SlideShare a Scribd company logo
1 of 30
ATM
DATABASE
SYSTEM
 INTRODUCTION
 Introduction to the project
 Objectives of the project
 Scope of the project
 Hardware and Software Requirements
 Technology used
 DESIGN
 Design
 System Design
 Architecture Design
 Detailed Design
 Diagrams
 SCREENSHOTS
 CONCLUSION
 Conclusion
 Perspective Users
 Limitations
CONTENTS
INTRODUCTION
 An automated teller machine (ATM) is a computerized telecommunications device
that provides the customers of a financial institution with access to financial
transactions in a public space without the need for a human clerk or bank teller. On
most modern ATMs, the customer is identified by inserting a plastic ATM card with
a magnetic stripe or a plastic smartcard with a chip, that contains a unique card
number and some security information, such as an expiration date or CVC(CVV).
Security is provided by the customer entering a personal identification
number(PIN).
 Using an ATM, customers can access their bank accounts in order to make cash
withdrawals (or credit card cash advances) and check their account balances as
well as purchasing mobile cell phone prepaid credit.
 ATMs are known by various other names including automated banking machine,
money machine, bank machine, cash machine, hole-in-the-wall, cashpoint,
Bancomat (in various countries in Europe and Russia), Multibanco and Any Time
Money eased ATM usage is also helped by the fact that customers have now the
flexibility of using ATMs of other banks, as most of the banks are part of major
interbank networks like National Financial Switch (NFS), Milr, BANGS, Cashtree and
Cashnet. The interbank networks have brought together ATMs of several banks so
that consumers would gain access to any of the participating banks' ATMs.
 Before making this application, we assumed that a fictitious bank which
had recently started its operations found it very difficult to handle their
customers.
 It was due to their great customer service and efficient handling of daily
operations that they customer base started growing, and in a day, they
started to handle lot of customer requests.
 When this happened, the bank authorities realized that the customer had
lot of different queries like Account opening, Account information,
Deposit, Withdrawal etc.
 Slowly & slowly the count of such customers started to grow very rapidly
and the bank employees had to devote their maximum time in handling
such customers.
 This resulted in large response times of the bank employees who found
themselves unable to give adequate time to other important customers
like NRIs.
1. Slowly, the bank started loosing its important or gold customers due to
poor response times by the bank employees and they even started
loosing those customers whose requests could not be fulfilled.
 After this, the bank decided to install a centralized system that can help
its customers fulfill their queries efficiently and at the same time help the
bank undertake important tasks securely which can improve the response
times and can ease up the tasks of the employees who were already
overburdened with handling all the processes manually till date.
OBJECTIVE
 Keeping the problem in mind, we have developed a solution which would
help the bank, achieve its overall objectives. The application can be securely
accessed by bank employees & the administrator who has got system-level
rights to access confidential information of the bank employees in the
database.
 The administrator can perform the following tasks:
 Account Opening: In this module, all the relevant personal information details
like Name, Address, Contact, PAN etc. of the prospective customer who wants
to open an account with the bank are entered.
 Modification: In this function, an administrator can modify the details of a
customer like Name, Address etc. Before the details are modified, the
account-id of the customer is inputted which is cross-checked in the database
for correctness.
 Kiosk status: In this application, we have assumed 3 kiosk / ATM machine
locations namely Vikas Puri, Dwarka & South Ex- II. Additionally, we have
assumed that all of these kiosks will have Rs. 25 lakh each in a day to serve
customer’s withdrawal requests efficiently.
 Lock/Unlock Accounts: Through this functionality, administrator would be able
to lock or unlock a customer’s account. We have assumed that one condition
in which the customer’s account would be locked will be if he/she wrongly
inputs the pin no. for 3 instances while logging in. This is a special security
feature that has been implemented to encourage security.
SCOPE OF THE PROJECT
 Close Accounts: An administrator can close a customer’s account upon bank’s
request only if the customer has not done any transaction for a long period,
say 1 year. It is assumed that when a customer does not make any transaction
