2.net banking project document.doc
-
Upload
panditce51 -
Category
Documents
-
view
234 -
download
0
Transcript of 2.net banking project document.doc
-
8/10/2019 2.net banking project document.doc
1/60
1. INTRODUCTION
The main objective of the proposed solution is to be automated the various functions and
activities of the bank through Internet. The solution will facilitate to the bank employees and
the account holders with the different modules. This solution is very much necessary for the private sector banks and the corporate sector. The banking industry will take a new shape and
explore like never before. Using the solution the bankers and account holders can generate
various kinds of reports.
1.1 PURPOSE:
Internet banking is a huge step forward in terms of convenience and safety in the banking
world. Most banks have website and most of these web sites have areas for online banking
customers. Though it cannot take care of every type of transaction for you, it does provide agreat deal of ease for tedious tasks that would re uire you to go to the bank fre uently.
!ou can manage all of your accounts this way and transfer money in between them. It
will show the history of an account for the last thirty days. If you need the date beyond then
and you do not have your paper statement, you will have to go to the bank. Tellers can print
you out the previous month. "eyond one month, the supervisor will have to assist you. #ith
online banking, though, it reduces your need for this.
1.2 SCOPE:The scope of this project is limited to the activities of the operations unit of the banking
system.#hich include opening of $ccount, %eposit of funds, #ithdrawal of funds and
transfer.
The Internet provides a secure medium for transferring funds electronically between bank
accounts, and also for making banking transaction over the Internet. $ll banking activities
that were conventionally carried by visiting a bank can now be done through a computer with
Internet access. &redit cards transactions are a form on Internet "anking.
#ith 'et("anking, you can not only view your account balance but also open a )ixed
%eposit, transfer funds, pay your electricity, telephone or mobile phone bills and much
more.$nd now, through 'et("anking, you can view not only your "ank accounts but also
your other "ank accounts. *o you can actually view many banks at the same time on one
screen
+ 'et "anking
-
8/10/2019 2.net banking project document.doc
2/60
1.3 Model diagram
)ig +.+ Model diagram for 'et "anking1.4 Over view of !e "ro#e$ :
Internet banking gives you access to your personal and business accounts online anytime,
anywhere. It s the perfect way to do your banking whether from home, the office or when
travelling because the service is available - hours a day, / days a week. Internet banking
gives you the freedom to choose your own banking hours giving you greater control of your
finances. It0s secure, fast and easy to use.
!ou can transact on all accounts linked to your $uto "ank, Master&ard, "usiness $uto"ank and 1 2lan cards. !ou can also view statements, make payments, apply to increase or
decrease an overdraft limit, and open investment and savings accounts.
'et banking, also referred to as on the net banking, has changed the way banking small
business is executed around the globe. "anking transactions is usually executed anytime from
anyplace. + can test account balances, apply for time deposits, and avail other banking expert
services even while sitting at your home or at workplace. 'ot like ahead of exactly where
persons needed to jostle for time to stop by a bank, now they merely demand a desktopcomputer they carry out their ordinary banking transactions.
- 'et "anking
-
8/10/2019 2.net banking project document.doc
3/60
DI%IT&' M&R(ETER )'O% :
Internet banking has also given an impetus to e(commerce. The banking sector in
association along with the authorities, have formulated a set of regulations and legal
guidelines that curb on line fraudulent practices. #hat s more, utmost confidentiality is taken
care of in determining and allocating pin codes and login ids of internet based banking and
instruments like debit and charge cards. "anks have also designed it obligatory for potential
customers to ac uire relevant safety measures to safeguard their online lender accounts. $s an
illustration, it s compulsory for your clients to vary their login specifics on fortnightly or
regular monthly foundation. 1ach one of these initiatives collectively have instilled faith and
self(confidence. In people today they transact from world wide web.
)olks are actually progressively carrying out over the internet shopping for and
selling transactions predominantly while in the areas of expert services. $s an illustration,
internet reserving of motion picture tickets is known as a general feature. #hile in
exceptional days like 3alentine s %ay and %iwali, greeting cards and bou uets web pages
witness maximum people load eager to deliver over the internet greetings and register for
bou uet delivery at a selected deal with ahead of time. $ll this happens to be likely because
of to safe and extremely fast online banking.
To create over the internet banking safer, you ll be able to also consider measures, like
putting in an anti(virus plus a firewall, to protected your personal personal
computer from hacking.The web banking was released during the eighties but it
only ac uired momentum while in the +445s. The banking people at first started
applying web based expert services for simple transactions like checking account
balances and digital funds transfer. To motivate extra participation, banks to
begin with furnished the solutions free of cost of cost and also carried out
exercise programs to lead persons on how to use online banking. In India, I&I&I
financial institution was the +st institution to start it underneath the identify of
Infinity.
3ia the internet banking also supplied respite to banking institutions since it
has minimi6ed the everyday load of clients going to them for smaller and easier
transactions like concern of bank statements.
"anking transactions where done with the online system, known as internet
banking becomes more popular. This is because you can do most of your banking transactions
without leaving the house, whenever you want to perform the transaction. Internet banking issafe and convenient way to handle your money.
7 'et "anking
http://www.digitalmarketinglabs.org/http://www.digitalmarketinglabs.org/ -
8/10/2019 2.net banking project document.doc
4/60
Internet "anking is very useful for the businessman who has a mobility and must often travel
on business. They have no spare time to spend to go to banks and do their banking
transactions . Therefore the choice of an online transaction is a must and very easy to them.
Many banks are now developing the online banking system . "ecause customers will get more
convenience than other bank customers who do not have these services. *ooner or later, most
people would be hard to resist and escape from this online banking system when all banks are
already adopting and using these systems as their banking facilities. 1ven so there are many
parties who do not know what exactly is online internet banking .
There are two types of banks that conduct banking transactions online via the Internet 8
9nline. "anks and Union banks are now starting to offer online banking services . These
banks are still possible for a customer to go to the building or office of a bank to conduct
their transactions personally and is served by a teller or customer service. 9r they can take
advantage of internet banking services through the bank web sites which are available. #hile
virtual banks do not have a location or office or building where the customer physically able
to enter and be served by a teller or customer service in banking transactions. They can only
do their banking business and transactions through the Internet. *uch kind of bank does not
provide options for customers to be able to visit a branch office and make a deposit or other
banking activities.
3irtual banks charge a small fee for their internet banking service . Internet banking service
might be performed even for free. 3irtual banks are able to do this because they do not have
the physical building and human resources in large number that must be considered and
maintained, so that the operational costs were relatively lower. "anks and credit unions also
charge a small fee for their online services.
&onduct banking transactions online has a small level of risk, because there are many stages
and password that must be passed before the online banking transactions done successfully.
This is to ensure the security of transactions and to prevent any leakage. 2rudence is the key
word when it decided to enter and access the internet banking system. If you already have an
account online, you will have a complex password. $nd there are a series of security options
that only you know the password. 9thers will not be given the opportunity to be able to break
through. In fact, when the option of transaction which will be done is high risk, then the
security will be getting more complex again. May be complicated for many people, but the
choice is safety and comfort.
