67576548 e-banking
DESCRIPTION
e-banking policyTRANSCRIPT
E- Banking
ABSTRACT
“Internet banking” refers to systems that enable bank customers to access
accounts and general information on bank products and services through a
personal computer (PC) or other intelligent device.
Internet banking products and services can include wholesale products for
Corporate customers as well as retail and fiduciary products for consumers.
Ultimately, the products and services obtained through Internet banking may
mirror products and services offered through other bank delivery channels.
Some examples of wholesale products and services include:
* Cash management.
* Wire transfer.
* Automated clearinghouse (ACH) transactions.
* Bill presentment and payment
Examples of retail and fiduciary products and services include:
* Balance inquiry.
* Funds transfer.
* Downloading transaction information.
* Loan applications.
* Investment activity.
* Other value-added services.
Other Internet banking services may include providing Internet access as an
Internet Service Provider (ISP). The OCC has determined that a national bank
subsidiary may provide home banking services through an Internet connection
to the bank’s home banking system and, incidental to that service, may also
provide Internet access to bank customers using that service. Historically, banks
have used information systems technology to process checks (item processing), drive
ATM machines (transaction processing), and produce reports (managements In the past,
the computer systems that made the information systems operate were rarely noticed by
customers. Today, Web sites, electronic mail, and electronic bill presentment and
payment systems are an important way for banks to reach their customers.
National banks have experimented with various forms of online banking for
many years. Some of the early experiments involved closed systems where the
customers accessed banks through a dial-in or cable TV connection. These
systems limited a bank’s potential customer base because they required out-ofarea
customers to either incur long-distance charges on their phone bills or
subscribe to a particular cable TV service to access the bank. With the
widespread growth of the Internet, customers can use this technology anywhere
in the world to access a bank’s network. The Internet, as an enabling
technology, has made banking products and services available to more
customers and eliminated geographic and proprietary systems barriers. With
an expanded market, banks also may have opportunities to expand or change
their product and service offerings.
Manual Process
Why the New System
The development of the new system contains the following activities which try to
automate the entire process keeping in view of the database integration approach.
1. The administrators have grates accessibility in collecting the consistent
information that is very much necessary for the system to exist and coordinate.
Inquires for an existing service or some specific information
Customer physically visits the bank
The incharge clerk checks the specification and answers the query
Associated and integrates the information as needed
Leaves the bank
Raises a request for new checkbook by filling in the prescribed form
Customer physically visits the bank
The incharge clerk accepts the request and prepares the cheque book with respect to given specification
The cheque book is sent for manages initials
Customer makes a counter sign and receives the checkbook
2. The system at any point of time can give the customers information related to
their
Accounts and accounts status
The balance enquiry
The fund transfer standards
The cheque book request
3.The system can provide information related to the different types of accounts that
are existing within the bank.
4.The system can provide the bank administration with information on the number of
customers who are existing in the system.
5.The system at any point of time can provide the information related to the executed
transactions by the customer.
6.The system with respect to the necessities can identify all the history details of the
trial participants along with their outcome of the results.
7.The system with respect to the necessities can provide the status of research and
development process that is under schedule within the organization currently.
8.With proper storage of the data in a relational environment the system can
Applegate itself to cater to the standards of providing a clear and easy path for future
research standards that may arise due to organizational policies.
Growth in Internet Banking
Numerous factors — including competitive cost, customer service, and
Demographic considerations — are motivating banks to evaluate their
technology and assess their electronic commerce and Internet banking
strategies. Many researchers expect rapid growth in customers using online
banking products and services. The challenge for national banks is to make
sure the savings from Internet banking technology more than offset the costs
and risks associated with conducting business in cyberspace.
Marketing strategies will vary as national banks seek to expand their markets
and employ lower cost delivery channels. Examiners will need to understand
the strategies used and technologies employed on a bank-by-bank basis to
assess the risk. Evaluating a bank’s data on the use of their Web sites, may
help examiners determine the bank’s strategic objectives, how well the bank is
meeting its Internet banking product plan, and whether the business is expected
to be profitable.
Some of the market factors that may drive a bank’s strategy include the
following:
Competition — Studies show that competitive pressure is the chief driving
force behind increasing use of Internet banking technology, ranking ahead of
cost reduction and revenue enhancement, in second and third place
respectively. Banks see Internet banking as a way to keep existing customers
and attract new ones to the bank.
