Atm Software
Atm Software
Atm Software
ACKNOWLEDGEMENT
SYNOPSIS
1. INTRODUCTION
1.1 PROJECT PROFILE
1.2 SYSTEM ENVIRONMENT
2 SYSTEM ANALYSIS
2.1 SYSTEM STUDY
2.2 FEASIBILITY STUDY
3 SOFTWARE REQUIREMENTS SPECIFICATION
3.1 USER CHARACTERISTICS
3.2 REQUIREMENT SPECIFICATION
3.3 FUNCTIONAL REQUIREMENTS
3.4 NON-FUNCTIONAL REQUIREMENTS
4 SOFTWARE QUALITY ASSURANCE PLAN
4.1 PURPOSE
4.2 SCOPE
4.3 OVERVIEW OF THE DOCUMENT
4.4 TASKS AND RESPONSIBILITIES
4.5 SQA IMPLEMENTATION IN DIFFERENT PHASES
4.6 DOCUMENTATION
4.7 SOFTWARE DOCUMENTATION AUDIT
4.8 REQUIREMENTS TRACEABILITY
4.9 SOFTWARE DEVELOPMENT PROCESS
Page | 1
4.10 PROJECT REVIEW
4.11 TESTING AND QUALITY CHECK
5 SYSTEM DESIGN
5.1 ARCHITECTURAL DESIGN
5.2 PROCESS DESIGN
5.3 ER-DIAGRAMS
6 DATA DESIGN
6.1 DATA FLOW DIAGRAMS
6.2 DATABASE DESIGN
7 SYSTEM TESTING
7.1 INTRODUCTION
7.2 LEVELS OF TESTING AND TEST CASES
7.3 VALIDATION CHECKS
8 SYSTEM IMPLEMENTATION
9 SYSTEM MAINTENANCE
10 CONCLUSION
11 SREEC SHOTS
BIBILIOGRAPHY
Page | 2
ACKNOWLEDGEMENT
I wish to express my heartfelt gratitude to my family, who has always been the
singular source of inspiration in all my ventures I have undertaken. Also I thank all my
friends for their help and suggestions.
Above all I thank the Almighty for His blessings and providing mercies at all
stages of my work.
Page | 3
HEMANT KUMAR
SYNOPSIS
Page | 4
INTRODUCTION
1.1 PROJECT PROFILE
The ATM will service one customer at a time. A customer will be required to insert an
ATM card and enter a personal identification number (PIN) - both of which will be sent
to the bank for validation as part of each transaction. The customer will then be able to
perform one or more transactions. The card will be retained in the machine until the
customer indicates that he/she desires no further transactions, at which point it will be
returned - except as noted below.
A customer must be able to make a deposit to any account linked to the card, consisting
of cash and/or checks in an envelope. The customer will enter the amount of the deposit
into the ATM, subject to manual verification when the envelope is removed from the
machine by an operator. Approval must be obtained from the bank before physically
accepting the envelope.
A customer must be able to make a transfer of money between any two accounts linked
to the card.
A customer must be able to make a balance inquiry of any account linked to the card.
A customer must be able to abort a transaction in progress by pressing the Cancel key
instead of responding to a request from the machine.
The ATM will communicate each transaction to the bank and obtain verification that it
was allowed by the bank. Ordinarily, a transaction will be considered complete by the
bank once it has been approved. In the case of a deposit, a second message will be sent
to the bank indicating that the customer has deposited the envelope.
If the bank determines that the customer's PIN is invalid, the customer will be required
to re-enter the PIN before a transaction can proceed. If the customer is unable to
Page | 5
successfully enter the PIN after three tries, the card will be permanently retained by the
machine, and the customer will have to contact the bank to get it back.
If a transaction fails for any reason other than an invalid PIN, the ATM will display an
explanation of the problem, and will then ask the customer whether he/she wants to do
another transaction.
The ATM will provide the customer with a printed receipt for each successful
transaction, showing the date, time, type of transaction, account(s), amount, and
ending and available balance(s) of the affected account ("to" account for transfers).