for a long period, his account becomes dormant and reminder letters are
being given to that customer by the bank regarding conversion of his/her
account to dormant. If the customer still does not respond to the reminders,
his/her id finally closed.
 Deposit: We have assumed that the customers can make deposit requests
through cheques wherein they can deposit their cheques through inputting all
the necessary & important details like cheque no, cheque date & cheque
amount in the application. The application will not accept post-dated cheques
and the customer will be duly notified about same.
 Withdrawal: Under this function, the customer can withdraw amount from his
account. His present balance is being shown before the withdrawal. After the
withdrawal, revised balance is being shown. It is assumed that in any day, a
customer is not allowed to withdraw more that Rs. 50,000/-.
 Account Status: Through this feature, the customer can have complete details
regarding his present account balance and the last deposit & withdrawal
transaction being done with all the details.
HARDWARE & SOFTWARE
REQUIREMENTS
Hardware:
Intel Pentium D Processor with 3.00 GHz CPU
clock speed
01 GB of RAM
80 GB of Hard Disk space
Software:
Microsoft Windows XP Professional (Service pack 2)
Java 6 Update 12 (JDK1.6)
• FRONT END :-
Java:
Java is a general-purpose, Object Oriented programming language. Its syntax is very much
similar to C & C++, but it omits features that make C & C++ complex, confusing and
insecure. Java was initially developed to address the problems of built in software for
small-distributed systems to embed in consumer devices.
• Back End:-
Microsoft SQL Server :-
Microsoft SQL Server is a relational database management system(RDBMS) produced
by Microsoft. Its primary query languages are MS-SQL and T-SQL. Protocol layer
implements the external interface to SQL Server. All operations that can be invoked on
SQL Server are communicated to it via a Microsoft-defined format, called Tabular DatA
Stream (TDS).
TECHNOLOGY USED
 We performed the analysis in 02 parts i.e. Feasibility Analysis & Requirements
Analysis.
 Feasibility Analysis:
 We studied the whole system & its objectives. Calculated the total time & resources
incurred on every function being done manually.
 Bifurcated the complete system into a list of functions & the users who operate on
them.
 Further subdivided all the functions into a list or source of requirements/inputs &
clearly defined the output/expectation from each function.
 The interaction, communication & dependency of all the functions between each
other were carefully analyzed in terms of sequence & information.
System Design
 The source & flow of the information was determined & how would it be processed &
used was considered.
 Finally, we visualized the complete system with automated functions & compared the
total time & resources being incurred to check the feasibility & see whether it is fulfilling
all the necessary objectives.
 Requirement Analysis:
 This was a subset of feasibility analysis in which we defined a set of objectives for the
complete system after thoroughly analyzing it.
 All the objectives were further subdivided into a set of function(s).
 The input(s) required by each function & the expected output(s)/behavior was/were
clearly defined.
 The source of information/input to every function was determined & its corresponding
processing, usage & storage were also taken into account.
 After this the interdependency & communication was finalized.
 Under architectural design, after defining the whole system into a set of objectives &
further subdividing them into functions, we defined the basic dependency &
communication between them.
 This means that all the prime functions, their required inputs, expected
output/behavior & interdependency between other functions were clearly defined.
The corresponding interfaces for the user for each function were designed to ensure
user-friendliness.
 We actually addressed the system-level problems here and made a conscious effort
to build a robust design which can result in an effective communication within itself
and with the system in terms of raw data or processed information.
• All the primary database design for data storage was also done in this phase.
Architectural Design
Model Diagram
 In this phase, we further subdivided every function into a set of modules & defined
required inputs & expected behavior for each of them. All the minute correlations,
interdependencies, communication between the modules were clearly defined. The
source, usage & processing of data for every module was carefully done. The database
design was also normalized at this stage to ensure that the data is efficiently stored &
retrieved.
 Detailed design helped us to exactly concretize every problem into inputs & outputs and