Cost Efficiencies — National banks can deliver banking services on the Internet
at transaction costs far lower than traditional brick-and-mortar branches. The
actual costs to execute a transaction will vary depending on the delivery
channel used. For example, according to Booz, Allen & Hamilton, as of mid-
1999, the cost to deliver manual transactions at a branch was typically more
than a dollar, ATM and call center transactions cost about 25 cents, and
Internet transactions cost about a penny. These costs are expected to continue
to decline.
National banks have significant reasons to develop the technologies that will
help them deliver banking products and services by the most cost-effective
channels. Many bankers believe that shifting only a small portion of the
estimated 19-billion payments mailed annually in the U.S. to electronic
delivery channels could save banks and other businesses substantial sums of
money. However, national banks should use care in making product decisions.
Management should include in their decision making the development and
ongoing costs associated with a new product or service, including the
technology, marketing, maintenance, and customer support functions. This
will help management exercise due diligence, make more informed decisions,
and measure the success of their business venture.
Geographical Reach — Internet banking allows expanded customer contact
through increased geographical reach and lower cost delivery channels.
In fact some banks are doing business exclusively via the Internet — they do
not have traditional banking offices and only reach their customers online.
Other financial institutions are using the Internet as an alternative delivery
channel to reach existing customers and attract new customers.
Branding — Relationship building is a strategic priority for many national
banks. Internet banking technology and products can provide a means for
national banks to develop and maintain an ongoing relationship with their
customers by offering easy access to a broad array of products and services.
By capitalizing on brand identification and by providing a broad array of
financial services, banks hope to build customer loyalty, cross-sell, and
enhance repeat business.
Customer Demographics — Internet banking allows national banks to offer a
wide array of options to their banking customers. Some customers will rely on
traditional branches to conduct their banking business. For many, this is the
most comfortable way for them to transact their banking business. Those
customers place a premium on person-to-person contact. Other customers are
early adopters of new technologies that arrive in the marketplace. These
customers were the first to obtain PCs and the first to employ them in
conducting their banking business. The demographics of banking customers
will continue to change. The challenge to national banks is to understand their
customer base and find the right mix of delivery channels to deliver products
and services profitably to their various market segments.
Possible Consequence:
After Possible ways of gaining unauthorized access to e banking fat client locally stored
data are explained possible consequence of this access are presented.
Consequence will be explained as violations of combination information and
cryptographic security.Information security can be usally expressed through sop called
CIA triad of confidentiality , integrity, availability.Cryptographic security includes
Confidendiality, data integrity authentication and non repudiation.
Confidentiality:
Confidentiality is a service used to keep the content of information from all but those
authorized to have it.Financial data should to private and ebanking application should
enforce privacy.Authorized access to that local storage where E-banking data is stored
would enable the intruder to read the data. This clearly violates confidentiality.
Data Integrity:
Data Integrity is a service which addresses the unauthorized alteration of data.
E-banking clients must be sure that the data they enter or get through fat client
application were not changed in any way on the way to or from the bank. Intruders
that gain unauthorized access to local e-banking data storage that might be able
to change the data in that storage. In this way data entered through fat client
application could be altered before it is sent to the bank.
Availability:
Availability is a service that ensures the information system and necessary datas
are available for use.When they are needed. Malicious users that gains access to
e-banking local storage could make data unavailable without need for any
knowledge about data meaning or structure. Simple deletion or alteration of
records or even the whole storage could render the data and application useless.
Authentication:
Authentication is a service related to identification. This function applies to both
entities and information itself. Only authenticated users should be able to view
financial view financial data and monetary transactions. E-banking clients require
authentication before they can start.
Non Repudiation:
Non Repudiation is a service which prevents an entity from denying previous
commitments or actions. Banks and its clients should not be able deny transactions
executed through an e-banking application. Without proper authentication ensured
data integrity it would be very difficult to prove if bank client actually created
and authorized transaction and even if he did if the transaction data are the same
data that client entered.
Types of Internet Banking
Understanding the various types of Internet banking products will help
examiners assess the risks involved. Currently, the following three basic kinds
of Internet banking are being employed in the marketplace:
C Informational — This is the basic level of Internet banking. Typically,
the bank has marketing information about the bank’s products and
services on a stand-alone server. The risk is relatively low, as
informational systems typically have no path between the server and the
bank’s internal network. This level of Internet banking can be provided
by the bank or outsourced. While the risk to a bank is relatively low,
the server or Web site may be vulnerable to alteration. Appropriate
controls therefore must be in place to prevent unauthorized alterations to
the bank’s server or Web site.
