SlideShare ist ein Scribd-Unternehmen logo
1 von 19
NETWORK BANKING
          $OFTWARE
‘Out of the box solution for the networked
                  Banks’



                                  Sunil Kumar Sharma
Contents
   EVOLUTION
   NETWORKS
   TCP/IP
   IP ADDRESS
   WHY JAVA ?
   JAVA AND NETWORKING
   SCOPE OF THE PROJECT
   FEATURES
   FUTURE ENHANCEMENTS
   CONCLUSION
EVOLUTION OF BANKING
 Banking started by the Templar
  Knights in the middle ages for the
  pilgrims to Jerusalem.
 Banking evolved from coinage to
  currency in the 20th century with the
  nationalization of Bank of England.
 Swiss Banks started the process of
  wire transfer of money between
  countries.
 Rising popularity of Banks induced
  new developments such as credit
  cards, ATM’s, mobile alerts etc…

 The latest phase in the evolution is
  the advent of Network Banking...
NETWORKS
 PEER TO PEER
      A peer to peer network is one in which lacks a dedicated
  server and every computer acts as both a client and a
  server.

 CLIENT/SERVER
  This type of network is designed to support a large number
  of users and uses dedicated server to accomplish this.
  Clients log on to the server in order to run applications or
  obtain files. Security and permissions can be managed by 1
  or more administrator.

 CENTRALIZED
  This is also a client/server based model in which the clients are
  "dumb terminals". This means that the client may not have a
  storage device and all applications and processing occur on the
  server. Security is very high on this type of network.
TCP/IP NETWORKS
 TCP and IP were developed by a
  Department of Defense (DOD) research
  project
 It was initially successful because it
  delivered a few basic services that
  everyone needs (file transfer, electronic
  mail, remote logon) across a very large
  number of client and server systems.
 Several computers in a small department
  can use TCP/IP (along with other protocols)
  on a single LAN.
IP Address
 An IP address is used for Network
  Layer identification of hosts and
  routers on a TCP/IP network. The
  address consists of a 32-bit binary
  number of 4 octets and is usually
  displayed in the decimal format
  100.100.100.100, which is called
  dotted decimal notation.
Why Client/Server ?

      The network chosen for this
application is Client/Server model
as it provides adequate security and
resources required for a critical
application like Banking.
WHY JAVA?
 Object Oriented.

 Simple and Architecturally Neutral

 Portable and Distributed.

 High Performance and Secure.

 Interpreted and Dynamic.

 Multithreaded and Robust.
Java and Networking
      Java uses three methodologies to
perform network operations.
 URL : Uniform Resource Locator is Associated with
  applets and programming for the world wide web.

 Datagram : An independent, self contained message
  sent over the network whose arrival, arrival time and
  data are not guaranteed.

 Sockets: One end point of a two way communication
  link between two ports on the network.
Scope of the Project

     This project aspires to be a
simulation of sorts for a Network
Bank in the near future. If coupled
with appropriate hardware this
system can be turned into an ATM
software.
Features


 Client-Server Model based on sockets and
  ports.
 Multithreaded Server having Microsoft
  Database.
 Intermediate Administrator for deposits.
 Client Side is platform Independent.
Server
   Account Creation, Deletion, Updation.
   View Account, Reports, Account Logs.
   Client Authentication.
   Client Monitoring.
   Centralised Data Processing.
   Creation of Account Logs.
Intermediate Administrator

 Privilege to Deposit.

 Can check Account Status.
Client

 Withdraw and Transfer Money.

 View Account, Account Logs.

 Change PIN, Passwords.
Additional Features
 Double Layered Security.

 Server can terminate a client port.

 Secure Login.

 Logs are stored to detect fraudulence.
Future Enhancements
   Loan Facility.
   Email and mobile alerts.
   Active Tracing of Fraudulent activities.
   Security upgrades like Visual Sensors
    with burglar alarms, Biometric
    Identification procedures etc.
CONCLUSION

      The aim of our project was to
explore new avenues in computing
Like the distributed systems along
with raditional concepts like OOPS
and networking.
THANK YOU

Weitere ähnliche Inhalte

Andere mochten auch (12)

Attitude is everything
Attitude is everythingAttitude is everything
Attitude is everything
 
Corporate Intranet Version 1.0
Corporate Intranet  Version 1.0Corporate Intranet  Version 1.0
Corporate Intranet Version 1.0
 
