net banking
DESCRIPTION
netbankingTRANSCRIPT
BONAFIDE CERTIFICATE
Certified that this project report titled “NET BANKING” is the bonafide
work of Mr N.SIVAKUMAR who carried out the project under my supervision. Certified
further, that to the best of my knowledge the work reported herein does not form part of
any other project report or dissertation on the basis of which a degree or award was
conferred on an earlier occasion on this or any other candidate.
Internal Guide Head of the Department
ABSTRACT NET BANKING NET BANKING is an online banking system that facilitates the
customers to perform banking Services such as Balance Enquiry, FundsTransfer, Funds
Transfer Enquiry, Cheque Status Enquiry, Modify Personal Details with his/her Account.
All these services are accessed by the user with the bank through Internet.
This banking application will have the following functionalities:
• The application will enable an account holder of the bank to register to use the
application.
• The application will enable registered account holders to log on to the banking
web site after entereing their login details. The banking application will enable the
account holders to view their account details. The registered user will also be able
to modify any personal details such as address or phone number.
ii
• The registered user will also be able to do funds transfer for transferring amount
from one account to another account and also enable to do funds transfer enquiry
for checking the funds transfer is succeed or not.
• The registered user will also be able to do cheque status enquiry for checking the
cheque status whether the cheque is releaved or pending.
OBJECTIVES OF THE PROJECT: The application is designed for Customers and Bank for funds transfer ,
change the personal details of the customer on his account , balance enquiry , cheque
status enquiry, transaction report, all these services are performed by customers through
online. Maintaining the details of the customers on the database by the bank.
This system helps both Customer and Bank to reduce time, easily handle
user request by bank, and more security.
ACKNOWLEDGEMENT
Behind every achievement lies an unfathomable sea of gratitude of those who
actuated it, without them it would never have come into existence. At the outset, I would
like to give glory to god, without whom this project would have remained an impossible
task.
I am deeply elated to express my gratitude to Thiru.T.R.Pachamuthu, B.sc.,
M.I.E, Chairman, of S.R.M Engineering College.
iii
I express my profound regards and gratitude to Prof. R.Venkataramani, B.E,
M.Tech, FIE, MISTE, Principal, of SRM Engineering College.
I express my profound and sincere thanks to Prof. S.Sagayaraj M.Phil, Head of
the Department of Master of Computer Applications, of S.R.M Engineering College for
giving me the unique opportunity to pursue this project.
I take this opportunity to thank our project coordinator Mrs.P.Visalakshi, M.C.A
for their constant support and my guide Mr.J.D.Jebaraj, M.C.A for the sustained interest
shown by him towards the successful completion of this project. For his valuable ideas and
efficient guiding, I shall be thankful.
I express my gratitude to my external guide Mr.P.ThulasiAhilan, my parents and
one and all who have directly or indirectly aided me in completing this project.
iv
LIST OF TABLES TABLE NO TABLE NAME PAGE NO 4.2.1 Account-no details 20 4.2.2 Login details 20 4.2.3 Personal details 21 4.2.4 Account details 22 4.2.5 Funds-transfer details
23
4.2.6 Cheque details 23 6.6.1 New user registration 29 6.6.2 New user login 31 6.6.3 Login 31 6.6.4 Funds Transfer 32 6.6.5 Funds transfer enquiry 32 6.6.6 Cheque status enquiry 33 LIST OF FIGURES FIGURE NO FIGURE NAME PAGE NO 4.1 Level 0 -DFD 13 4.2 Level 1 -DFD 14 4.3 Level 0 -DFD
15 4.4 Level 1 -DFD 16 4.5 Level 0 -DFD 17 4.6 Level 0 -DFD 18 4.7 Level 0 -DFD 19 A.1 Home page 35 A.2 New user registration 36 A.3 New user login 38 A.4 Login 39 A.5 Funds Transfer 40 A.6 Funds transfer enquiry 41 A.7 Cheque status enquiry 42 A.8 Balance enquiry 43
v
CHAPTER 1 INTRODUCTION 1.1 ORGANIZATION OVERVIEW Cynergy Technologies Private Ltd is one of India’s leading institutions
contributing to the knowledge economy of the global financial services marketplace.
Headquartered in Chennai (India), In this knowledge quest, over the last 3 decades,
Cynergy has established its solutions and services footprint globally contributing to the
realization of the business vision of some of the world's leading giants in the money
vertical.
