Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Banking
Chapt
er 1
Abstr
act
The E-Banking is an application that has been developed for a well-established
regional bank operating primarily in south India. The bank has several branches in
key cities and towns in the north. In the world of this competitive environment and
technological development, the bank has been totally computerized in the last 3
years, and to increase its customer base has started planning, for a concept called
as e-banking; with this concept the bank wants to move very nearer to the
customers and increase its basic operational strategies. Through E-Banking the
bank wants to introduce the core concept of IT based Enabled Services (ITES). The
E-Banking services are executed only upon the customer, and these e-banking
services would fully integrate with the core banking solution that is already in
usage. The major idea is to provide a series of services to the customer through the
internet, and make the customer feel flexible in calling out simple tasks faster
instead of making visit to the bank every time. The e-banking service is open only
to savings bank. Customers and not for current account holders. The customer is
privileged to use most of the system only as a viewing phase, the only online
transactions the customer can do are chequebook requisition and fund transfer
among his personal accounts.
The project ahs been planned to be having the view of distributed architecture, with
centralized storage of the database. The application for the storage of the data has
been planned. Using the constructs of MS-SQLServer2000 and all the user
interfaces have been designed using the ASP.Net technologies. The database
connectivity is planned using the “SQL Connection” methodology. The standards of
security and data protective mechanism have been given a big choice for proper
usage. The application takes care of different modules and their associated reports,
which are produced as per the applicable strategies and standards that are put
forwarded by the administrative staff.
Chapt
er 2
Project
Synopsis
The entire project has been developed keeping in view of the distributed client
server computing technology, in mind. The specification have been normalized up to
3NF to eliminate all the anomalies that may arise due to the database transaction
that are executed by the general users and the organizational administration. The
user interfaces are browser specific to give distributed accessibility for the overall
system. The internal database has been selected as MS-SQL server 200.The basic
constructs of table spaces, clusters and indexes have been exploited to provide
higher consistency and reliability for the data storage. The MS-SQL server 200 was
a choice as it provides the constructs of high-level reliability and security. The total
front end was dominated using the ASP.Net technologies. At all proper levels high
care was taken to check that the system manages the data consistency with proper
business rules or validations. The database connectivity was planned using the
latest ”SQL Connection” technology provided by Microsoft Corporation. The
authentication and authorization was crosschecked at all the relevant stages. The
user level accessibility has been restricted into two zones namely. The
administrative zone and the normal user zone.
Dfgegdfgdfgdfgdf
Manual Process
Customer
physically visits
the bank
Inquires for an existing service
or some specific information
Customer
makes a The cheque book is sent for The incharge clerk accepts the
counter sign manages initials request and prepares the
and receives cheque book with respect to
the checkbook given specification
2. The system at any point of time can give the customers information related
to their
3.The system can provide information related to the different types of accounts
that are existing within the bank.
4.The system can provide the bank administration with information on the
number of customers who are existing in the system.
5.The system at any point of time can provide the information related to the
executed transactions by the customer.
6.The system with respect to the necessities can identify all the history details of
the trial participants along with their outcome of the results.
7.The system with respect to the necessities can provide the status of research
and development process that is under schedule within the organization
currently.
8.With proper storage of the data in a relational environment the system can
Applegate itself to cater to the standards of providing a clear and easy path for
future research standards that may arise due to organizational policies.
Chapter
3
Feasibility
Report
Technical Descriptions:
The total number of databases that were identified to build system is 17. The
major parts of the databases are categorized as administration components and
customer of based components. The administration components are useful is
managing the actual master date that may be necessary the maintain the
consistency of the system. These databases purely used for the internal
organizational needs and necessities.
GUI’S
In the flexibility of the uses the interface has been developed a graphics concept
in mind, associated through a browses interface. The GUI’S at the top level have
been categorized
The Account holder interface helps the ordinary website visitors is transacting
through the required services that provided upon the site. The customer
interfaces also help the ordinary users in managing their own information
Required Hardware
Pentium IV Processor.
128 MB RAM.
Oracle 9i.
Number of Modules
The system after careful analysis has been identified to be presented with the
following modules.
Document Conventions:
The overall documents for this project use the recognized modeling
standards at the software industries level.
Introduction
• Re d e s i g n e d u t i l i t i e s s u p p o r t t e r a b y t e - s i z e d
d a t a b a s e s e f f i c i e n t l y.