visualize them in terms of their communication with each other. We focused on
interdependency & interoperability between the broken modules here.
 It was this design phase where the factors like user-friendliness ease of use, scalability and
self-explanation of interfaces & outputs were actually realized. For all the modules, the
placement of controls, passing of information, communication of different interfaces, user
messages, data transfer to databases was defined.
Detailed Design
DFD DIAGRAMS
 A data-flow diagram (DFD) is a graphical representation of the "flow" of data
through a information system. DFDs can also be used for the visualization of
data processing
 On a DFD, data items flow from an external data source or an internal data
store to an internal data store or an external data sink, via an internal process.
 shown
Level-0 MAIN
• In this diagram, overall control is with administrator when we login as an administrator.
An administrator can create a new account by providing a user ID and password, where a
new customer and his all the details are acting as an input to the machine. Kiosk status
fills the ATM machine which the desired amount that should present in the machine.
Administrator can close a user account if he/she wants to do that.
• Now user can make transaction from the ATM machine in the form of withdraw and
deposit and check his account.
Level-1 Administrator
 Logging in as administrator, an administrator can add a new customer in which he
enters his personal details he can create current or saving account. User can
modify his details. He can temporary lock his account.
 Administrator can check the kiosk status of the accounts of the customer and if
the balance in the machine is not enough than the administrator can fill up the
machine with the desired amount now if and user wants to closes account than he
can requested that administrator to do that and his account permanently.
Level-2 User DFD
• In this DFD, user can make transaction in the form of withdrawal and deposit.
This two boxes acts as an input that the user enters. A user can add money to
his previous account and can withdraw money from his existing account. He
can then check his account status which acts as output to the user.
Use Case diagram
interaction diagram
Activity diagram
SCREENSHOTS
The Main Page
When logged in as the administrator
Logging in as the user
CONCLUSION
• The project development has been an enriching experience. Its technological
components challenged us to use most current tools and techniques of Java.
Developing a live system is a work of high responsibility and is not as simple
as it finally appears to client who is going to use it. It not only requires in
depth study of the system already used but also understanding of the
problem analysis and design issues.
Perspective Users
 It is used by customers in payment of the bills, tax debates, money transfer,
sales of products and recharge of mobile bills.
 Bank employees use ATM to transfer their transaction made at their branch
to the main branch of the Bank.
 It is used in the financial sector regarding the credit card information.
 It is used in the different parts of the world to carry out the work related to
money.
• Providing customers with all the money transactions & debits in a convenient
way.
 Researchers who work for an Israeli computer security company say they have
discovered a fundamental weakness in the system that banks use to keep debit card PIN
codes secret while they are transported across bank networks - a flaw that they say
could undermine the entire debit card system Accordingly its limitations include three
types of feasibility:-
• Economic Feasibility: Economic analysis includes the use or rather n some sense misuse
of the ATM machines in foreign countries. it can be misuse in any part of the world. the
money can be used by some unauthorized agency for their brutal purpose. again here
the verification of the PIN no. plays a very important role. ln the financial sector this is
regarded as the PIN cracking.
• Technical Feasibility: Technical feasibility includes the proper functioning of atm database
system when it comes to the remembering of the PIN no. Many cardholders walk up to
an ATM and pull out a piece of paper containing four numbers. If you are not sure, make
it a point that you don't keep the PIN and ATM card together in your wallet - If someone
comes up and hits you over the head, they're going to have all your information right
there. But ideally, one should never write down the PIN number - it should be
memorized.
• Social Feasibility: Illiterate People cant handle the functioning of ATM. So to teach them
the use instructions are also provided regarding its transactions & debits, transfer of
money to people at any part of the world
Limitation And Constraints of project
QUERIES??

