Netbank

246 views

Published on

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
246
On SlideShare
0
From Embeds
0
Number of Embeds
9
Actions
Shares
0
Downloads
0
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Netbank

  1. 1. NETWORK BANKING $OFTWARE‘Out of the box solution for the networked Banks’ Sunil Kumar Sharma
  2. 2. Contents EVOLUTION NETWORKS TCP/IP IP ADDRESS WHY JAVA ? JAVA AND NETWORKING SCOPE OF THE PROJECT FEATURES FUTURE ENHANCEMENTS CONCLUSION
  3. 3. EVOLUTION OF BANKING Banking started by the Templar Knights in the middle ages for the pilgrims to Jerusalem. Banking evolved from coinage to currency in the 20th century with the nationalization of Bank of England. Swiss Banks started the process of wire transfer of money between countries.
  4. 4.  Rising popularity of Banks induced new developments such as credit cards, ATM’s, mobile alerts etc… The latest phase in the evolution is the advent of Network Banking...
  5. 5. NETWORKS PEER TO PEER A peer to peer network is one in which lacks a dedicated server and every computer acts as both a client and a server. CLIENT/SERVER This type of network is designed to support a large number of users and uses dedicated server to accomplish this. Clients log on to the server in order to run applications or obtain files. Security and permissions can be managed by 1 or more administrator. CENTRALIZED This is also a client/server based model in which the clients are "dumb terminals". This means that the client may not have a storage device and all applications and processing occur on the server. Security is very high on this type of network.
  6. 6. TCP/IP NETWORKS TCP and IP were developed by a Department of Defense (DOD) research project It was initially successful because it delivered a few basic services that everyone needs (file transfer, electronic mail, remote logon) across a very large number of client and server systems. Several computers in a small department can use TCP/IP (along with other protocols) on a single LAN.
  7. 7. IP Address An IP address is used for Network Layer identification of hosts and routers on a TCP/IP network. The address consists of a 32-bit binary number of 4 octets and is usually displayed in the decimal format 100.100.100.100, which is called dotted decimal notation.
  8. 8. Why Client/Server ? The network chosen for thisapplication is Client/Server modelas it provides adequate security andresources required for a criticalapplication like Banking.
  9. 9. WHY JAVA? Object Oriented. Simple and Architecturally Neutral Portable and Distributed. High Performance and Secure. Interpreted and Dynamic. Multithreaded and Robust.
  10. 10. Java and Networking Java uses three methodologies toperform network operations. URL : Uniform Resource Locator is Associated with applets and programming for the world wide web. Datagram : An independent, self contained message sent over the network whose arrival, arrival time and data are not guaranteed. Sockets: One end point of a two way communication link between two ports on the network.
  11. 11. Scope of the Project This project aspires to be asimulation of sorts for a NetworkBank in the near future. If coupledwith appropriate hardware thissystem can be turned into an ATMsoftware.
  12. 12. Features Client-Server Model based on sockets and ports. Multithreaded Server having Microsoft Database. Intermediate Administrator for deposits. Client Side is platform Independent.
  13. 13. Server Account Creation, Deletion, Updation. View Account, Reports, Account Logs. Client Authentication. Client Monitoring. Centralised Data Processing. Creation of Account Logs.
  14. 14. Intermediate Administrator Privilege to Deposit. Can check Account Status.
  15. 15. Client Withdraw and Transfer Money. View Account, Account Logs. Change PIN, Passwords.
  16. 16. Additional Features Double Layered Security. Server can terminate a client port. Secure Login. Logs are stored to detect fraudulence.
  17. 17. Future Enhancements Loan Facility. Email and mobile alerts. Active Tracing of Fraudulent activities. Security upgrades like Visual Sensors with burglar alarms, Biometric Identification procedures etc.
  18. 18. CONCLUSION The aim of our project was toexplore new avenues in computingLike the distributed systems alongwith raditional concepts like OOPSand networking.
  19. 19. THANK YOU

×