Vous êtes sur la page 1sur 7

ATM (Automated teller machine)

Introduction:

Automated Teller Machine enables the clients of a bank to have access to their account without going to the bank. This is achieved only by development the application using online concepts. When the product is implemented, the user who uses this product will be able to see all the information and services provided by the ATM, when he enters the necessary option and arguments. The product also provides services like request for cheques, deposit cash and other advanced requirement of the user. The data is stored in the database and is retrieved whenever necessary. The implementation needs ATM machine hardware to operate or similar simulated conditions can also be used to successfully use the developed product. To develop this ATM system the entire operation has been divided into the following step: 1. verification process 2. language, service and account selection 3. Banking services 4. Transactions 5. Special services The program is designed in such a way that the user has to card and pin number. Once verified, he is provided a menu and he/she had to enter the option provided in the menu. For example, when the user wants to view the list of payment history than he/she had to enter the option for payment history provided in the main menu. When the option is entered alone with the respective argument, then the payment history is displayed on the screen. The user also must be given option to browse through the pages like previous page, next page, etc. The user may experience a delay in retrieving or viewing the data, when there are many users logged on to the same bank branch system.
Aims & Objective:

Millions of times per day around the globe people are instantly withdrawing money at automatic teller machines (ATMs). Given the fast-pace of the world today, it is not surprising that the demand for access to quick cash is so immense. The power of ATMs would not be possible without secure connections. The final act of ATM dispending cash is the result of an amazingly fast burst of the customer never sees, but a trust is being done in a confidential manner. Using an ATM, customers can access their bank accounts in order to make cash withdrawals (or credit card cash advances) and check their account balances as well as purchase cellphone prepaid credit. If the currency being withdrawn from the ATM is different from that which the bank account is denominated in (eg: Withdrawing Japanese Yen from a bank account containing US Dollars), the money will be converted at a wholesale exchange rate. Thus, ATMs often provide the best possible exchange rate for foreign travelers and are heavily used for this purpose as well. ATMs are known by various other names including Automated Transaction Machine, automated banking machine, cashpoint (in Britain),money machine, bank machine, cash machine, hole-in-the-wall, Bancomat (in various countries in Europe and Russia), Multibanco (after a registered trade mark, in Portugal), and Any Time Money (in India)

Method & Technology:


An ATM is simply a data terminalwith two input and four output devices. Like any other data terminal, the ATM has to connect to, and communicate through, a host processor. The host processor is analogous to an Internet service provider (ISP) in that it is the gateway through which all the various ATM networks become available to the cardholder (the person wanting the cash). Most host processors can support either leased-line or dial-up machines. Leased-line machines connect directly to the host processor through a four-wire, point-to-point, dedicated telephone line. Dial-up ATMs connect to the host processor through a normal phone line using a modem and a toll-free number, or through an Internet service provider using a local access number dialed by modem. Leased-line ATMs are preferred for very high-volume locations because of their thru-put capability, and dial-up ATMs are preferred for retail merchant locations where cost is a greater factor than thru-put. The initial cost for a dial-up machine is less than half that for a leased-line machine. The monthly operating costs for dial-up are only a fraction of the costs for leased-line.

The host processor may be owned by a bank or financial institution, or it may be owned by an independent service provider. Bank-owned processors normally support only bank-owned machines, whereas the independent processors support merchant-owned machines.

Parts of the Machine


You're probably one of the millions who has used an ATM. As you know, an ATM has two input devices: Card reader - The card reader captures the account information stored on the magnetic stripe on the back of an ATM/debit or credit card. The host processor uses this information to route the transaction to the cardholder's bank. Keypad - The keypad lets the cardholder tell the bank what kind of transaction is required (cash withdrawal, balance inquiry, etc.) and for what amount. Also, the bank requires the cardholder's personal identification number (PIN) for verification. Federal law requires that the PIN block be sent to the host processor in encrypted form. And an ATM has four output devices: Speaker - The speaker provides the cardholder with auditory feedback when a key is pressed. Display screen - The display screen prompts the cardholder through each step of the transaction process. Leased-line machines commonly use a monochrome or color CRT (cathode ray tube) display. Dial-up machines commonly use a monochrome or color LCD. Receipt printer - The receipt printer provides the cardholder with a paper receipt of the transaction. Cash dispenser - The heart of an ATM is the safe and cash-dispensing mechanism. The entire bottom portion of most small ATMs is a safe that contains the cash.

Detail Report on Project Stages of Software Lifecycle

Software Requirement Analysis This is the first stage of the project, which involves interaction with the customer to understand his/her needs, requirements, information, required functions, performance and interfacing in MLM software. For this purpose requirement analyst will arrange a meeting for gathering information and additional details for software development. After completing requirement gathering tasks developer team will take a look for understand how requirements can be computerized. The requirement is documented in the form of a Software Requirement Specification (SRS) which is then presented to the customer for review.

Design

Beginning once software requirements have been analyzed and specified, software design is the first of three technical activities design, code generation, and test that are required to build and verify the software.

Design is multi level process which defines following details: Data Design Architecture Design Interface Design Component level Design

Development The design must be translated into a machine-readable form. The coding step performs this task. In this stage, the developers will actually code the programs. The specifications arrived at the design stage for each and every function will be converted to code using tools that are finalized for the implementation of the Software. At this stage the testing methodology to be adopted will be finalized. For each program test cases will be prepared and for each of these test cases, test data will also be prepared. The actual developers will do a first cur checking at this stage to see that the programs written by them are error free.