More Related Content

Similar to project database 1 ALI Hassan 005.ppt

Hotel Management System final report
Hotel Management System final report  Hotel Management System final report
Hotel Management System final report jaysavani5
 
MULTI-BANK SYSTEM
MULTI-BANK SYSTEMMULTI-BANK SYSTEM
MULTI-BANK SYSTEMIJARIIT
 
Banking Management System Project
Banking Management System ProjectBanking Management System Project
Banking Management System ProjectChaudhry Sajid
 
Document Atm machine using c language mini project.pdf
Document  Atm machine using c language mini project.pdfDocument  Atm machine using c language mini project.pdf
Document Atm machine using c language mini project.pdfNEERAJRAJPUT81
 
A Software Engineering Project on Cyber cafe management
A Software Engineering Project on Cyber cafe managementA Software Engineering Project on Cyber cafe management
A Software Engineering Project on Cyber cafe managementsvrohith 9
 
HDFC banking system SRS Document
HDFC banking system  SRS DocumentHDFC banking system  SRS Document
HDFC banking system SRS DocumentNavjeetKajal
 
CUSTOMER CARE ADMINISTRATION-developer-2000 and oracle 9i
CUSTOMER CARE ADMINISTRATION-developer-2000 and oracle 9iCUSTOMER CARE ADMINISTRATION-developer-2000 and oracle 9i
CUSTOMER CARE ADMINISTRATION-developer-2000 and oracle 9iAkash Gupta
 
Banking Management System SRS
Banking Management System SRSBanking Management System SRS
Banking Management System SRSMr. Moms
 
PPS.pptx this ppt is for coding your problems and to do ppt for new students ...
PPS.pptx this ppt is for coding your problems and to do ppt for new students ...PPS.pptx this ppt is for coding your problems and to do ppt for new students ...
PPS.pptx this ppt is for coding your problems and to do ppt for new students ...ragishettyanilkumar
 
IRJET- Bank Management System
IRJET- Bank Management SystemIRJET- Bank Management System
IRJET- Bank Management SystemIRJET Journal
 
Bank account tracking system
Bank account tracking systemBank account tracking system
Bank account tracking systemMaulesh Desai
 
RISK REPORTING SYSTEM IN IT ORGANIZATIONSCPT PAPERName Vi.docx
RISK REPORTING SYSTEM IN IT ORGANIZATIONSCPT PAPERName Vi.docxRISK REPORTING SYSTEM IN IT ORGANIZATIONSCPT PAPERName Vi.docx
RISK REPORTING SYSTEM IN IT ORGANIZATIONSCPT PAPERName Vi.docxjoellemurphey
 
51955853 banking-system-documentation
51955853 banking-system-documentation51955853 banking-system-documentation
51955853 banking-system-documentationAziz Muslim
 

Similar to project database 1 ALI Hassan 005.ppt (20)

Hotel Management System final report
Hotel Management System final report  Hotel Management System final report
Hotel Management System final report
 
Final project (1)
Final project (1)Final project (1)
Final project (1)
 
MULTI-BANK SYSTEM
MULTI-BANK SYSTEMMULTI-BANK SYSTEM
MULTI-BANK SYSTEM
 
Banking Management System Project
Banking Management System ProjectBanking Management System Project
Banking Management System Project
 
Document Atm machine using c language mini project.pdf
Document  Atm machine using c language mini project.pdfDocument  Atm machine using c language mini project.pdf
Document Atm machine using c language mini project.pdf
 
A Software Engineering Project on Cyber cafe management
A Software Engineering Project on Cyber cafe managementA Software Engineering Project on Cyber cafe management
A Software Engineering Project on Cyber cafe management
 
HDFC banking system SRS Document
HDFC banking system  SRS DocumentHDFC banking system  SRS Document
HDFC banking system SRS Document
 
CUSTOMER CARE ADMINISTRATION-developer-2000 and oracle 9i
CUSTOMER CARE ADMINISTRATION-developer-2000 and oracle 9iCUSTOMER CARE ADMINISTRATION-developer-2000 and oracle 9i
CUSTOMER CARE ADMINISTRATION-developer-2000 and oracle 9i
 
Banking Management System SRS
Banking Management System SRSBanking Management System SRS
Banking Management System SRS
 
PPS.pptx this ppt is for coding your problems and to do ppt for new students ...
PPS.pptx this ppt is for coding your problems and to do ppt for new students ...PPS.pptx this ppt is for coding your problems and to do ppt for new students ...
PPS.pptx this ppt is for coding your problems and to do ppt for new students ...
 
IRJET- Bank Management System
IRJET- Bank Management SystemIRJET- Bank Management System
IRJET- Bank Management System
 
Bank account tracking system
Bank account tracking systemBank account tracking system
Bank account tracking system
 
RISK REPORTING SYSTEM IN IT ORGANIZATIONSCPT PAPERName Vi.docx
RISK REPORTING SYSTEM IN IT ORGANIZATIONSCPT PAPERName Vi.docxRISK REPORTING SYSTEM IN IT ORGANIZATIONSCPT PAPERName Vi.docx
RISK REPORTING SYSTEM IN IT ORGANIZATIONSCPT PAPERName Vi.docx
 
51955853 banking-system-documentation
51955853 banking-system-documentation51955853 banking-system-documentation
51955853 banking-system-documentation
 
