Upload
akshaysuresh
View
219
Download
0
Embed Size (px)
Citation preview
8/13/2019 Srs for Network Conferencing, Centralized Database
1/9
Secured Networking, Centralized database
and Network conferencing in LAN
Software Requirements Specification
By-
Akshay S. Ijantkar
Satish S. Kadabagil
8/13/2019 Srs for Network Conferencing, Centralized Database
2/9
Secured Networking, Centralized database and Network conferencing in LAN
Software Requirements Specification Page ii
Table of Contents
1. INTRODUCTION ................................................................................................................................................... 1
1.1PURPOSE .............................................................................................................................................................. 11.2SCOPE .................................................................................................................................................................. 11.3DEFINITIONS,ACRONYMS,AND ABBREVIATIONS ................................................................................................ 11.4OVERVIEW ........................................................................................................................................................... 1
2. GENERAL DESCRIPTION ................................................................................................................................... 1
2.1PRODUCT PERSPECTIVE ....................................................................................................................................... 22.2PRODUCT FUNCTIONS .......................................................................................................................................... 22.3USER CHARACTERISTICS ..................................................................................................................................... 22.4GENERAL CONSTRAINTS ...................................................................................................................................... 22.5ASSUMPTIONS AND DEPENDENCIES ..................................................................................................................... 2
3. SPECIFIC REQUIREMENTS ............................................................................................................................... 3
3.1SOFTWARE REQUIREMENTS .........................................................................ERROR!BOOKMARK NOT DEFINED.3.2HARDWARE REQUIREMENTS ................................................................................................................................ 33.3FUNCTIONAL REQUIREMENT ................................................................................................................................. 43.4USE CASES ............................................................................................................................................................ 4
3.4.1 case #1 ........................................................................................................................................................ 43.4.2 case #2 ........................................................................................................................................................ 4
3.4.3 Classes / Objects...4
3.4.3.1 Attributes..4
3.4.3.2 Functions...4
3.5NON-FUNCTIONAL REQUIREMENTS ..................................................................................................................... 43.6LOGICAL DATABASE REQUIREMENTS .................................................................................................................. 4
4. ANALYSIS MODELS ............................................................................................................................................. 4
4.1SEQUENCE DIAGRAMS ......................................................................................................................................... 54.2DATA FLOW DIAGRAMS (DFD) ........................................................................................................................... 6
8/13/2019 Srs for Network Conferencing, Centralized Database
3/9
Secured Networking, Centralized database and Network conferencing in LAN
Software Requirements Specification Page 1
1. Introduction
Newer days LAN has been used in many organizations and institute to share the same resource.
The software tool we are going to develop should be convenient to all users to share the data and
to communicate with other users.
In LAN there is possibility of leak of database through peripheral storage devices. And thissoftware should be able to track the any connection of peripherals in LAN.
There is another problem in LAN such as users data can be accessed/modified by other user, so
the user should be able to store their data in secure way.
1.1PurposeThe main purpose of this software tool to make the user to take the maximum use of LAN easily.
1.2 Scope
(1) Proposed system is integration of-
Network asset tracker, Text passing tool, document passing and Voice over IP. Network asset tracker:- Network asset tracker is a inventory tool which will check all the
systems of the network(LAN) for the hardware installed and notify it to theadministrator.
Text passing tool:- This will provide the user a way to communicate using textcommunication.
Document passing:- As there is a need for a centralized database, the users canimplement this feature by storing all their data in the same database. Or he might send
it to other clients.
VoIP:- Voice over internet protocol is a method for taking analog audio signals like thekind we here when we talk on the phone and turning them into digital data that can be
transmitted over the network.
1.2Definitions, Acronyms, and AbbreviationsVoIP: Voice over internet protocol
IP: Internet protocol
LAN: Local Area Network
1.3 Overview
(1) Software and hardware requirements.
(2) Needs to understand the requirements.
2. General Description
The attenuation noise in the LAN affects the rate of communication those we require better
quality of network. Poor quality of microphone and speakers will affect the quality ofcommunication.