The ATM will have a key-operated switch that will allow an operator to start and stop
the servicing of customers. The machine can only be turned off by operator. When the
switch is moved to the "off" position, the machine will shut down..
The ATM will also maintain an internal log of transactions to facilitate resolving
ambiguities arising from a hardware failure in the middle of a transaction. Entries will
be made in the log when the ATM is started up and shut down, for each message sent to
the Bank (along with the response back, if one is expected), for the dispensing of cash,
and for the receiving of cash. Log entries may contain card numbers and Customer
identification number.
All risks associated with physical certificates such as delays, loss, theft,
bad deliveries, etc. eliminated. And also calculation delay is reduced. So the overall
objective of the system is to develop user-friendly, secure, consistent and flexible
software so that the effort required to prepare the cashbook can be reduced.
Page | 6
1.2 SYSTEM ENVIRONMENT
HARDWARE REQUIREMENTS
SOFTWARE REQUIREMENTS
DEVELOPMENT TOOLS
Page | 7
Other software : Internet Explorer, Dream Weaver
THEORITICAL FRAMEWORK
The all-new Help and Support Center in Windows XP is our one-stop shop for:
Troubleshooting advice.
Page | 8
HISTORY OF JAVA
Overview of Java
Java is loosely based on C++ syntax, and is meant to be Object-Oriented
Structure of java is midway between an interpreted and a compiled language.
The java compiler into Byte Codes, which are secure and portable across
different platforms, compiles Java programs. These byte codes are essentially
instructions encapsulated in single type, to what is known as a java virtual
machine (JVM), which resides in standard browser.
JVM verifies these byte codes when downloaded by the browser for integrity.
JVM available for almost all OS. JVM converts these byte codes into machine
specific instructions at runtime.
FEATURES OF JAVA
Java is object-oriented language and supports encapsulation,
inheritance, polymorphism and dynamic binding, but does not support
multiple inheritances. Everything in java is an object except some
primitive data types.
Java is portable architecture neutral that is java programs once compiled
can be executed on any machine that is enabled.
Java is distributed in its approach and used for Internet programming.
Page | 9
Java is robust, secured, high performing and dynamic in nature.
Java supports multithreading. There for different parts of the program
can be executed at the same time.
About JSP
Overview of JSP
The JSP technology will be used to interface HTML with Java. The JSP
technology provides a seamless connection with Java and presents an easy to
use, Java-like programming constructs that can be scripted within HTML files.
Java Server Pages is a technology for developing web pages that include
dynamic content. A JSP page contains standard markup language elements,
such as HTML tags, just like a regular web page. A JSP page also contains
special JSP elements that allow the server to insert dynamic content in the web
page.
ADVANTAGES OF JSP
JSP supports both scripting and element-based dynamic content.
JSP pages can be used in combination with servlets that handle the
business logic.
High Security.
Page | 10
JSP is vender Neutral.
Page | 11
applications. Despite the name, JavaScript is unrelated to the Java programming
language; though both
Page | 12
compose the page to specify all the elements that appear on the page-the text,
graphics, horizontal rule, heading division and so on. In addition we use HTML to
tell a computer what color to use where and to indicate the relative size and font of
text.
.
OTHER SOFTWARES
DREAMWEAVER
Dreamweaver is used because it provides a high quality design with ease of designing.
BROWSERS
INTERNET EXPLORER
Page | 13
Components
Tomcat version 4.x was released with Jasper (a redesigned JSP engine), Catalina (a
redesigned servlet container) and Coyote (an HTTP connector).
Catalina
Catalina is Tomcat's servlet container. Catalina implements Sun Microsystems'
specifications for servlet and JavaServer Pages (JSP). The architect for Catalina was
Craig McClanahan.
MYSQL
Primary subsystems
The Query Engine
Page | 14
The Storage Manager
The Buffer Manager
The Transaction Manager
The Recovery Manager
In addition to five primary subsystems, the MySql architecture
contains the following two support components.