*ome of the benefits that can be retrieved by performing internet banking, !ou can do varioustransactions through internet banking. !ou can pay bills directly from your account. !ou also
'et "anking
-
8/10/2019 2.net banking project document.doc
5/60
get a longer span of time in paying bills. The process is much faster without the need to
ueue. )unds can be transferred directly from your account. 1ase of filling any loan
applications. !ou can even use internet banking to invest.
The huge and strongly felt of the benefits is the ease of doing banking transactions without a
limited time and place. !ou can perform banking transactions whenever you want. In fact,
you can add software to your computer so it can download information from your internet
banking account to register the virtual check of your internet banking activities. In addition,
you can access internet banking account anytime, day or night. $s long as you have an
internet connection, when you are in business trip. !ou can conduct your banking transactions
from a laptop in a hotel room, or from your home computer. !ou0ll find it easy to find
information and conduct transactions that you want. #ith the ease of it, welcome to the world
of online banking .
: 'et "anking
-
8/10/2019 2.net banking project document.doc
6/60
2. 'ITER&TURE SUR*E+
2.1 &)OUT ,&*&
Initially the language was called as ;oak< but it was renamed as ;=ava< in +44:. The
primary motivation of this language was the need for a platform(independent >i.e.,
architecture neutral? language that could be used to create software to be embedded in various
consumer electronic devices.
=ava is a programmer0s language.
=ava is cohesive and consistent.
1xcept for those constraints imposed by the Internet environment, =ava
gives the programmer, full control.
)inally, =ava is to Internet programming where & was to system programming.
IMPORT&NCE O- ,&*& TO T E INTERNET
=ava has had a profound effect on the Internet. This is because@ =ava expands the
Universe of objects that can move about freely in &yberspace. In a network, two categories of
objects are transmitted between the *erver and the 2ersonal computer. They areA 2assive
information and %ynamic active programs. The %ynamic, *elf(executing programs causeserious problems in the areas of *ecurity and probability. "ut, =ava addresses those concerns
and by doing so, has opened the door to an exciting new form of program called the $pplet.
,&*& C&N )E USED TO CRE&TE T/O T+PES O- PRO%R&MS
&PP'IC&TIONS &ND &PP'ETS: $n application is a program that runs on our
&omputer under the operating system of that computer. It is more or less like one creating
using & or &BB. =ava0s ability to create $pplets makes it important. $n $pplet is an
application designed to be transmitted over the Internet and executed by a =ava Ccompatible
web browser. $n applet is actually a tiny =ava program, dynamically downloaded across the
network, just like an image. "ut the difference is, it is an intelligent program, not just a media
file. It can react to the user input and dynamically change.
2.1.1 -E&TURES O- ,&*&
SECURIT+1very time you that you download a ;normal< program, you are risking a viral
infection. 2rior to =ava, most users did not download executable programs fre uently, and
D 'et "anking
-
8/10/2019 2.net banking project document.doc
7/60
those who did scanned them for viruses prior to execution. Most users still worried about the
possibility of infecting their systems with a virus. In addition, another type of malicious
program exists that must be guarded against. This type of program can gather private
information, such as credit card numbers, bank account balances, and passwords. =ava
answers both these concerns by providing a ;firewall< between a network application and
your computer.#hen you use a =ava(compatible #eb browser, you can safely download =ava applets
without fear of virus infection or malicious intent. PORT&)I'IT+
)or programs to be dynamically downloaded to all the various types of platforms
connected to the Internet, some means of generating portable executable code is needed .$s
you will see, the same mechanism that helps ensure security also helps create portability.
Indeed, =ava0s solution to these two problems is both elegant and efficient.
T E )+TE CODE
The key that allows the =ava to solve the security and portability problems is that the
output of =ava compiler is "yte code. "yte code is a highly optimi6ed set of instructions
designed to be executed by the =ava run(time system, which is called the =ava 3irtual
Machine >=3M?. That is, in its standard form, the =3M is an interpreter for byte code.
Translating a =ava program into byte code helps makes it much easier to run a
program in a wide variety of environments. The reason is, once the run(time package exists
for a given system, any =ava program can run on it.
$lthough =ava was designed for interpretation, there is technically nothing about =ava
that prevents on(the(fly compilation of byte code into native code. *un has just completed its
=ust In Time >=IT? compiler for byte code. #hen the =IT compiler is a part of =3M, it
compiles byte code into executable code in real time, on a piece(by(piece, demand basis. It isnot possible to compile an entire =ava program into executable code all at once, because =ava
performs various run(time checks that can be done only at run time. The =IT compiles code,
as it is needed, during execution.
,&*& *IRTU&' M&C INE0,*M
"eyond the language, there is the =ava virtual machine. The =ava virtual machine is an
important element of the =ava technology. The virtual machine can be embedded within aweb browser or an operating system. 9nce a piece of =ava code is loaded onto a machine, it is
/ 'et "anking
-
8/10/2019 2.net banking project document.doc
8/60
verified. $s part of the loading process, a class loader is invoked and does byte code
verification makes sure that the code that0s has been generated by the compiler will not
corrupt the machine that it0s loaded on. "yte code verification takes place at the end of the
compilation process to make sure that is all accurate and correct. *o byte code verification is
integral to the compiling and executing of =ava code.
Overall De $ri" io
)ig -.+ 2icture showing the development process of =$3$ 2rogram
=ava programming uses to produce byte codes and executes them. The first box
indicates that the =ava source code is located in a. =ava file that is processed with a =ava
compiler called javac. The =ava compiler produces a file called a. class file, which contains
the byte code. The. &lass file is then loaded across the network or loaded locally on your
machine into the execution environment is the =ava virtual machine, which interprets and
executes the byte code
2.1. 2 ,&*& &RC ITECTURE
=ava architecture provides a portable, robust, high performing environment for
development. =ava provides portability by compiling the byte codes for the =ava 3irtual
Machine, which is then interpreted on each platform by the run(time environment. =ava is a
dynamic system, able to load code when needed from a machine in the same room or across
the planet.
2.1.3COMPI'&TION O- CODE
#hen you compile the code, the =ava compiler creates machine code >called byte
code? for a hypothetical machine called =ava 3irtual Machine >=3M?. The =3M is supposed
to execute the byte code. The =3M is created for overcoming the issue of portability. The
E 'et "anking
Java Source Java byte code JavaVM
=ava .&lass
-
8/10/2019 2.net banking project document.doc
9/60
code is written and compiled for one machine and interpreted on all machines. This machine
is called =ava 3irtual Machine.
)ig -.- compilation of code %uring run(time the =ava interpreter tricks the bytecode file into thinking that it is
running on a =ava 3irtual Machine. In reality this could be a Intel 2entium #indows 4: or
*un*$F& station running *olaris or $pple Macintosh running system and all could receive
code from any computer through Internet and run the $pplets.
SIMP'E
=ava was designed to be easy for the 2rofessional programmer to learn and to use
effectively. If you are an experienced &BB programmer, learning =ava will be even easier.