C Communicative — This type of Internet banking system allows
some interaction between the bank’s systems and the customer. The
interaction may be limited to electronic mail, account inquiry, loan
applications, or static file updates (name and address changes). Because
these servers may have a path to the bank’s internal networks, the risk is
higher with this configuration than with informational systems.
Appropriate controls need to be in place to prevent, monitor, and alert
management of any unauthorized attempt to access the bank’s internal
Comptroller’s Handbook 5 Internet
Banking
networks and computer systems. Virus controls also become much
more critical in this environment.
C Transactional — This level of Internet banking allows customers to
execute transactions. Since a path typically exists between the server
and the bank’s or outsourcer’s internal network, this is the highest risk
architecture and must have the strongest controls. Customer
transactions can include accessing accounts, paying bills, transferring
funds, etc.
Number of Modules:
The system after careful analysis has been identified to be presented with the following
modules.
1. Employee information module: The module manages the information of all the
employees who practically exist for this organization. Each employee is exclusively
associated through a specific department and authorized designation. The module
manages all the transactional relations that generically arise as and when the system has
been executed, upon the requirements.
2. Banks Information module: This module specifies the integrated and
interrelation information alert the banks and their branches. The module also specifically
states the different services each bank can provide and integrates itself with customer’s
accounts information.
3. Customers accounts information module: The module maintains the actual
customers list that have availed bank accounts upon this system. The module integrates
itself with the banks and the types of services the bank can provide.
4. Customer transaction module: This module maintains the information related to
all the transaction that are executed by the customer upon the E-Banking application. The
module integrates itself with entities like transaction types to check the consistency of the
transaction.
5. Fund Transfer module: This module maintains the information related to the
funds that have been transferred by the customer from one of his account to another
account of his own. This module helps the customer in executing the fund transfer with
out the physical visit to the banks premises.
6. Chequebook request module: This module maintains the information related
and issues by the bank. This module facilitates the customer with requesting the
chequebook through online process eradicating the physical
System Requirements:
Hardware Specification:
Processor : Pentium IV
Speed : 1.5 GHz
Main Memory : 256 MB
Hard Disk Drive : 40 GB
Floppy Drive : 1.44 inches
Monitor : SVGA Color
Keyboard : Multimedia
Software Specification:
Front-end : PHP 5.0
Back-end : MYSQL 5.2.1
Server : Appache Wampserver2.0
Operating System : windows Xp
User Authentication:
Authentication is the act of establishing or confirming something (or someone) as
authentic, that is, that claims made by or about the thing are true. Authenticating an
object may mean confirming its provenance, whereas authenticating a person often
consists of verifying their identity. Authentication depends upon one or more
authentication factors.
To start a session with a system, usually by giving a {user name} and {password}
as a means of user {authentication}. The term is also used to mean the ability to access a
service (also called an account), e.g. "Have you been given a login yet?" "Log in/on" is
occasionally misused to refer to starting a session where no authorization is involved, or
to access where there is no session involved.
Upon entering the program, all users will encounter the “Login Screen”. Each
user will have a personalized profile and database that is password-protected from other
users. To begin using Connect, a user must select his/her profile. The user then enters
their personal password and left-clicks the “Go” button once with their mouse. The user
may also choose to exit the program from here by clicking “Exit”. If a user does not have
a profile, s/he must select “New User” from the menu.
Advantage of Internet banking:
As per the Internet and Mobile Association of India's report on online banking 2006,
"There are many advantages of online banking. It is convenient, it isn't bound by
operational timings, there are no geographical barriers and the services can be offered at a
miniscule cost."
Through Internet banking, you can check your transactions at any time of the day, and
as many times as you want to. Where in a traditional method, you get quarterly
statements from the bank. If the fund transfer has to be made outstation, where the bank
does not have a branch, the bank would demand outstation charges. Whereas with the
help of online banking, it will be absolutely free for you.
Security Precautions:
Customers should never share personal information like PIN numbers, passwords etc
with anyone, including employees of the bank. It is important that documents that contain
confidential information are safeguarded. PIN or password mailers should not be stored,
the PIN and/or passwords should be changed immediately and memorised before
destroying the mailers.
Customers are advised not to provide sensitive account-related information over
unsecured e-mails or over the phone. Take simple precautions like changing the ATM
PIN and online login and transaction passwords on a regular basis. Also ensure that the
logged in session is properly signed out.