The Process Manager
Function Libraries
Security
The process of accessing a MySql database can be broken down
into two tasks: connecting to the MySql server itself, and accessing individual
objects, such as tables or columns, in a database. MySql has built-in security to
verify user credentials at both stages.
WAMP SERVER
Page | 15
WAMP is a form of mini-server that can run on almost any
Windows Operating System. WAMP includes Apache 2, PHP 5 (SMTP ports are
disabled), and MySQL (phpMyAdmin and SQLitemanager are installed to manage
your databases) preinstalled.
An icon on the taskbar tray displays the status of WAMP, letting you know if;
WAMP is running but no services are opened (the icon will appear red).
WAMP is running and one service is opened (the icon will appear
yellow).
WAMP is running with all services opened (the icon will appear white).
The files/web pages that are hosted on your WAMP server can
be accessed by typing http://localhost/ or http://127.0.0.1/ in the address bar of
your web browser. WAMP must be running in order to access either of the above
addresses.
Page | 16
SYSTEM ANALYSIS
2. SYSTEM ANALYSIS
PROBLEM STATEMENT
Develop secure, consistent and flexible software which can used for
Customer transaction
PROPOSED SYSTEM
The Proposed system should satisfy all the features of the existing
system, barring the some disadvantages . The Proposed system
Page | 17
Allows faster workflow since everything is automated.
Each Card number has a unique number which helps the transactions to
be more secure.
The administrator have update limited authority
Technical Feasibility. Technical feasibility refers to the ability of the process to take
advantage of the current state of the technology in pursuing further improvement. The
technical capability of the personnel as well as the capability of the available
technology should be considered. Technology transfer between geographical areas and
cultures needs to be analyzed to understand productivity loss (or gain) due to
differences (see Cultural Feasibility). Since we are using Java 6, Tomcat 5.5 and so
on so technically our project is feasible.
Economic Feasibility. This involves the feasibility of the proposed project to generate
economic benefits. A benefit-cost analysis and a breakeven analysis are important
aspects of evaluating the economic feasibility of new industrial projects. The tangible
and intangible aspects of a project should be translated into economic terms to facilitate
a consistent basis for evaluation.
Page | 18
financing can be a major obstacle in large multi-party projects because of the level of
capital required. Loan availability, credit worthiness, equity, and loan schedule are
important aspects of financial feasibility analysis.
Cultural Feasibility. Cultural feasibility deals with the compatibility of the proposed
project with the cultural setup of the project environment. In labor-intensive projects,
planned functions must be integrated with the local cultural practices and beliefs. For
example, religious beliefs may influence what an individual is willing to do or not do.
In general terms, the elements of a feasibility analysis for a project should cover the
following:
Need Analysis. This indicates recognition of a need for the project. The need
may affect the organization itself, another organization, the public, or the
government. A preliminary study is then conducted to confirm and evaluate the
need. A proposal of how the need may be satisfied is then made. Pertinent
questions that should be asked include:
Process Work. This is the preliminary analysis done to determine what will be
required to satisfy the need. The work may be performed by a consultant who
is an expert in the project field. The preliminary study often involves system
Page | 19
models or prototypes. For technology-oriented projects, artist's conception and
scaled-down models may be used for illustrating the general characteristics of a
process. A simulation of the proposed system can be carried out to predict the
outcome before the actual project starts.
Financial Analysis. This involves an analysis of the cash flow profile of the
project. The analysis should consider rates of return, inflation, sources of
capital, payback periods, breakeven point, residual values, and sensitivity. This
is a critical analysis since it determines whether or not and when funds will be
available to the project. The project cash flow profile helps to support the
economic and financial feasibility of the project.
Page | 20
SOFTWARE REQUIREMENTS
SPECIFICATION
The customer are the user of this product who have the right to
access this software. This ability is given through card no and Pin no. These users
are sure to be literate with the computers.
Page | 21
Requirement definition is the most crucial part of the project.
