In this assessment item, you are required to provide the detailed architecture and design of the system.
Automated Teller Machine is basically an banking outlet that is an banking outlet allowing the customers to do basic transaction such as depositing money, and withdrawing money from the ATM (Prasanthi et al., 2014). The case study deals with the Colllin’s ATM Bank from where the customers can credit or debit cash from the machine. The first ATM was established in the year 1967 in London and within 50 years it spread around the world.
In this report, the details of a ATM machine is described elaborately. The functional requirements as well as non-functional requirements are illustrated that helps to build an ATM system. This report also elaborates the Use case diagram of the proposed ATM system of Collin’s Bank. All the actors and the use cases are described that are used in Use Case. There is a model class diagram as well for the ATM. The five activities of SDLC are also described clearly along with environment, application components, network infrastructure, database and network infrastructure.
Functional Requirements: Functional Requirements are basically the processes or tasks that are to be performed by ATM system under development (Risodkar et al., 2017). Functional requirements that are involved with an ATM system are withdrawal processes and the deposit processes that are the done by the customer. The following shows the functional requirements that are related with an ATM system.
FR-Serial Number |
FUNCTIONAL REQUIREMENTS |
FRNO-1 |
The ATM machine has a card reader, which determines account number of the card that is entered. |
FRNO-2 |
There is an idle state, that is considered as a function in an ATM |
FRNO-3 |
After detecting the card, the system asks for the ATM pin from the customer. |
FRNO-4 |
A function is there, which shows the many options on the screen. The options includes withdrawal, balance enquiry, pin change, deposit, mini-statement, pay bill, Update account. |
FRNO-5 |
There is a cash dispenser that has the function to dispense cash. |
FRNO-6 |
Printing section gives the printing receipt of the account details on demand (Bahill & Madni, 2017). |
FRNO-7 |
After completion of the transaction, the card can be ejected or can be continued for another transaction. |
FRNO-8 |
Envelop feeder accepts all envelops inserted. |
FRNO-9 |
Envelop feeder gets aware if envelop is inserted. |
FRNO-10 |
There is a printer, which determines if there is enough paper or ink. |
FRNO-11 |
By default, the ATM is in an idle state. |
FRNO-12 |
The amount of cash that is available is being aware by the cash dispenser. |
FRNO-13 |
For bill payments, the user is shown about the number of bill that are to be paid (Hossian, Nawaz & Grihan, 2013). |
FRNO-14 |
The inputs are given on a keypad. |
FRNO-15 |
The system is to be aware of state of envelop drawer. |
FRNO-16 |
There is a function to withhold the bank card by the system. |
FRNO-17 |
There is cancel button on the keypad, which cancels the transaction if pressed. |
Non-Functional Requirements: The non-functional requirements are the standards or the qualities that the system of ATM must have. The non-functional requirements does not involve any kind of tasks that are involved with the system (Duvey, Goyal & Hemrajani, 2013). The non-functional requirements involves that the system is to be built within a particular cost, and have the strategies to mitigate the attacks that comes to the system. The non-functional requirements that can be involved in an ATM system are as follows:
NFR-Serial Number |
NON-FUNCTIONAL REQUIREMENTS |
NFRNO-1 |
The requirements for the system of ATM should have a display, card dispenser, envelop slot, envelop drawer, printer, and a keypad (Raj & Julian, 2015). |
NFRNO-2 |
There must be 10 buttons on the keypads showing number from 0 to 9. And other four buttons are to be present as well showing OKAY, CANCEL, CLEAR, EXIT, and all the buttons performs different functions. |
NFRNO-3 |
When demanded for the pin, the pin is to be put within 20 seconds. |
NFRNO-4 |
There are maximum of three attempts that the customer can put for entering the pin correctly. |
NFRNO-5 |
The user cannot access the card if the pin is entered wrong three times. The card gets blocked (Gaspar et al., 2016). |
NFRNO-6 |
There is a security associated with the ATM. |
NFRNO-7 |
There should be a restart and a shut down button in an ATM system. |
NFRNO-8 |
Envelop Drawer can be opened and can be refilled. |
NFRNO-9 |
Envelop feeder has the function to be opened so remove the deposited envelops. |
NFRNO-10 |
The cash in the cash dispenser can be refilled. |
NFRNO-11 |
The printer is refilled as well. |
Figure 1: Use Case Diagram of Collin’s ATM
(Source: Created By Author)
Description of the Use Case:
The customers are able to withdraw cash as well as deposit money in the ATM system of the Collin’s Bank. The actors that are involves in the system are the customers and the technicians.