Software configuration:
FRONT END OF SOFTWARE:
Introduction to PHP:
PHP is a language that has outgrown its name. It was originally conceived as a set of
macros to help coders maintain personal home pages, and its name grew from its purpose.
Since then, PHP's capabilities have been extended, taking it beyond a set of utilities to a
full-featured programming language, capable of managing huge database-driven online
environments.
As PHP's capabilities have grown, so too has its popularity. According to
NetCraft (http://www.netcraft.com), PHP was running on more than 1 million hosts in
November 1999. As of February 2000, that figure had already risen to 1.4 million hosts.
According to E-Soft, PHP is the most popular Apache module available, beating even
ModPerl.
PHP is now officially known as PHP: Hyper Text Preprocessor. It is a server-side
scripting language usually written in an HTML context. Unlike an ordinary HTML page,
a PHP script is not sent directly to a client by the server; instead, it is parsed by the PHP
binary or module. HTML elements in the script are left alone, but PHP code is interpreted
and executed. PHP code in a script can query databases, create images, read and write
files, talk to remote servers— the possibilities are endless.
The output from PHP code is combined with the HTML in the script and the
result sent to the user.
How Did PHP Evolve?
The first version of PHP was created by Rasmus Lerdorf in 1994 as a set of Web
publishing macros. These were released as the Personal Home Page Tools and later
rewritten and extended to include a package called the Form Interpreter (PHP/FI). From a
user's perspective, PHP/FI was already an attractive proposition, and its popularity grew
steadily. It also began to attract interest from the developer community. By 1997, a team
of programmers was working on the project. The next release— PHP3— was born out of
this collaborative effort. PHP3 was an
effective rewrite of PHP, with an entirely new parser created by Zeev Suraski and Andi
Gutmans, as well as differences in syntax and new features. This release established PHP
as one of the most exciting server scripting languages available, and the growth in usage
was enormous.
PHP's support for Apache and MySQL further secured its popularity. Apache is
now the most-used Web server in the world, and PHP3 can be compiled as an Apache
module. MySQL is a powerful free SQL database, and PHP provides a comprehensive set
of functions for working with it. The combination of Apache, MySQL, and PHP is all but
unbeatable. That isn't to say that PHP is not designed to work in other environments and
with other tools. In fact, PHP supports a bewildering array of databases and servers.
The rise in popularity of PHP has coincided with a change of approach in Web
publishing. In the mid-1990s it was normal to build sites, even relatively large sites, with
hundreds of individual hard-coded HTML pages. Increasingly, though, site publishers are
harnessing the
power of databases to manage their content more effectively and to personalize their sites
according to individual user preferences.
The use of databases to store content, and of a scripting language to retrieve this
data, will become further necessary as data is sent from a single source to multiple
environments, including mobile phones and PDAs, digital television, and broadband
Internet environments. In this context, it is not surprising that a tool of PHP's
sophistication and flexibility is becoming so popular.
At the time of this writing, PHP4 is in its final beta stage and is due for release
shortly. By the time you read this book, PHP4 will be making waves!
Why Choose PHP?
There are some compelling reasons to work with PHP4. For many projects you
will find that the production process is significantly faster than you might expect if you
are used to working with other scripting languages. As an open source product, PHP4 is
well supported by a talented production team and a committed user community.
Furthermore, PHP can be run on all the major operating systems with most
servers.
Speed of Development
Because PHP allows you to separate HTML code from scripted elements, you
will notice a significant decrease in development time on many projects. In many
instances, you will be able to separate the coding stage of a project from the design and
build stages. Not only can this make life easier for you as a programmer, it also can
remove obstacles that stand in the way of effective and flexible design.
PHP Is Open Source
To many people, "open source" simply means free, which is, of course, a benefit
in itself. To quote from the official PHP site at http://www.php.net/: This may sound a
little foreign to all you folks coming from a non-UNIX background, but PHP doesn't cost
anything. You can use it for commercial and/or non-commercial use all you want. You
can give it to your friends, print it out and hang it on your wall or eat it for lunch.
Welcome to the world of Open Source software! Smile, be happy, the world is good. For
the full legalese, see the official license.
Well-maintained open source projects offer users additional benefits, though. You benefit
from an accessible and committed community who offer a wealth of experience in the
subject. Chances are that any problem you encounter in your coding can be answered
swiftly and easily with a little research. If that fails, a question sent to a mailing list can
yield an intelligent, authoritative response.
