Home Security SRS documentation

download Home Security SRS documentation

of 28

  • date post

    22-Sep-2014
  • Category

    Documents

  • view

    172
  • download

    7

Embed Size (px)

Transcript of Home Security SRS documentation

HOME SECURITY FOR I-PHONE APPLICATION

A Report on

I-Guard

Submitted By Honey Patel(080120107062) & Aanal Purani(080120107077)

GANDHINAGAR INSTITUTE OF TECHNOLOGY DEPARTMENT OF COMPUTER ENGINEERING/INFORMATION TECHNOLOGY2011-2012

1

HOME SECURITY FOR I-PHONE APPLICATIONA Report on

I-GuardMajor Project-ISubmitted in partial fulfilment of the requirements For the degree of Bachelor of Engineering in Computer Engineering

Submitted By Honey Patel(080120107062) & Aanal Purani(080120107077)

GANDHINAGAR INSTITUTE OF TECHNOLOGY DEPARTMENT OF COMPUTER ENGINEERING/INFORMATION TECHNOLOGY2011-2012

2

HOME SECURITY FOR I-PHONE APPLICATION

CertificateThis is to certify that the Major Project-I entitled I-Guard submitted by (Honey Patel)(080120107062), towards the partial fulfillment of the requirements for the degree of Bachelor of Engineering in Computer Engineering of Gandhinagar Institute of Technology, Moti bhoyan is the record of work carried out by her under my supervision and guidance. In my opinion, the submitted work has reached a level required for being accepted for examination. The results embodied in this major project, to the best of my knowledge, havent been submitted to any other university or institution for award of any degree.

Internal Guide, Mr.Ankit Barot Lecturer Computer Department

Department Head, Mrs.Darshna Mistry Assistant Professor Computer Department

External Faculty

3

HOME SECURITY FOR I-PHONE APPLICATION

AcknowledgementThis project would not have been possible without the guidance and support technical and personal of a number of people. We would like to thank all those individuals, researchers, professionals and technicians who are working in the domain of I-phone directly and indirectly. We went through many problems and challenges during our tenure with the industry. We had gone through many books and also referred many recommendations proposed by many forums and standards making bodies. Finally we would like to thank our college faculty members and friends without whose support we would not have been able to complete the project up to this.

Aanal Purani & Honey Patel

4

HOME SECURITY FOR I-PHONE APPLICATION

Abstract

The purpose of making this project is to provide security network on .Net platform, with its own database so that all users of that application can secure their premises whether they are at their work place or at their home.

5

HOME SECURITY FOR I-PHONE APPLICATION

Index1. Introduction ...........................................................................................................................7 1.1 Purpose ..................................................................................................................................7 1.2 Document Conventions .........................................................................................................7 1.3 Intended audience and reading suggestions....7 1.4 Project Scope ..........................................................................................................................7 2. Overall Description ................................................................................................................8 2.1 Product Perspective ................................................................................................................8 2.2 Product Features......................................................................................................................8 2.3 User Characteristics ................................................................................................................8 2.4 Operating Environment ..........................................................................................................10 2.5 Design and Implementation Constraints ................................................................................13 2.6 User Documentation ...............................................................................................................15 2.7 Assumptions and Dependencies ............................................................................................16 3. System Features .....................................................................................................................17 3.1 System Feature 1 ...................................................................................................................17 4. System design..18 4.1 Data flow Diagram.....18 4.2 Use case Diagram20 4.3 Class Diagram.....21 4.4 Sequence Diagram..22 4.5 E-R Diagram..23 5. External Interface Requirements ........................................................................................24 5.1 User interface.24 5.2 Hardware Interfaces ..............................................................................................................24 5.3 Software Interfaces ...............................................................................................................24 5.4 Communication interface...27 6. Other Nonfunctional Requirements .....................................................................................27 6.1 Safety Requirements ..............................................................................................................27 6.2 Security Requirements ..........................................................................................................28 6.3 Software Quality Attributes ..................................................................................................28 References29

6

HOME SECURITY FOR I-PHONE APPLICATION

1.Introduction:1.1 Purpose: This project is about the design and development of an automated home security system. Home security system should provide security and safety features for those houses that are using it. It should be able to alarm residents from natural, accidental and/or human dangers such as: fire,theft, animals invading, .etc. The requirement document will include some details about the problem or the need for a home security system as well as the solution specifications or what is expected from home security system. This document, the Software Requirements Specification (SRS) is used to describe and track the software requirements for home security system. In addition to basic requirements this SRS will describe the external Interface Requirements, nonfunctional requirements, and Overall Description,System Features,etc.

1.2 Document Convention:Main Section Title : Font : Times New Roman Sub Section Title: Font : Times New Roman Other Text Explanation: Font : Times New Roman Face: Bold Size: 14

Face: Bold

Size: 12

Face: Normal

Size: 12

1.3 Intended Audience and Reading SuggestionsThis SRS is useful for developer, user, external guide and internal guide.Each of them can easily understand how to use our software product by reading this SRS.

1.4 Project Scope: The scope of this project is what is suggested by the instructor in the project initiation document provided in the website. The document addresses the general purposes for home security system. Any detail requirements can be verified with the user or the customer.7

HOME SECURITY FOR I-PHONE APPLICATION

2. Overall Description:2.1Product Perspective: iPhone Technology and Literature Review application for Home security &monitoring. User can control arm(lock)/disarm(unlock)/alarm(emergency) his home from the mobile. He can view the history of the events and camera attached in his home. Whoever can interact with our home security systems such as the lightening system, phone system, alarm etc in enable mode.

2.2 Product Features: Reports sent in seconds via pop up messages in phone call.It does support WI-FI and GPRS for iphone and Internet connection for Application server. Arm/Disarm alarm via internet keypad Remote programming of the system Super fast transmission speed Easy to install and set-up APPLICATIONS: Alarm signal reporting Open/Close signal reporting - Monitor by user code Latch-key reporting Polling loss notification - Monitor if you lose communication Supervisory by zone - Monitor a liquor or gun cabinet in your home

2.3 User Characteristics: Passwords: Many users, security specialists and administrators rely at least in part on passwords to authenticate the identity of those wishing to gain access to a security system. Passwords need to incorporate more than just letters for the greatest security, making use of numbers and other symbols available on the keyboard. Those wishing to gain access by defeating the password security system may try commonly used passwords, or to hack the password system in order to gain unauthorized entry.

8

HOME SECURITY FOR I-PHONE APPLICATION Biometrics: Biometric devices detect the identity of the person trying to gain access to a security system. In home security system, biometric scans a user's fingerprint to authenticate the person's identity before allowing the user access to the system. Certificates: Third-party digital security companies (called certification authorities) issue digital certificates to companies or individuals. Digital certificates vary in their complexity, depending on the security needs of the individual or company. The certification authority issues a certificate that the user embeds on security sysytem. When the user attempts to gain access to secured areas on a network, or even secured websites, another software program at the receiving end of the request validates the required digital certificate. Smart cards: An authorized individual may use a smart card to authenticate his identity in order to gain access to secured