8/13/2019 Srs for Network Conferencing, Centralized Database
4/9
Secured Networking, Centralized database and Network conferencing in LAN
Software Requirements Specification Page 2
2.1 Product Perspective
We are integrating all the above mentioned features in a single software package which will
reduce the cost effectiveness.
2.2 Product Functions
Network asset tracking: the inventory software tool is installed in the client which willgive the notification to the administrator whenever an external device is connected and itwill also notify the current running applications. The information is sent to the
administrator through the network as packets.
Text passing tool: this tool will provide the user/client a platform where he can make thetext conversation. The process will start by converting the text into digital data then it
will be encrypted and sent over the network as packets at the receiver side it will be
decrypted and displayed to the user/client.
Document passing: This tool provide the user/client a means by which he can pass thedocument to the client or store it in the database. The functionality is carried out by
converting the document into digital stream and after encryption it is passed as packets.Based on the user choice it may be either received by the other client or stored in the
database.
VoIP: This will provide the voice communication to the user/clients. The inputted audiois converted to binary data and sent through the network as packets and at the receiver
side it will get converted to audio.
2.3 User Characteristics
This software is user friendly thus it does not need much requirement to co-op with the client
side application. The administrator must be capable of handling all the information coming fromdifferent client systems.
2.4 General Constraints
Limitation over the range of LAN. The communication requires the receivers IP address. If the clients system requirement does not meet the specified requirements the
communication might not establish or the rate will be low.
2.5 Assumptions and Dependencies
Assumptions:
The speed of the LAN must be good. The clients and the administrator should have the basic knowledge about the computer
networks.
Dependencies:
The communication range is highly dependent on the range of LAN. The client/server system must satisfy the hardware and software requirements.
8/13/2019 Srs for Network Conferencing, Centralized Database
5/9
Secured Networking, Centralized database and Network conferencing in LAN
Software Requirements Specification Page 3
3. Specific Requirements
3.1SOFTWARE REQUIREMENTSPlatform : JAVA
Operating System : Microsoft Windows NT 4.0 or
Windows 2000or XP
3.2HARDWARE REQUIREMENTSProcessor : 733 MHz Pentium III Processor
RAM : 128 MB
Hard Drive : 10GB
Monitor : 14 VGA COLOR MONITOR
Keyboard : 104 Keys
Mouse : Logitech Serial Mouse
Disk Space : 1 GB
Headsets : 2 Nos.
Communications Interfaces : LAN connection
Cards : Sound card
3.3 Functional Requirements
Inputs1. Voice.2. Peripheral devices.3. Confidential documents by clients.
Processing:Conversion to packets and cryptography
Outputs:1. Required data from centralized data base.2. Voice.3. Notification to server in case of connecting peripheral device.4. Clients current task information in server
8/13/2019 Srs for Network Conferencing, Centralized Database
6/9
Secured Networking, Centralized database and Network conferencing in LAN
Software Requirements Specification Page 4
3.4 Use Cases
3.4.1 Use Case #1: Client side
3.4.2 Use Case` #2: Server side
3.4.3 Classes / Objects3.4.3.1 Attributes: User Id, IP address of client systems.
3.4.3.2 Functions: Communication, data transfer.
3.5 Non-Functional Requirements
Ethernet delay o.63 ms
Packet delay 156.66ms
Traffic sent 10918pps
Traffic received 9245pps
Packet loss 14.57%
3.6 Logical Database Requirements
Data formats Supports all data formats (Depends on system).
Storage capabilities Depend upon the requirement.
Data retention Should hold all data.
Data integrity Data is integrated to all user
4. Analysis Models
4.1 Sequence DiagramsVoIP Sequence flow:
Text transfer flow:
8/13/2019 Srs for Network Conferencing, Centralized Database
7/9
Secured Networking, Centralized database and Network conferencing in LAN
Software Requirements Specification Page 5
Document passing to client/server:
8/13/2019 Srs for Network Conferencing, Centralized Database
8/9
Secured Networking, Centralized database and Network conferencing in LAN
Software Requirements Specification Page 6
Network asset tracking:
4.2 Data Flow Diagrams (DFD)
8/13/2019 Srs for Network Conferencing, Centralized Database
9/9
Secured Networking, Centralized database and Network conferencing in LAN
Software Requirements Specification Page 7