Fathom
FathomFathom
Fathom
 
Anger management
Anger managementAnger management
Anger management
 
Fathom
FathomFathom
Fathom
 
Piano power point
Piano power pointPiano power point
Piano power point
 
Online Test Engine
Online  Test EngineOnline  Test Engine
Online Test Engine
 
Haptics
HapticsHaptics
Haptics
 
ORACLE 9i
ORACLE 9iORACLE 9i
ORACLE 9i
 
Laminas Animales
Laminas AnimalesLaminas Animales
Laminas Animales
 
English irregular verbs with phonetic transcription
English irregular verbs with phonetic transcriptionEnglish irregular verbs with phonetic transcription
English irregular verbs with phonetic transcription
 
English Irregular Verbs With Phonetic Transcription
English  Irregular  Verbs With  Phonetic  TranscriptionEnglish  Irregular  Verbs With  Phonetic  Transcription
English Irregular Verbs With Phonetic Transcription
 

Ähnlich wie Netbank

Clientserver Presentation
Clientserver PresentationClientserver Presentation
Clientserver Presentation
Tuhin_Das
 
Www architecture,cgi, client server security, protection
Www architecture,cgi, client server security, protectionWww architecture,cgi, client server security, protection
Www architecture,cgi, client server security, protection
Austina Francis
 
D1-3-Signaling
D1-3-SignalingD1-3-Signaling
D1-3-Signaling
Oleg Levy
 
Combating Mobile Device Theft with Blockchain
Combating Mobile Device Theft with BlockchainCombating Mobile Device Theft with Blockchain
Combating Mobile Device Theft with Blockchain
Nagesh Caparthy
 
PPT ON WEB SECURITY BY MONODIP SINGHA ROY
PPT ON WEB SECURITY BY MONODIP SINGHA ROYPPT ON WEB SECURITY BY MONODIP SINGHA ROY
PPT ON WEB SECURITY BY MONODIP SINGHA ROY
Monodip Singha Roy
 

Ähnlich wie Netbank (20)

Clientserver Presentation
Clientserver PresentationClientserver Presentation
Clientserver Presentation
 
Socket programming
Socket programmingSocket programming
Socket programming
 
Www architecture,cgi, client server security, protection
Www architecture,cgi, client server security, protectionWww architecture,cgi, client server security, protection
Www architecture,cgi, client server security, protection
 
D1-3-Signaling
D1-3-SignalingD1-3-Signaling
D1-3-Signaling
 
04 Client Server Computing
04 Client Server Computing04 Client Server Computing
04 Client Server Computing
 
Socket Programming by Rajkumar Buyya
Socket Programming by Rajkumar BuyyaSocket Programming by Rajkumar Buyya
Socket Programming by Rajkumar Buyya
 
Taw opening session
Taw opening sessionTaw opening session
Taw opening session
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
Combating Mobile Device Theft with Blockchain
Combating Mobile Device Theft with BlockchainCombating Mobile Device Theft with Blockchain
Combating Mobile Device Theft with Blockchain
 
Open Standards Enabling Digital Transformation
Open Standards Enabling Digital TransformationOpen Standards Enabling Digital Transformation
Open Standards Enabling Digital Transformation
 
N - Tier Applications, Enterprise Java Beans, Component technologies
N - Tier Applications, Enterprise Java Beans, Component technologiesN - Tier Applications, Enterprise Java Beans, Component technologies
N - Tier Applications, Enterprise Java Beans, Component technologies
 
Essay On Ethernet
Essay On EthernetEssay On Ethernet
Essay On Ethernet
 
DESIGN OF A WIRELESS COMMUNICATION SOFTWARE BETWEEN MULTIPLE CLIENTS AND A SI...
DESIGN OF A WIRELESS COMMUNICATION SOFTWARE BETWEEN MULTIPLE CLIENTS AND A SI...DESIGN OF A WIRELESS COMMUNICATION SOFTWARE BETWEEN MULTIPLE CLIENTS AND A SI...
DESIGN OF A WIRELESS COMMUNICATION SOFTWARE BETWEEN MULTIPLE CLIENTS AND A SI...
 