D y n a m i c Ro w - F u l l r o w - l e v e l l o c k i n g i s i m p l e m e n t e d f o r b o t h d a t a
Level Locking rows and index entries. Dynamic locking
a u t o m a t i c a l l y c h o o s e s t h e o p t i m a l l e v e l o f l o c k ( r o w,
page, multiple page, table) for all database
operations. This feature provides improved
concurrency with no tuning. The database also
supports the use of "hints" to force a particular
level of locking.
Evolution T h e n e w a r c h i t e c t u r e i s d e s i g n e d f o r e x t e n s i b i l i t y,
with a foundation for object-relational features.
Overview
The original code was inherited from Sybase and designed for
eight-megabyte Unix systems in 1983.These new formats improve
manageability and scalability and allow the server to easily scale
from low-end to high-end systems, improving performance and
m a n a g e a b i l i t y.
Benefits
Overview
Files
SQL Server 7.0 creates a database using a set of operating system
files, with a separate file used for each database. Multiple
databases can no longer share the same file. There are several
important benefits to this simplification. Files can now grow and
shrink, and space management is greatly simplified. All data and
objects in the database, such as tables, stored procedures,
triggers, and views, are stored only within these operating system
files:
F i l e Ty p e Description
Secondary These files are optional and can hold all data and
data files objects that are not on the primary data file. Some
databases may not have any secondary data files,
while others have multiple secondary data files.
Log files These files hold all of the transaction log information
used to recover the database. Every database has at
least one log file.
Filegroups
A database now consists of one or more data files and one or more
log files. The data files can be grouped together into user-defined
f i l e g r o u p s . Ta b l e s a n d i n d e x e s c a n t h e n b e m a p p e d t o d i f f e r e n t
filegroups to control data placement on physical disks. Filegroups
are a convenient unit of administration, greatly improving
f l e x i b i l i t y. S Q L S e r v e r 7 . 0 w i l l a l l o w y o u t o b a c k u p a d i f f e r e n t
portion of the database each night on a rotating schedule by
choosing which filegroups to back up. Filegroups work well for
sophisticated users who know where they want to place indexes
and tables. SQL Server 7.0 can work quite effectively without
filegroups.
Space Management
SQL Server now has a much more efficient system for tracking
table space. The changes enable
File Shrink
T h e s e r v e r c h e c k s t h e s p a c e u s a g e i n e a c h d a t a b a s e p e r i o d i c a l l y. I f
a database is found to have a lot of empty space, the size of the
files in the database will be reduced. Both data and log files can be
shrunk. This activity occurs in the background and does not affect
a n y u s e r a c t i v i t y w i t h i n t h e d a t a b a s e . Yo u c a n a l s o u s e t h e S Q L
Server Enterprise Manager or DBCC to shrink files as individually
o r a s a g r o u p , o r u s e t h e D B C C c o m m a n d s S H R I N K D ATA B A S E o r
SHRINKFILE.
SQL Server shrinks files by moving rows from pages at the end of
the file to pages allocated earlier in the file. In an index, nodes
are moved from the end of the file to pages at the beginning of the
file. In both cases pages are freed at the end of files and then
returned to the file system. Databases can only be shrunk to the
point that no free space is remaining; there is no data
compression.
File Grow
Te x t / I m a g e Te x t , n t e x t , a n d i m a g e d a t a
To r n p a g e d e t e c t i o n h e l p s i n s u r e d a t a b a s e c o n s i s t e n c y. I n S Q L
Server 7.0, pages are 8 KB, while Windows NT does I/O in 512-byte
segments. This discrepancy makes it possible for a page to be
partially written. This could happen if there is a power failure or
other problem between the time when the first 512-byte segment is
written and the completion of the 8 KB of I/O.
There are several ways to deal with this. One way is to use
battery-backed cached I/O devices that guarantee all-or-nothing
I/O. If you have one of these systems, torn page detection is
u n n e c e s s a r y.
In SQL Server 7.0, you can enable torn page detection for a
particular database by turning on a database option.
Locking Enhancements
Row-Level Locking
Dynamic Locking
Intent U s e d t o e s t a b l i s h a l o c k h i e r a r c h y.
Overview
The data for each table is now stored in a collection of 8-KB data
pages. Each data page has a 96-byte header containing system
information such as the ID of the table that owns the page and
pointers to the next and previous pages for pages linked in a list.
A row-offset table is at the end of the page. Data rows fill the rest
of the page.
SQL Server 7.0 tables use one of two methods to organize their
data pages:
Table Indexes
Clustered Indexes
Unicode Data
SQL Server now supports Unicode data types, which makes it easier
to store data in multiple languages within one database by
eliminating the problem of converting characters and installing
multiple code pages. Unicode stores character data using two bytes
for each character rather than one byte. There are 65,536 different
bit patterns in two bytes, so Unicode can use one standard set of
bit patterns to encode each character in all languages, including
languages such as Chinese that have large numbers of characters.
