Sunteți pe pagina 1din 77

Indo Global College Of Engineering 1 INTRODUCTION

Fintelligence is a system for easy, quick, and secure file processing that will automate the tasks of a Financial Company like maintaining information of client, verifying information provided by client, checking an eligibility of a client whether loan can be issued or not, and finally issuing the loan. Fintelligence is basically designed for those financial companies which provide different types of loans from different banks to all types of clients. To keep track of different loans, different interest rates of different banks and different types of clients, is not an easy job. To make these tasks easy with all latest updates, Fintelligence is quiet helpful.

It will be an enterprise application, so it is distributed and data centric. This application is designed on the basis of enterprise application architecture. In this application, MySQL database will be used to store data related to employees, loans, clients, etc. Since database will be on Server, so any number of users can work simultaneously and can share their data with each other.

It is developed using JAVA and J2EE technologies.

The project mainly deals with the documents of the client Collateral submitted by the client in order to get financial service from the financial company. It also deals with maintaining the records of the employees working in the company along with their access rights i.e how much information from the database is accessible by the particular employee and it also maintains the records of the clients associated with the company.

CURRENT SYSTEM Current system is providing financial services to different clients. These financial services include loans processing, and compensation claims. For providing these financial services processes are defined like for processing loan of a particular client the process for issuing a loan is defined like he has to submit the documents then documents will be cross checked and if verified the loan will be issued with the generation of new loan file for that client. But for issuing a loan and then taking care of returns from the client there are a lot of persons involved or rather we can say more

Indo Global College Of Engineering 2 than one department of the financial service providing agency are involved. And currently all these processes are managed manually. And more over clients have to contact personally to the financial services providing agency if they need to get any information about any of the services provided by the financial agency. So in this way current system is performing its all the tasks and managing all the information manually.

Limitations of the Current System 1. In the current system there no common interface for the users from where they can get the required information and manage information of different personnel involved in performing different processes of the financial agencies like for higher authorities there is no interface where they can define the different loan policies offered by the financial agency.

2. In the current system client has to get all the information regarding his process with the financial agency personally. There is no interface provided from where he can get information of his or her interest.

3. In the current system there is no proper management of resources available like there is no centralization of data so it takes a lot of time in processing information regarding different clients.

Indo Global College Of Engineering 3

Fintelligence consist of different modules which includes:

1. Admin Module: Admin module will be the central module of the application. Using this module admin users will configure the system with required information like loan policies available for clients and the requirements for those loan polices and also other services offered by the Financial Company.

2. LPS (Loan Processing System): LPS module is for maintaining details regarding different types of loans and their processing with different clients.

3. CDMS (Collateral Document Management System): CDMS module is about managing the documents which are required for different types of loans and submitted by different clients.

4. RRS (Risk Review System): RRS module is about reviewing the risks involved in issuing a loan and approving a compensation claim.

5. TRS (Trade Reconciliation System): TRS module maintains the flow of money. Here the information regarding EMIs is maintained.

6. CCPS (Compensation Claim Processing System): CCPS module is about processing a compensation claim claimed by some client.

All the information regarding the client is maintained in the controlled and consistent way. As soon as the information gets added to the database regarding the stock, everything is managed maintaining the integrity and the concurrency constraints.Integrity is never compromised in any way and database management system is controlled well.

Indo Global College Of Engineering 4 BUSINESS FUNCTION PROVIDED IN PROPOSED SYSTEM 1. Login: The system users would be required to login through a login screen. After authentication and login he would be able to access only those areas for which he is capable to access. 2. Users Maintenance: That allows adding or updating the details of all users who are accessing this application. 3. Employees Maintenance: That allows adding or updating the details of all employees of the company.

4. Loans Maintenance: That allows adding or updating the details of all types of loans. 5. Clients Maintenance: That allows adding or updating the details of all clients. 6. Loan Processing: Here following tasks are to be performed: Taking Client Details File Login Verify Clients Documents Check Loan eligibility of a client Issue Loan

7. Collateral Document Maintenance: The documents of the client Collateral submitted by the client in order to get financial service from the financial company. 8. EMI Manager: Here the record of EMIs for different clients will be maintained and system should be able to provide all the required information of EMI generation. 9. Report: Reports of users, employees, loans, clients, etc are to be generated.

Indo Global College Of Engineering 5 BUSINESS REQUIREMENTS

Input Requirement of the system 1. 2. 3. 4. 5. 6. 7. Login Users Details Employees Details Loan Details Clients Details Documents Details Compensation Claim Details

Output Requirement of the system 1. 2. 3. 4. Listing of all users, employees, types of loans, and clients Getting status of loan to be issued to client Listing of issued loans to clients. List EMIs for a particular client.

External Interface Requirements 1. Integration with eFax/fax.

Special User Requirements 1. Automatic Email Generation to the concerned person

Hardware Requirements 1. Intel P4 processor with minimum 2.0Ghz Speed 2. RAM: Minimum 512MB 3. Hard Disk: Minimum 20GB

Indo Global College Of Engineering 6 Software Requirements 1. JDK 1.6 NetBeans 6.5.1 2. Database MySQL Database Server 5.0 3. Reports JasperReports 3.7.6 4. Web Server Tomcat 6.0.18 5. Application Server GlassFish v2.1 6. Testing Tool JUnit 4.5 7. Deployment Tool Ant 1.7 8. Operating System Windows 7/ Linux Fedora

Indo Global College Of Engineering 7 TECHNOLOGIES TO BE USED

1. Java :Java is Platform Independent, Secure, Object Oriented, Scalable, and Robust Programming Language It consists of two parts JVM stands for Java Virtual Machine, which is run time environment to execute the java programs. Java API (Application Programming Interface) that consists of inbuilt classes used in java programs. 2. JDBC JDBC (Java Database Connectivity) is an API, which is used for the communication of java programs with different databases. 3. Java Mail API The JavaMail API provides a platform-independent and protocol-independent framework to build mail and messaging applications. 4. Servlets Servlets are basically a part of Java Platform, Enterprise Edition (Java EE) and is a technology that is used for extending the functionality of the servers that host application access via request-response programming model. 5. JSP JSP (Java Server Pages) a technology of Java Platform, Enterprise Edition (Java EE) is used for server-side programming and with the help of JSP we can segregate the work of a web designer and a developer. 6. JasperReports JasperReports is an open source reporting engine. Using JasperReports reports can generated in any type of application i.e. console application, desktop application, web application, enterprise application. 7. MySQL MySQL is used as database, used to store data. It is RDBMS. 8. Scripting Languages HTML & CSS JavaScript XML, XHTML AJAX 9. Others UML Ant Used for deployment JUnit Unit Testing.

Indo Global College Of Engineering 8 WORKING ENVIORNMENT Java Technology Java technology is both a programming language and a platform.

