    department or with only one or two persons.

    7 'et "anking

    unauthenticated validation authenticated( id,pwd ) ( ok )

    ( id,pwd )

    Ready Validation Changed

    ( invalid )

    ( valid )

    ( oldpwd,new pwd )

  • 8/10/2019 2.net banking project document.doc

    44/60

    =.1 SOURCE CODE

    &$$oA De ail .# ":

    JS page importPNjava.s l.L,java.util.LN sessionPNtrueNSO

    JSint accnoP5@

    *tring typeP>*tring?session.get$ttribute>NacctypeN?@

    *tring topPNN@

    try

    &lass.for'ame>Nsun.jdbc.odbc.=dbc9dbc%riverN?@

    &onnection con P %riverManager.get&onnection>NjdbcAodbcAnetbankN , NscottN , N ;tigerN?@

    *tatement stPcon.create*tatement>?@

    Fesult*et rsPnull@

    2repared*tatement pstPnull@

    rsPst.executeQuery>Nselect max>accno? from autoN?@

    if>rs.next>??

    accnoPrs.getInt>+?@

    accnoBP+@

    pstPcon.prepare*tatement>Ninsert into auto>accno? values>R?N?@

    pst.setInt>+,accno?@

    pst.execute>?@

    V else accnoP+555@

    if>type.e uals>N*"N?? topPN*"NBaccno@

    else if>type.e uals>N&$N?? topPN&$NBaccno@

    else if>type.e uals>N&&N?? topPN&&NBaccno@

    else if>type.e uals>NT%N?? topPNT%NBaccno@

    else topPNF%NBaccno@

    V catch>1xception e? out.println>NJh+ONBeBNJ8h+ON?@V

    SO

    JhtmlO

    JheadO

    JtitleO

    $ccount %etails

    J8titleO

    'et "anking

  • 8/10/2019 2.net banking project document.doc

    45/60

    J8headO

    Jbody idPbodyO

    J*&FI2T anguagePN=ava*criptN 2urposePN%omN FunatPN"rowserN

    *F&PNvalidate.jsNOJ8*&FI2TO

    J*&FI2T anguagePN3"*criptN 2urposePN%omN FunatPN"rowserN

    *F&PNwarn.vbsNOJ8*&FI2TO

    J*&FI2T anguagePN=ava*criptNOonloadPfunction>?

    element1ffect>?@

    document.get1lement"yId> grad ?.style.cssTextPNpaddingA+5px@filterAalpha>styleP+,startWP+5

    5,start!P5?@backgroundAgreen@colorAaliceblue@font(familyAtahoma@font(

    si6eA75px@heightA+-5pxN@

    document.get1lement"yId> body ?.style.cssTextPNmarginA5px@backgroundAfloralwhiteN@V

    J8scriptO

    JTable widthP+55S cellspacingP5 cellpaddingP5OJTFOJTd idPgrad valignPtopO9nline 'et

    "anking *olutions )or ife TimeJ8tdOJ8trOJ8tableO

    Jh+ alignPNcenterNO$ccount %etails J8h+O

    Jform actionPN$ccounts.jspNO

    Jtable alignPNcenterNO JtrOJtdO$ccount 'oJ8tdOJtdO Jinput typePNtextN namePNacctnumN

    valueP JSPtopSO readonly8O J8tdOJ8trO

    JtrOJtdO$ccount &ategoryJ8tdOJtdOJselect namePNacctcategoryN O

    Joption valuePNsNO*ingle

    Joption valuePNjNO=oint

    Joption valuePNcNO&ustodial

    J8selectOJ8tdOJ8trO

    JtrOJtdO9peration ModeJ8tdOJtdOJselect namePNopermodeN O

    Joption valuePNsNO*elf

    Joption valuePNfNO)ormer8*urvivor

    Joption valuePNeNO1ither8*urvivor

    J8selectOJ8tdOJ8trO

    JtrOJtdO9pen %ate J8tdOJtdO Jinput typePNtextN namePNopendateN valuePNN

    8OLdd(mmm(yyJ8tdOJ8trO

    JtrOJtdO"alance $mountJ8tdOJtdO Jinput typePNtextN namePNbalanceamtNvaluePNN 8OJ8tdOJ8trO

    : 'et "anking

  • 8/10/2019 2.net banking project document.doc

    46/60

    JtrOJtdOIntroducer 'ameJ8tdOJtdO Jinput typePNtextN namePNintrodnameN

    valuePNN 8O J8tdOJ8trO

    JtrOJtdOIntroducer $ccount 'oJ8tdOJtdO Jinput typePNtextN

    namePNintroacnoN valuePNN 8O J8tdOJ8trO

    JtrOJtdO"ranchJ8tdOJtdO Jinput typePNtextN namePNbranchN valuePNN 8O

    J8tdOJ8trO

    JtrOJtdO nown $pplicantsJ8tdOJtdO Jinput typePNtextN

    namePNknown$pplicantsN valuePNN maxlengthP- onkeypressPNreturn blockkey>this?N 8O

    J8tdOJ8trO

    J8tableOJbrOJbrO

    JcenterO

    Jinput typePNsubmitN namePNsubmitN valuePN*U"MITN8O

    Jinput typePNresetN namePNresetN valuePN&ancelN8O

    J8center

    J8formO

    J8bodyOJ8htmlO

    &$$oA .# ":