Many programming languages also support Unicode data types.
T h e n e w d a t a t y p e s t h a t s u p p o r t U n i c o d e a r e n t e x t , n c h a r, a n d
n v a r c h a r. T h e y a r e t h e s a m e a s t e x t , c h a r, a n d v a r c h a r, e x c e p t f o r
the wider range of characters supported and the increased storage
space used.
Normalization
SQL
The structured query language is used to manipulate data in the
oracle database. It is also called SEQUEL.
• To p r o v i d e a c o d e - e x e c u t i o n e n v i r o n m e n t t h a t m i n i m i z e s
software deployment and versioning conflicts.
• To p r o v i d e a c o d e - e x e c u t i o n e n v i r o n m e n t t h a t e l i m i n a t e s
the performance problems of scripted or interpreted
environments.
Fo r e x a m p l e , A S P. N E T h o s t s t h e r u n t i m e t o p r o v i d e a s c a l a b l e ,
s e r v e r - s i d e e n v i r o n m e n t f o r m a n a g e d c o d e . A S P. N E T w o r k s d i r e c t l y
w i t h t h e r u n t i m e t o e n a b l e We b Fo r m s a p p l i c a t i o n s a n d X M L We b
services, both of which are discussed later in this topic.
W i t h r e g a r d s t o s e c u r i t y, m a n a g e d c o m p o n e n t s a r e a w a r d e d
varying degrees of trust, depending on a number of factors that
include their origin (such as the Internet, enterprise network, or
local computer). This means that a managed component might or
might not be able to perform file-access operations, registry-
access operations, or other sensitive functions, even if it is
being used in the same active application.
T h e r u n t i m e e n f o r c e s c o d e a c c e s s s e c u r i t y. Fo r e x a m p l e , u s e r s
c a n t r u s t t h a t a n e x e c u t a b l e e m b e d d e d i n a We b p a g e c a n p l a y
an animation on screen or sing a song, but cannot access their
personal data, file system, or network. The security features of
the runtime thus enable legitimate Internet-deployed software to
be exceptionally feature rich.
The common type system defines how types are declared, used,
and managed in the runtime, and is also an important part of
the runtime's support for cross-language integration. The
common type system performs the following functions:
D e f i n e s r u l e s t h a t l a n g u a g e s m u s t f o l l o w, w h i c h h e l p s e n s u r e
that objects written in different languages can interact with each
o t h e r.
I n T h i s S e c t i o n C o m m o n Ty p e S y s t e m O v e r v i e w
Type Members
Value Types
Classes
Delegates
Arrays
Interfaces
Pointers
Cross-Language Interoperability
In This Section
Language Interoperability
Fo r e x a m p l e , t h e . N E T F r a m e w o r k c o l l e c t i o n c l a s s e s i m p l e m e n t a
set of interfaces that you can use to develop your own collection
classes. Yo u r collection classes will blend seamlessly with the
classes in the .NET Framework.
A s y o u w o u l d e x p e c t f r o m a n o b j e c t - o r i e n t e d c l a s s l i b r a r y, t h e . N E T
Framework types enable you to accomplish a range of common
programming tasks, including tasks such as string management,
d a t a c o l l e c t i o n , d a t a b a s e c o n n e c t i v i t y, a n d f i l e a c c e s s . I n a d d i t i o n
to these common tasks, the class library includes types that
support a variety of specialized development scenarios. Fo r
example, you can use the .NET Framework to develop the following
types of applications and services:
Console applications.
• ASP.NET applications.
• Windows services.
Fo r e x a m p l e , t h e W i n d o w s Fo r m s c l a s s e s a r e a c o m p r e h e n s i v e s e t
of reusable types that vastly simplify Windows GUI development. If
y o u w r i t e a n A S P. N E T We b Fo r m a p p l i c a t i o n , y o u c a n u s e t h e We b
Fo r m s c l a s s e s .
Client Application Development
T h e W i n d o w s Fo r m s c l a s s e s c o n t a i n e d i n t h e . N E T F r a m e w o r k a r e
d e s i g n e d t o b e u s e d f o r G U I d e v e l o p m e n t . Yo u c a n e a s i l y c r e a t e
command windows, buttons, menus, toolbars, and other screen
elements with the flexibility necessary to accommodate shifting
business needs.