Incorrect, inaccurate, or excessive definition of requirements must necessarily
result in schedule delays, wasted resources, or customer dissatisfaction.
FUNCTIONAL REQUIREMENT
NON FUNCTIONAL REQUIREMENT
Page | 22
Functional requirement describes the relationship between the input and
the output of the system. The functional requirements of the project are given
below.
OPERATOR
The ‘OPERATOR module consists of the following functions.
This is for switching off ATM machine. The system will show
appropriate message in reply.
Page | 23
CUSTOMER
WITHDRAWL
This is to supply the money to customer for customer transaction. It is a regular
process .For this operator needs amout to which he want to withdraw after the
verification of Card no,Customer _Id and PIN NO.System will show appropriate
messege after /failure transaction.
DEPOSIT
This is to deposit the money to bank.. It is a regular process .For this
customer have to enter the amout to which he want to deposit after the verification of
Card no,Customer _Id and PIN NO.System will show appropriate messege after /failure
transaction
MONEY TRANSFER
This is to transfer the money from one account to another account.. It is a
regular process .For this customer have to enter the bank_id,branch_id ,account_no and
amount for transfering account.System will show appropriate messege after /failure
transaction
PIN NUMBER CHANGE
This is to change the pin number of corresponding account. .For this
customer have to enter the old PIN NO,new PIN NO,and CONFIRM PIN NO.
System will show appropriate messege after /failure transaction
MINI STATEMENT
This is to show the transaction currenty occured.For this customer
have to enter the PIN NO.System will show appropriate messege after /failure
transaction
BALANCE ENQUIRY
This is to show the current balance of account.For this customer
have to enter the PIN NO.System will show appropriate messege after /failure
Page | 24
NON-FUNCTIONAL REQUIREMENTS
Security
Reliability
Maintainability
Portability
Extensibility
Reusability
Application Affinity/Compatibility
Resource Utilization
Page | 25
Non-Functional Requirements
Page | 26
SOFTWARE QUALITY ASSURANCE
PLAN
Page | 27
4.1 PURPOSE
4.2 SCOPE
The scope of this document is to outline all procedures,
techniques and tools to be used for quality assurance of this project.
This plan:
Identifies the SQA responsibilities of the project developer and the SQA
consultant
Lists the activities, processes, and work products that the SQA
consultant will review and audit
Identifies the SQA work products
.
Page | 28
SQAP Requirements: This section defines the SQA review, reporting, and auditing
procedures used to ensure that software deliverables are developed in accordance
with this plan and the project’s requirements.
4.3.1 Management
4.3.2 Organization
Develop the requirement specification and cost estimation for the project
Develop the design plan and test plan for testing the tool
Implement and test the application and deliver the application along
with the necessary documentation
Page | 29
Planning, coordinating, testing and assessing all aspects of quality
issues.
Requirements phase: When the SRS is being developed, it has to be ensured that it
elucidates the proposed functionality of the product and to keep refining the SRS
until the requirements are clearly stated and understood.
Specification and Design phase: Due to the great importance for accuracy and
completeness in these documents, weekly reviews shall be conducted between the
developer and the client to identify any defects and rectify them.
Implementation phase: The developer shall do code reviews when the construction
phase of the Tool begins.
Page | 30
Software testing phase: The developer shall test each case. The final product shall
be verified with the functionality of the software as specified in the Software
Requirements Specification (SRS) for the Tool.
4.6 DOCUMENTATION
Software Test Plan: Describes the test cases that will be employed to test the
product.
Page | 31
4.7 SOFTWARE DOCUMENTATION AUDIT
The SRS will be used to check off the deliverables. The Project
Review will ensure that each of the requirements mentioned in the SRS is met by
the deliverables.
Page | 32
incorporate modifications suggested by the committee. This would ensure quality
of the software product.
Page | 33
SYSTEM DESIGN
Page | 34
1. SYSTEM DESIGN
Page | 35
indentifying the interfaces and interconnections among the functions and sub
functions, identifying the data used and passed among the functions and finally
identifying where data is stored.