20 years ago, Citigroup began its quest to pioneer the utilization of the vast
human intellect capital in India & the seeds of Cynergy were sown. Cynergy was fortunate
to be one of the first vendors that Citigroup chose to partner with, through this Indian
quest. In parallel, Citigroup also started its own company called COSL (Citibank Overseas
Software Ltd) which strategised and operationalised Citigroup's vision of leveraging India.
Today, Cynergy is the amalgamation of these two organization that traveled the
path of successfully architecting & realizing Citigroup's India led vision. The 2 Decade
long journey was clearly an experience that helped Cynergy participate, witness and
experience every pitfall, every hurdle & fallacy in this path to leverage the Indian
intellectual capital.
The challenges were many. The challenge of creating a successful global
sourcing model, the challenge of creating an alternative distributed banking platform, the
challenge of creating global competitiveness from a third world economy, the challenge of
replicating success from one country to another…. The biggest challenge was in being the
first one in the world doing all this.
vi
As Citigroup gained the competitive edge, Cynergy gained two very critical experiences:
• The experience of creating mission critical solutions with leading edge
functionality, built on reliable and robust technical architecture which could be
successfully implemented and replicated across the globe. This capability is today
brought to the customer in the form of a suite of modular solution components
under the brand name of intellect Suite.
• The experience of creating successful outsourcing models which enable global
organizations to sustain their competitiveness. This experience has been converted
into a predictable and repeatable model of success and is known as the Entity
model.
1.2 PROJECT OVERVIEW 1.2.1 NET BANKING NET BANKING is an online banking system that facilitates the customers
to perform banking Services such as Balance Enquiry, FundsTransfer, Funds Transfer
Enquiry, Cheque Status Enquiry, Modify Personal Details with his/her Account. All these
services are accessed by the user with the bank through Internet.
This banking application will have the following functionalities:
• The application will enable an account holder of the bank to register to use the
application.
• The application will enable registered account holders to log on to the banking
web site after entereing their login details. The banking application will enable the
account holders to view their account details. The registered user will also be able
to modify any personal details such as address or phone number.
vii
• The registered user will also be able to do funds transfer for transferring amount
from one account to another account and also enable to do funds transfer enquiry
for checking the funds transfer is succeed or not.
• The registered user will also be able to do cheque status enquiry for checking the
cheque status whether the cheque is releaved or pending.
The concepts that I will use to build the banking application are:
• HTML
• JavaScript
• Java Server Pages(JSP)
• Requests and Response Cycle of JSP and JSP Tags
• Java Beans
• Java Naming And Directory Interface(JNDI)
• Remote Method Invocation(RMI)
• Java Database Connectivity(JDBC)
• Enterprise Java Bean and Deploying Enterprise Java Bean
1.3 SOFTWARE OVERVIEW
1.3.1 FRONT-END(HTML):
HTML is used to create a static content web page displayed Into the browser.
It is user interface.
viii
1.3.2 CLIENT-SIDE SCRIPTING(JAVA SCRIPT):
JavaScript is a lightweight object-based scripting language created by Netscape
Communications Corporation for developing Internet applications. JavaScript is
lightweight in that there isn't a great deal to learn and you can be productive with it very
quickly, in contrast to much more complex languages such as Java. As a scripting
language, JavaScript is meant to tell an application what to do. Unlike languages used to
create applications, it cannot do anything without the application.
You can develop server applications or client applications with JavaScript. In
this book, the term "server" refers to the computer where your Web pages reside. The term
"client" refers to the browser application that loads and displays your Web pages. This
book focuses on teaching you to create client applications with JavaScript-specifically,
documents (Web pages) on the World Wide Web.
You can embed JavaScript statements in Web pages, which are written in
HTML (Hypertext Markup Language). JavaScript is an extension to HTML that lets you
create more sophisticated Web pages than you ever could with HTML alone. To appreciate
this, it helps to know a little history.
1.3.3 SERVER – SIDE SCRIPTING(JSP):
Java Server Pages(JSP) is a technology used to create dynamic content on
the web. With the spread of the Internet and increasing number of users registering with
web sites, the static pages developed using HTML have became obsolete.
You can use JSP to create dynamic web pages. Essentially, a JSP page is an
HTML document with embedded java code. A JSP file must be saved with the .jsp
extension.
ix
The web application consists of both presentation and business logic.