Fo r e x a m p l e , t h e . N E T F r a m e w o r k p r o v i d e s s i m p l e p r o p e r t i e s t o
adjust visual attributes associated with forms. In some cases the
underlying operating system does not support changing these
attributes d i r e c t l y, and in these cases the .NET Framework
automatically recreates the forms. This is one of many ways in
which the .NET Framework integrates the developer interface,
making coding simpler and more consistent.
U n l i k e A c t i v e X c o n t r o l s , W i n d o w s Fo r m s c o n t r o l s h a v e s e m i - t r u s t e d
a c c e s s t o a u s e r ' s c o m p u t e r. T h i s m e a n s t h a t b i n a r y o r n a t i v e l y
executing code can access some of the resources on the user's
system (such as GUI elements and limited file access) without
being able to access or compromise other resources. Because of
c o d e a c c e s s s e c u r i t y, m a n y a p p l i c a t i o n s t h a t o n c e n e e d e d t o b e
installed on a user's system can now be safely deployed through
t h e We b . Yo u r a p p l i c a t i o n s c a n i m p l e m e n t t h e f e a t u r e s o f a l o c a l
a p p l i c a t i o n w h i l e b e i n g d e p l o y e d l i k e a We b p a g e .
Choosing a Complier
To o b t a i n t h e b e n e f i t s p r o v i d e d b y t h e c o m m o n l a n g u a g e r u n t i m e ,
you must use one or more language compilers that target the
runtime.
Compiling translates your source code into MSIL and generates the
required metadata.
Compiling MSIL to native code
Assemblies Overview
I t f o r m s a s e c u r i t y b o u n d a r y. A n a s s e m b l y i s t h e u n i t a t w h i c h
p e r m i s s i o n s a r e r e q u e s t e d a n d g r a n t e d . Fo r m o r e i n f o r m a t i o n a b o u t
security boundaries as they apply to assemblies, see Assembly
Security Considerations
I t f o r m s a t y p e b o u n d a r y. E v e r y t y p e ' s i d e n t i t y i n c l u d e s t h e n a m e
o f t h e a s s e m b l y i n w h i c h i t r e s i d e s . A t y p e c a l l e d M y Ty p e l o a d e d i n
t h e s c o p e o f o n e a s s e m b l y i s n o t t h e s a m e a s a t y p e c a l l e d M y Ty p e
l o a d e d i n t h e s c o p e o f a n o t h e r a s s e m b l y.
It forms a reference scope b o u n d a r y. The assembly's manifest
contains assembly metadata that is used for resolving types and
satisfying resource requests. It specifies the types and resources
that are exposed outside the a s s e m b l y. The manifest also
enumerates other assemblies on which it depends.
I t i s t h e u n i t a t w h i c h s i d e - b y- s i d e e x e c u t i o n i s s u p p o r t e d . Fo r
more information about running multiple versions of the same
a s s e m b l y, s e e S i d e - b y- S i d e E x e c u t i o n
A S P. N E T i s t h e h o s t i n g e n v i r o n m e n t t h a t e n a b l e s d e v e l o p e r s t o u s e
t h e . N E T F r a m e w o r k t o t a r g e t We b - b a s e d a p p l i c a t i o n s . H o w e v e r,
A S P. N E T is more than just a runtime host; it is a complete
architecture for developing We b sites and Internet-distributed
objects using managed code. Both We b Fo r m s and XML We b
services use IIS and A S P. N E T as the publishing mechanism for
applications, and both have a collection of supporting classes in
the .NET Framework.
XML We b services, an important evolution in We b - b a s e d
t e c h n o l o g y, are distributed, server-side application components
similar to common We b sites. H o w e v e r, unlike We b - b a s e d
a p p l i c a t i o n s , X M L We b s e r v i c e s c o m p o n e n t s h a v e n o U I a n d a r e n o t
targeted for browsers such as Internet Explorer and Netscape
N a v i g a t o r. I n s t e a d , X M L We b s e r v i c e s c o n s i s t o f r e u s a b l e s o f t w a r e
components designed to be consumed by other applications, such
a s t r a d i t i o n a l c l i e n t a p p l i c a t i o n s , We b - b a s e d a p p l i c a t i o n s , o r e v e n
o t h e r X M L We b s e r v i c e s . A s a r e s u l t , X M L We b s e r v i c e s t e c h n o l o g y
is rapidly moving application development and deployment into the
highly distributed environment of the Internet.
I f y o u d e v e l o p a n d p u b l i s h y o u r o w n X M L We b s e r v i c e , t h e . N E T
Framework provides a set of classes that conform to all the
underlying communication standards, such as S O A P, WSDL, and
XML. Using those classes enables you to focus on the logic of your
service, without concerning yourself with the communications
infrastructure required by distributed software development.