The Java Programming Language The Java programming language is a high-level language that can be characterized by all of the following characteristics Simple Object oriented Distributed Multithreaded Architecture neutral Portable High performance Robust

In the Java programming language, all source code is first written in plain text files ending with the .java extension. Those source files are then compiled into .class files by the javac compiler. A .class file does not contain code that is native to your processor; it instead contains bytecodes the machine language of the Java Virtual Machine1 (Java VM). The java launcher tool then runs your application with an instance of the Java Virtual Machine.

An overview of the software development process.

Indo Global College Of Engineering 9 Because the Java VM is available on many different operating systems, the same .class files are capable of running on Microsoft Windows, the Solaris TM Operating System (Solaris OS), Linux, or Mac OS. Some virtual machines, such as the Java HotSpot virtual machine, perform additional steps at runtime to give your application a performance boost. This include various tasks such as finding performance bottlenecks and recompiling (to native code) frequently used sections of code.

Through the Java VM, the same application is capable of running on multiple platforms.

Indo Global College Of Engineering 10 The Java Platform

A platform is the hardware or software environment in which a program runs. Most platforms can be described as a combination of the operating system and underlying hardware. The Java platform differs from most other platforms in that it's a software-only platform that runs on top of other hardware-based platforms.

The Java platform has two components:

8. The Java Virtual Machine (JVM) 9. The Java Application Programming Interface (API) Java Virtual Machine is the base for the Java platform and is ported onto various hardware-based platforms.

The API is a large collection of ready-made software components that provide many useful capabilities. It is grouped into libraries of related classes and interfaces; these libraries are known as packages.

The API and Java Virtual Machine insulate the program from the underlying hardware. Every full implementation of the Java platform gives you the following features: 10. Development Tools: The development tools provide means for compiling, running, debugging, and documenting your applications. The main tools are the javac compiler, the java launcher, and the javadoc documentation tool.

Indo Global College Of Engineering 11 11. Application Programming Interface (API): The API provides the core functionality of the Java programming language. It offers a wide array of useful classes ready for use in your own applications. It spans everything from basic objects, to networking and security, to XML generation and database access, etc.

12. Deployment Technologies: The JDK software provides standard mechanisms such as the Java Web Start software and Java Plug-In software for deploying your applications to end users.

13. User Interface Toolkits: The Swing and Java 2D toolkits make it possible to create sophisticated Graphical User Interfaces (GUIs).

14. Integration Libraries: Integration libraries such as the Java IDL, JDBC, JNDI, Java RMI, and Java Remote Method Invocation over Internet Inter-ORB Protocol Technology (Java RMI-IIOP Technology) enable database access and manipulation of remote objects.

Indo Global College Of Engineering 12 Java - Exception Handling

An exception is an event, which occurs during the execution of a program, that disrupts the normal flow of the program's instructions. When an error occurs within a method, the method creates an object and hands it off to the runtime system. The object, called an exception object, contains information about the error, including its type and the state of the program when the error occurred. Creating an exception object and handing it to the runtime system is called throwing an exception. After a method throws an exception, the runtime system attempts to find something to handle it. The set of possible "somethings" to handle the exception is the ordered list of methods that had been called to get to the method where the error occurred. The list of methods is known as the call stack (see the next figure).

The call stack. The runtime system searches the call stack for a method that contains a block of code that can handle the exception. This block of code is called an exception handler. The search begins with the method in which the error occurred and proceeds through the call stack in the reverse order in which the methods were called. When an appropriate handler is found, the runtime system passes the exception to the handler. An exception handler is considered appropriate if the type of the exception object thrown matches the type that can be handled by the handler.

Indo Global College Of Engineering 13 The exception handler chosen is said to catch the exception. If the runtime system exhaustively searches all the methods on the call stack without finding an appropriate exception handler, as shown in the next figure, the runtime system (and, consequently, the program) terminates.

Searching the call stack for the exception handler. Using exceptions to manage errors has following advantages over traditional error-management techniques:

15. Separating Error-Handling Code from "Regular" Code 16. Propagating Errors Up the Call Stack 17. Grouping and Differentiating Error Types

A program can catch exceptions by using a combination of the try, catch, and finally blocks. The try block identifies a block of code in which an exception can occur. The catch block identifies a block of code, known as an exception handler, that can handle a particular type of exception. The finally block identifies a block of code that is guaranteed to execute, and is the right place to close files, recover resources, and otherwise clean up after the code enclosed in the try block. Class Hierarchy

Indo Global College Of Engineering 14

Object

Throwable

Error IOException

Exception
RuntimeException

Indo Global College Of Engineering 15 Java - Collections Framework A collection is simply an object that groups multiple elements into a single unit. Collections are used to store, retrieve, manipulate, and communicate aggregate data. A collections framework is a unified architecture for representing and manipulating collections. All collections frameworks contain the following: Interfaces: These are abstract data types that represent collections. Interfaces allow collections to be manipulated independently of the details of their representation. Implementations: These are the concrete implementations of the collection interfaces. In essence, they are reusable data structures. Algorithms: These are the methods that perform useful computations, such as searching and sorting, on objects that implement collection interfaces. The algorithms are said to be polymorphic: that is, the same method can be used on many different implementations of the appropriate collection interface. In essence, algorithms are reusable functionality. The collections framework provides the following benefits: 18. Reduces programming effort 19. Increases program speed and quality 20. Allows interoperability among unrelated APIs 21. Reduces effort to learn and to use new APIs 22. Reduces effort to design new APIs 23. Fosters software reuse

Indo Global College Of Engineering 16 The collections framework consists of: Collection Interfaces - Represent different types of collections, such as sets, lists and maps. These interfaces form the basis of the framework. General-purpose Implementations - Primary implementations of the collection interfaces. Legacy Implementations - The collection classes from earlier releases, Vector and Hashtable, have been retrofitted to implement the collection interfaces. Special-purpose Implementations - Implementations designed for use in special situations. These implementations display nonstandard performance characteristics, usage restrictions, or behavior. Concurrent Implementations - Implementations designed for highly concurrent use. Wrapper Implementations - Add functionality, such as synchronization, to other implementations. Convenience Implementations - High-performance "mini-implementations" of the collection interfaces. Abstract Implementations - Partial implementations of the collection interfaces to facilitate custom implementations. Algorithms - Static methods that perform useful functions on collections, such as sorting a list. Infrastructure - Interfaces that provide essential support for the collection interfaces. Array Utilities - Utility functions for arrays of primitives and reference objects. Not, strictly speaking, a part of the Collections Framework, this functionality was added to the Java platform at the same time and relies on some of the same infrastructure

Indo Global College Of Engineering 17

The general purpose implementations are summarized in the table below:

Implementations Hash Table Resizable Array Set Interfaces List Map HashMap HashSet ArrayList TreeMap Balanced Tree TreeSet

Indo Global College Of Engineering 18 Java Multithreading

Multithreading is a conceptual programming paradigm where a program (process) is divided into two or more subprograms (processes/threads), which can be implemented at the same time in parallel. For example, one subprogram can display an animation on the screen while another may build the next animation to be displayed. This is something similar to dividing a task into subtasks and assigning them to different people for execution independently and simultaneously. CPU has a limitation that it can not run more than one thread at a time so with the help of time sharing concept it simulates an execution of more than one thread at a time.