Presentation Layer: All the PHP and HTML pages are designed in this tier.
Business Layer: All the business logic and service code are written here.
DAO Layer: All the database connections and resultset related codes are written here.
V-MODEL OF DEVELOPMENT
Page | 36
OBJECTIVE
Page | 37
- The standardized procedure makes the cost calculation more transparent. Any risks
in connection with the costs can be recognized better.
- Uniform standards reduce friction losses between customer and contractor as well
as between main contractor and subcontractor.
- Standardized procedures allow for the reduction in the use of resources.
- The user, the purchaser, and the developer will be supported when formulating
their requirements/when describing their parts or results.
- The interim results/final results are standardized to such an extent that other parties
involved or staff of other companies are able to settle in without very much effort,
if necessary.
Page | 38
Entity Relationship Diagrams (ERDs) illustrate the logical
structure of databases.
ENTITY
An entity is an object or concept about which you want to store information.
WEAK ENTITY
A weak entity is an entity that must defined by a foreign key relationship
with another entity as it cannot be uniquely identified by its own attributes alone.
KEY ATTRIBUTE
MULTIVALUED ATTRIBUTE
A multivalued attribute can have more than one value. For example, an
employee entity can have multiple skill values.
Page | 39
DERIVED ATTRIBUTE
RELATIONSHIPS
Relationship
Page | 40
ER- DIAGRAM
City
Edraw TrialEdraw
Version
Trial
Edraw
Version
Trial Version customer_id
name
customer
Line 2
depositer
card_no balance
zero_r
zero_n account_info
zero_x
zero_v
bankId branch_id
transaction bank
tran_mode branch_id
branch_name
address
atm_id
bank_id
atm city
place
branch assets
password place
assets
operator_id
card_id date
operator
password block
Page | 41
DATA DESIGN
6.1 DATA FLOW DIAGRAM
Page | 42
Square representing external entities, which are sources
or destinations of data.
PROCESS
The process shape represents a task that handles data within the
application. The task may process the data or perform an action based on the data.
MULTIPLE PROCESS
EXTERNAL ENTITY
The external entity shape is used to represent any entity outside the
application that interacts with the application via an entry point.
DATA FLOW
The data flow shape represents data movement within the application. The
direction of the data movement is represented by the arrow.
DATA STORE
Page | 43
The data store shape is used to represent locations where data is stored.
Data stores do not modify the data, they only store data.
PRIVILEGE BOUNDARY
RESULT
Page | 44
LEVEL 1 :- ATM
ACCOUNT
DEPOSIT ACCOUNT
BRANCH
ATM
MONEY TRANSFER
ATM
BRANCH
LOGIN
ACCOUNT
CUSTOMER
MINI STATEMENT
ACCOUNT
LOGIN
BALANCE ENQUIRY
Page | 45
ACCOUNT
Page | 46
NORMALIZATION
The database is in First Normal Form as all the fields of all tables are atomic.
There is no multivalued field in any table.
The database is in Second Normal Form as it satisfies the constraint of full
functional dependency. All the fields of all tables are fully functional dependent on
the primary key.
OPERATOR
PASSWORD VARCHAR(20) NO
BANK
Page | 47
FIELD NAME TYPE NULL KEY
BANK_ID VARCHAR(10) NO PRIMARY
BANK_NAME VARCHAR(20) NO
BRANCH
ACCOUNT
Page | 48
CUSTOMER
DEPOSITER
FIELD NAME TYPE NULL KEY
ACCOUNT_ID VARCHAR(30) NO FOREIGN
ATM
Page | 49
PLACE VARCHAR(30) NO
STATUS VARCHAR(10) NO
PASSWORD VARCHAR(10) NO
CUSTOMER_SECRET
ZERO_N BIGINT NO
ZERO_X BIGINT NO
ZERO_V BIGINT NO
ZERO_R BIGINT NO
SECRET
RSA_PUB BIGINT
Page | 50
RSA_SECRET BIGINT
RSA_EXP INT
TRANSACTION
BLOCK_ID
Page | 51
SYSTEM TESTING
7. SYSTEM TESTING
Testing is the penultimate step of software development. An
elaborate testing of the data is prepared and the system is using the test data.