The technicians will maintain the system and will give update to the bank about the ATM maintenance. The bank will be updated from the technicians who are involved with the system.
The customer plays the main role in the ATM system. A customer or a user of the user can withdraw money from the ATM. At the same time, he can deposit money, check the updated balance of his own account and then can change the pin of his card if the customer wills. All the works that are done by customers are all update in the database of the bank.
Figure 2: UML Diagram for ATM System
(Source: Created by Author)
There are different types of information system that are used by different business or organizations. The concept by which different organizations or different business has their own life, is known as System Development Life Cycle (Buede & Miller, 2016). The five phases that are involved in SDLC are planning, analysis, design, implementation, and Support/Maintenance.
Planning: During the planning phase of SDLC, the security of the ATM machine is kept in mind so that the further continuation of the system does not affect the development of the system. The business requirements are to maintain the triad factor including confidentiality, integrity, as well as availability.
Analysis: The analysis phase consists risk assessment that are involved with the security of requirements. In analysis phase, testing is performed as functional testing and security testing.
Design: The architecture of the ATM system is kept in mind while designing the system of ATM (Patoliya & Desai, 2017). The application for ATM is designed, along with the network integrated and designed. In design phase, a contingency plan is also involved with review of design.
Implementation: mainly five activities are involved in the implementation phase. Constructing the components of software, test and verify the software, conversion of data, training is provided to the users and the system document, and installing of the system is done in this phase.
Maintenance and Support: The maintenance and support of a SDLC model includes support that is given to the user regarding the system. Physical support for the onsite user is also maintained along with all the issues solved regarding the new system.
The design of the environment mainly focuses on designing and on planning section of SDLC model. The environment of ATM mainly focuses about carrying examination with the ATM system. There are many stages in SDLC model that can be carried out in implementing the ATM system (Simakov et al., 2015). This platform carries different developments of software in its building process. Integrated Development Environment is another environment that can be implemented with the software development of the ATM. The IDE is basically a platform that helps to develop the software system with different types of process of development. The IDE environment provides some particular processes that makes the work of engineers easy to complete the work with the available resources and makes the development system cost effective.
The components that can be involved in the development of the ATM system for the Collin’s Bank are those that is mainly used for successful interaction in between the customers and the system of ATM (Gardi et al., 2015). The components that are generally involved in the development system of the ATM machine are as follows:
Switch: There is a on and off switch connected with the ATM machine, so that the machine can be started or can be turned off when needed. . The on off switch is basically used by the technicians for maintenance purpose.
ATM card reader: The card reader of the ATM machine is attached with the machine for reading the card that is given as input by the user. The card reader to read the card generally uses magnetic strips to read the card. Messages are displayed on the screen
Key pad: For entering the numbers or any type of input on the system, ATM keypad is used (Okokpujie et al., 2016). Information is given to the machine from the user through the keypad.
Cash Dispenser: Cashes are dispensed from the cash dispenser. The cash dispenser is not to be kept empty.
Deposit Slot: The deposit slot is a section on the machine that accepts cash from the user and users also deposits checks on the deposit slot.
Printer: The printer is used in the ATM machine for printing the account receipts for the customers.
Communication and Network infrastructure: The network infrastructure in the ATM machine consists of different types of communication structure that are all related with the transaction in the bank. All the bank transactions are noted on the network infrastructure.
There is to be a communication between the system and the user. The interaction that is done in between a machine and human is known as human computer interaction. User interface involves transmitting the computer message to human and vice versa. The responses from the computer are also displayed on the screen through user interface.
Database in ATM system involves all the details of the transaction associated with every customer related to a particular bank (Wu, 2017). The information about the transaction, deposit or withdrawal is all stored on the database. The database is to be kept updated all the time. The transaction that is done at any ATM is updated with the database of the bank as all the databases are connected. The mangers of the banks get to know about the transaction with a particular account. The database associated with the ATM is present with the bank as well.