Thread A thread is similar to a program that has a single flow of control. It has beginning, a body and an end and executes commands sequentially. The Java VM always has multiple threads, called daemon threads, running. For example, a continually running daemon thread performs garbage collection tasks. Another daemon thread handles mouse and keyboard events. There are two ways to create the thread in java: -

1. By implementing the Runnable Interface 2. By extending the Thread class.

Runnable:Runnable interface is very useful in that situation when we want to extends any class and want to create that class as Thread class. Just implements the Runnable interface and override the run() method. Thread : -

Indo Global College Of Engineering 19 Thread can be created by extending the Thread class. Java does not support multiple inheritance so in that situation where no other inheritance except Thread class is required at that time it is very useful. Inherit the Thread class and then override the run() method of Thread class.

Life Cycle of a Thread Following are the thread state: New born state Runnable state Running state Blocked State Dead State

New born state: When we create a thread object, the thread is born and is said to be in newborn state. The thread is not yet scheduled for running. At this state we can choose any one of the following method: start() method (to start the thread). stop() method (to stop or kill the thread)

Runnable state The runnable state means that the thread is ready for execution and is waiting for the availability of the process i.e. thread has joined the queue of threads that are waiting for execution. If all threads have equals priority, then they are given time slots for execution in round robin fashion i.e. FIFO (First In First Out). Assigning the time to the threads is called time slicing. If we want a thread to relinquish control to another thread to equal priority before its turn comes, then we can do this by using the yield() method.

Running state: -

Indo Global College Of Engineering 20 Running means that the processor has given its time to the thread for its execution. The thread runs until it relinquishes control on its own or it is preempted by a higher priority thread. A running thread may relinquish its control in one of the following situations: It Can be suspended by using suspend() method. It can be revived by using resume method() method.

sleep() method can be used to sleep the current running thread by passing time in milliseconds as a argument in sleep method.

wait() method is used to wait by a thread uptil it is not notified by calling notify() method.

Block state

A thread is said to be blocked when it is prevented from entering into the runnable state and subsequently the running state. This happens when the thread is suspended, sleeping or waiting in order to satisfy certain requirements. A blocked thread is considered not runnable but not dead and it can run again at any time.

Dead state

Every thread destroyed when it has completed executing its run() method. It is known as natural death. stop() method is used to kill the thread. Thread can be killed in its born, running or even in blocked state.

Thread priority

Indo Global College Of Engineering 21 When a Java thread is created, it inherits its priority from the thread that created it. You can set a threads priority using the setPriority() method. Thread priorities are represented as integer values ranging from MIN_PRIORITY to MAX_PRIORITY (constants in the Thread class). The thread with the highest priority is executed. When that thread stops, yields, or becomes not runnable, a lower priority thread will be executed. If two threads of the same priority are waiting, the Java scheduler will choose one of them to run in a round-robin fashion.

Synchronization: One of the central problems of multithreaded computing is handling situations where more than one thread has access to the same data structure. For example, if one thread was trying to update the elements in a list, while another thread was simultaneously trying to sort them, your program could deadlock or produce incorrect results. To prevent this problem, you need to use thread synchronization. The simplest way to prevent two objects from accessing the same method at the same time is to require a thread to obtain a lock. While a thread holds the lock, another thread that needs a lock has to wait until the first thread releases the lock. To keep a method thread-safe, use the synchronized keyword when declaring methods that can be executed by only one thread at a time. Note that you can also synchronize on an object.

Indo Global College Of Engineering 22 Java Database Connectivity (JDBC) JDBC stands for "Java DataBase Connectivity". It is an API (Application Programming Interface) which consists of a set of Java classes, interfaces and exceptions and a specification to which both JDBC driver vendors and JDBC developers adhere when developing applications. JDBC is a very popular data access standard. RDBMS (Relational Database Management Systems) or third-party vendors develop drivers which adhere to the JDBC specification. Other developers use these drivers to develop applications which access those databases. The JDBC API is a Java API that can access any kind of tabular data, especially data stored in a Relational Database.

JDBC helps you to write java applications that manage these three programming activities: 1. Connect to a data source, like a database 2. Send queries and update statements to the database 3. Retrieve and process the results received from the database in answer to your query

Indo Global College Of Engineering 23 JDBC Architecture

The JDBC API supports both two-tier and three-tier processing models for database access. Two-tier Architecture for Data Access.

In the two-tier model, a Java application talks directly to the data source. This requires a JDBC driver that can communicate with the particular data source being accessed. A user's commands are delivered to the database or other data source, and the results of those statements are sent back to the user. The data source may be located on another machine to which the user is connected via a network. This is referred to as a client/server configuration, with the user's machine as the client, and the machine housing the data source as the server. In the three-tier model, commands are sent to a "middle tier" of services, which then sends the commands to the data source. The data source processes the commands and sends the results back to the middle tier, which then sends them to the user. MIS directors find the three-tier model very attractive because the middle tier makes it possible to maintain control over access and the kinds of updates that can be made to corporate data. Another advantage is that it simplifies the deployment of applications. Finally, in many cases, the three-tier architecture can provide performance advantages.

Indo Global College Of Engineering 24 Three-tier Architecture for Data Access.

Until recently, the middle tier has often been written in languages such as C or C++, which offer fast performance. However, with the introduction of optimizing compilers that translate Java bytecode into efficient machine-specific code and technologies such as Enterprise JavaBeans, the Java platform is fast becoming the standard platform for middle-tier development. This is a big plus, making it possible to take advantage of Java's robustness, multithreading, and security features. With enterprises increasingly using the Java programming language for writing server code, the JDBC API is being used more and more in the middle tier of a three-tier architecture. Some of the features that make JDBC a server technology are its support for connection pooling, distributed transactions, and disconnected rowsets. The JDBC API is also what allows access to a data source from a Java middle tier.