You also can be sure that bugs will be addressed as they are found, and that new
features will be made available as the need is defined. You will not have to wait for the
next commercial release before taking advantage of improvements. There is no vested
interest in a particular server product or operating system. You are free to make choices
that suit your needs or those of your clients, secure that your code will run whatever you
decide.
Performance
Because of the powerful Zend engine, PHP4 compares well with ASP in
benchmark tests, beating it in some tests. Compiled PHP leaves ASP far behind.
Portability
PHP is designed to run on many operating systems and to cooperate with many
servers and databases. You can build for a UNIX environment and shift your work to NT
without a problem. You can test a project with Personal Web Server and install it on a
UNIX system running on PHP as an Apache module.
MySQL
History of MySQL
We started out with the intention of using MY SQL to connect to our tables using
our own fast low-level (ISAM) routines. However, after some testing, we came to the
conclusion that My SQL was not fast enough or flexible enough for our needs. This
resulted in a new SQL interface to our database but with almost the same API interface as
MY SQL. This API was designed to allow third-party code that was written for use with
MY SQL to be ported easily for use with My SQL.
The derivation of the name My SQL is not clear. Our base directory and a large
number of our libraries and tools have had the prefix “my” for well over 10 years.
However, co-founder Monty Widenius’s daughter is also named My. Which of the two
gave its name to MY SQL is still a mystery, even for us. 6 My SQL Technical Reference
for Version 5.0.1-alpha The name of the My SQL Dolphin (our logo) is “Sakila,” which
was chosen by the founders of MY SQL AB from a huge list of names suggested by users
in our “Name the Dolphin” contest. The winning name was submitted by Ambrose
Twebaze, an Open Source software developer from Swaziland, Africa. According to
Ambrose, the name Sakila has its roots in SiSwati, the local language of Swaziland.
Sakila is also the name of a town in Arusha, Tanzania, near Ambrose’s country of origin,
Uganda.
The Main Features of MY SQL
The following list describes some of the important characteristics of the My SQL
Database Software.
Internals and Portability
• Written in C and C++.
• Tested with a broad range of different compilers.
• Works on many different platforms.
• Uses GNU Automake, Autoconf, and Libtool for portability.
• APIs for C, C++, Eiffel, Java, Perl, PHP, Python, Ruby, and Tcl are available.
• Fully multi-threaded using kernel threads. It can easily use multiple CPUs
• Provides transactional and non-transactional storage engines.
• Uses very fast B-tree disk tables (MyISAM) with index compression.
• Relatively easy to add another storage engine. This is useful if you want to add
an SQL interface to an in-house database.
• A very fast thread-based memory allocation system.
• Very fast joins using an optimized one-sweep multi-join.
• In-memory hash tables, which are used as temporary tables.
• SQL functions are implemented using a highly optimized class library and should
be as fast as possible. Usually there is no memory allocation at all after query
initialization.
• The MySQL code is tested with Purify (a commercial memory leakage detector)
as well as with Valgrind, a GPL tool (http://developer.kde.org/~sewardj/).
• The server is available as a separate program for use in a client/server networked
environment. It is also available as a library that can be embedded (linked) into
standalone applications. Such applications can be used in isolation or in
environments where no network is available.
• Fixed-length and variable-length records.
• Statements and Functions
• Full operator and function support in the SELECT and WHERE clauses of
queries. For example:
mysql> SELECT CONCAT(first_name, ' ', last_name)
FROM citizen
WHERE income/dependents > 10000 AND age > 30;
• Full support for SQL GROUP BY and ORDER BY clauses. Support for group
functions (COUNT(), COUNT(DISTINCT ...), AVG(), STD(), SUM(), MAX(),
MIN(), and GROUP_CONCAT()).
• Support for LEFT OUTER JOIN and RIGHT OUTER JOIN with both standard
SQL and ODBC syntax.
• Support for aliases on tables and columns as required by standard SQL.
• DELETE, INSERT, REPLACE, and UPDATE return the number of rows that
were changed (affected). It is possible to return the number of rows matched
instead by setting a flag when connecting to the server.
• The MySQL-specific SHOW command can be used to retrieve information about
databases, tables, and indexes. The EXPLAIN command can be used to determine
how the optimizer resolves a query.
• Function names do not clash with table or column names. For example, ABS is a
valid column name. The only restriction is that for a function call, no spaces are
allowed between the function name and the ‘(’ that follows it.
• You can mix tables from different databases in the same query.
• Security
• A privilege and password system that is very flexible and secure, and that allows
host-based verification. Passwords are secure because all password traffic is
encrypted when you connect to a server.