"ecause =ava inherits the &8&BB syntax and many of the object oriented features of &BB.
Most of the confusing concepts from &BB are either left out of =ava or implemented in a
cleaner, more approachable manner. In =ava there are a small number of clearly defined ways
to accomplish a given task.
O),ECT ORIENTED
=ava was not designed to be source(code compatible with any other language. This
allowed the =ava team the freedom to design with a blank slate. 9ne outcome of this was a
4 'et "anking
SourceCode....
..
PC Compiler
MacintoshCompiler
SPARC
Compiler
Java
Byte code
(Platformindependent)
JavaInterpreter(PC)
JavaInterpreter(Macintosh)
JavaInterpreter(Sparc)
-
8/10/2019 2.net banking project document.doc
10/60
clean usable, pragmatic approach to objects. The object model in =ava is simple and easy to
extend, while simple types, such as integers, are kept as high(performance non(objects.
RO)UST
The multi(platform environment of the #eb places extraordinary demands on a
program, because the program must execute reliably in a variety of systems. The ability to
create robust programs was given a high priority in the design of =ava. =ava is strictly typed
language@ it checks your code at compile time and run time.
=ava virtually eliminates the problems of memory management and deallocation,
which is completely automatic. In a well(written =ava program, all run time errors can Cand
should Cbe managed by your program.
2.2 SER*'ETS
INTRODUCTION
The =ava web server is =ava*oft s own web *erver. The =ava web server is just a part
of a larger framework, intended to provide you not just with a web server, but also with
tools. To build customi6ed network servers for any Internet or Intranet client8server
system. *ervlets are to a web server, how applets are to the browser.
&)OUT SER*'ETS
*ervlets provide a =ava(based solution used to address the problems currently
associated with doing server(side programming, including inextensible scripting solutions,
platform(specific $2Is, and incomplete interfaces.
*ervlets are objects that conform to a specific interface that can be plugged into a
=ava(based server. *ervlets are to the server(side what applets are to the client(side ( object
byte codes that can be dynamically loaded off the net. They differ from applets in that they
are faceless objects >without graphics or a GUI component?. They serve as platform
independent, dynamically loadable, plugable helper byte code objects on the server side that
can be used to dynamically extend server(side functionality.
)or example, an HTT2 *ervlets can be used to generate dynamic HTM content. #hen you
use *ervlets to do dynamic content you get the following advantagesA
They0re faster and cleaner than &GI scripts
They use a standard $2I >the *ervlets $2I?
+5 'et "anking
-
8/10/2019 2.net banking project document.doc
11/60
They provide all the advantages of =ava >run on a variety of servers without
needing to be rewritten?.
&TTR&CTI*ENESS O- SER*'ETS
There are many features of *ervlets that make them easy and attractive to use. TheseincludeA
1asily configured using the GUI(based $dmin tool
&an be loaded and invoked from a local disk or remotely across the network.
&an be linked together, or chained, so that one *ervlets can call another
*ervlets, or several *ervlets in se uence.
&an be called dynamically from within HTM pages, using server(side
include tags.$re secure ( even when downloading across the network, the *ervlets security
model and *ervlets sandbox protect your system from unfriendly behavior.
&D*&NT&%ES O- SER*'ET &PI
9ne of the great advantages of the *ervlet $2I is protocol independence. It assumes
nothing aboutA
The protocol being used to transmit on the net
How it is loaded
The server environment it will be running in
These ualities are important, because it allows the *ervlet $2I to be embedded in
many different kinds of servers. There are other advantages to the *ervlet $2I as well. These
includeA
It0s extensible ( you can inherit all your functionality from the base classes
made available to you.
it s simple, small, and easy to use.
-E&TURES O- SER*'ETS
*ervlets are fast. *ince *ervlets only need to be loaded once, they offer much
better performance over their &GI counterparts.
++ 'et "anking
http://var/www/apps/conversion/tmp/scratch_2/load.htmlhttp://var/www/apps/conversion/tmp/scratch_2/filter.htmlhttp://var/www/apps/conversion/tmp/scratch_2/ssinclude.htmlhttp://var/www/apps/conversion/tmp/scratch_2/ssinclude.htmlhttp://var/www/apps/conversion/tmp/scratch_2/api.htmlhttp://var/www/apps/conversion/tmp/scratch_2/load.htmlhttp://var/www/apps/conversion/tmp/scratch_2/filter.htmlhttp://var/www/apps/conversion/tmp/scratch_2/ssinclude.htmlhttp://var/www/apps/conversion/tmp/scratch_2/ssinclude.htmlhttp://var/www/apps/conversion/tmp/scratch_2/api.html -
8/10/2019 2.net banking project document.doc
12/60
*ervlets are platform independent.
*ervlets are extensible. =ava is a robust, object(oriented programming
language, which easily can be extended to suit your needs
*ervlets are secure.*ervlets can be used with a variety of clients.
'O&DIN% SER*'ETS*ervlets can be loaded from three places from a directory that is on the & $**2$TH. The
& $**2$TH of the =ava#eb*erver includes service root8classes8 which is where the system
classes reside.)rom the J*1F3I&1KF99T 8*ervlets8 directory. This is LnotL in the server s class
path. $ class loader is used to create *ervlets from this directory. 'ew *ervlets can be added (
existing *ervlets can be recompiled and the server will notice these changes.
)rom a remote location. )or this a code base like httpA 88 nine.eng 8 classes 8 foo 8 is
re uired in addition to the *ervlets class name. Fefer to the admin GUI docs on *ervlet
section to see how to set this up.
9$%I'G F1M9T1 *1F3 1T*
Femote *ervlets can be loaded byA
+. &onfiguring the $dmin Tool to setup automatic loading of remote *ervlets
-. *etting up server side include tags in .shtml files
7. %efining a filter chain configuration
I'39 I'G *1F3 1T*
$ *ervlet invoker is a *ervlet that invokes the NserviceN method on a named *ervlet. If
the *ervlet is not loaded in the server, then the invoker first loads the *ervlet >either from
local disk or from the network? and the then invokes the NserviceN method. $lso like applets,
local *ervlets in the server can be identified by just the class name. In other words, if a
*ervlet name is not absolute, it is treated as local.
$ client can invoke *ervlets in the following waysA
The client can ask for a document that is served by the *ervlet.
The client >browser? can invoke the *ervlet directly using a UF , once it has
been mapped using the *ervlet $liases section of the admin GUI.
The *ervlet can be invoked through server side include tags.
The *ervlet can be invoked by placing it in the *ervlets8 directory.