Software methods
The network associated with the ATM system gives a particular software interface. different banks mostly uses different software for the entire process that is to be carried out. The software for transaction management are different and the resources are basically kept under BMS (Ahmad, Rifen & Wahab, 2016). There are different kinds of software used for network establishment. For recording purpose, the database mainly uses the Oracle version of 7.0.
Conclusions
Mostly there are two different types of ATM. The basic machines of ATMs only help the customers to withdraw cash, and also receive the printed reports about their accounts. The other type of machine helps to deposit money, does credit payments, and reports the account information. The ATMs are connected to the database of bank and withdrawal or deposit updates the database of the bank directly.
In this report the detailed structure and the design of the Collin’s ATM is shown in detailed. This report illustrated the functional as well as the non-functional requirements that are involved with the ATM system. There is a use case diagram in this report that defines the actors and works that are done in the ATM system. There is also a UML class diagram for the ATM system that shows all the functions that are carried in the system. This system has System Development Life Cycle that is discussed in details in this report.
References
Ahmad, N., Rifen, A. A. M., & Wahab, M. H. A. (2016, November). AES Cardless Automatic Teller Machine (ATM) Biometric Security System Design Using FPGA Implementation. In IOP Conference Series: Materials Science and Engineering (Vol. 160, No. 1, p. 012113). IOP Publishing.
Bahill, A. T., & Madni, A. M. (2017). Discovering system requirements. In Tradeoff Decisions in System Design (pp. 373-457). Springer, Cham.
Buede, D. M., & Miller, W. D. (2016). The engineering design of systems: models and methods. John Wiley & Sons.
Duvey, A. A., Goyal, D., &Hemrajani, D. N. (2013). A reliable ATM protocol and comparative analysis on various parameters with other ATM protocols. International Journal of Communication and Computer Technologies, 1(56), 192-197.
Gardi, A., Sabatini, R., Ramasamy, S., & Marino, M. (2015). Automated ATM system for 4-dimensional trajectory based operations. In AIAC16: 16th Australian International Aerospace Congress (p. 190). Engineers Australia.
Gaspar, A., Bari, A. G., Kumar, A. N., Bucci, A., Wiegand, R. P., & Albert, J. L. (2016, November). Evolutionary Practice Problems Generation: Design Guidelines. In Tools with Artificial Intelligence (ICTAI), 2016 IEEE 28th International Conference on (pp. 544-548). IEEE.
Hossian, F. S., Nawaz, A., &Grihan, K. (2013). Biometric authentication scheme for ATM banking system using energy efficient AES processor. International Journal of Information and Computer Science, 2(4), 57-63.
Okokpujie, K., Olajide, F., John, S., & Kennedy, C. G. (2016, January). Implementation of the enhanced fingerprint authentication in the ATM system using ATmega128. In Proceedings of the International Conference on Security and Management (SAM) (p. 258). The Steering Committee of The World Congress in Computer Science, Computer Engineering and Applied Computing (WorldComp).
Patoliya, J. J., & Desai, M. M. (2017, April). Face detection based ATM security system using embedded Linux platform. In Convergence in Technology (I2CT), 2017 2nd International Conference for (pp. 74-78). IEEE.
Prasanthi, B. V., Jyothi, U. P., Sridevi, B., & Krishna, T. V. (2014). Security Enhancement of ATM System with Fingerprint and DNA Data. International Journal of Advanced Research in Computer Science and Software Engineering.
Raj, M. M. E., & Julian, A. (2015, March). Design and implementation of anti-theft ATM machine using embedded systems. In Circuit, Power and Computing Technologies (ICCPCT), 2015 International Conference on (pp. 1-5). IEEE.
Risodkar, Y. R., Pawar, A. B., Chavanke, S. N., & Pawar, A. S. (2017). ATM Authentication with Enhance Security Using GSM. Journal of Science and Technology (JST), 2(5), 01-05.
Simakov, D. S., Wright, M. M., Ahmed, S., Mokheimer, E. M., & Román-Leshkov, Y. (2015). Solar thermal catalytic reforming of natural gas: a review on chemistry, catalysis and system design. Catalysis Science & Technology, 5(4), 1991-2016.
Wu, J. (2017). Distributed system design. CRC press.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download