• Scalability and Limits
• Handles large databases. We use MySQL Server with databases that contain 50
million records. We also know of users who use MySQL Server with 60,000
tables and about 5,000,000,000 rows.
• Up to 64 indexes per table are allowed. Each index may consist of 1 to 16
columns or parts of columns. The maximum index width is 1000 bytes (500
before MySQL 4.1.2). An index may use a prefix of a column for CHAR,
VARCHAR, BLOB, or TEXT column types.
• Connectivity
• Clients can connect to the MySQL server using TCP/IP sockets on any platform.
On Windows systems in the NT family (NT, 2000, or XP), clients can connect
using named pipes. On Unix systems, clients can connect using Unix domain
socket files.
• MySQL Technical Reference for Version 5.0.1-alpha
• The Connector/ODBC (MyODBC) interface provides MySQL support for client
programs that use ODBC (Open Database Connectivity) connections.
• For example, you can use MS Access to connect to your MySQL server. Clients
can be run on Windows or Unix. MyODBC source is available.
• All ODBC 2.5 functions are supported, as are many others.
• The Connector/J interface provides MySQL support for Java client programs that
use JDBC connections. Clients can be run on Windows or Unix. Connector/J
source is available.
• Localization
• The server can provide error messages to clients in many languages.
• All data is saved in the chosen character set. All comparisons for normal string
columns are case-insensitive.
• Sorting is done according to the chosen character set (using swedish collation by
default). It is possible to change this when the MySQL server is started. To see an
example of very advanced sorting, look at the Czech sorting code. MySQL Server
supports many different character sets that can be specified at compile time and
runtime.
• Clients and Tools
• All MySQL programs can be invoked with the --help or -? options to obtain
online assistance.
4. DESIGN ISSUE
Design is the process of translation requirements defined during analysis in to
several design activities for user consideration, designer, select equipments needed to
implement the system. In this phase, design of the database, input design, code design
and output design are considered.
SYSTEM DESIGN
The design of an information system provided the details state how a system
which meet the requirements identified during the system analysis, this stage is often
referred to as logical design in contrast to the process of developing program software,
which is referred to as physical design, and this also describes the data to input,
calculated or stored.
Requirement are translated into specification, this system design involve first
logical design than physical construction of the system.
LOGICAL DESIGN
Show the major feature and how they are related to one another, it also specifies
input box and screen layout for all forms.
PHYSICAL DESIGN
Logical design produce programs, software, files and working system.
4.1 INPUT DESIGN
Input using the process of converting user – oriented handling input
specify how data are accepted for computer processing, input design can ensure the
reliability of the system output of error ones information, it determines whether the
user interact with the computer efficiently.
The input design is the link ties the information system into the world of
its users. Some aspects of the design vary, depending on whether the system is batch
oriented or online. But regardless of the system, there are general input concerns that
all analysts should have.
Input design consists of developing specifications and procedures for data
preparation those steps necessary to put data into a usable form for processing, and
data entry, the activity of putting the data into computer for processing. As obviously
data from a written or printed document or it can occur by having people key data
directly into the system. Four objectives guiding the design of input focus on:
• Controlling the amount of input required.
• Avoiding delay.
• Controlling errors.
• Keeping steps simple.
4.2 OUTPUT DESIGN
Computer output is the most important and direct source of information to the
user. Designing computer output should proceed in an organized manner. The right
output element is designed so that people will find the system easy to use efficiently.
• Identify the specific output that is needed to meet the information
requirements.
• Select methods for presenting information.
• Create document, report or other formats that contain information produced by the system.
The output from an information system should accomplish one or more of the
following objective:
• Convey information about past activities, current status.
• Signal important events, opportunities and problems.
• Trigger an action.
• Confirm an action.
Output is the main reason for developing the system. The points that have to be
considered when designing an output are as follows:
• Determining what information to present.
• Decide whether to display, or print and select the output medium.
• Arrange the presentation of information in an acceptable format.
• Decide how to distribute the output to intended recipients.
The arrangement of information on a display or printed document if termed as
layout. The output design is specified as layout form sheets that describe the location
characteristics and format of column heading and pagination. Output design of the
system is concerned with the convergence of information to the end user in a user-
friendly manner.
CODE DESIGN
Coding state encompasses a coding philosophy that stresses simplicity and clarity.
The coding design styled followed in the system includes,
• Using intonation. Parenthesis, blank space and boards around the block of
commands and enhance readability.
• Providing standard documentation for each program and unit
• Avoiding side effect.