+- 'et "anking
http://var/www/apps/conversion/tmp/administration/servlet_load.htmlhttp://var/www/apps/conversion/tmp/scratch_2/ssinclude.htmlhttp://var/www/apps/conversion/tmp/scratch_2/filter.htmlhttp://var/www/apps/conversion/tmp/administration/servlet_alias.htmlhttp://var/www/apps/conversion/tmp/administration/servlet_alias.htmlhttp://var/www/apps/conversion/tmp/administration/servlet_alias.htmlhttp://var/www/apps/conversion/tmp/scratch_2/ssinclude.htmlhttp://var/www/apps/conversion/tmp/administration/servlet_load.htmlhttp://var/www/apps/conversion/tmp/scratch_2/ssinclude.htmlhttp://var/www/apps/conversion/tmp/scratch_2/filter.htmlhttp://var/www/apps/conversion/tmp/administration/servlet_alias.htmlhttp://var/www/apps/conversion/tmp/scratch_2/ssinclude.html -
8/10/2019 2.net banking project document.doc
13/60
The *ervlet can be invoked by using it in a filter chain.
2.3 ,&*&SCRIPT
=ava*cript is a script(based programming language that was developed by 'etscape&ommunication &orporation. =ava*cript was originally called ive *cript and renamed as
=ava*cript to indicate its relationship with =ava. =ava*cript supports the development of both
client and server components of #eb(based applications. 9n the client side, it can be used to
write programs that are executed by a #eb browser within the context of a #eb page. 9n the
server side, it can be used to write #eb server programs that can process information
submitted by a #eb browser and then updates the browser0s display accordingly
1ven though =ava*cript supports both client and server #eb programming, we prefer
=ava*cript at &lient side programming since most of the browsers supports it. =ava*cript is
almost as easy to learn as HTM , and =ava*cript statements can be included in HTM
documents by enclosing the statements between a pair of scripting tags
J*&FI2T*O..J8*&FI2TO.
J*&FI2T $'GU$G1 P ;=ava*cript
-
8/10/2019 2.net banking project document.doc
14/60
#hile =ava*cript is best suited o simple applications and adding interactive features to
#eb pages@ =ava can be used for incredibly complex applications.
There are many other differences but the important thing to remember is that =ava*cript and
=ava are separate languages. They are both useful for different things@ in fact they can be usedtogether to combine their advantages.
&D*&NT&%ES
=ava*cript can be used for *ever(side and &lient(side scripting.
It is more flexible than 3"*cript.
=ava*cript is the default scripting languages at &lient(side since all the
browsers supports it.
+PERTE T M&R(UP '&N%U&%EHypertext Markup anguage >HTM ?, the languages of the #orld #ide #eb
>###?, allows users to produces #eb pages that include text, graphics and pointer to other
#eb pages >Hyperlinks?.
HTM is not a programming language but it is an application of I*9 *tandard EE/4,
*GM >*tandard Generali6ed Markup anguage?, but speciali6ed to hypertext and adapted to
the #eb. The idea behind Hypertext is that instead of reading text in rigid linear structure, we
can easily jump from one point to another point. #e can navigate through the information
based on our interest and preference. $ markup language is simply a series of elements, each
delimited with special characters that define how text or other items enclosed within the
elements should be displayed. Hyperlinks are underlined or emphasi6ed works that load to
other documents or some portions of the same document.
HTM can be used to display any type of document on the host computer, which can
be geographically at a different location. It is a versatile language and can be used on any
platform or desktop.
HTM provides tags >special codes? to make the document look attractive. HTM
tags are not case(sensitive. Using graphics, fonts, different si6es, color, etc., can enhance the
presentation of the document. $nything that is not a tag is part of the document itself.
)&SIC TM' T&%S
5677 778 *pecifies comments
5&8999.5 &8 &reates hypertext links
5)8999.5 )8 )ormats text as bold
+ 'et "anking
-
8/10/2019 2.net banking project document.doc
15/60
5)I%8999.5 )I%8 )ormats text in large font.
5)OD+895 )OD+8 &ontains all tags and text in the HTM document
5CENTER8...5 CENTER8 &reates text
5DD895 DD8 %efinition of a term
5D'8...5 D'8 &reates definition list
5-ONT895 -ONT8 )ormats text with a particular font
5-ORM8...5 -ORM8 1ncloses a fill(out form
5-R&ME8...5 -R&ME8 %efines a particular frame in a set of frames
5 ;895 ;8 &reates headings of different levels
5 E&D8...5 E&D8 &ontains tags that specify information about a document
5 R8...5 R8 &reates a hori6ontal rule
5 TM'895 TM'8 &ontains all other HTM tags
5MET&8...5 MET&8 2rovides meta(information about a document
5SCRIPT895 SCRIPT8 &ontains client(side or server(side script
5T&)'E895 T&)'E8 &reates a table
5TD895 TD8 Indicates table data in a table
5TR895 TR8 %esignates a table row
5T 895 T 8 &reates a heading in a table
&D*&NT&%ES$ HTM document is small and hence easy to send over the net. It is small because it
does not include formatted information.HTM is platform independent.HTM tags are not case(sensitive.
2.4 ,D)C
=%"& is a =ava $2I for executing *Q statements. >$s a point of interest, =%"& is a
trademarked name and is not an acronym@ nevertheless, =%"& is often thought of as standingfor =ava %atabase &onnectivity. It consists of a set of classes and interfaces written in the
=ava programming language. =%"& provides a standard $2I for tool8database developers and
makes it possible to write database applications using a pure =ava $2I.
Using =%"&, it is easy to send *Q statements to virtually any relational database.
9ne can write a single program using the =%"& $2I, and the program will be able to send
*Q statements to the appropriate database. The combinations of =ava and =%"& lets a
programmer write it once and run it anywhere.
-UNCTIONS O- ,D)C
+: 'et "anking
-
8/10/2019 2.net banking project document.doc
16/60
*imply put, =%"& makes it possible to do three thingsA
1stablish a connection with a database
*end *Q statements
2rocess the results. =%"& 31F*U* 9%"&
$t this point, Microsoft s 9%"& >9pen %atabase &onnectivity? $2I is that probably
the most widely used programming interface for accessing relational databases. It offers the
ability to connect to almost all databases on almost all platforms.
*o why not just use 9%"& from =avaR The answer is that you can use 9%"& from =ava,
but this is best done with the help of =%"& in the form of the =%"&(9%"& "ridge, which we
will cover shortly. The uestion now becomes N#hy do you need =%"&RN There are several
answers to this uestionA
+. 9%"& is not appropriate for direct use from =ava because it uses a & interface. &alls
from =ava to native & code have a number of drawbacks in the security, implementation,
robustness, and automatic portability of applications.
-. $ literal translation of the 9%"& & $2I into a =ava $2I would not be desirable. )or
example, =ava has no pointers, and 9%"& makes copious use of them, including the
notoriously error(prone generic pointer Nvoid LN. !ou can think of =%"& as 9%"&
translated into an object(oriented interface that is natural for =ava programmers.
7. 9%"& is hard to learn. It mixes simple and advanced features together, and it has
complex options even for simple ueries. =%"&, on the other hand, was designed to keep
simple things simple while allowing more advanced capabilities where re uired.
. $ =ava $2I like =%"& is needed in order to enable a Npure =avaN solution. #hen
9%"& is used, the 9%"& driver manager and drivers must be manually installed on
every client machine. #hen the =%"& driver is written completely in =ava, however,
=%"& code is automatically installable, portable, and secure on all =ava platforms from
network computers to mainframes.
