You are on page 1of 6

ABSTRACT:The main objective of this project is reporting application based on

an existing client/database application. The existing application


gathers all the transaction data from different ATM machine'. The
goal of the application is to allow manager to view general reporting
information through a web browser and not require the installation of
the client or exhaustive training. The scope of this application is
4 graphical reports, a security module. Which are ATM availability,
Transaction types and volume ,On-us and Not On-us transactions,
Average withdrawal amounts etc., the reports will primarily be
accessing data in the transaction log, which contains most of the
prevalent information for managers.
Project Description
The project is a web based reporting application. The existing
application gathers all the transaction data from different ATM
Machines. The goal of the application is to allow managers to view
general reporting information of all ATMs through a web browser and
not require the installation of a client or exhaustive training. The web
reporting application is being built in java . The backend database is
oracle. The scope of the application is seven graphical reports, a
security module. The reports will primarily be accessing data in the
transaction log (which contains most of the prevalent information
for managers).
Software Constraints:
The minimum software requirements to run this application Front End

Hardware Constraints:

The Minor Project Report must contain the following1. Cover Page & Title Page
2. Bonafide Certificate
3. Abstract
4. Problem Statement with justification
5. Existing System with merits and demerits
6. Proposed System of your app/project
7. Algorithm Method and technique used in your app
8. Table of Contents
9. List of Tables (if required)
10. List of Figures
11. Introduction
12. Motivation & Objective
13. Scope of the project
14. Overall Design and Implementation
15. References

Problem statement and justification


State Bank of India is planning to introduce Automated Teller
Machine (ATM) system for its customers to provide convenient
withdrawal service in every where , even if customer doesnt
come to a bank. A software is to be designed that will control
ATM having a magnetic stripe reader for reading an ATM card,
a customer console (keyboard and display) for interaction with
the customer, a slot for depositing envelopes, a dispenser for
cash (in multiples of Rs.100) and a printer for printing customer
receipts. The bank provides
computer to maintain its own accounts and process
transactions against them .The ATM will service one customer
at a time. A customer will be required to insert an ATM card
and enter a personal identification number (PIN) - both of which
will be sent to the bank for validation as part of each
transaction. The customer will then be able to perform one or
more transactions. The card will be retained in the machine
until the customer indicates that he/she desires no further
transactions ,at which point it will be returned .The ATM will
communicate each transaction to the bank and obtain
verification that it was allowed by the bank. If the bank
determines that the customer's PIN is invalid, the customer will
be required to re-enter the PIN before a transaction can
proceed. If the customer is unable to successfully enter the PIN
after three tries, the card will be permanently retained by the
machine, and the customer will have to contact the bank to get
it back. If a transaction fails for any reason other thanan invalid

PIN, the ATM will display an explanation of the problem, and


will then ask the customer whether he/she wants to do another
transaction .The ATM will also maintain an internal log of
transactions to facilitate resolving ambiguities arising from a
hardware failure in the middle of a transaction. Entries will be
made in the log when the ATM is started up and shut down, for
each message sent to the Bank (along with the response back,
if one is expected), for the dispensing of cash, and for the
receiving of an envelope. Log entries may contain card
numbers and amounts, but for security will never contain a
PIN. To avail ATM facility, a customer is required to open/have
an account in the bank and apply for the ATM card. A customer
can have one or more accounts and for each account, only one
ATM card will be provided. The bank also provides SMS
updates for every transaction of customers account To obtain
SMS updates ,customer is required to register his/her mobile
number against his account in the bank

Existing System with merits and demerits:Merits:1. You can withdraw cash at any time, day or night.
The banks dont need to be open.
2. ATMs offer the convenience of multiple locations.
You can withdraw cash at any bank that is part
of the system to which your ATM card is linked.
3. Your ATM card is protected by a PIN, keeping
your money safe.
4. You dont need to fill out withdrawal and deposit
slips as is required at the bank.

5. ATMs are faster than going to the bankno long


lines.
6. You can withdraw cash at ATMs in foreign
countries.

Demerits:1. ATM may be off-line (system down).


2. You may forget your PIN number.
3. Risk of robbery when you leave the ATM.
4. The ATM can break down or run out of cash.
5. Fees charged to use ATMs of other banks can
become expensive.

PROPOSED SYSTEM:The main objective of this project is to reduce the


congestion when data transfers between source and
destination. When data transfers between source and
destination there may be chances of occurrence of
congestion and also it monitor when congestion occurs.
If so that has to be intimated or warned to the user. In
this System, using several algorithms viz. Leaky bucket
algorithm and Virtual scheduling algorithm congestion
can be avoided. Leaky Bucket Algorithm continuously
receives and sends the data at the particular interval of
time to avoid congestion or flooding of data. Virtual
scheduling algorithm monitors the congestion
occurrence, when congestion occurs it intimates or
warns user and simultaneously intimates when the
router is free and data transferred successfully to
destination. This system can be implemented in a real
network to control the traffic occurred in a network.
User can get to know the status of the router whether

router is busy in controlling the inflow and outflow of


data to transfer data to the destination.

You might also like