• Avoiding use of an identifier for multiple purposes.
• Method of data declaration.
• Compiling and debugging.
• The debugging is very easy.
4.3 DATABASE DESIGN
It is very important the files designed are capable of storing the same information
needed repetition of filed, (i.e), storing the same information should be kept minimum.
That ensures thus the database is considered.
This system is developed with some database, each having one table is being
listed here in order to explain the database.
Database design runs parallel without application design. As we called
information about what is to be done, we will obviously collect the information what data
needs to be entered, stored, messaged and printed on the reports, we have to use our data
entry screens and forward what will need to be in our database or pickup the report and
work backward.
Data Flow Diagrams:
There are only five symbols that are used in the drawing of business process diagrams (data flow diagrams). These are now explained, together with the rules that apply to them.
This diagram represents a banking process, which maintains customer accounts. In this example, customers can withdraw or deposit cash, request information about their account or update their account details. The five different symbols used in this example represent the full set of symbols required to draw any business process diagram.
External Entity
An external entity is a source or destination of a data flow which is outside the area of study. Only those entities which originate or receive data are represented on a business process diagram. The symbol used is an oval containing a meaningful and unique identifier.
Process
A process shows a transformation or manipulation of data flows within the system. The symbol used is a rectangular box which contains 3 descriptive elements: Firstly an identification number appears in the upper left hand corner. This is allocated arbitrarily at the top level and serves as a unique reference.Secondly, a location appears to the right of the identifier and describes where in the system the process takes place. This may, for example, be a department or a piece of hardware. Finally, a descriptive title is placed in the centre of the box. This should be a simple imperative sentence with a specific verb, for example 'maintain customer records' or 'find driver'.
Data Flow
A data flow shows the flow of information from its source to its destination. A data flow is represented by a line, with arrowheads showing the direction of flow. Information always flows to or from a process and may be written, verbal or electronic. Each data flow may be referenced by the processes or data stores at its head and tail, or by a description of its contents.
Data Store
A data store is a holding place for information within the system:It is represented by an open ended narrow rectangle. Data stores may be long-term files such as sales ledgers, or may be short-term accumulations: for example batches of documents that are waiting to be processed. Each data store should be given a reference followed by an arbitrary number.
Resource Flow
A resource flow shows the flow of any physical material from its source to its destination. For this reason they are sometimes referred to as physical flows. The physical material in question should be given a meaningful name. Resource flows are usually restricted to early, high-level diagrams and are used when a description of the physical flow of materials is considered to be important to help the analysis.
Data Flow Diagrams – The Rules
SYSTEM DESIGN:
System Design transforms a logical representation of a given system into
the physical specification. The specifications are converted into a physical reality during
development. The design forms a blueprint of the system and how the components relate
to each other. The design of the system reflects the strength of the software. Better the
design; better the quality, efficiency and reliability of the software.
System design goes through two phases of development.
Logical Design
Physical Design
Logical design is concerned with reviewing the current physical system,
preparing input specification, preparing output specification, preparing edit and security
control specification, specify the implementation plan, preparing logical walkthrough of
the information flow, output, input, control and implementation plans and reviewing
benefits, cost, target date and system constraints.
Physical design is concerned with specification of input and output media,
designing database, specify the backup procedure, designing information flow throughout
the system. Physical design walkthrough preparing a conversion schedule and a target
date, determining training procedure, courses and timetable, devising a test and
implementation plan, specifying a new hardware and software and updating benefits,
cost, conversion date and system constraints.
DESIGN OF INPUT:
Input design is the process of converting user originated inputs to a
computer based format. The goal of designing input data to make the data entry as easy,
logical and free from errors as possible. The input design details to be considered.
• What data to input?
• What medium to use?
• How the data should be arranged?
• The dialogue to guide user in providing input.
• Data items transaction needing a validation to detect errors.
• Methods for performing inputs validation and steps to follow when errors
occur.
The design decisions for handling input specify how data is accepted for computer
processing. The design of input also includes specifying the means by which users and
system operators direct the system in which actions to take.
DESIGN OF OUTPUT:
Computer output is the most important and direct sources of information
to the user. Efficiency, intelligible, output design should improve system’s relationship
with the user and help in decision making. When designing output, the following should
be accomplished.
• Determine what information to present.
• Decide whether to display, print or speak and select the output media.
• Arrange the presentation of information in an acceptable format.