While doing testing, errors are noted and correction is made. The users are
trained to operate the developed system. Both hardware and software securities
are made to run the developed system successfully.
At the very first stage of testing, the goals and objectives are set.
This simplifies the limits or borders of testing process. Before testing, the tester
should plan what kind of data he is giving for test. Give data inputs as functional,
boundary, stress, performance, usability values etc.
Page | 52
Characteristics of a Good Test:
Psychology of Testing
TESTING OBJECTIVES
A good test case is one that has a high probability of finding error, if it
exists.
The software more or less confirms to the quality and reliable standards
Page | 53
Testing is usually relying on to detect the faults on each phase, in
addition to the faults introduced during the coding phase itself. Due to this,
different levels of testing are used in the testing process, each level of testing aims
to test different aspect of a system.
Client Acceptance
Design
Integration Testing
Page | 54
WHITE BOX TESTING
I tested step wise every piece of code, taking care that every
statement in the code is executed at least once. The white box testing is also called
Glass Box Testing.
Interface errors.
Performance errors
Page | 55
All the forms have been executed and verified. Based on some
sample input data, the generated output is verified whether the system is providing
better results or not.
Table given below outlines the tests that were performed on the
system to ensure correctness and unearth errors, which were subsequently
debugged.
Page | 56
Testing Phase Objectives
UNIT TESTING
Page | 57
Test Case Description
This test case deals with the entering of basic details related with the logged in
administrator. This process takes many inputs. The test case should check for proper
inputs and verify whether the function for validating the inputs is called properly or
not.
Inputs
Details Related with the logged in administrator in a Standard Format.
Expected Outputs
Alert window for erroneous inputs.
Confirmation of Successful Completion of basic details entry process.
An alert window was shown whenever the user gave some erroneous data.
MODULE TESTING
INTEGRATION TESTING
Page | 58
components as they are added to the system. Developing a component as they are
added to the system, developing an implementation and integration schedules that
will make the modules available when needed, and designing test cases that will
demonstrate the viability of the evolving system. Though each program works
individually they should work after linking them together. This is also referred to
as interfacing. Data may be lost across interface and one module can have adverse
effect on another. Subroutines after linking may not do the desired function
expected by the main routine. Integration testing is a systematic technique for
constructing program structure while at the same time conducting tests to uncover
errors associated with the interface. In the testing, the programs are constructed and
tested in small segments.
VALIDATION TESTING
This provides the final assurance that the software meets all the
functional, behavioral and performance requirements. The software is completely
assembled as a package. Validation succeeds when the software functions in a
manner in which user wishes. Validation refers to the process of using software in
live environment in order to find errors. During the course of validation the system
failure may occur and sometime the coding has to be hanged according to the
requirement. Thus the feedback from the validation phase generally produces
changes in the software.
Once the application was made of all logical and interface errors,
inputting dummy data ensure that the software developed satisfied all the
requirements of the user. The dummy data is known as test cases.
OUTPUT TESTING
Page | 59
produce the required output in the specific format. Asking the users about the
format of output they required, tests the output generated in two ways. One is on
screen and another is printed format.
ACCEPTANCE TESTING
Acceptance test refers to the acceptance of data into the system for
processing. The acceptance test contributes to the consistency and smooth working
Page | 60
of the system. The system under consideration is tested for users at a time for
developing and making changes whenever required. This is done with regard to the
following points :
Screen design
Output screen design
On-line message to guide the user
SYSTEM TESTING
Page | 61
7.2 TEST CASES
A specific set of steps and data along with expected results for a
particular test objective. A test case should only test one limited subset of a feature or
functionality.