Communications Technologies
Communications TechnologiesCommunications Technologies
Communications Technologies
 
Client server model Presentation 4pptx
Client server model  Presentation 4pptxClient server model  Presentation 4pptx
Client server model Presentation 4pptx
 
Java Networking
Java NetworkingJava Networking
Java Networking
 
SECURE SOCKET LAYER ( WEB SECURITY )
SECURE SOCKET LAYER ( WEB SECURITY )SECURE SOCKET LAYER ( WEB SECURITY )
SECURE SOCKET LAYER ( WEB SECURITY )
 
PPT ON WEB SECURITY BY MONODIP SINGHA ROY
PPT ON WEB SECURITY BY MONODIP SINGHA ROYPPT ON WEB SECURITY BY MONODIP SINGHA ROY
PPT ON WEB SECURITY BY MONODIP SINGHA ROY
 
Blockchain in Cloud computing.pptx
Blockchain in Cloud computing.pptxBlockchain in Cloud computing.pptx
Blockchain in Cloud computing.pptx
 
santosh_resume
santosh_resumesantosh_resume
santosh_resume
 

Netbank

  • 1. NETWORK BANKING $OFTWARE ‘Out of the box solution for the networked Banks’ Sunil Kumar Sharma
  • 2. Contents  EVOLUTION  NETWORKS  TCP/IP  IP ADDRESS  WHY JAVA ?  JAVA AND NETWORKING  SCOPE OF THE PROJECT  FEATURES  FUTURE ENHANCEMENTS  CONCLUSION
  • 3. EVOLUTION OF BANKING  Banking started by the Templar Knights in the middle ages for the pilgrims to Jerusalem.  Banking evolved from coinage to currency in the 20th century with the nationalization of Bank of England.  Swiss Banks started the process of wire transfer of money between countries.
  • 4.  Rising popularity of Banks induced new developments such as credit cards, ATM’s, mobile alerts etc…  The latest phase in the evolution is the advent of Network Banking...
  • 5. NETWORKS  PEER TO PEER A peer to peer network is one in which lacks a dedicated server and every computer acts as both a client and a server.  CLIENT/SERVER This type of network is designed to support a large number of users and uses dedicated server to accomplish this. Clients log on to the server in order to run applications or obtain files. Security and permissions can be managed by 1 or more administrator.  CENTRALIZED This is also a client/server based model in which the clients are "dumb terminals". This means that the client may not have a storage device and all applications and processing occur on the server. Security is very high on this type of network.
  • 6. TCP/IP NETWORKS  TCP and IP were developed by a Department of Defense (DOD) research project  It was initially successful because it delivered a few basic services that everyone needs (file transfer, electronic mail, remote logon) across a very large number of client and server systems.  Several computers in a small department can use TCP/IP (along with other protocols) on a single LAN.
  • 7. IP Address  An IP address is used for Network Layer identification of hosts and routers on a TCP/IP network. The address consists of a 32-bit binary number of 4 octets and is usually displayed in the decimal format 100.100.100.100, which is called dotted decimal notation.
  • 8. Why Client/Server ? The network chosen for this application is Client/Server model as it provides adequate security and resources required for a critical application like Banking.
  • 9. WHY JAVA?  Object Oriented.  Simple and Architecturally Neutral  Portable and Distributed.  High Performance and Secure.  Interpreted and Dynamic.  Multithreaded and Robust.
  • 10. Java and Networking Java uses three methodologies to perform network operations.  URL : Uniform Resource Locator is Associated with applets and programming for the world wide web.  Datagram : An independent, self contained message sent over the network whose arrival, arrival time and data are not guaranteed.  Sockets: One end point of a two way communication link between two ports on the network.
  • 11. Scope of the Project This project aspires to be a simulation of sorts for a Network Bank in the near future. If coupled with appropriate hardware this system can be turned into an ATM software.
  • 12. Features  Client-Server Model based on sockets and ports.  Multithreaded Server having Microsoft Database.  Intermediate Administrator for deposits.  Client Side is platform Independent.
  • 13. Server  Account Creation, Deletion, Updation.  View Account, Reports, Account Logs.  Client Authentication.  Client Monitoring.  Centralised Data Processing.  Creation of Account Logs.
  • 14. Intermediate Administrator  Privilege to Deposit.  Can check Account Status.
  • 15. Client  Withdraw and Transfer Money.  View Account, Account Logs.  Change PIN, Passwords.
  • 16. Additional Features  Double Layered Security.  Server can terminate a client port.  Secure Login.  Logs are stored to detect fraudulence.
  • 17. Future Enhancements  Loan Facility.  Email and mobile alerts.  Active Tracing of Fraudulent activities.  Security upgrades like Visual Sensors with burglar alarms, Biometric Identification procedures etc.
  • 18. CONCLUSION The aim of our project was to explore new avenues in computing Like the distributed systems along with raditional concepts like OOPS and networking.