Banking java project
Banking java projectBanking java project
Banking java project
 
Mca titles
Mca titlesMca titles
Mca titles
 
Mca titles
Mca titlesMca titles
Mca titles
 
Mca titles
Mca titlesMca titles
Mca titles
 
Mca titles
Mca titlesMca titles
Mca titles
 
Mca titles
Mca titlesMca titles
Mca titles
 

Recently uploaded

BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 

Recently uploaded (20)

BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 

project database 1 ALI Hassan 005.ppt

  • 2.  INTRODUCTION  Introduction to the project  Objectives of the project  Scope of the project  Hardware and Software Requirements  Technology used  DESIGN  Design  System Design  Architecture Design  Detailed Design  Diagrams  SCREENSHOTS  CONCLUSION  Conclusion  Perspective Users  Limitations CONTENTS
  • 3. INTRODUCTION  An automated teller machine (ATM) is a computerized telecommunications device that provides the customers of a financial institution with access to financial transactions in a public space without the need for a human clerk or bank teller. On most modern ATMs, the customer is identified by inserting a plastic ATM card with a magnetic stripe or a plastic smartcard with a chip, that contains a unique card number and some security information, such as an expiration date or CVC(CVV). Security is provided by the customer entering a personal identification number(PIN).  Using an ATM, customers can access their bank accounts in order to make cash withdrawals (or credit card cash advances) and check their account balances as well as purchasing mobile cell phone prepaid credit.  ATMs are known by various other names including automated banking machine, money machine, bank machine, cash machine, hole-in-the-wall, cashpoint, Bancomat (in various countries in Europe and Russia), Multibanco and Any Time Money eased ATM usage is also helped by the fact that customers have now the flexibility of using ATMs of other banks, as most of the banks are part of major interbank networks like National Financial Switch (NFS), Milr, BANGS, Cashtree and Cashnet. The interbank networks have brought together ATMs of several banks so that consumers would gain access to any of the participating banks' ATMs.
  • 4.  Before making this application, we assumed that a fictitious bank which had recently started its operations found it very difficult to handle their customers.  It was due to their great customer service and efficient handling of daily operations that they customer base started growing, and in a day, they started to handle lot of customer requests.  When this happened, the bank authorities realized that the customer had lot of different queries like Account opening, Account information, Deposit, Withdrawal etc.  Slowly & slowly the count of such customers started to grow very rapidly and the bank employees had to devote their maximum time in handling such customers.  This resulted in large response times of the bank employees who found themselves unable to give adequate time to other important customers like NRIs. 1. Slowly, the bank started loosing its important or gold customers due to poor response times by the bank employees and they even started loosing those customers whose requests could not be fulfilled.  After this, the bank decided to install a centralized system that can help its customers fulfill their queries efficiently and at the same time help the bank undertake important tasks securely which can improve the response times and can ease up the tasks of the employees who were already overburdened with handling all the processes manually till date. OBJECTIVE
  • 5.  Keeping the problem in mind, we have developed a solution which would help the bank, achieve its overall objectives. The application can be securely accessed by bank employees & the administrator who has got system-level rights to access confidential information of the bank employees in the database.  The administrator can perform the following tasks:  Account Opening: In this module, all the relevant personal information details like Name, Address, Contact, PAN etc. of the prospective customer who wants to open an account with the bank are entered.  Modification: In this function, an administrator can modify the details of a customer like Name, Address etc. Before the details are modified, the account-id of the customer is inputted which is cross-checked in the database for correctness.  Kiosk status: In this application, we have assumed 3 kiosk / ATM machine locations namely Vikas Puri, Dwarka & South Ex- II. Additionally, we have assumed that all of these kiosks will have Rs. 25 lakh each in a day to serve customer’s withdrawal requests efficiently.  Lock/Unlock Accounts: Through this functionality, administrator would be able to lock or unlock a customer’s account. We have assumed that one condition in which the customer’s account would be locked will be if he/she wrongly inputs the pin no. for 3 instances while logging in. This is a special security feature that has been implemented to encourage security. SCOPE OF THE PROJECT