T/O7TIER &ND T REE7TIER MODE'S
The =%"& $2I supports both two(tier and three(tier models for database access. In the
two(tier model, a =ava applet or application talks directly to the database. This re uires a
=%"& driver that can communicate with the particular database management system being
accessed. $ user s *Q statements are delivered to the database, and the results of those
+D 'et "anking
-
8/10/2019 2.net banking project document.doc
17/60
statements are sent back to the user. The database may be located on another machine to
which the user is connected via a network. This is referred to as a client8server configuration,
with the user s machine as the client, and the machine housing the database as the server. The
network can be an Intranet, which, for example, connects employees within a corporation, or
it can be the Internet.
In the three(tier model, commands are sent to a Nmiddle tierN of services, which then send
)ig -.7 Three tier model
*Q statements to the database. The database processes the *Q statements and sends the
results back to the middle tier, which then sends them to the user. MI* directors find the
three(tier model very attractive because the middle tier makes it possible to maintain controlover access and the kinds of updates that can be made to corporate data. $nother advantage is
that.
when there is a middle tier, the user can employ an easy(to(use higher(level $2I which is
translated by the middle tier into the appropriate low(level calls. )inally, in many cases the
three(tier architecture can provide performance advantages
+/ 'et "anking
JAVA Application
JDBC
DBMS
Client machine
DBMS-proprietary protocol
Database server
-
8/10/2019 2.net banking project document.doc
18/60
)ig -. Middle tier architecture
Until now the middle tier has typically been written in languages such as & or &BB, which
offer fast performance. However, with the introduction of optimi6ing compilers that translate
=ava byte code into efficient machine(specific code, it is becoming practical to implement the
middle tier in =ava. This is a big plus, making it possible to take advantage of =ava s
robustness, multithreading, and security features. =%"& is important to allow database access
from a =ava middle tier.
,D)C DRI*ER T+PES
The =%"& drivers that we are aware of at this time fit into one of four categoriesA
=%"&(9%"& bridge plus 9%"& driver
'ative($2I partly(=ava driver
=%"&('et pure =ava driver
'ative(protocol pure =ava driver
+E 'et "anking
Java applet orHtml browser
ApplicationServer (
Java) JDBC
DBMS
Client machine (GUI)
HTTP, RMI, or CORBA calls
Server machine (business Logic)
DBMS-proprietary protocol
Database server
-
8/10/2019 2.net banking project document.doc
19/60
,D)C7OD)C )RID%EIf possible, use a 2ure =ava =%"& driver instead of the "ridge and an 9%"& driver. This
completely eliminates the client configuration re uired by 9%"&. It also eliminates the
potential that the =ava 3M could be corrupted by an error in the native code brought in by the
"ridge >that is, the "ridge native library, the 9%"& driver manager library, the 9%"& driver
library, and the database client library?. ,D)C7 OD)C )RID%E
The =%"&(9%"& "ridge is a =%"& driver, which implements =%"& operations by
translating them into 9%"& operations. To 9%"& it appears as a normal application
program. The "ridge implements =%"& for any database for which an 9%"& driver is
available. The "ridge is implemented as the sun.jdbc.odbc =ava package and contains a native
library used to access 9%"&. The "ridge is a joint development of Intersolv and =ava*oft.
2.< ,&*& SER*ER P&%ES0,SP
=ava server 2ages is a simple, yet powerful technology for creating and maintaining
dynamic(content web pages. "ased on the =ava programming language, =ava *erver 2ages
offers proven portability, open standards, and a mature re(usable component model .The =ava
*erver 2ages architecture enables the separation of content generation from content
presentation. This separation not eases maintenance headaches, it also allows web teammembers to focus on their areas of expertise. 'ow, web page designer can concentrate on
layout, and web application designers on programming, with minimal concern about
impacting each other0s work.
-E&TURES O- ,SP
PORT&)I'IT+
=ava *erver 2ages files can be run on any web server or web(enabled application
server that provides support for them. %ubbed the =*2 engine, this support involves
recognition, translation, and management of the =ava *erver 2age lifecycle and its interaction
components.
COMPONENTS
It was mentioned earlier that the =ava *erver 2ages architecture can include reusable
=ava components. The architecture also allows for the embedding of a scripting language
+4 'et "anking
-
8/10/2019 2.net banking project document.doc
20/60
directly into the =ava *erver 2ages file. The components current supported include =ava
"eans, and *ervlets.
PROCESSIN%
$ =ava *erver 2ages file is essentially an HTM document with =*2 scripting or tags.
The =ava *erver 2ages file has a =*2 extension to the server as a =ava *erver 2ages file.
"efore the page is served, the =ava *erver 2ages syntax is parsed and processed into a *ervlet
on the server side. The *ervlet that is generated outputs real content in straight HTM for
responding to the client.
&CCESS MODE'S
$ =ava *erver 2ages file may be accessed in at least two different ways. $ client0s
re uest comes directly into a =ava *erver 2age. In this scenario, suppose the page
accesses reusable =ava "ean components that perform particular well(defined
computations like accessing a database. The result of the "eans computations, called
result sets is stored within the "ean as properties. The page uses such "eans to generate
dynamic content and present it back to the client.
In both of the above cases, the page could also contain any valid =ava code. =ava *erver
2ages architecture encourages separation of content from presentation.
STEPS IN T E E ECUTION O- & ,SP &PP'IC&TION
+ The client sends a re uest to the web server for a =*2 file by giving the name of the
=*2 file within the form tag of a HTM page.
- This re uest is transferred to the =ava #eb *erver. $t the server side =ava #eb *erver
receives the re uest and if it is a re uest for a jsp file server gives this re uest to the
=*2 engine.
7 =*2 engine is program which can understands the tags of the jsp and then it converts
those tags into a *ervlet program and it is stored at the server side. This *ervlet is
loaded in the memory and then it is executed and the result is given back to the =ava
#eb *erver and then it is transferred back to the result is given back to the =ava #eb
*erver and then it is transferred back to the client
-5 'et "anking
-
8/10/2019 2.net banking project document.doc
21/60
,D)C CONNECTI*IT+
The =%"& provides database(independent connectivity between the =-11 platform
and a wide of tabular data sources. =%"& technology allows an $pplication &omponent
2rovider range toA
2erform connection and authentication to a database server
Manager transactions
Move *Q statements to a database engine for preprocessing and execution
1xecute stored procedures
-+ 'et "anking
-
8/10/2019 2.net banking project document.doc
22/60
3. S+STEM &N&'+SIS
3.1 E ISTIN% S+STEM:
In the existing system the transactions are done only manually but in proposed system
we have to computeri6e all the banking transaction using the software 9nline "anking.
3.1.1 DIS7&D*&NT&%ES:
+. ack of security of data.-. More man power 7. Time consuming. %amage of machines due to lack of attention.