Indo Global College Of Engineering 25 Different database systems have surprisingly little in common: just a similar purpose and a mostly compatible query language. Beyond that, every database has its own API that you must learn to write programs that interact with the database. This has meant that writing code capable of interfacing with databases from more than one vendor has been a daunting challenge. Crossdatabase APIs exist, most notably Microsoft's ODBC API, but these tend to find themselves, at best, limited to a particular platform. JDBC is Sun's attempt to create a platform-neutral interface between databases and Java. With JDBC, you can count on a standard set of database access features and (usually) a particular subset of SQL, SQL-92. The JDBC API defines a set of interfaces that encapsulate major database functionality, including running queries, processing results, and determining configuration information. A database vendor or third-party developer writes a JDBC driver, which is a set of classes that implements these interfaces for a particular database system. An application can use a number of drivers interchangeably. Following figure shows how an application uses JDBC to interact with one or more databases without knowing about the underlying driver implementations.

Indo Global College Of Engineering 26

Indo Global College Of Engineering 27 JDBC Components JDBC includes four components: The JDBC API: The JDBC API provides programmatic access to relational data from the Java programming language. Using the JDBC API, applications can execute SQL statements, retrieve results, and propagate changes back to an underlying data source. The JDBC API can also interact with multiple data sources in a distributed, heterogeneous environment.

The JDBC API is part of the Java platform, which includes the Java Standard Edition (Java SE ) and the Java Enterprise Edition (Java EE). The JDBC 4.0 API is divided into two packages: java.sql and javax.sql. Both packages are included in the Java SE and Java EE platforms.

JDBC Driver Manager: -

The JDBC DriverManager class defines objects which can connect Java applications to a JDBC driver. DriverManager has traditionally been the backbone of the JDBC architecture.It is quite small and simple. The Standard Extension packages javax.naming and javax.sql let you use a DataSource object registered with a Java Naming and Directory Interface (JNDI) naming service to establish a connection with a data source. You can use either connecting mechanism, but using a DataSource object is recommended whenever possible.

JDBC Test Suite : -

The JDBC driver test suite helps you to determine that JDBC drivers will run your program. These tests are not comprehensive or exhaustive, but they do exercise many of the important features in the JDBC API.

Indo Global College Of Engineering 28 JDBC-ODBC Bridge: The Java Software bridge provides JDBC access via ODBC drivers. Note that you need to load ODBC binary code onto each client machine that uses this driver. As a result, the ODBC driver is most appropriate on a corporate network where client installations are not a major problem, or for application server code written in Java in a three-tier architecture.

Indo Global College Of Engineering 29 JDBC Drivers JDBC drivers are available for most database platforms, from a number of vendors and in a number of different flavors. There are four categories of drivers: Type 1 (JDBC-ODBC bridge drivers ) Type 1 drivers use a bridge technology to connect a Java client to an ODBC database system. The JDBC-ODBC Bridge from Sun and InterSolv is the only existing example of a Type 1 driver. Type 1 drivers require some sort of non-Java software to be installed on the machine rjunning your code, and they are implemented using native code.

Type 2 (Native-API partly Java drivers) Type 2 drivers use a native code library to access a database, wrapping a thin layer of Java around the native library. For example, with Oracle databases, the native access might be through the Oracle Call Interface (OCI) libraries that were originally designed for C/C++ programmers. Type 2 drivers are implemented with native code, so they may perform better than all-Java drivers, but they also add an element of risk, as a defect in the native code can crash the Java Virtual Machine.

Type 3 (Net-protocol All-Java drivers) Type 3 drivers define a generic network protocol that interfaces with a piece of custom middleware. The middleware component might use any other type of driver to provide the actual database access. BEA's WebLogic product line (formerly known as WebLogic Tengah and before that as jdbcKona/T3) is an example. These drivers are especially useful for applet deployment, since the actual JDBC classes can be written entirely in Java and downloaded by the client on the fly.

Indo Global College Of Engineering 30 Type 4 (Native-protocol All-Java drivers) Type 4 drivers are written entirely in Java. They understand database-specific networking protocols and can access the database directly without any additional software. These drivers are also well suited for applet programming, provided that the Java security manager allows TCP/IP connections to the database server. Following are the basic steps to create JDBC application:1. 2. 3. 4. 5. 6. 7. Load the Drivers Define the connection URL Establish the connection Create a statement Execute a query Process the results Close the connection

Indo Global College Of Engineering 31 Java - Networking Networking Basics Computers running on the Internet communicate to each other using either the Transmission Control Protocol (TCP) or the User Datagram Protocol (UDP), as this diagram illustrates:

When you write Java programs that communicate over the network, you are programming at the application layer. Typically, you don't need to concern yourself with the TCP and UDP layers. Instead, you can use the classes in the java.net package. These classes provide system-independent network communication. However, to decide which Java classes your programs should use, you do need to understand how TCP and UDP differ. TCP TCP provides a point-to-point channel for applications that require reliable communications. The Hypertext Transfer Protocol (HTTP), File Transfer Protocol (FTP), and Telnet are all examples of applications that require a reliable communication channel. The order in which the data is sent and received over the network is critical to the success of these applications. When HTTP is used to read from a URL, the data must be received in the order in which it was sent. Otherwise, you end up with a jumbled HTML file, a corrupt zip file, or some other invalid information.

Indo Global College Of Engineering 32 Definition: TCP (Transmission Control Protocol) is a connection-based protocol that provides a reliable flow of data between two computers. UDP The UDP protocol provides for communication that is not guaranteed between two applications on the network. UDP is not connection-based like TCP. Rather, it sends independent packets of data, called datagrams, from one application to another. Sending datagrams is much like sending a letter through the postal service: The order of delivery is not important and is not guaranteed, and each message is independent of any other. Note: Many firewalls and routers have been configured not to allow UDP packets. If you're having trouble connecting to a service outside your firewall, or if clients are having trouble connecting to your service, ask your system administrator if UDP is permitted. Understanding Ports Generally speaking, a computer has a single physical connection to the network. All data destined for a particular computer arrives through that connection. However, the data may be intended for different applications running on the computer. So how does the computer know to which application to forward the data? Through the use of ports. Data transmitted over the Internet is accompanied by addressing information that identifies the computer and the port for which it is destined. The computer is identified by its 32-bit IP address, which IP uses to deliver data to the right computer on the network. Ports are identified by a 16-bit number, which TCP and UDP use to deliver the data to the right application. In connection-based communication such as TCP, a server application binds a socket to a specific port number. This has the effect of registering the server with the system to receive all data destined for that port. A client can then rendezvous with the server at the server's port, as illustrated here:

Indo Global College Of Engineering 33

Definition: The TCP and UDP protocols use ports to map incoming data to a particular process running on a computer. In datagram-based communication such as UDP, the datagram packet contains the port number of its destination and UDP routes the packet to the appropriate application, as illustrated in this figure:

Port numbers range from 0 to 65,535 because ports are represented by 16-bit numbers. The port numbers ranging from 0 - 1023 are restricted; they are reserved for use by well-known services such as HTTP and FTP and other system services. These ports are called well-known ports. Your applications should not attempt to bind to them. Socket A socket is one endpoint of a two-way communication link between two programs running on the network. A socket is bound to a port number so that the TCP layer can identify the application that data is destined to be sent.