  • 6.  Close Accounts: An administrator can close a customer’s account upon bank’s request only if the customer has not done any transaction for a long period, say 1 year. It is assumed that when a customer does not make any transaction for a long period, his account becomes dormant and reminder letters are being given to that customer by the bank regarding conversion of his/her account to dormant. If the customer still does not respond to the reminders, his/her id finally closed.  Deposit: We have assumed that the customers can make deposit requests through cheques wherein they can deposit their cheques through inputting all the necessary & important details like cheque no, cheque date & cheque amount in the application. The application will not accept post-dated cheques and the customer will be duly notified about same.  Withdrawal: Under this function, the customer can withdraw amount from his account. His present balance is being shown before the withdrawal. After the withdrawal, revised balance is being shown. It is assumed that in any day, a customer is not allowed to withdraw more that Rs. 50,000/-.  Account Status: Through this feature, the customer can have complete details regarding his present account balance and the last deposit & withdrawal transaction being done with all the details.
  • 7. HARDWARE & SOFTWARE REQUIREMENTS Hardware: Intel Pentium D Processor with 3.00 GHz CPU clock speed 01 GB of RAM 80 GB of Hard Disk space Software: Microsoft Windows XP Professional (Service pack 2) Java 6 Update 12 (JDK1.6)
  • 8. • FRONT END :- Java: Java is a general-purpose, Object Oriented programming language. Its syntax is very much similar to C & C++, but it omits features that make C & C++ complex, confusing and insecure. Java was initially developed to address the problems of built in software for small-distributed systems to embed in consumer devices. • Back End:- Microsoft SQL Server :- Microsoft SQL Server is a relational database management system(RDBMS) produced by Microsoft. Its primary query languages are MS-SQL and T-SQL. Protocol layer implements the external interface to SQL Server. All operations that can be invoked on SQL Server are communicated to it via a Microsoft-defined format, called Tabular DatA Stream (TDS). TECHNOLOGY USED
  • 9.  We performed the analysis in 02 parts i.e. Feasibility Analysis & Requirements Analysis.  Feasibility Analysis:  We studied the whole system & its objectives. Calculated the total time & resources incurred on every function being done manually.  Bifurcated the complete system into a list of functions & the users who operate on them.  Further subdivided all the functions into a list or source of requirements/inputs & clearly defined the output/expectation from each function.  The interaction, communication & dependency of all the functions between each other were carefully analyzed in terms of sequence & information. System Design
  • 10.  The source & flow of the information was determined & how would it be processed & used was considered.  Finally, we visualized the complete system with automated functions & compared the total time & resources being incurred to check the feasibility & see whether it is fulfilling all the necessary objectives.  Requirement Analysis:  This was a subset of feasibility analysis in which we defined a set of objectives for the complete system after thoroughly analyzing it.  All the objectives were further subdivided into a set of function(s).  The input(s) required by each function & the expected output(s)/behavior was/were clearly defined.  The source of information/input to every function was determined & its corresponding processing, usage & storage were also taken into account.  After this the interdependency & communication was finalized.
  • 11.  Under architectural design, after defining the whole system into a set of objectives & further subdividing them into functions, we defined the basic dependency & communication between them.  This means that all the prime functions, their required inputs, expected output/behavior & interdependency between other functions were clearly defined. The corresponding interfaces for the user for each function were designed to ensure user-friendliness.  We actually addressed the system-level problems here and made a conscious effort to build a robust design which can result in an effective communication within itself and with the system in terms of raw data or processed information. • All the primary database design for data storage was also done in this phase. Architectural Design
  • 13.  In this phase, we further subdivided every function into a set of modules & defined required inputs & expected behavior for each of them. All the minute correlations, interdependencies, communication between the modules were clearly defined. The source, usage & processing of data for every module was carefully done. The database design was also normalized at this stage to ensure that the data is efficiently stored & retrieved.  Detailed design helped us to exactly concretize every problem into inputs & outputs and visualize them in terms of their communication with each other. We focused on interdependency & interoperability between the broken modules here.  It was this design phase where the factors like user-friendliness ease of use, scalability and self-explanation of interfaces & outputs were actually realized. For all the modules, the placement of controls, passing of information, communication of different interfaces, user messages, data transfer to databases was defined. Detailed Design
  • 14. DFD DIAGRAMS  A data-flow diagram (DFD) is a graphical representation of the "flow" of data through a information system. DFDs can also be used for the visualization of data processing  On a DFD, data items flow from an external data source or an internal data store to an internal data store or an external data sink, via an internal process.  shown