F i n a l l y, l i k e We b Fo r m s p a g e s i n t h e m a n a g e d e n v i r o n m e n t , y o u r
XML We b service will run with the speed of native machine
language using the scalable communication of IIS.
Developing Components
Processing Transactions
Securing Applications
Serializing Objects
Threading
D i s c u s s e s h o w t o c r e a t e a n d o p t i m i z e A S P. N E T We b a p p l i c a t i o n s .
Creating Windows Forms Applications
D e s c r i b e s h o w t o c r e a t e W i n d o w s Fo r m s a n d W i n d o w s c o n t r o l s
applications.
Introduction to ASP.NET
A S P. N E T i s m o r e t h a n t h e n e x t v e r s i o n o f A c t i v e S e r v e r P a g e s
( A S P ) ; i t i s a u n i f i e d We b d e v e l o p m e n t p l a t f o r m t h a t p r o v i d e s
the services necessary for developers to build enterprise-class
We b a p p l i c a t i o n s . W h i l e A S P. N E T i s l a r g e l y s y n t a x c o m p a t i b l e
with A S P, it also provides a new programming model and
infrastructure for more secure, scalable, and stable applications.
Yo u c a n f e e l f r e e t o a u g m e n t y o u r e x i s t i n g A S P a p p l i c a t i o n s b y
i n c r e m e n t a l l y a d d i n g A S P. N E T f u n c t i o n a l i t y t o t h e m .
A S P. N E T i s a c o m p i l e d , . N E T- b a s e d e n v i r o n m e n t ; y o u c a n a u t h o r
applications in any .NET compatible language, including Visual
B a s i c . N E T, C # , a n d J S c r i p t . N E T. A d d i t i o n a l l y, t h e e n t i r e . N E T
F r a m e w o r k i s a v a i l a b l e t o a n y A S P. N E T a p p l i c a t i o n . D e v e l o p e r s
can easily access the benefits of these technologies, which
include the managed common language runtime environment,
t y p e s a f e t y, i n h e r i t a n c e , a n d s o o n .
A S P. N E T h a s b e e n d e s i g n e d t o w o r k s e a m l e s s l y w i t h W Y S I W Y G
HTML editors and other programming tools, including Microsoft
V i s u a l S t u d i o . N E T. N o t o n l y d o e s t h i s m a k e We b d e v e l o p m e n t
e a s i e r, b u t i t a l s o p r o v i d e s a l l t h e b e n e f i t s t h a t t h e s e t o o l s h a v e
t o o f f e r, i n c l u d i n g a G U I t h a t d e v e l o p e r s c a n u s e t o d r o p s e r v e r
controls onto a We b page and fully integrated debugging
support.
Developers can choose from the following two features when
c r e a t i n g a n A S P. N E T a p p l i c a t i o n , We b Fo r m s a n d We b s e r v i c e s ,
or combine these in any way they see fit. Each is supported by
the same infrastructure that allows you to use authentication
schemes, cache frequently used data, or customize your
application's configuration, to name only a few possibilities.
We b Fo r m s a l l o w s y o u t o b u i l d p o w e r f u l f o r m s - b a s e d We b p a g e s .
W h e n b u i l d i n g t h e s e p a g e s , y o u c a n u s e A S P. N E T s e r v e r c o n t r o l s
to create common UI elements, and program them for common
t a s k s . T h e s e c o n t r o l s a l l o w y o u t o r a p i d l y b u i l d a We b Fo r m o u t
of reusable built-in or custom components, simplifying the code
o f a p a g e . Fo r m o r e i n f o r m a t i o n , s e e We b Fo r m s P a g e s . Fo r
information on how to develop A S P. N E T server controls, see
D e v e l o p i n g A S P. N E T S e r v e r C o n t r o l s
E a c h o f t h e s e m o d e l s c a n t a k e f u l l a d v a n t a g e o f a l l A S P. N E T
features, as well as the power of the .NET Framework and .NET
Framework common language runtime. These features and how
you can use them are outlined as follows:
A c c e s s i n g d a t a b a s e s f r o m A S P. N E T a p p l i c a t i o n s i s a n o f t e n - u s e d
technique for displaying data to We b site visitors. A S P. N E T
makes it easier than ever to access databases for this purpose.