Indo Global College Of Engineering 34

Introduction to MYSQL MySQL, the most popular Open Source SQL database management system, is developed, distributed, and supported by Oracle Corporation. The MySQL (R) software delivers a very fast, multi-threaded, multi-user, and robust SQL (Structured Query Language) database server. MySQL Server is intended for mission-critical, heavy-load production systems as well as for embedding into mass-deployed software. The MySQL software is Dual Licensed. Users can choose to use the MySQL software as an Open Source/Free Software product under the terms of the GNU General Public License or can purchase a standard commercial license. The MySQL web site (http://www.mysql.com/) provides the latest information about the MySQL software. MySQL is a relational database management system.

A database is a structured collection of data. It may be anything from a simple shopping list to a picture gallery or the vast amounts of information in a corporate network. To add, access, and process data stored in a computer database, you need a database management system such as MySQL Server. Since computers are very good at handling large amounts of data, database management systems play a central role in computing, as standalone utilities, or as parts of other applications.

MySQL software is Open Source.

A relational database stores data in separate tables rather than putting all the data in one big storeroom. This adds speed and flexibility. The SQL part of MySQL stands for Structured Query Language. SQL is the most common standardized language used to access databases and is defined by the ANSI/ISO SQL Standard. The SQL standard has been evolving since 1986 and several versions exist.

The MySQL Database Server is very fast, reliable, and easy to use.

MySQL Server was originally developed to handle large databases much faster than

Indo Global College Of Engineering 35 existing solutions and has been successfully used in highly demanding production environments for several years. Although under constant development, MySQL Server today offers a rich and useful set of functions. Its connectivity, speed, and security make MySQL Server highly suited for accessing databases on the Internet

MySQL Server works in client/server or embedded systems.

The MySQL Database Software is a client/server system that consists of a multi-threaded SQL server that supports different backends, several different client programs and libraries, administrative tools, and a wide range of application programming interfaces (APIs).

MySQL Server also provides an embedded multi-threaded library that you can link into your application to get a smaller, faster, easier-to-manage standalone product. 1. A large amount of contributed MySQL software is available. History of MySQL We started out with the intention of using mSQL to connect to our tables using our own fast low-level routines. However, after some testing, we came to the conclusion that mSQL was not fast enough or flexible enough for our needs. This resulted in a new SQL interface to our database but with almost the same API interface as mSQL. This API was designed to allow thirdparty code that was written for use with mSQL to be ported easily for use with MySQL. The derivation of the name MySQL is not clear. Our base directory and a large number of our libraries and tools have had the prefix ``my'' for well over 10 years. However, co-founder Monty Widenius's daughter is also named My. Which of the two gave its name to MySQL is still a mystery, even for us. The name of the MySQL Dolphin (our logo) is Sakila. Sakila was chosen by the founders of MySQL AB from a huge list of names suggested by users in our ``Name the Dolphin'' contest. The winning name was submitted by Ambrose Twebaze, an open source software developer from Swaziland, Africa. According to Ambrose, the name Sakila has its roots in SiSwati, the local language of Swaziland. Sakila is also the name of a town in Arusha, Tanzania, near Ambrose's country of origin, Uganda.

Indo Global College Of Engineering 36

2.

The Main Features of MySQL

The following list describes some of the important characteristics of the MySQL Database Software 1 Internals and Portability 1. Written in C and C++. 2. Tested with a broad range of different compilers. 3. For portability, uses CMake in MySQL 5.5 and up. Previous series use Automake, Autoconf, and Libtool. 4. APIs for C, C++, Eiffel, Java, Perl, PHP, Python, Ruby, and Tcl are available. 5. Tested with Purify (a commercial memory leakage detector) as well as Valgrind, a GPL tool (http://developer.kde.org/~sewardj/) 6. Uses multi-layered server design with independent modules. 7. Designed to be fully multi-threaded using kernel threads, to easily use multiple CPUs if they are available. 8. Provides transactional and nontransactional storage engines. 9. Uses very fast B-tree disk tables (MyISAM) with index compression. with GNU

10. Designed to make it relatively easy to add other storage engines. This is useful if you want to provide an SQL interface for an in-house database. 11.Uses a very fast thread-based memory allocation system. 12.Executes very fast joins using an optimized nested-loop join. 13. Implements in-memory hash tables, which are used as temporary tables. 14. Implements SQL functions using a highly optimized class library that should be as

fast as possible. Usually there is no memory allocation at all after query initialization. 15. Provides the server as a separate program for use in a client/server networked environment, and as a library that can be embedded (linked) into standalone applications. Such applications can be used in isolation or in environments where no network is available.

Indo Global College Of Engineering 37 2 Column Types

Many data types: signed/unsigned integers 1, 2, 3, 4, and 8 bytes long, FLOAT, DOUBLE, CHAR, VARCHAR, BINARY, VARBINARY, TEXT, BLOB, DATE, TIME, DATETIME, TIMESTAMP, YEAR, SET, ENUM, and OpenGIS spatial types. See Chapter 10, Data Types.

Fixed-length and variable-length string types.

3 Commands and Functions II. Full operator and function support in the SELECT list and WHERE

clause of queries. For example: mysql> SELECT CONCAT(first_name, ' ', last_name) -> FROM citizen -> WHERE income/dependents > 10000 AND age > 30;

III.

Full support for SQL GROUP BY and ORDER BY clauses. Support for group functions (COUNT(), AVG(), STD(), SUM(), MAX(), MIN(), and GROUP_CONCAT()).

IV.

Support for LEFT OUTER JOIN and RIGHT OUTER JOIN with both standard SQL and ODBC syntax.

V. VI.

Support for aliases on tables and columns as required by standard SQL. Support for DELETE, INSERT, REPLACE, and UPDATE to return the number of rows that were changed (affected), or to return the number of rows matched instead by setting a flag when connecting to the server.

VII.

Support for MySQL-specific SHOW statements that retrieve information about databases, storage engines, tables, and indexes. MySQL 5.0 adds support for the INFORMATION_SCHEMA database, implemented according to standard SQL.