Database Design
Myacct:
S.no Field name Datatype
1 id int(11)
2 acct varchar(255)
3 Card varchar(255)
4 name varchar(255)
5 depo varchar(255)
6 day varchar(255)
7 address varchar(255)
8 acctype varchar(255)
9 mail varchar(255)
10 accnomini varchar(255)
11 nomadd varchar(255)
12 addproof varchar(255)
13 other varchar(255)
this project makes it project makes it easy for the patients to get their MRIs
login :
doctors with an online s
S.no Field name Datatype
1 id int(11)
2 acct varchar(100)
3 card varchar(100)
4 name varchar(100)
5 pword varchar(100)
Service:
S.no Field name Datatype
1 id int(11)
2 acct varchar(100)
3 name varchar(100)
4 branch varchar(100)
5 service varchar(100)
6 ser_status varchar(100)
Testing
SYSTEM TESTING:
The objective of software testing is to uncover errors. To fulfill this objective, a
series of test steps, unit, integration, validation, and system tests are conducted. At last
UAT (User Acceptance Testing) is conducted. Unit and integration tests concentrate on
functional verification of a module and incorporation of modules into a software
structure. Validation testing demonstrates trace ability to software requirements, and
system testing validates software once it has been incorporated into larger system. Then
debugging is made to clear all errors. AT is conducted in users environment, they give
feedback is system is not to their expectation. They test with the data, with which they are
working and check all the possibilities.
TESTING STRATEGIS:
•White box testing or Code testing.
•Black box testing or Behavioral testing.
WHITE BOX TESTING:
The code testing strategy checks for the correctness of every statement in the
program. To follow this testing strategy, there should be test cases that result in execution
of every instruction in the program or module; that is every path in the program is tested.
The test cases should guarantee that independent paths within a module are executed at
least once.
BLACK BOX TESTING:
To perform black box testing, the analyst examines the specifications stating what
the program or module should do and how it should perform under various conditions.
Then, test cases are developed for various conditions and submitted for processing. By
examining the results, the analyst can examine whether the program performs according
the specified requirements.
Unit Testing:
Instead of testing the system as a whole, unit testing focuses on the modules that
make up the system. Each module is taken up individually and tested for corrections in
coding and logic. Errors resulting from interaction of modules are initially avoided.
The advantages of unit testing are
Size of a module is quite small that errors can be easily located.
Confusing interactions of multiple errors in widely different parts
Of the software eliminated.
Module level testing can be exhaustive.
Integration Testing:
The strategies for integrating software component product include the bottom-up
strategy, the top-down strategy and send which strategy careful planning and scheduling
are required. To ensure that modules will be available for integration into the evolving
software product when needed. The integration strategy dictates the order in which
modules must be available & thus exerts a strong influence on the order in which
modules are written, debugged and unit tested.
Validation Testing:
At the culmination of integration testing, software is completely assembled as a
package. Interfacing errors have been uncovered and corrected and a final series of
software test-validation testing begins. Validation testing can be defined in many ways,
but a simple definition is that validation succeeds when the software functions in manner
that is reasonably expected by the customer. Software validation is achieved through a
series of black box tests that demonstrate conformity with requirement. After validation
test has been conducted, one of two conditions exists.
• The function or performance characteristics confirm to specifications and are
accepted.
• A validation from specification is uncovered and a deficiency created.
Deviation or errors discovered at this step in this project is corrected prior to
completion of the project with the help of the user by negotiating to establish a method
for resolving deficiencies. Thus the proposed system under consideration has been tested
by using validation testing and found to be working satisfactorily. Though there were
deficiencies in the system they were not catastrophic.
User Acceptance Testing:
User acceptance of the system is key factor for the success of any system. The
system under consideration is tested for user acceptance by constantly keeping in touch
with prospective system and user at the time of developing and making changes
whenever required. This is done in regarding to the following points.
Screen Shot:
User Main Page:
Login Page:
Customer’s Details:
Transaction Details:
Service Request:
Check Book Request:
Admin Part:
Customer’s details:
Service Request:
Conclusion:
E Banking is becoming immensely popular globally, and India is no exception to it. The
declining Internet rates, falling PC prices, broad bandwidth access through cable and
digital subscriber lines
, accessing the NET through cable TV etc., would definitely encourage the boom in E
Banking in India. With the globalization of business and services, our country cannot lag
behind in niche areas of Electronic Banking. In the new global era of multi currency,
multi-legal and multi regulatory systems, with the freedom of E-Commerce, banks have
to operate like multinational corporations to grow and survive by adopting E banking.