I t a l s o a l l o w s y o u t o m a n a g e t h e d a t a b a s e f r o m y o u r c o d e . Fo r
m o r e i n f o r m a t i o n , s e e A c c e s s i n g D a t a w i t h A S P. N E T
A S P. N E T p r o v i d e s a s i m p l e m o d e l t h a t e n a b l e s We b d e v e l o p e r s t o
write logic that runs at the application level. Developers can
write this code in the global.asax text file or in a compiled class
d e p l o y e d a s a n a s s e m b l y. T h i s l o g i c c a n i n c l u d e a p p l i c a t i o n - l e v e l
events, but developers can easily extend this model to suit the
needs of their We b application. Fo r more information, see
A S P. N E T A p p l i c a t i o n s
Fo r a d v a n c e d d e v e l o p e r s w h o w a n t t o u s e A P I s a s p o w e r f u l a s
the ISAPI programming interfaces that were included with
p r e v i o u s v e r s i o n s o f A S P, A S P. N E T o f f e r s t h e I H t t p H a n d l e r a n d
IHttpModule interfaces. Implementing the IHttpHandler interface
gives you a means of interacting with the low-level request and
response services of the IIS We b server and provides
functionality much like ISAPI extensions, but with a simpler
programming model. Implementing the IHttpModule interface
allows you to include custom events that participate in every
r e q u e s t m a d e t o y o u r a p p l i c a t i o n . Fo r m o r e i n f o r m a t i o n , s e e
H TT P R u n t i m e S u p p o r t
A S P. N E T t a k e s a d v a n t a g e o f p e r f o r m a n c e e n h a n c e m e n t s f o u n d i n
t h e . N E T F r a m e w o r k a n d c o m m o n l a n g u a g e r u n t i m e . A d d i t i o n a l l y,
it has been designed to offer significant performance
i m p r o v e m e n t s o v e r A S P a n d o t h e r We b d e v e l o p m e n t p l a t f o r m s .
A l l A S P. N E T c o d e i s c o m p i l e d , r a t h e r t h a n i n t e r p r e t e d , w h i c h
allows early binding, strong typing, and just-in-time (JIT)
compilation to native code, to name only a few of its benefits.
A S P. N E T i s a l s o e a s i l y f a c t o r a b l e , m e a n i n g t h a t d e v e l o p e r s c a n
remove modules (a session module, for instance) that are not
r e l e v a n t t o t h e a p p l i c a t i o n t h e y a r e d e v e l o p i n g . A S P. N E T a l s o
provides extensive caching services (both built-in services and
c a c h i n g A P I s ) . A S P. N E T a l s o s h i p s w i t h p e r f o r m a n c e c o u n t e r s
that developers and system administrators can monitor to test
n e w a p p l i c a t i o n s a n d g a t h e r m e t r i c s o n e x i s t i n g a p p l i c a t i o n s . Fo r
m o r e i n f o r m a t i o n , s e e A S P. N E T C a c h i n g Fe a t u r e s a n d A S P. N E T
Optimization
W r i t i n g c u s t o m d e b u g s t a t e m e n t s t o y o u r We b p a g e c a n h e l p
i m m e n s e l y i n t r o u b l e s h o o t i n g y o u r a p p l i c a t i o n ' s c o d e . H o w e v e r,
it can cause embarrassment if it is not removed. The problem is
that removing the debug statements from your pages when your
application is ready to be ported to a production server can
require significant effort. A S P. N E T offers the Tr a c e Context
class, which allows you to write custom debug statements to
your pages as you develop them. They appear only when you
have enabled tracing for a page or entire application. Enabling
t r a c i n g a l s o a p p e n d s d e t a i l s a b o u t a r e q u e s t t o t h e p a g e , o r, i f
y o u s o s p e c i f y, t o a c u s t o m t r a c e v i e w e r t h a t i s s t o r e d i n t h e
r o o t d i r e c t o r y o f y o u r a p p l i c a t i o n . Fo r m o r e i n f o r m a t i o n , s e e
A S P. N E T Tr a c e
T h e . N E T F r a m e w o r k a n d A S P. N E T p r o v i d e d e f a u l t a u t h o r i z a t i o n
a n d a u t h e n t i c a t i o n s c h e m e s f o r We b a p p l i c a t i o n s . Yo u c a n e a s i l y
remove, add to, or replace these schemes, depending upon the
n e e d s o f y o u r a p p l i c a t i o n . Fo r m o r e i n f o r m a t i o n , s e e A S P. N E T
We b A p p l i c a t i o n S e c u r i t y
A S P. N E T c o n f i g u r a t i o n s e t t i n g s a r e s t o r e d i n X M L- b a s e d f i l e s ,
which are human readable and writable. Each of your
applications can have a distinct configuration file and you can
e x t e n d t h e c o n f i g u r a t i o n s c h e m e t o s u i t y o u r r e q u i r e m e n t s . Fo r
m o r e i n f o r m a t i o n , s e e A S P. N E T C o n f i g u r a t i o n
Building Applications
I n t r o d u c e s W i n d o w s Fo r m s , t h e n e w o b j e c t - o r i e n t e d f r a m e w o r k
for developing Windows-based applications.