Presentation represents the elements used to design the structure of a web page in terms of
page layout, color and text. Business logic involves application of financial and business
calculations. JSP technology segregates presentation from the business logic. For example,
a web designer can design HTML pages. At the same time, a web developer can use JSP to
write business logic. Therefore, both web designers and web developers can
simultaneously work in their areas of specialization, leading to better quality and
productivity.
A JSP page is converted to a servlet after compilation. Therefore, a JSP page
incorporates all servlet functionalities. Servlets and JSP share common features, such as
platform independence, creation of database-driven web applications, and server-side
programming capabilities.
1.3.4 JAVA 2 SDK 1.3
The Java 2 SDK includes tools useful for developing and testing programs
written in the Java programming language and running on the Java platform. These tools
are designed to be used from the command line. Except for appletviewer, these tools do not
provide a graphical user interface.
1.3.5 J2SDKEE 1.3.1
Sun Microsystems introduced the J2EE application server and the
EnterpriseJavaBeans(EJB) specifications as a venture into the multi-tier component
architecture. J2EE functions as a middle-tier server in a three-tier architecture. It
provides certain specifications that can be used to implement enterprise solutions for
catering to all types of business requirements.J2EE also offers cost-effective solutions
for business requirements.
x
J2EE is used for developing, deploying and executing applications in a
distributed environment. The J2EE application server acts as a platform for
implementing various server-side technologies such as servlets, Java Server
Pages(JSP) and Enterprise JavaBeans. J2EE allows you to focus on business logic in
your programs. The business logic is coded in Enterprise JavaBeans, which are
reusable components that can be accessed by client programs. Enterprise JavaBeans
runs on a J2EE server.
In J2EE, security is handled almost entirely by the platform and its
administrations. The developers do not have to worry about writing the security logic.
1.3.6 SERVER-SIDE COMPONENTS(EJB):
Enterprise JavaBeans(EJB) are server-side components that run on the J2EE
server. Some of the features of EJB are:
• EJB components are written using java.
• EJB components implement only the business logic.
• EJB components provide services services such as transaction and security
management, and can be customized during deployment.
• EJB can maintain state information across various method calls.
1.3.7 JAVA DATABASE CONNECTIVITY(JDBC):
You use databases to store data. In addition to storing data in a structured
manner, databases help in easy retrieval and processing of data. However, the maintenance
of databases can be arduous for some people. Imagine that a store owner has to maintain
data about a large department store on an SQL server. In order to update or query the
xi
database, he will need to learn about SQL statements. This can be tedious task for the store
owner. The solution is to build applications that will act as an interface between the store
owner and the database. The applications will accept values from the store owner by using
user-friendly GUIs, and the application will update or query the database. The java
environment provides you the JDBC API necessary to create java applications that are
capable of interacting with a database.
1.3.8 JAVA NAMING AND DIRECTORY INTERFACE(JNDI) :
JNDI is a standard extension to the Java platform that provides multiple
naming and directory services. A naming service provides a mechanism for locating
distributing objects. A directory service organizes distributed objects and other resources,
such as files into hierarchical structures. Directory services allow resources to be linked
virtually. This enables a resource to be located in the directory services hierarchy. There
are different types of directory services. JNDI allows the different types of directory
services to be linked. Thus, clients can use any type of directory service.
JNDI can be compared to a telephone directory, which is used to search for a
phone number. Similary, JNDI is used to locate and search for an object. It is Application
Programming Interface(API) for accessing different types of naming and directory
services.
1.3.9 REMOTE METHOD INVOCATION(RMI):
RMI is a specification that enables one Java Virtual Machine(JVM) to invoke
methods in an object located in another Java Virtual Machine(JVM). These two JVMs,
could be running on different computers or running as separate process on the same
computer. RMI is implemented on the middle-tier of the three-tier architecture framework,
thereby facilitating the programmers to invoke distributed components across a networked
environment.
xii
Sun introduced RMI as an easy alternative to the complex coding involved in
server-socket programming. For using RMI, the programmer need not know socket
programming or multi-threading and needs to solely concentrate on developing the
business logic.
1.3.10 MS SQL SERVER 2000
1.3.10.1 INTRODUCTION:
SQL Server 2000 builds on and extends the performance, reliability, quality,
and ease of use of SQL Server version 7.0. It also includes a number of new features that
further establish SQL Server as the best database platform for OLTP, data warehousing,
and e-commerce applications.