VIII. IX.

An EXPLAIN statement to show how the optimizer resolves a query. Independence of function names from table or column names. For

example, ABS is a valid column name. The only restriction is that for a function

Indo Global College Of Engineering 38 call, no spaces are permitted between the function name and the ( that follows it. 4 Security A privilege and password system that is very flexible and secure, and allows host-based verification. Passwords are secure because all password traffic is encrypted when you connect to a server. 5 Scalability and Limits Support for large databases. We use MySQL Server with databases that contain 50 million records. We also know of users who use MySQL Server with 200,000 tables and about 5,000,000,000 rows. Support for up to 64 indexes per table (32 before MySQL 4.1.2). Each index may consist of 1 to 16 columns or parts of columns. The maximum index width is 1000 bytes (767 for InnoDB); before MySQL 4.1.2, the limit is 500 bytes. An index may use a prefix of a column for CHAR, VARCHAR, BLOB, or TEXT column types. 6 Connectivity Clients may connect to the MySQL server using TCP/IP sockets on any platform. On Windows systems in the NT family (NT, 2000, or XP), clients may connect using named pipes. On Unix systems, clients may connect using Unix domain socket files. MySQL client programs can be written in many languages. A client library written in C is available for clients written in C or C++, or for any language that provides C bindings. APIs for C, C++, Eiffel, Java, Perl, PHP, Python, Ruby, and Tcl are available, enabling MySQL clients to be written in many languages. The Connector/ODBC (MyODBC) interface provides MySQL support for client programs that use ODBC (Open Database Connectivity) connections. For example, you can use MS Access to connect to your MySQL server. Clients can be run on Windows or Unix. MyODBC

Indo Global College Of Engineering 39 source is available. All ODBC 2.5 functions are supported, as are many others. The Connector/J interface provides MySQL support for Java client programs that use JDBC connections. Clients can be run on Windows or Unix. Connector/J source is available. MySQL Connector/NET enables developers to easily create .NET applications that require secure, high-performance data connectivity with MySQL. It implements the required ADO.NET interfaces and integrates into ADO.NET aware tools. Developers can build applications using their choice of .NET languages. MySQL Connector/NET is a fully managed ADO.NET driver written in 100% pure C#. 7 Localization The server can provide error messages to clients in many languages. Full support for several different character sets, including latin1 (cp1252), german, big5, ujis, and more. For example, the Scandinavian characters , and are permitted in table and column names. Unicode support is available as of MySQL 4.1. All data is saved in the chosen character set. Sorting and comparisons are done according to the chosen character set and collation (using latin1 and Swedish collation by default). It is possible to change this when the MySQL server is started. To see an example of very advanced sorting, look at the Czech sorting code. MySQL Server supports many different character sets that can be specified at compile time and runtime. As of MySQL 4.1, the server time zone can be changed dynamically, and individual clients can specify their own time zone. 7 Clients and Tools MySQL includes several client and utility programs. These include both command-line programs such as mysqldump and mysqladmin, and graphical programs such as MySQL Administrator and MySQL Query Browser.

Indo Global College Of Engineering 40 MySQL Server has built-in support for SQL statements to check, optimize, and repair tables. These statements are available from the command line through the mysqlcheck client. MySQL also includes myisamchk, a very fast command-line utility for performing these operations on MyISAM tables. All MySQL programs can be invoked with the --help or -? options to obtain online assistance. 3. MySQL Stability

This section addresses the questions ``How stable is MySQL Server?'' and ``Can I depend on MySQL Server in this project?'' We will try to clarify these issues and answer some important questions that concern many potential users. The information in this section is based on data gathered from the mailing list, which is very active in identifying problems as well as reporting types of use. The original code stems back to the early 1980s. It provides a stable code base, and the ISAM table format used by the original storage engine remains backward-compatible. At TcX, the predecessor of MySQL AB, MySQL code has worked in projects since mid-1996, without any problems. When the MySQL Database Software initially was released to a wider public, our new users quickly found some pieces of ``untested code''. Each new release since then has had fewer portability problems (even though each new release has also had many new features). Each release of the MySQL Server has been usable. Problems have occurred only when users try code from the ``gray zones.'' Naturally, new users don't know what the gray zones are; this section therefore attempts to document those areas that are currently known. The descriptions mostly deal with Version 3.23 and 4.0 of MySQL Server. All known and reported bugs are fixed in the latest version, with the exception of those listed in the bugs section, which are designrelated. The MySQL Server design is multi-layered with independent modules.

Indo Global College Of Engineering 41 NetBeans IDE A free, open-source Integrated Development Environment for software developers. One can get all the tools you need to create professional desktop, enterprise, web, and mobile applications with the Java language, C/C++, and even dynamic languages such as PHP, JavaScript, Groovy, and Ruby. NetBeans IDE is easy to install and use straight out of the box and runs on many platforms including Windows, Linux, Mac OS X and Solaris. NetBeans IDE is an integrated development environment (IDE) for writing, compiling, testing, and debugging desktop applications and web applications for the Java platform. NetBeans IDE includes a full-featured text editor with syntax highlighting and error checking, visual design tools, Ant support, version control system support, and many other features. The NetBeans IDE 6.5 provides several new features and enhancements, such as rich PHP, JavaScript and Ajax editing features, improved support for using the Hibernate web framework and the Java Persistence API, and tighter GlassFish v3 and MySQL integration. NETBEANS-WINDOW DEVLOPING APPLICATION Netbeans can be used to create professional-looking GUIs with automatic spacing and alignment. Professional Swing GUI Building Design Swing GUIs by dragging and positioning GUI components from a palette onto a canvas. The GUI builder automatically takes care of the correct spacing and alignment. Click into JLabels, JButtons, ButtonGroups, JTrees, JTextFields,

ComboBoxes and edit their properties directly in place. You can use the GUI builder to prototype GUIs right in front of customers. 4. Intuitive and Customizable You can choose whether the GUI code should be generated with fully qualified or simple class names. The help bar displays context-sensitive hints about what can be

Indo Global College Of Engineering 42 done with the selected component and suggests shortcuts that can speed up your work in the future. The NetBeans IDE also comes with built-in support for GUI localization and accessibility. If you use JDK 6 Update 10, you can now preview your forms in the new Nimbus look and feel. Standard and Custom GUI Components The extensible Component Palette comes with pre-installed Swing and AWT components and includes a visual menu designer. Use the Component Inspector to view a component's tree and properties. Swing Application Framework (JSR 296) Support The Swing Application Framework simplifies the handling of the application life cycle, actions and resources. Take advantage of the provided code-generation tools and building blocks, and develop small to medium-sized desktop applications faster than ever. Create menus fast and intuitively by dragging and dropping menu items onto the canvas; you can add mnemonics and rename menu items inline by clicking and typing in the Design view. Beans Binding technology (JSR 295) Support Take advantage of Beans Binding technology and the Java Persistence API to create Swing desktop database applications more easily. Using the new Java Desktop Application project template, you can quickly set up a form that displays a database table and also enables you to modify the database. Bind a database table to an existing form by dragging a table from the Runtime window onto the form.