Deploying Applications
Shows how to use the .NET Framework and the common
language runtime to create self-described, self-contained
applications.
Configuring Applications
Enabling Profiling
W h e n y o u c r e a t e We b Fo r m s p a g e s , y o u c a n u s e t h e s e t y p e s o f
controls:
The object model for HTML server controls maps closely to that
o f t h e c o r r e s p o n d i n g e l e m e n t s . Fo r e x a m p l e , H T M L a t t r i b u t e s a r e
exposed in HTML server controls as properties.
A set of events for which you can write event handlers in much
the same way you would in a client-based form, except that the
event is handled in server code.
S u p p o r t f o r H T M L 4 . 0 s t y l e s i f t h e We b Fo r m s p a g e i s d i s p l a y e d
i n a b r o w s e r t h a t s u p p o r t s c a s c a d i n g s t y l e s h e e t s . Pa s s - t h r o u g h
o f c u s t o m a t t r i b u t e s . Yo u c a n a d d a n y a t t r i b u t e s y o u n e e d t o a n
HTML server control and the page framework will read them and
r e n d e r t h e m w i t h o u t a n y c h a n g e i n f u n c t i o n a l i t y. T h i s a l l o w s y o u
t o a d d b r o w s e r - s p e c i f i c a t t r i b u t e s t o y o u r c o n t r o l s . Fo r d e t a i l s
about how to convert an HTML element to an HTML server
c o n t r o l , s e e A d d i n g H T M L S e r v e r C o n t r o l s t o a We b Fo r m s Pa g e
We b s e r v e r c o n t r o l s a r e a s e c o n d s e t o f c o n t r o l s d e s i g n e d w i t h a
different emphasis. They do not map one-to-one to HTML server
controls. Instead, they are defined as abstract controls in which
the actual HTML rendered by the control can be quite different
from the model that you program against. Fo r example, a
R a d i o B u t t o n L i s t We b s e r v e r c o n t r o l m i g h t b e r e n d e r e d i n a t a b l e
or as inline text with other HTML.
We b s e r v e r c o n t r o l s i n c l u d e t r a d i t i o n a l f o r m c o n t r o l s s u c h a s
buttons and text boxes as well as complex controls such as
tables. They also include controls that provide commonly used
form functionality such as displaying data in a grid, choosing
dates, and so on.
We b s e r v e r c o n t r o l s o f f e r a l l o f t h e f e a t u r e s d e s c r i b e d a b o v e f o r
HTML server controls (except one-to-one mapping to HTML
elements) and these additional features:
Fo r s o m e c o n t r o l s , t h e a b i l i t y t o s p e c i f y w h e t h e r a c o n t r o l ' s
event causes immediate posting to the server or is instead
cached and raised when the form is submitted.
A t d e s i g n t i m e i n H T M L v i e w, t h e c o n t r o l s a p p e a r i n y o u r p a g e i n
a format such as:
In this the structural and behavioral aspects of the environment in which the
system is to be implemented are represented.
Databases used
Login
information
Bank
&branches
registration
Customers
registration
Bank Accounts &
Administrators types
registration
Service type
registration
Transaction
type
registration
Employees
registration
Account holders or customers: There are the actors who statistically work
upon the system with respect to the expected services what they need to
avail. They are mostly restricted on to such areas where query
standardization has the highest priority.
Login
information
View
customer
information
View account
types
Account
Holder Register for
new password
View service
types
Execute fund
transfer
Request
cheque book
Elaborated Diagrams: Bank Administrators
password
Store
Enter the Validate Display
Request for specific type
service types
Validate balance
Request for Raise check book Store
cheque book request-ID
Execut
e
Class Collaboration
Bank branches and service collaboration
Customer master
Customer account master
Cust-acc-no:number Customer-ID:Number
Cust-ID:number Customer-name:varchar2
Account-branch-ID:Number Customer-address:varchar2
Cust-acc-typ-ID:number Customer-phone:number
Acc-approved-emp-id:number Customer-email:varchar2
Acc-opening-date:date Other-details:varchar2
Opening-balance:number Insert ()
Current-balance:number Delete ()
Acc-status-id:number Update ()
Acc-nominee-name:varchar2 Search ()
Nominee-rel-with-acc-
holder:varchar2
Nominee-address:varchar2 Account type master
Any-other-details:varchar2 Acc-typ-ID:Number
Insert () Account -name:varchar2
Delete () Account-abbr: varchar2
Update () Account-min-bal: number
Search () Account-max-bal: number
Validate-branch-ID () Other-details:varchar2
Validate-acc-typ-id() Insert ()
Validate-app-emp-id() Delete ()
Validate-acc-status-id() Update ()
Validate-cust-ID() Search ()
Login
Login Login master
screen master
Login
Accept
log name
Enable the
Validate system
Accept with
password () Validate privileged
access
Fund Customer
transfer account
screen master
Request
for fund
transfer Accept
data ()
Validate acc
number () Store the
information
Cheque book request sequence
Customer
Chequebook account Cheque book
request screen master request master
Request
for
Chequeb
ook Validate
acc-no ()
Generate
Cheque
book-req-ID Store the
() information
Database Tables
1. Banks Master: This table maintains the records of all the banks that
have been integrated onto this system. Each bank is uniquely
identified, with the operational incharge designation.