1.3.10.2 SQL SERVER CORE COMPONENT NOTES:
These notes relate to the SQL Server core components, including the
database engine, client components, connectivity components, graphical tools, and
command prompt utilities.
1.3.10.3 PERMISSIONS FOR ACTIVE DIRECTIVE INTEGERATION:
In Microsoft SQL Server 2000, only members of the system admin fixed
server role can register databases or publications in Active Directory; members of the db-
owner fixed database role cannot.
1.3.10.4 BACKUP/RESTORE APIs FOR INDEPENDENT
SOFTWARE VENDORS:
xiii
Microsoft SQL Server 2000 is supported by a large number of third-party
backup solutions. SQL Server provides application programming interfaces that enable
independent software vendors to integrate SQL Server into their products. These APIs
provide maximum reliability and performance, and support the full range of SQL Server
backup and restore functionality, including hot and snapshot capabilities. For information
about how your backup solution integrates with SQL Server, contact your backup solution
vendor. For information about the Backup/Restore APIs, install the "Backup/Restore API"
subcomponent of the "Development Tools" component of SQL Server.
CHAPTER 2 SYSTEM STUDY AND ANALYSIS 2.1 ANALYSIS OF EXISTING SYSTEM: In the existing system, all these bank operations are done through manual.
The customers wants to make any operations in these, customer moves directly to the bank
and perform the operations and it takes more time and also bank provides services half a
day. So it is not comfortable to the customer.
2.1.1 DISADVANTAGES OF EXISTING SYSTEM: • Lot of manpower is required.
• Lot of time is wasted to perform operations through maual.
• Services are provided for time-limit a day.
• Process speed is less.
2.2 ANALYSIS OF PROPOSED SYSTEM:
In the proposed system, all these bank operations are performed through Online.
Each customer have user-id and password to login before perform His/her operations. It
xiv
gives more security to the customer. Then the user perform His/her operations with his/her
account.
2.2.1 ADVANTAGES OF PROPOSED SYSTEM: • Manpower is reduced.
• Time is reduced to process the operations.
• 24 hr services are provided to the customer.
xv
CHAPTER 3 SYSTEM ENVIRONMENT
3.1 HARDWARE AND SOFTWARE REQUIREMENTS.
3.1.1 HARDWARE:
PROCESSOR : PENTIUM 4.
PROCESSOR SPEED : 650MHZ.
RAM : 256 MB.
HARDDISK : 40GB.
3.1.2 SOFTWARE:
OPERATING SYSTEM : WINDOWS 98, 2000,
XP.
SCRIPTING LANGUAGE : JAVASCRIPT, JSP.
USER INTERFACE : HTML.
SERVER-SIDE COMPONENTS : EJB.
CLIENT-SIDE COMPONENTS : JAVABEANS.
J2EE APPLICATION SERVER : J2EE SERVER.
JAVA PROGRAM TOOL : JDK1.3
BACKEND : MS SQLSERVER
2000.
xvi
CHAPTER 4 SYSTEM DESIGN
4.1 DATA FLOW DIAGRAM:
A data flow diagram (DFD) is the graphical representation of the flow of data through business functions or processes. It illustrates the processes, data stores, external entities, data flow in the system and out the system and the relationships between these things.
4.1.1 NEW USER REGISTERATION: LEVEL 0: Figure 4.1 Level 0 - DFD
New user validates
Personal details
Login details
xvii
LEVEL 1: Error message Invalid Account -no Details
Valid
Error message
Already exist User-id Login Details
Not exist
Error message Exist Email-id
Personal Details Not exist
Personal Details
Store Personal details
Authentication User-id
Authentication Email-id
New User
Authentication Account-no
Validate Personal details
Store the User-id, Email-id
A
Login details
A
xviii
Login details Figure 4.2 Level 1 - DFD
4.1.2 NEW USER LOGIN: LEVEL 0: Figure 4.3 Level 0 -DFD LEVEL 1:
New user validates Login details
xix
Error message
Invalid User-id
Login details Valid Store
Login details
Figure 4.4 Level 1-DFD
New user
Authentication User-id
Store Password
xx
4.1.3 LOGIN, MODIFY AND BALANCE OPERATIONS: LEVEL 0:
Error message Invalid User-id Login details
Update view
Personal Details Account Details Figure 4.5 Level 0-DFD
4.1.4 FUNDS TRANSFER AND ENQUIRY:
User
Authentication
Update Personal details
View the balance details
xxi
LEVEL 0: Error message Invalid User-id
Login details
View Store FundsTransfer Details Figure 4.6 Level 0- DFD
4.1.5 CHEQUE STATUS ENQUIRY:
Bank employee Process the Data And Store the data
User
Authentication
Store the FundsTransfer details
View the FundsTransfer status
xxii
LEVEL 0: Error message Invalid User-id Login details Valid View Cheque details Figure 4.7 Level 0-DFD
4.2 DATABASE DESIGN:
The database design briefs the entire design of the database used in
the project.