Indo Global College Of Engineering 43 PHASES OF PROJECT RRS:- (Risk Review System): RRS module is about reviewing the risks involved in issuing a loan and approving a compensation claim. It includes the maintenance of details of all the employees along with the information regarding the loan application maintenance. Further it allows a record of an employee tp get entered.It also includes the management of verification of loan applications. From the above reference we can conclude this project works on following different components. Manage Sanction Loan Account Employee Record Maintenance Add Employee Change Password Loan Application Maintenance

Starting from the very beginning, we have a LOGIN page, only by the authentication of the user, we are provided access to use the different services offered by the project. We can either login as : 1. Administrator: Administrator would have all capabilities. Administrator will configure the System with information regarding different loan policies available for clients and the requirements for those loan polices and also other services offered by the Financial Company. Also administrator is responsible managing information regarding all the Employees.

2. Employee: Employee is the users of this system who will have access to the specific area in the system according to their access rights.

3. Client: Client is the end user who is in the need of financial services

LOGIN: Begin Take the username and password entered by the particular user. Check whether that username exists. If step 2 turns out to be true, Check whether password entered is correct.

Indo Global College Of Engineering 44 If step 3 turns out to be true, save the user details in a particular session and allow the user to access the particular services until that user log out from the account. Based on the details entered, check whether the user status is active or not. Access is only allowed if the user has status as active. If the status of the user is inactive, display the message inactive user. If step 3 turns out to be false, display the message invalid username or password If step 2 turns out to be false, display the message User doesnt exist. End

Now if the user is not able to LOGIN successfully then maybe the user has forgot the password. If the user has forgot the password we have a FORGOT PASSWORD link on the LogIn page which take the user on the forgot password page from where the user can get his password on the mail id entered for him in the database. Moreover we have a RESET button which we can use to change the present password and the new password is updated in the database.

FORGOT PASSWORD If a user has forgotten his/her password, he/she can recover that on its mail by entering specific details of itself and clicking on the link FORGOT PASSWORD provided on the login page. Password recovery includes the use of a page: Forgot password page

Indo Global College Of Engineering 45 : 1. Begin 2. Enter the username of the user who had forgot his password. 3. If the username turns out to be true i.e the username is present in the database then send the password of the user to the corresponding mail id of the user. 4. The mail id is taken from the database which was previously entered by user itself. 5. If the username turns out to be false, display the message User doesnt exist and redirects to the home_ masterpage. 6. End

DATAFLOW DIAGRAM

Indo Global College Of Engineering 46

CHANGE PASSWORD

If the user wants to change his present password then he selects the RESET button on the LogIn page and he is directed to the change password page where the user can change his password and the new password is updated in the database on clicking the UPDATE button present on the chage password page.

For changing the password the user need to enter his username and the password on the LogIn page and select the reset button. On clicking the reset button the control goes to change password page where the username is already passed on by the LogIn page. Now the user need to enter the old password and the new password which the user want to set now. Then the user is needed to confirm the new password by entering it again then on clicking the update button the new password is updated in the database.

If the old password entered by the user doesnot matches the corresponding username from the database then the error message is displayed saying Password Incorrect and the user is required to enter the old password once again.

1. Begin 2. Enter the old password corresponding to the username fetched from the LogIn page . 3. Now enter the new password.

Indo Global College Of Engineering 47 4. Again re-enter the new password in order to confirm the new password. 5. Click on the update button in order to update the new password in the database. 6. End DATAFLOW DIAGRAM

Indo Global College Of Engineering 48

Indo Global College Of Engineering 49 HOME PAGE

After the user gets successfully Login to the application, there comes a home page on the window screen which show following links:

HOME RISK REVIEW MANAGE SANCTIONED LOAN ACCOUNT CHANGED PASSWORD REPORTS LOGOUT

The user can manage or manipulate the links on the basis is his rights. The Logout link provided on the click of which the user gets succesfully logout from the application and cant further access any components of the application before Login again.

Http Sessions are used to maintain the whole details of the user in a particular instance after being logged in to the application.

Each of the Components of the application are explained as under with each of their data flow diagrams, screen shots, Algorithms and the description of the page i.e what particular operations can be performed by and on that particular page.

Also the information being added or modified must be maintained in consistent way. If a new document is added by a user it must in the added it the database i.e database should be updated properly and the document added should be displayed during the execution of the application.

Indo Global College Of Engineering 50 HOMEPAGE

Indo Global College Of Engineering 51 RISK REVIEW The risk-review section manage and sanction the loan to client .it will store the the client id and loan code,client name and application date and finally search for the same client in the database to review his account then manage and sanctioned the loan on his loan status and loan account as requirement.

if client wish to manage his account detail then loan application documents will open to manage client profile and loan account for making changes if required or just for client information to manage his\her account. As if client want to make updation in his current profile which is stored as biodata about client information in the database for checking the criteria for loan processing about his personal ,professional information,address and income details for the financial firm.

Indo Global College Of Engineering 52

Indo Global College Of Engineering 53

If client want to check his loan status or want to make some updation then he will go for view loan application which will show the client current loan projection with corresponding client id

Indo Global College Of Engineering 54 ADDING A NEW EMPLOYEE

This page allows the addition of new employee to the database. Following fields need to be filled for adding a employee to the database: Employee code, employee type, login password, name, father name, designation, permanent address, correspondence address, phone, mobile, email address, date of birth, status.

After clicking on the save button, the whole information gets stored in the Employee master table of the database and the employee maintenance main page shows the updated version of the database.

New employee id is assigned to the new employee being entered by executing the function which evaluates the maximum of the ids that are already assigned to it.

ALGORITHM:

1. Begin

2. The information regarding the new employee entered by the user gets stored in the object of employee bean class.

3. Insert query is made to the employeemaster table based on the information held by the object of the bean class.

4. If step 3 operation gets performed successfully, the result Inserted get returned and main page page get updated.

5. If any of the above queries fail, the error message is reported to the user.

6. End.

If client want to sanctioned the loan or want to process for new loan sanction loan account with the corresponding client id the he will go for Sanction Loan-create loan account

Indo Global College Of Engineering 55 Sanction loan-Create Loan Account

After completing the formality click on save and create account button it will save the processed sanctioned loan with corresponding client Id.and all information get stored in database with respective tables named as clientmaster and loanapplicationmaster.

Indo Global College Of Engineering 56

After new loanaccount get created it move to view Sanction-loan risk cover where it will check the risk and suggest for appropriate loan available with respective loan account details through database with corresponding interest rate that need client need to be submit additional on sanctioned amount. Sanction Loan Loan Risk Cover

Indo Global College Of Engineering 57

after administratior had completed the loan sanctioned risk review it will access the interest rate at which loan is sanctioned to the client.by checking its all mortage value ,asset valuation and post cheque date with appropriate approval from guranter it will issued the loan.

Indo Global College Of Engineering 58 Sanctioned Laon Interest Rate

Indo Global College Of Engineering 59

After interest rate is allotted to new loan sanction account it will check the loan sanction loan account details to give all updation about total EMI amount,Total Installment,installment left, and EMI Due date for every month that client need to submit to the company. Sanction Loan Laon Detail

After clicking on finish button information get stored in database with respective client name and ID.