4. Account type master: This database contains the records of all the
different types of accounts that are managed by the bank. It
specifies the general rules with which the account balances should
be maintained for each specific account type.
14.Funds Transfer master: This database helps the user to execute his
fund transfer transaction. The database stores the information of
the source account and the jar set account upon which the transfer
has been executed.
Psychology of Testing
The aim of testing is often to demonstrate that a program works by showing
that it has no errors. The basic purpose of testing phase is to detect the
errors that may be present in the program. Hence one should not start
testing with the intent of showing that a program works, but the intent
should be to show that a program doesn’t work. Testing is the process of
executing a program with the intent of finding errors.
Testing Objectives
The main objective of testing is to uncover a host of errors, systematically
and with minimum effort and time. Stating formally, we can say,
finding an error.
error.
error, if it exists.
standards.
Levels of Testing
In order to uncover the errors present in different phases we have the
below…
Acceptance
Testing
Client Needs
System Testing
Requirements
Unit Testing
Code
System Testing
The philosophy behind testing is to find errors. Test cases are devised with
this in mind. A strategy employed for system testing is code testing.
Code Testing:
This strategy examines the logic of the program. To follow this method we
developed some test data that resulted in executing every instruction in the
program and module i.e. every path is tested. Systems are not designed as
entire nor are they tested as single systems. To ensure that the coding is
perfect two types of testing is performed or for that matter is performed or
that matter is performed or for that matter is performed on all systems.
Types Of Testing
Unit Testing
Link Testing
Unit Testing
Unit testing focuses verification effort on the smallest unit of software i.e. the
module. Using the detailed design and the process specifications testing is
done to uncover errors within the boundary of the module. All modules must
be successful in the unit test before the start of the integration testing
begins.
In this project each service can be thought of a module. There are so many
modules like Login, HWAdmin, MasterAdmin, Normal User, and PManager.
Giving different sets of inputs has tested each module. When developing the
module as well as finishing the development so that each module works
without any error. The inputs are validated when accepting from the user.
Link Testing
Link testing does not test software but rather the integration of each module
in system. The primary concern is the compatibility of each module. The
Programmer tests where modules are designed with different parameters,
length, type etc.
Integration Testing
After the unit testing we have to perform integration testing. The goal here is
to see if modules can be integrated proprerly, the emphasis being on testing
interfaces between modules. This testing activity can be considered as
testing the design and hence the emphasis on testing module interactions.
In this project integrating all the modules forms the main system. When
integrating all the modules I have checked whether the integration effects
working of any of the services by giving different combinations of inputs with
which the two services run perfectly before Integration.
System Testing
Here the entire software system is tested. The reference document for this
process is the requirements document, and the goal os to see if software
meets its requirements.
Here entire ‘ATM’ has been tested against requirements of project and it is
checked whether all requirements of project have been satisfied or not.
Acceptance Testing
Acceptance Test is performed with realistic data of the client to demonstrate
that the software is working satisfactorily. Testing here is focused on
external behavior of the system; the internal logic of program is not
emphasized.
executed at least once. The white box testing is also called Glass Box Testing.
I have generated a list of test cases, sample data. which is used to check
all possible combinations of execution paths through the code at every
module level.
• Using core java and components like JSP and EJB needs
proper deployment as per general specifications
developed the front end as it.
Chapter
9
Conclusions &
Recommendations
Conclusions And Recommendations
The entire project has been developed and deployed as per the requirements
stated by the user, it is found to be bug free as per the testing standards that
the coming versions, which are planned to be developed in near future. The
system at present does not take care off the money payment methods, as
initiated in the first face, the application of the credit card transactions is
SQL Server