Testing In this stages the test group of the development team, using the cases and the test data already prepared will test the programs. Only after all the functions are tested singularly, an integrated testing will be performed to see that inter-function dependability is satisfied. Separate test cases and test data will be worked out for the integrated testing.

Acceptance Test This round of testing will be performed by the test group formed by the users of MLM software. This test group has to insure that the developed software is working as per their requirements. If some problems are found then it should be immediately communicated Development group so that the problem can be looked into and hence rectified.

Data Creation
For software, data is most important part. Data is information which is handled by software. So before coding software, all master table data will have to be created.

Implementation
Now the implementation of software is to be done by programmers. All the requirements and information gathered by the analyst is now take actual image in form of software. After making software it is uploaded in to the system so users, for whom software is developed, can use the software.

1 Effort Estimation

Effort estimation methods are one of the important tools for project managers in controlling human resources of ongoing or future software projects. The estimations require historical project data including process and product metrics that characterize past projects.

Software cost and effort estimation will never be an exact science. Too many variables human, technical, environment, political can affect the ultimate cost of software and effort applied to develop it. However, software project estimation can be transformed from a black art to a series of systematic steps that provide estimate with acceptable risk. To achieve reliable cost and effort estimates, a number of options arise:

Software Sizing
Function point sizing Standard component sizing

Problem-Based Estimation
LOC and FP data are used in two ways during software project Estimation:-

As an estimation variable to size each element of the software and As baseline matrices collected from past projects and used in conjunction with estimation variables to develop cost and effort projections.

Schedules
Obtain an early view of staffing requirements and constraints, and demonstrate impact of changing deadlines, understaffing, and staff loading. the

Quality
Quantify the impact on defect rates of building to deadlines or reducing staff.

Risk Fine tune risk levels for all the major types of risk: size, requirements, technology, maintenance, systems integration, and defects.

Conclusion
Back in 1969, Chemical Bank announced that a new form of banking was being launched. With that, customers were provided with plastic cards designed with a magnetic strip that could be used with a machine built into a wall. Gone were the days of having to stand in line for a teller or not having money on hand after normal banking hours. Almost everyone has heard of and used an ATM machine. Interestingly, some of people feel that ATM machines are the best thing to happen in the banking world while other people consider them a curse. The main complaint heard about ATM machines is that while they are convenient, they are expensive to use. However, if we look at it from a banking perspective, business is business. Regardless of what we think of ATM machines, there is no doubt that they have changed the world and the way in which we do things. For example, think how many times we have been out somewhere only to discover we have no cash and we are out of checks, ah, but in the corner, there is an ATM machine. In the blink of an eye, we swipe the card and now have cash on hand. In addition to pulling money out, the ATM machine also makes it convenient to deposit money, transfer money, and check balances. Best of all, to use an ATM machine, we do not have to go to the bank. We will find ATM machines at other banks, grocery stores, shopping malls, along the roadside, Buckingham Palace, airports, in casinos, and even on the South Rim of the Grand Canyon. For this reason, ATM machines are extremely helpful! Discussion
ATMs keep your personal identification number (PIN) and other information safe by usingencryption software such as Triple DES (Data Encryption Standard). But there are lots of things that you can do to protect your information and your money at an ATM. Many banks recommend that you select your own PIN. Visa offersthe following PIN tips: Don't write down your PIN. If you must write it down, do not store it in your wallet or purse. Make your PIN a series of letters or numbers that you can easily remember, but that cannot easily be associated with you personally. Avoid using birth dates, initials, house numbers or your phone number. Visa also recommends the following tips for safe ATM usage:

Store your ATM card in your purse or wallet, in an area where it won't get scratched or bent. Get your card out BEFORE you approach the ATM. You'll be more vulnerable to attack if you're standing in front of the ATM, fumbling through your wallet for your card. Stand directly in front of the ATM keypad when typing in your PIN. This prevents anyone waiting to use the machine from seeing your personal information. After your transaction, take your receipt, card and money away. Do not stand in front of the machine and count your money. If you are using a drive-up ATM, get your vehicle as close to the machine as possible to prevent anyone from coming up to your window. Also make sure that your doors are locked before you drive up to the machine.

Do not leave your car running while using a walk-up ATM. Take your keys with you and lock the doors before your transaction. If someone or something makes you uncomfortable, cancel your transaction and leave the machine immediately. Follow up with your bank to make sure the transaction was cancelled and alert the bank to any suspicious people. Many retail merchants close their store at night. It is strongly recommended that they pull the money out of the machine when they close, just like they do with their cash registers, and leave the door to the security compartment wide open like they do with an empty cash-register drawer. This makes it obvious to any would-be thief that this is not payday. For safety reasons, ATM users should seek out a machine that is located in a well-lighted public place. Federal law requires that only the last four digits of the cardholder's account number be printed on the transaction receipt so that when a receipt is left at the machine location, the account number is secure. However, the entry of your four-digit personal identification number (PIN) on the keypad should still be obscured from observation, which can be done by positioning your hand and body in such a way that the PIN entry cannot be recorded by store cameras or store employees. The cardholder's PIN is not recorded in the journal, but the account number is. If you protect your PIN, you protect your account.

Opinion & Suggestions:


Loan Facility Email and mobile alerts. Active Tracing of Fraudulent activities Security upgrades like Visual Sensors with burglar alarms, Biometric Identification procedures etc.

Vous aimerez peut-être aussi