OFF/ON STATE
PIN NUMBER
Page | 62
1. Writing correct PIN Make sure ‘main Pass ‘Head of
number in PIN page should be Account’ Page
number field and appear appears
click “submit”
WITHDRAWL
Page | 63
The amount field “cant allow more
greater than 50000 in than 50000 in one
One day days”
DEPOSIT
MONEY TRANSFER
PINMUMBER CHANGE
1. Click on Make sure ‘PIN Pass ‘PIN NUMBER
“PIN number change” NUMBER CHANGE’ CHANGE’ Page
Page should appear appears
Page | 64
2. Click on Make sure ‘PIN Pass PIN number
“submit” after filling number will be change will be
The old PIN no, new successful’ Page successful appear
PIN no and confirm should appear
PIN no
3. Click on Make sure error Pass Error is displayed
“submit” after filling should display as
Wrong old PIN “old PIN number is
number wrong”
4 Click on Make sure error Pass Error is displayed
“submit” after filling should display as
Wrong confirm PIN “confirm PIN
number number is wrong”
MINI STATEMENT
BALANCE ENQUIRY
Page | 65
Data type
Length
Constraints
Blank field
Format
Data type:
I have use Varchar type for character, int for numeric, Decimal for amount and
Date for date type. Character never inputted in numeric field as amount, no never
accept character if any person input wrongly.
Length:
When we define a max length, then it never accepts more data. For example, if I
define numeric length is 5, then it store either equal to length or less than length. If
user gives more character than required then it never accept.
Constraints:
In this I am defining range of data, if data is less than then display error with
message. For example, the field of date must be 8 characters.
Blank field:
Some fields need not to be blank. If the data needed field is blank then it display
message without halt.
Format:
The predefine format is used not change daily to daily. For example, format of date
DDMMYYYY is used in all date type field. If user inserts another format then it
never accepts.
SYSTEM IMPLEMENTATION
Page | 66
8. SYSTEM IMPLEMENTATION
It has been observed that even the best system cannot show good
results if the analysts managing th implementation do not attend every important
detail. This is the area where the system analysts need to work with utmost care.
User training
User Manual
Conversion
User Training
Page | 67
User capabilities
Nature of the proposed system
User Manual
The user manual helps to find out the answers of the queries like:-
Conversion
Parallel system
Page | 68
Direct conversion
Pilot system
Phase – in mind
Page | 69
SYSTEM MAINTENANCE
9. SYSTEM MAINTENANCE
Page | 70
perspective requires considerable skill and experience and is an important and
ongoing aspect of system development. Maintenance demands more orientation
and training than any other programming activities. The environment must
recognize the needs of the maintenance programmer for tools, methods and
training.
Page | 71
CONCLUSION
10. CONCLUSION
Page | 72
integrity, availability and privacy of information entrusted to the system was
successfully obtained. This system work best for the security of ATM money
transaction and other concurrency issue.By applying zero knowledge protocol no
body know what is customer PIN number even if administrator also.It provides
network level security by applying RSA public key algorithm & MD5/SHA
message digesting algorithm. so This will provide high level security.
Page | 73
SCREEN SHOTS
FIRST PAGE
Page | 74
CARD READING PAGE
Page | 75
ENTER PIN NUMBER PAGE
Page | 76
SELECTION PAGE FOR SAVINNGS/CURRENT
Page | 77
MAIN PAGE
Page | 78
WITHDRAWL PAGE
Page | 79
Page | 80
WITHDRAWL OUTPUT PAGE
DEPOSIT OUTPUTPAGE
Page | 81
Page | 82
MONEY TRANSFER PAGE
Page | 83
BALANCE ENQUIRY PAGE
Page | 84
Page | 85
PINCHANGE PAG
Page | 86
PIN CHANGE RTEPORT
Page | 87
MINI STATEMENT PAGE
Page | 88
ERROR PAGE
Page | 89
ERROR PAGE
Page | 90
Page | 91
CARD BLOCKING ERROR PAGE
Page | 92
BIBLIOGRAPHY
BIBILIOGRAPHY
E-study:
www.w3schools.com
www.wikipedia.com
Page | 93