    JS page importPNjava.s l.LNSO

    JS page importPNjava.io.LNSO

    JS page importPNjava.util.LN sessionPNtrueNSO

    JhtmlO

    JheadOJtitleO$ccount InformationJ8titleOJ8headO

    Jbody backgroundPNpinkNO

    Jhr colorPXbb5::1O

    JS

    *tring accno P re uest.get2arameter>NacctnumN?.trim>?@

    *tring acccat P re uest.get2arameter>NacctcategoryN?.trim>?@

    *tring opermode P re uest.get2arameter>NopermodeN?.trim>?@

    *tring opendatePre uest.get2arameter>NopendateN?.trim>?@

    float balamtP)loat.parse)loat>re uest.get2arameter>NbalanceamtN??@

    *tring intronamePre uest.get2arameter>NintrodnameN?.trim>?@

    *tring introacnoPre uest.get2arameter>NintroacnoN?.trim>?@ *tring branPre uest.get2arameter>NbranchN?.trim>?@

    D 'et "anking

  • 8/10/2019 2.net banking project document.doc

    47/60

    int knowappPInteger.parseInt>re uest.get2arameter>Nknown$pplicantsN??@

    try

    try

    &lass.for'ame>Nsun.jdbc.odbc.=dbc9dbc%riverN?@

    V catch >1xception ex?

    *ystem.out.println>N1rror while loading the %river A N B ex?@

    V

    &onnection con P %riverManager.get&onnection>NjdbcAodbcAnetbankN , NscottN ,

    NtigerN?@

    88 int accnoP(+@

    2repared*tatement psPcon.prepare*tatement>Ninsert into accounts

    values>R,R,R,R,R,R,R,R,R,R?N?@

    ps.set*tring>+,accno?@

    ps.set*tring>-,acccat?@

    ps.set*tring>7,opermode?@

    ps.set*tring> ,opendate?@

    ps.set)loat>:,balamt?@

    ps.set*tring>D,introname?@

    ps.set*tring>/,introacno?@

    ps.set*tring>E,bran?@

    ps.setInt>4,knowapp?@

    ps.set*tring>+5,N*"N?@

    int nPps.executeUpdate>?@

    if>nO5?

    session.set$ttribute>NaccountN,accno?@

    response.sendFedirect>NcustomersKreg.jspN?@

    Velse

    out.println>NJhtmlOJbodybgcolorPpinkOJh-O'ot *uccessfulN?@

    ps.close>?@ con.close>?@

    / 'et "anking

  • 8/10/2019 2.net banking project document.doc

    48/60

    V catch >1xception e?

    out.println>N1rror occured %ue to the insertion os dateNBe?@

    V

    SO

    >. S+STEM TESTIN%

    *ystem Testing is a process of executing a program with the explicit intention of

    finding errors, which cause program failure. There are two general strategies for testing

    software. They are A

    >.1Code Te i g

    >.2 S"e$ifi$a io e i g

    >.1 CODE TESTIN%

    E 'et "anking

  • 8/10/2019 2.net banking project document.doc

    49/60

    This strategy examines the logic of a program and has been carried out to identify three

    levels of correctness of programs. 2ossible correctness is first achieved by giving arbitrary

    inputs. Then the inputs are carefully selected to obtain predicted output. This gives the

    probable correctness. $ll potentially problematic areas are checked in this way for the software

    to achieve probable correctness. $bsolute correctness can be demonstrated by a test involving

    every possible combination of inputs. However, this cannot be performed with the software but

    to the existence of the various possible combinations of the inputs and due to time restrictions.

    >.2 SPECI-IC&TION TESTIN%

    The specifications are examined which states what the program should do and how it

    should perform under various conditions. Then test cases are developed for each condition or

    combinations of conditions and submitted for processing. "y examining the results, it is

    determined whether the program performs according to its specified re uirements.

    >.3 'E*E'S O- TESTIN%

    The two levels of Testing are

    Unit Testing*ystem Testing

    >.3.1UNIT TESTIN%Unit testing is done for the programs making up the systems. It is focused to find out

    module errors and enables to detect errors in coding and logic that are contained in the module.Unit testing is performed from bottom(up, starting with the smallest and lowest levels modules

    and proceeding one.

    >.3.2 S+STEM TESTIN%

    $t a time *ystem Testing finds out the discrepancies between the system and its

    original objective, current specifications and systems documentation.

    The training session consists of getting the users used to software by asking them to

    perform data entry in our presence and look into the problems if encountered .Testing can be done in two ways.

    +. *ample Tests

    -. Feal Tests

    >.4 S&MP'E TESTS

    The software was tested with sample data that we randomly selected. I tested all

    functions with such random data and I was successful in getting accurate results. It was at this

    time I got to know certain intricacies of the system that I had overlooked.#ithout much delay

    4 'et "anking

  • 8/10/2019 2.net banking project document.doc

    50/60

    however, I got over the problems and managed to perfect the software at least to the extent

    possible.

    >.< RE&' TEST

    )or the real test, I have planned to do in due course. I initiali6ed the software and creation of entities through the updation module, transaction entries through the transaction module and

    generated reports with the estimations. The various information retrieval functions as per user

    need are also implemented

    >.= TEST C&SES:

    -OR 'O%IN P&%E:

    Te $a e;: + Priori @0 ' : High

    Te O #e$ ive: &orrect login details

    Te De $ri" io : User id and password checked

    Re Aireme verified: User id and password are checked in database

    Te E viro me : =ava

    Te e A" or "re7$o di io : User initiates any control mechanism like *ubmit or Go buttons

    &$ io EB"e$ ed Re Al

    Incorrect login

    &orrect login

    $ message ;Invalid user id8password