:. &onsumes large volume of pare work.3.2 PROPOSED S+STEM:
The aim of proposed system is to develop a system of improved facilities. The proposed
system can overcome all the limitations of the existing system. The system provides proper
*ecurity and reduce the manual work. The proposed system can be accessed from any part of
the world, as opposed to stand alone or manual system, and provides information at anytime,
anywhere round the clock to the customers
3.2.1 &D*&NT&%ES:
The following are the advantages of proposed system
1. The user can access the system at any time, because it0s - (hour online from anywhere in
the world.2. The customer can save his money and time that is a valuable one in today0s day( to C day
life.3. It provides easy to use and user friendly interface for the user.4. Minimum time re uired
-
8/10/2019 2.net banking project document.doc
23/60
4. SO-T/&RE &ND &RD/&RE SPECI-IC&TIONS
SO-T/&RE RE?UIREMENTS
9perating system A windows xp with sp-.
anguage >front end? A java >jdk+.:8+.D?
*erver A apache tomcat :.:8D.5
#eb technology A html, java script, css.
%atabase >back end? A oracle +5g.
$rchitecture A 7(tier architectur
&RD/&RE RE?UIREMENTS
2rocessor A2entium -. GH6 or above
*peed AE55 MH6
Hard %isk AE5 G"
F$M A:+- M"
< S+STEM DESI%N
-7 'et "anking
-
8/10/2019 2.net banking project document.doc
24/60
+ G" F$M recommended?
7. Hard disk with minimum + G" free space
. 'I& >network interface card? connected to network pentium III
:. Fam A D M".
D. Hard disk A +5.- G".
/. Monitor A *3G$ color monitor.
E. eyboard A +5: standard mouse.
-
8/10/2019 2.net banking project document.doc
25/60
Credi Card
&ustomer needs to open a savings8current account bank account before opening the
credit card account. &redit card account will be linked with their savings8current account.
&ustomer needs to give their account detail when applying for the credit card.
I "A
&ustomer account details
OA "A
$lert message
Term De"o i
Term %eposit can be of two typesA )lexible deposit and &umulative deposit.
-leBi le De"o i
)lexible deposit has links with the savings bank account.
I "A
&ustomer details
$mount
2eriod
o !ears
o Months
o %ays
Fenewal 9ption
o Fepay the deposit
o $uto Fenewal
2rincipal only
2rincipal along with interest
OA "A
-: 'et "anking
-
8/10/2019 2.net banking project document.doc
26/60
$lert message.
CAmAla ive De"o i
I "A
&ustomer details
$mount
2eriod
o !ears
o Months
o %ays
OA "A
$lert message
Re$Arri g De"o i
I "A
&ustomer details
2eriod
Installment amount
OA "A
$lert message
-
8/10/2019 2.net banking project document.doc
27/60
Interest *tatement
Un &leared &he ue
&$$oA SAmmar@
&ustomer can go to the Teller option and select the $ccount *ummary. It provides
account summary of the customer. $ccount summary will be grouped asA
Fegular $ccounts
Investment $ccounts
oan $ccounts
&redit card $ccount
9n selecting the account summary field, the type of accounts field will be displayed.
Here the customer selects their account type and the account number will be entered further.
9n entering these, the account summary is displayed. )urther, customer can enter from and to
dates to see the opening balance and the closing balance.
I "A
$ccount Type
$ccount 'umber
*tatement %uration
OA "A
%ate
%escription
&redit8%ebit
$mount
"alance
-
8/10/2019 2.net banking project document.doc
28/60
I "A
$ccount type
$ccount number
2eriod of transaction
OA "A
Transaction history for the specified period
Card Tra a$ io
The card transaction option will be provided for displaying the card transaction
details.
I "A
&ard Type
&ard 'umber
2eriod of transaction
OA "A
&ard 'umber
$ccount 'umber
1xpiry %ate
%ate of transaction
2ay To
$mount
-
8/10/2019 2.net banking project document.doc
29/60
$ccount 'umber
Interest type >accrued8credited8debited?
)rom and to dates
OA "A
%ate
%escription >loan no. or flexi deposit no etc?
Interest $ccrued8&redited8%ebited
Interest credited during last year
Interest credited during the current year
-
8/10/2019 2.net banking project document.doc
30/60
-A d Tra fer
&ustomers can use this service for regular payment from one account to another.
I "A
9rigin account number
%estination account number
%estination "ank
%estination "ranch
Transfer $mount
)re uency >9ne Time8Monthly8Quarterly8!early?
Transfer %ate
OA "A
&ler me age. In case if there is no sufficient fund in the origin account, the same
must be alerted to the customer.
TaB Pa@me
The Tax 2ayment component facilitates the customer to calculate tax payment amount
and remit the same to the tax collecting authority.
9ptions provided to the customer includeA
Tax 2ayment re uest
Tax 2ayment modification
Tax 2ayment &ancellation
I "A
$ccount Type
$ccount 'umber
Tax 2ayer I%
75 'et "anking
-
8/10/2019 2.net banking project document.doc
31/60
Taxing 2eriod
Income during the above period
Tax 2ayment amount
Tax &ollecting $uthority
OA "A
$lert message.
-
8/10/2019 2.net banking project document.doc
32/60
$lert message will be displayed to the user showing the service charge amount that
will be debited from his account.
-
8/10/2019 2.net banking project document.doc
33/60
MaGi g remi a $e .
*ervice charges will be displayed for the customer to avail the facility and will be
determined by the bank.
I "A
The customer provides following detailsA
2ayee name
2ayee bank name and branch
2ayee account number
$mount
$ccount type
$ccount 'o.
"ranch
OA "A
$lert message showing the service charge to be debited from the customer0s account.
-
8/10/2019 2.net banking project document.doc
34/60
$ccount 'o.
OA "A
$lert message showing the service charge to be debited from the customer0s
account.
New Card Re Ae
In this process, the customer re uests for a new card when he has lost his current card.
I "A
&ard 'o.
&ard Type
ost on %ate
OA "A
$lert message showing the service charge to be debited from the customer0s account.
Draf Ca !ier C!e Ae
The customer re uests bank to issue draft8cashier0s che ue. "ank may deliver the
%%8cashier0s che ue at users0 doorstep or payee0s doorstep. "ank will charge customer
accordingly.
I "A
9ptions to userA
%raft
&ashier0s che ue
)urther, customer enters the following detailsA
2ayee name
%rawn on
$mount
%elivery options
7 'et "anking
-
8/10/2019 2.net banking project document.doc
35/60
o %eliver at customer0s doorstep
o %eliver at payee0s doorstep
2ayee0s address
o %oor 'o.
o *treet
o $rea
o &ity
o 2I'
OA "A
$lert message showing the service charge to be debited from the customer0s account.
S o" Pa@me
In this process, the customer informs the bank to hold payment for the che ues he has
issued.
I "A
$ccount 'umber
"ranch
&he ue 'o
OA "A
9n entering the che ue number, following will be displayedA
2ayee 'ame
%ate of issue
"ranch
$lert message also will be displayed to the customer with service charge.
-
8/10/2019 2.net banking project document.doc
36/60
9pen another account
&lose account
Modify account info
Modify customer info
O"e & o !er &$$oA
In this process, an existing customer opens another account.