  • 16. • In this diagram, overall control is with administrator when we login as an administrator. An administrator can create a new account by providing a user ID and password, where a new customer and his all the details are acting as an input to the machine. Kiosk status fills the ATM machine which the desired amount that should present in the machine. Administrator can close a user account if he/she wants to do that. • Now user can make transaction from the ATM machine in the form of withdraw and deposit and check his account.
  • 18.  Logging in as administrator, an administrator can add a new customer in which he enters his personal details he can create current or saving account. User can modify his details. He can temporary lock his account.  Administrator can check the kiosk status of the accounts of the customer and if the balance in the machine is not enough than the administrator can fill up the machine with the desired amount now if and user wants to closes account than he can requested that administrator to do that and his account permanently.
  • 20. • In this DFD, user can make transaction in the form of withdrawal and deposit. This two boxes acts as an input that the user enters. A user can add money to his previous account and can withdraw money from his existing account. He can then check his account status which acts as output to the user.
  • 25. When logged in as the administrator
  • 26. Logging in as the user
  • 27. CONCLUSION • The project development has been an enriching experience. Its technological components challenged us to use most current tools and techniques of Java. Developing a live system is a work of high responsibility and is not as simple as it finally appears to client who is going to use it. It not only requires in depth study of the system already used but also understanding of the problem analysis and design issues.
  • 28. Perspective Users  It is used by customers in payment of the bills, tax debates, money transfer, sales of products and recharge of mobile bills.  Bank employees use ATM to transfer their transaction made at their branch to the main branch of the Bank.  It is used in the financial sector regarding the credit card information.  It is used in the different parts of the world to carry out the work related to money. • Providing customers with all the money transactions & debits in a convenient way.
  • 29.  Researchers who work for an Israeli computer security company say they have discovered a fundamental weakness in the system that banks use to keep debit card PIN codes secret while they are transported across bank networks - a flaw that they say could undermine the entire debit card system Accordingly its limitations include three types of feasibility:- • Economic Feasibility: Economic analysis includes the use or rather n some sense misuse of the ATM machines in foreign countries. it can be misuse in any part of the world. the money can be used by some unauthorized agency for their brutal purpose. again here the verification of the PIN no. plays a very important role. ln the financial sector this is regarded as the PIN cracking. • Technical Feasibility: Technical feasibility includes the proper functioning of atm database system when it comes to the remembering of the PIN no. Many cardholders walk up to an ATM and pull out a piece of paper containing four numbers. If you are not sure, make it a point that you don't keep the PIN and ATM card together in your wallet - If someone comes up and hits you over the head, they're going to have all your information right there. But ideally, one should never write down the PIN number - it should be memorized. • Social Feasibility: Illiterate People cant handle the functioning of ATM. So to teach them the use instructions are also provided regarding its transactions & debits, transfer of money to people at any part of the world Limitation And Constraints of project

Editor's Notes

  1. We have developed a solution which will help the bank achieve its objectives. The bank employees and the administrator who has the system level rights can access the information regarding bank employees in the database. All relevant information like name, address, contract, pan of the prospective customers who want to open an account with the bank are entered. In this we can modify all the details of the customer and before making changes we check the correctness of customer id. We want to install Atm machines at 3 new locations i.e. Vikas Puri, Dwarka & south ex-2. we have assumed that all of these machines will have Rs. 25 lakh each in a day to serve customer’s withdrawal requests efficiently. In this case the administrator can even lock/unlock the account if the pin has been wrongly entered for 3 times.
  2. 5) If no transaction has been done for 1 yr then the account becomes inoperative, in such a case the bank will post letter to that customer informing that customer that his/her account has become inoperative and after that if the customer still does not reply then the account is closed. 6) We have assumed that the amount can be deposited through cheques by entering all important details like cheque no, date and amount in the application. 7) The customer can even withdraw amount from his account this application can even show present balance before withdrawal and revised balance after withdrawal the maximum limit for withdrawal can be Rs 50,000 per day. 8) In this feature, the customer can get to know the details regarding his present account balance and last deposit & withdrawal transaction done with all details.