View the cheque details
User
Authentication
xxiii
4.2.1 ACCOUNT-NO DETAILS: COLUMNAME TYPE SIZE ATTRIBUTES Account-no
Varchar
15
Primary key
Name
Varchar
25
Not null
Account-type
Varchar
20
Not null
Table 4.2.1 Account-no details 4.2.2 LOGIN DETAILS: COLUMNAME TYPE SIZE ATTRIBUTES
User-id
Varchar
20
Primary key
Password
Varchar
10
Not null
Account-no
Varchar
15
Primary key First character Must start with letter. Foreign key References account-no.
Table 4.2.2 Login details 4.2.3 PERSONAL DETAILS:
xxiv
COLUMNAME TYPE SIZE ATTRIBUTES Bank-state
Varchar
20
Not null
Bank-city
Varchar
20
Not null
Bank-branch
Varchar
20
Not null
Account-type
Varchar
20
Not null
Account-no
Varchar
15
Primary key First character must Be a letter Foreign key References account-no.
Name
Varchar
25
Not null
Gender
Varchar
6
Not null
Date_of_birth
DATETIME
Not null
Address
Varchar
60
Not null
City
Varchar
20
Not null
State
Varchar
20
Not null
Pincode
Varchar
6
Not null
Email-id
Varchar
25
Primary key
User-id
Varchar
20
Primary key
Residence-phno
Varchar
15
xxv
Mobile-phno
Varchar
11
Office-phno
Varchar
15
Table 4.2.3 Personal details 4.2.4 ACCOUNT DETAILS: COLUMNAME TYPE SIZE ATTRIBUTES Account-no
Varchar
15
Primary key First character must be a letter Foreign key References account-no.
Account-type
Varchar
15
Not null
Branch
Varchar
20
Not null
Currency
Varchar
5
Not null
Balance
Float
Not null Must be greater than 5000.
Table 4.2.4 Account details
4.2.5 FUNDS-TRANSFER DETAILS:
COLUMNAME TYPE SIZE ATTRIBUTES
xxvi
Account-no-from
Varchar
15
Foreign key References account-no.
Account-no-to
Varchar
15
Foreign key References account-no.
Date
DATETIME
Not null
Amount
Float
Not null
Status
Varchar
13
Not null
Table 4.2.5 Funds-transfer details 4.2.6 CHEQUE DETAILS: COLUMNAME TYPE SIZE ATTRIBUTES Account-no-from
Varchar
15
Foreign key References account-no.
Account-no-to
Varchar
15
Foreign key References account-no.
Name-of-cheque
Varchar
25
Not null
Cheque-no
Varchar
15
Primary key
Date-of-cheque
DATETIME
Not null
Amount
Float
Not null
Status
Varchar
13
Not null
Table 4.2.6 Cheque details CHAPTER 5 SYSTEM DEVELOPMENT
xxvii
5.1 MODULES:
The core modules identified within the scope of the project are
• NEW USER REGISTERATION
• NEW USER LOGIN
• LOGIN
• MODIFY PERSONAL DETAILS
• BALANCE ENQUIRY
• FUNDS TRANSFER
• FUNDS TRANSFER ENQUIRY
• CHEQUE STATUS ENQUIRY
5.2 MODULES DESCRIPTION: The description is given below:
5.2.1 NEW USER REGISTRATION: The existing Account –holders wants to access his/her account through
Online, the user must register his/her personal details in the registration form. These details
will be evaluated number of times with the different database details. Finally the details
are valid then the details are stored into the database. Then only the user access his/her
account through Online.
5.2.2 NEW USER LOGIN: This process is performed next to the Registration. In this process the user
enter his/her user-id, password and confirm password. User-id is given it as in the
xxviii
Registration form. Password and confirm-password must be the same. Then the password
will be stored into Corresponding user-id of the Login details database.