I "A
&ustomer I%
&ustomer details
OA "A
$lert message showing the new account number.
Clo e &$$oA
In this process, an existing account holder closes his account.
I "A
$ccount type
$ccount number
"ranch
Feason
)or remittance of balance
o $ccount Transfer
$ccount number
"ank name
"ranch
o &ashier0s che ue details
7D 'et "anking
-
8/10/2019 2.net banking project document.doc
37/60
OA "A
$ccount summary will be presented to the customer. &heck list will be provided to
the customer regarding pending standing instructions, pending &he ue etc.
Modif@ &$$oA I fo
In this process, a customer modifies his account information.
I "A
&ustomer has to enter the following informationA
$ccount type
$ccount number
"ranch
Mode of operation
$ccount link
Threshold
OA "A
$lert message displaying that the account details have been modified.
Modif@ CA omer I fo
In this process, the customer wants to change information about him such as
address, phone number etc.
I "A
$ccount type
$ccount number
"ranch
$pplicant number
&ustomer details
7/ 'et "anking
-
8/10/2019 2.net banking project document.doc
38/60
OA "A
$lert message showing that the customer0s details have been modified.
-
8/10/2019 2.net banking project document.doc
39/60
I "A
$ccount number
$mount
*tart date
Maturity date
"ank
"ranch
OA "A
$lert message displaying that the customer0s re uest was processed.
:.7 UM' Diagram :
U e $a e diagram for $rea e ill "a@me o !er "a@me a d aB "a@me
74 'et "anking
-
8/10/2019 2.net banking project document.doc
40/60
Bill Payments
Other Payments
Tax Payment
Card Transactions
Account Summary
Funds Transfer
Requests
Transactions
Credit Card Payment
New A/c Ty e
Customer
New A/c Creation
!aintenance Ser"ices
#nterest Statement
Ban$
Fixed %e osit !aturity
-ig. :.+ Use case diagram for create, bill payment, other payments and tax payment
Se Ae $e diagram for ew a$$oA $rea io :
5 'et "anking
-
8/10/2019 2.net banking project document.doc
41/60
)ig.D.7.- se uence diagram for customer operations
New AccountCreation & Ban$
#n ut Screen Transactions AccountSummary
'& Choose A/c Ty e (& A/c %etails )& Tran Ty e
*& +alidation
,& -et Tran %et.
)ig:.- A se uence diagram for new account creation
Cla diagram for di $A io of oA "A
+ 'et "anking
-
8/10/2019 2.net banking project document.doc
42/60
- # Com onent
!enu
O tions
#n ut Screen
Re ort
%ata !ani ulator
%ata Store
Account0Ty es
ser0Acc0Ty esFunds0Transfers
Bill0Payments %raft0Cheque
Tax0Payments Accounts
1oan0Ty es
1oans
Credit0Cards
CustomersCheque0Reorder
1oan0#ssue
Nominee
Transactions
22instantiates3322uses33
New Account
Transaction Ser"ices
Bill Payments!aintenance
Teller Ser"ices
ser Alerts
Requests
Re orts
)ig. :.7.A class diagram for discussion of output
S a e $!ar diagram for aA !e i$a io
- 'et "anking
-
8/10/2019 2.net banking project document.doc
43/60
)ig.:. A state chart diagram for authentication
S a e $!ar diagram for valida io
)ig :.:A *tate chart diagram for valid
=. IMP'EMENT&TION
Implementation is the process of having systems personnel check out and put new
e uipment into use, train users, install the new app %epending on the si6e of the
organi6ation that will be involved in using the application and the risk associated with its use,
systems developers may choose to test the operation in only one area of the firm, say in one
department or with only one or two persons.
7 'et "anking
unauthenticated validation authenticated( id,pwd ) ( ok )
( id,pwd )
Ready Validation Changed
( invalid )
( valid )
( oldpwd,new pwd )
-
8/10/2019 2.net banking project document.doc
44/60
=.1 SOURCE CODE
&$$oA De ail .# ":
JS page importPNjava.s l.L,java.util.LN sessionPNtrueNSO
JSint accnoP5@
*tring typeP>*tring?session.get$ttribute>NacctypeN?@
*tring topPNN@
try
&lass.for'ame>Nsun.jdbc.odbc.=dbc9dbc%riverN?@
&onnection con P %riverManager.get&onnection>NjdbcAodbcAnetbankN , NscottN , N ;tigerN?@
*tatement stPcon.create*tatement>?@
Fesult*et rsPnull@
2repared*tatement pstPnull@
rsPst.executeQuery>Nselect max>accno? from autoN?@
if>rs.next>??
accnoPrs.getInt>+?@
accnoBP+@
pstPcon.prepare*tatement>Ninsert into auto>accno? values>R?N?@
pst.setInt>+,accno?@
pst.execute>?@
V else accnoP+555@
if>type.e uals>N*"N?? topPN*"NBaccno@
else if>type.e uals>N&$N?? topPN&$NBaccno@
else if>type.e uals>N&&N?? topPN&&NBaccno@
else if>type.e uals>NT%N?? topPNT%NBaccno@
else topPNF%NBaccno@
V catch>1xception e? out.println>NJh+ONBeBNJ8h+ON?@V
SO
JhtmlO
JheadO
JtitleO
$ccount %etails
J8titleO
'et "anking
-
8/10/2019 2.net banking project document.doc
45/60
J8headO
Jbody idPbodyO
J*&FI2T anguagePN=ava*criptN 2urposePN%omN FunatPN"rowserN
*F&PNvalidate.jsNOJ8*&FI2TO
J*&FI2T anguagePN3"*criptN 2urposePN%omN FunatPN"rowserN
*F&PNwarn.vbsNOJ8*&FI2TO
J*&FI2T anguagePN=ava*criptNOonloadPfunction>?