Indo Global College Of Engineering 60

MANAGED SANCTIONED LOAN ACCOUNT MANAGED SANCTION LOAN ACCOUNT manages the client information by editing its details and updating it to client side by viewing it.administrator manages the client information by its client name and loan code for the particular loan account he has applied for.

EDITING THE DETAILS OF THE EXISTING EMPLOYEES

This page allows the editing of the information of an existing employee. Following fields can be updated Employee code, employee type, login password, name, father name, designation, permanent address, correspondence address, phone, mobile, email address, date of birth, status.

Indo Global College Of Engineering 61 After clicking on the update button, the whole information gets stored in the employeemaster table of the database and the employee maintenance main page shows the updated version of the database.

ALGORITHM:

1. Begin 2. The information of the employee which is to be updated gets stored in the object of employeebean class. 3. If the update button is pressed, Update query is made to the employeemaster table of the database corresponding to the particular employee id of that employee. 4. If query successfully executes, new information regarding the employee m gets stored

in the database and the main page shows the updated version of the database. 5. If Cancel button is clicked, control returns to the main page of the employee maintenance. 6. If any of the above queries fail, the error message is reported to the user. 7. End.

So, after going through the algorithms of the add and edit employee operations we see that only one of the table of the database gets updated: employeemaster .

If a particular client want to edit his edit sanction loan account he will click on edit link my matching its loan code and client name if validate user the his edit sanction loan account will open in which he could made the required changes as per his requirements like sanctioned amount, loan cheque bank and upload it to create updation in database.and if he clicked on cancel button the n it will move I step back that is to managed sanctioned loan account.

Indo Global College Of Engineering 62

When client get done with his edit sanctioned loan account it click on upload load account and next it will then switch to edit sanctioned loan loan risk cover where client fill his client id,name,loan sanctioned,loan cheque bank,loan cheque number,loan cheque favoured filling it correctly from database it will fetch the values of mortage asset,asset valuation,asset details,gurantor,post date cheques and finally get updated with loan risk cover on new edit sanctioned loan account whoch get stored in database and switch to next edit sanction loan loan interest rate where it fetch the values of client id,name loan code ,loan account ,loan sanctioned,loan bank,loan cheque number,loan chequed favoured,mortage asset asset valuation,asset details,guarantor,post date cheques from database which is set in edit sanction loan account and edit sanction loan risk cover for the corresponding client ,and client choose the particular rate of interest in which he want to have his loan sanctioned anf get updated which again set in database and program switch to edit sanction loan loan detail Where it get the values of total EMI Amount,Total installments,installments left,EMI due date for every month which client need to submit finally click on updated button and get finished on the edit details will reset in database with corresponding client name.

Indo Global College Of Engineering 63 Edit Sanction Loan Interest Rate

Edit Sanction Loan-Loan Details

Indo Global College Of Engineering 64 VIEWING THE EMPLOYEE DETAILS

The details of the employee can be viewed by clicking on the view link present on the table being displayed on the main page of employee maintenance.

Information shown of the employee that is shown includes Employee code, employee type, login password, name, father name, designation, permanent address, correspondence address, phone, mobile, email address, date of birth, status.

No information regarding the employee can be changed on this page. It only displays the information of the employee whose corresponding view link is clicked based on the employee id.

ALGORITHM:

1. Begin

2. The information of the employee which is to be displayed is retrieved as an object of employee bean class and is shown in the text fields of the View employee details page.

3. Information regarding the particular employee is retrieved by executing a select query on the employeemaster table of the database.

4. If query executes successfully, object of the employeebean class is returned which allows the information regarding the employee to get displayed.

5. If any of the above queries fail, the error message is reported to the user.

6. If Back button is clicked, control returns to the main page of product maintenance. After clicking on update and finish button it goes back to first page that is manage sanction loan loan account. Manage sanction loan for edit is for administrator and view is for client side to view his loan account details if person click on view link it .It will view sanction loan-loan account with values fetched from database.

Indo Global College Of Engineering 65

After clicking on next it will show the values of view sanction loan-loan interest rate.

Indo Global College Of Engineering 66

View sanction loan-loan risk review

Indo Global College Of Engineering 67 After clicking on next it show the view sanction loan loan interest rate by fetching the value from datebase.

Client can view it rate of interest for particular month which would be interested on his installment amount.after clicking on next button client again can view VIEW SANCTION LOAN-LOAN DETAILS where he get informed how much EMI Amount he had to pain ,total installment,total installment left to paid and EMI due date.

Indo Global College Of Engineering 68 VIEW SANCTION LOAN-LOAN DETAILS

And then finished.clicking on finished button it will get back to managed sanction loan-loan account page and on clicking on previous it get back to one page.

Indo Global College Of Engineering 69 After that REPORTS which consist of JASPER REPORT. Jasper Reports Jasper Reports is an open source reporting engine. Using Jasper Reports reports can generated in any type of application i.e. console application, desktop application, web application, enterprise application. For example-LOGIN JASPER REPORT describing lount account detail

LOGIN JASPER REPORT

Indo Global College Of Engineering 70 MANAGE SANCTION REPORT MANAGE SANCTION ACCOUNT REPORT DESCRIBES SANCTION LOAN DETAILS.

View sanction loan risk cover View sanction loan risk cover describe view sanction loan detail.

Indo Global College Of Engineering 71 LOGOUT It will logout of application at any point and switch back to login page .where client or administrator has to login again it he wants to work on.

Indo Global College Of Engineering 72

RRS-DATA FLOW DIAGRAM

PROCESS APPLICATION

Indo Global College Of Engineering 73

RISK REVIEW

Indo Global College Of Engineering 74

LOAN SANCTION -ADD

Indo Global College Of Engineering 75

LOAN SANCTION EDIT

Indo Global College Of Engineering 76

LOAN SANCTION VIEW

Indo Global College Of Engineering 77 CONCLUSION

Fintelligence is a system for easy, quick, and secure file processing that will automate the tasks of a Financial Company like maintaining information of client, verifying information provided by client, checking an eligibility of a client whether loan can be issued or not, and finally issuing the loan. Fintelligence is basically designed for those financial companies which provide different types of loans from different banks to all types of clients. To keep track of different loans, different interest rates of different banks and different types of clients, is not an easy job. To make these tasks easy with all latest updates, Fintelligence is quiet helpful. It will be an enterprise application, so it is distributed and data centric. This application is designed on the basis of enterprise application architecture. In this application, MySQL database will be used to store data related to employees, loans, clients, etc. Since database will be on Server, so any number of users can work simultaneously and can share their data with each other.

It will be developed using Java and J2EE technologies.

S-ar putea să vă placă și