5.2.3 LOGIN: This process is performed next to the NewUserLogin. In this process the user
enter his/her user-id and password to access his/her account through Online. The given
user-id and password is validated with login details database for authentication purpose. If
it is Valid the corresponding account-no is retrieved from the database. Using that
account-no The user performs some bank operations with his/her account.
5.2.4 MODIFY PERSONAL DETAILS: If the user-id and password is valid then the user is allowed to perform the
Bank operations with this account. In this place modify personal details is one of the bank
operations accessed by the user. If the user wants to modify/update his/her personal
details, the user has to click the modify personal details which will be displayed in the web
browser.
After click, the account-no will be automatically send to the database for
retrieving the Corresponding personal details from the personal details database. Then all
the personal details of the user are displayed into the web browser. The bank given
permissions to the user to change only some of the personal details and Submit the form to
update the data into the database.
5.2.5 BALANCE ENQUIRY: This process is similar to the modify personal details. The only difference is The
account-no will be send to the account-details database to ‘know the balance of the
Particular account’.
xxix
5.2.6 FUNDS TRANSFER: In the funds transfer process the user must submit some required details To
make funds transfer to his/her account or to some other account within the same bank. The
given details entered by the user are stored into the funds-transfer database. Using that
Details the bank does fund transfer operations.
5.2.7 FUNDS TRANSFER ENQUIRY: In the funds transfer enquiry process the user know his/her fund transfer process is
successfully completed or not. To know the details of the funds transfer (i.e. whether the
Funds transfer is made successfully or not ) the user must enter some required details to
retrieve the data from the funds transfer database and the account-no is similar to
previously defined, send to the database .
5.2.8 CHEQUE STATUS ENQUIRY: In the cheque status enquiry process the user know his/her cheque status Is
successfully relieved or not. To know the details of the cheque status the user must Enter
some required details to retrieve the data from the funds transfer database and the Account-
no is similar to previously defined send to the database.
CHAPTER 6 SYSTEM TESTING
6.1 INTRODUCTION
xxx
System testing is an important phase. Testing represents an interesting anomaly
for the software. Thus a series of testing are performed for the proposed system before the
system is ready for user acceptance testing.
Unit testing is essential for the verification of the code produced during the
coding phase and hence the goal is to test the Internal logic of the modules. Using the
detailed design description as a guide, important paths are tested to uncover errors with in
the boundary of the modules. These tests were carried out during the programming stage
itself. All functional behavioral performance requirements and the errors which are
uncovered during the testing are corrected. Form level and as well as field level validations
are performed in all the data entry screens.
Program testing is nothing but testing a number of programs that form a
cluster to achieve a certain goal. During program testing two kinds of errors will occur
namely, syntax errors and logical errors.
Syntax errors have to be corrected before the program is executed.
Logical errors many occur due to in correct. Handling of data, improper
sequence of program statement etc..,
The following are the various stages in the testing process.
6.2 BLACK BOX TESTING:
xxxi
In this testing we give input to the system and test the output. Here we do not go
for watching the internal variable in the system and what are the changes made on them for
the required output. Any invalid input for the above leads to failure in establishing the
connection between the front end and the back end.
6.3 WHITE BOX TESTING It is just the vice versa of the back box testing. There we do not watch the
internal variables during testing. This gives clear idea about what is going on during
execution of the system. The points at which the bug occurs were all clear and were
removed.
6.4 STRESS TESTING:
The purpose of stress testing is to improve that the candidate system does not
malfunction during peak loads. We subject a high volume of data during a very short
period of time. This simulates an online environment where a high volume of activities
occurs in spurts.
6.5 INTEGRATION TESTING:
Each test in the source code test plan consists of the following details
• Type of test
• Machine Configuration
• Test assumptions
• Requirements being tested
• Exact test stimuli
• Expected outcome
xxxii
• Connecting with database
• Test Cases
6.6 TEST PLAN:
6.6.1 NEW USER REGISTRATION:
Requirements being
Tested
Input Data Error Message
Bank State Not selected Select the Bank state
Bank City Not selected Select the Bank city
Bank branch Not selected Select the Bank branch
Account type Not selected Select the Account type
Account-number Not null Please enter your
account- Number
Account-number TNCHT0 Please enter your full
length Account-
number
Name Null Please enter your name
Name Syskl Please enter your name
with Initial.