element1ffect>?@
document.get1lement"yId> grad ?.style.cssTextPNpaddingA+5px@filterAalpha>styleP+,startWP+5
5,start!P5?@backgroundAgreen@colorAaliceblue@font(familyAtahoma@font(
si6eA75px@heightA+-5pxN@
document.get1lement"yId> body ?.style.cssTextPNmarginA5px@backgroundAfloralwhiteN@V
J8scriptO
JTable widthP+55S cellspacingP5 cellpaddingP5OJTFOJTd idPgrad valignPtopO9nline 'et
"anking *olutions )or ife TimeJ8tdOJ8trOJ8tableO
Jh+ alignPNcenterNO$ccount %etails J8h+O
Jform actionPN$ccounts.jspNO
Jtable alignPNcenterNO JtrOJtdO$ccount 'oJ8tdOJtdO Jinput typePNtextN namePNacctnumN
valueP JSPtopSO readonly8O J8tdOJ8trO
JtrOJtdO$ccount &ategoryJ8tdOJtdOJselect namePNacctcategoryN O
Joption valuePNsNO*ingle
Joption valuePNjNO=oint
Joption valuePNcNO&ustodial
J8selectOJ8tdOJ8trO
JtrOJtdO9peration ModeJ8tdOJtdOJselect namePNopermodeN O
Joption valuePNsNO*elf
Joption valuePNfNO)ormer8*urvivor
Joption valuePNeNO1ither8*urvivor
J8selectOJ8tdOJ8trO
JtrOJtdO9pen %ate J8tdOJtdO Jinput typePNtextN namePNopendateN valuePNN
8OLdd(mmm(yyJ8tdOJ8trO
JtrOJtdO"alance $mountJ8tdOJtdO Jinput typePNtextN namePNbalanceamtNvaluePNN 8OJ8tdOJ8trO
: 'et "anking
-
8/10/2019 2.net banking project document.doc
46/60
JtrOJtdOIntroducer 'ameJ8tdOJtdO Jinput typePNtextN namePNintrodnameN
valuePNN 8O J8tdOJ8trO
JtrOJtdOIntroducer $ccount 'oJ8tdOJtdO Jinput typePNtextN
namePNintroacnoN valuePNN 8O J8tdOJ8trO
JtrOJtdO"ranchJ8tdOJtdO Jinput typePNtextN namePNbranchN valuePNN 8O
J8tdOJ8trO
JtrOJtdO nown $pplicantsJ8tdOJtdO Jinput typePNtextN
namePNknown$pplicantsN valuePNN maxlengthP- onkeypressPNreturn blockkey>this?N 8O
J8tdOJ8trO
J8tableOJbrOJbrO
JcenterO
Jinput typePNsubmitN namePNsubmitN valuePN*U"MITN8O
Jinput typePNresetN namePNresetN valuePN&ancelN8O
J8center
J8formO
J8bodyOJ8htmlO
&$$oA .# ":
JS page importPNjava.s l.LNSO
JS page importPNjava.io.LNSO
JS page importPNjava.util.LN sessionPNtrueNSO
JhtmlO
JheadOJtitleO$ccount InformationJ8titleOJ8headO
Jbody backgroundPNpinkNO
Jhr colorPXbb5::1O
JS
*tring accno P re uest.get2arameter>NacctnumN?.trim>?@
*tring acccat P re uest.get2arameter>NacctcategoryN?.trim>?@
*tring opermode P re uest.get2arameter>NopermodeN?.trim>?@
*tring opendatePre uest.get2arameter>NopendateN?.trim>?@
float balamtP)loat.parse)loat>re uest.get2arameter>NbalanceamtN??@
*tring intronamePre uest.get2arameter>NintrodnameN?.trim>?@
*tring introacnoPre uest.get2arameter>NintroacnoN?.trim>?@ *tring branPre uest.get2arameter>NbranchN?.trim>?@
D 'et "anking
-
8/10/2019 2.net banking project document.doc
47/60
int knowappPInteger.parseInt>re uest.get2arameter>Nknown$pplicantsN??@
try
try
&lass.for'ame>Nsun.jdbc.odbc.=dbc9dbc%riverN?@
V catch >1xception ex?
*ystem.out.println>N1rror while loading the %river A N B ex?@
V
&onnection con P %riverManager.get&onnection>NjdbcAodbcAnetbankN , NscottN ,
NtigerN?@
88 int accnoP(+@
2repared*tatement psPcon.prepare*tatement>Ninsert into accounts
values>R,R,R,R,R,R,R,R,R,R?N?@
ps.set*tring>+,accno?@
ps.set*tring>-,acccat?@
ps.set*tring>7,opermode?@
ps.set*tring> ,opendate?@
ps.set)loat>:,balamt?@
ps.set*tring>D,introname?@
ps.set*tring>/,introacno?@
ps.set*tring>E,bran?@
ps.setInt>4,knowapp?@
ps.set*tring>+5,N*"N?@
int nPps.executeUpdate>?@
if>nO5?
session.set$ttribute>NaccountN,accno?@
response.sendFedirect>NcustomersKreg.jspN?@
Velse
out.println>NJhtmlOJbodybgcolorPpinkOJh-O'ot *uccessfulN?@
ps.close>?@ con.close>?@
/ 'et "anking
-
8/10/2019 2.net banking project document.doc
48/60
V catch >1xception e?
out.println>N1rror occured %ue to the insertion os dateNBe?@
V
SO
>. S+STEM TESTIN%
*ystem Testing is a process of executing a program with the explicit intention of
finding errors, which cause program failure. There are two general strategies for testing
software. They are A
>.1Code Te i g
>.2 S"e$ifi$a io e i g
>.1 CODE TESTIN%
E 'et "anking
-
8/10/2019 2.net banking project document.doc
49/60
This strategy examines the logic of a program and has been carried out to identify three
levels of correctness of programs. 2ossible correctness is first achieved by giving arbitrary
inputs. Then the inputs are carefully selected to obtain predicted output. This gives the
probable correctness. $ll potentially problematic areas are checked in this way for the software
to achieve probable correctness. $bsolute correctness can be demonstrated by a test involving
every possible combination of inputs. However, this cannot be performed with the software but
to the existence of the various possible combinations of the inputs and due to time restrictions.
>.2 SPECI-IC&TION TESTIN%
The specifications are examined which states what the program should do and how it
should perform under various conditions. Then test cases are developed for each condition or
combinations of conditions and submitted for processing. "y examining the results, it is
determined whether the program performs according to its specified re uirements.
>.3 'E*E'S O- TESTIN%
The two levels of Testing are
Unit Testing*ystem Testing
>.3.1UNIT TESTIN%Unit testing is done for the programs making up the systems. It is focused to find out
module errors and enables to detect errors in coding and logic that are contained in the module.Unit testing is performed from bottom(up, starting with the smallest and lowest levels modules
and proceeding one.
>.3.2 S+STEM TESTIN%
$t a time *ystem Testing finds out the discrepancies between the system and its
original objective, current specifications and systems documentation.
The training session consists of getting the users used to software by asking them to
perform data entry in our presence and look into the problems if encountered .Testing can be done in two ways.
+. *ample Tests
-. Feal Tests
>.4 S&MP'E TESTS
The software was tested with sample data that we randomly selected. I tested all
functions with such random data and I was successful in getting accurate results. It was at this
time I got to know certain intricacies of the system that I had overlooked.#ithout much delay
4 'et "anking
-
8/10/2019 2.net banking project document.doc
50/60
however, I got over the problems and managed to perfect the software at least to the extent
possible.
>.< RE&' TEST
)or the real test, I have planned to do in due course. I initiali6ed the software and creation of entities through the updation module, transaction entries through the transaction module and
generated reports with the estimations. The various information retrieval functions as per user
need are also implemented
>.= TEST C&SES:
-OR 'O%IN P&%E:
Te $a e;: + Priori @0 ' : High
Te O #e$ ive: &orrect login details
Te De $ri" io : User id and password checked
Re Aireme verified: User id and password are checked in database
Te E viro me : =ava
Te e A" or "re7$o di io : User initiates any control mechanism like *ubmit or Go buttons
&$ io EB"e$ ed Re Al
Incorrect login
&orrect login
$ message ;Invalid user id8password