Gender Not selected Please select the
gender
Address Null Please enter your
address
City Null Please enter your city
State Null Please enter your city
Pin code Null Please enter your pin
Code
xxxiii
Pin code 600467 Pin code length must
be Six or greater
Emailid Null Please enter your
emailid
Emailid Siv200yahoo.com Please enter with ‘@’
Symbol
Emailid [email protected] Please enter with ‘.’
Symbol
Userid Null Please enter your userid
Userid Kue42 Your userid length must be
greater than six.
Residence-phno ,mobile-
phno,office-phno,fax-no
Null Please enter at least one phone
–number
Residence-phno,mobile-
phno,office-phno,fax-no
Jdj37832 Please enter your valid phone
number
Table 6.6.1 New user registration
6.6.2 NEW USER LOGIN: Requirements being
Tested
Input Data Error Message
Userid Null Please enter your userid
Userid Kue42 Your userid length must
be greater than six.
Password Null Please enter your
password
Password ****** Password length must be
At least six
xxxiv
Confirm password Null Please enter your confirm
password
Confirm password ***** Password length must be
at least six
Password Confirm password
*******
*******
Password and confirm
Password must be equal.
Table 6.6.2 New user login 6.6.3 LOGIN: Requirements being
Tested
Input Data Error Message
Userid Null Please enter your userid
Userid Kue42 Your userid length must be
greater than six.
Password Null Please enter your password
Password ***** Please enter your full
Length password.
Table 6.6.3 Login 6.6.4 FUNDS TRANSFER: Requirements being
Tested
Input Data Error Message
Transfer –to Null Please enter the to Account-no.
Transfer-to Mat78 Your user-id length must be greater than six.
Transfer-amount Null Please enter your Transfer Amount.
xxxv
Date Null Please enter the today’s Date.
Date 7/2005/09 Please enter the date in This format (dd/mm/yy).
Table 6.6.4 Funds Transfer 6.6.5 FUNDS TRANSFER ENQUIRY: Requirements being
Tested
Input Data Error Message
Transfer –to Null Please enter the to Account-no.
Transfer-to Mat78 Your user-id length must be greater than six.
Date Null Please enter the today’s Date.
Date 7/2005/09 Please enter the date In This format (dd/mm/yy).
Table 6.6.5 Funds transfer enquiry 6.6.6 CHEQUE STATUS ENQUIRY: Requirements being
Tested
Input Data Error Message
Cheque-number Null Please enter the cheque- Number.
Cheque-number Sdjsdndsnn Please enter your Correct Cheque-no
Amount Null Please enter the Amount Of the cheque.
xxxvi
Date Null Please enter the date Of Cheque.
Date 7/2005/09 Please enter the date in This format (dd/mm/yy).
Table 6.6.6 Cheque status enquiry CHAPTER 7 CONCLUSION
The application “NET BANKING” has been designed and developed after
a detailed investigation of the existing system. It speeds up the process and provides the
results in less time consumption. It also reduces the wastage of man power and more
security. It is more comfortable to the customer to access his/her account at any time.
xxxvii
APPENDIX OUTPUT SCREENS
1. HOME PAGE:
xxxviii
Figure A.1 Home page
2. NEW USER REGISTRATION:
xxxix
Figure A.2a New user registration
xl
Figure A.2b New user registration
xli
3. NEW USER LOGIN:
Figure A.3 New user login
4. LOGIN:
xlii
Figure A.4 Login
5. FUNDS TRANSFER:
xliii
Figure A.5 Funds transfer
6. FUNDS TRANSFER ENQUIRY:
xliv
Figure A.6 Funds transfer enquiry
7. CHEQUE STATUS ENQUIRY:
xlv
Figure A.7 Cheque status enquiry
8. BALANCE ENQUIRY:
xlvi
Figure A.8 Balance enquiry
xlvii
REFERENCES
BOOKS:
1. Deital, ‘Internet and World Wide Web’, 4th Edition, Tata McGraw Hill, 2003. 2. Deital, ‘Developing J2EE Applications’, 3th Edition, Tata McGraw Hill, 2004. 3. Herbert Schildt, ‘The Complete Reference Java2 ‘, Tata McGraw Hill,2002. 4. James Good Will, ‘Java Server Pages’, 3rd Edition, Tec media, 2000.
WEBSITES REFFERED:
http://www.java.sun.com
http://www.oracle.com
http://www.microsoft.com