26
Safe Home System Version 1.0

SHS_SRS

Embed Size (px)

Citation preview

Page 1: SHS_SRS

Safe Home System

Version 1.0

Page 2: SHS_SRS

Safe Home System

2011

Page 3: SHS_SRS

Safe Home System

2011

Table of Contents

1. Introduction 1

1.1 Purpose 11.2 Scope 11.3 Definitions, Acronyms and Abbreviations 11.4 References 21.5 Overview 2

2. Positioning3

2.1 Business Opportunity 32.2 Problem Statement 32.3 Product Position Statement 3

3. Stakeholder and User Descriptions 4

3.1 Market Demographics 43.2 Stakeholder Summary 43.3 User Summary 53.4 User environment 53.5 Stakeholder Profile and User profile 63.6 Alternatives and Competition 7

4. Product Overview 8

4.1 Product Perspective 84.2 Summary of Capabilities 84.3 Assumptions and Dependencies 84.4 Cost and Pricing 94.5 Licensing and Installation 9

5. Product Features 10

6. Constraints106.1 Security 106.2 Usability 106.3 Responsiveness 106.4 Capacity 10

7. Precedence and Priority 11

8. Other Product Requirements 11

8.1 Applicable Standards 118.2 System Requirements 118.3 Performance Requirements 118.4 Environmental Requirements 11

9. Documentation Requirements 12

9.1 User Manual 139.2 Online Help 13

Page 4: SHS_SRS

Safe Home System

2011

9.3 Installation Guides, Configuration, Read Me File 139.4 Labeling and Packaging 13

10. Appendix 1 - Feature Attributes 14

10.1 Status 1510.2 Benefit 1510.3 Effort 1610.4 Risk 1610.5 Stability 1610.6 Target Release 1610.7 Assigned To 16

Page 5: SHS_SRS

Safe Home System

2011

1. IntroductionThe purpose of this document is to collect, analyze and define high-level needs and features of the Safe Home System. It focuses on the capabilities needed by the stakeholders, and the target users, and why these needs exist. The details of how the Safe Home System fulfils these needs are detailed in the use-case and supplementary specifications. The document also explains the working of sensors, alarms and cameras used in Safe Home System.

1.1. PurposeThe project Safe Home System (SHS) is open source burglar alarm control and monitoring software using wireless alarm system.The is an advanced wireless Home/Business Alarm Controller which supports many types of sensors, can control various types of devices, and has computer interfaces for USB and Ethernet.With our code you can:

Arm and disarm your alarm system Read the current settings and program the device Monitor all the attached devices (PIR sensors, web cams etc)

1.2. Scope

In this system, home owner can start the system as well as independently control all the sensors through SMS or internet. Home owner will be informed by SMS and call when any human intrusion detected. He can view logs of images of human and time when intrusion took place in his home. This system will be very useful to a homeowner who does not have sufficient funds to pay for a professionally installed security system.

A majority of homeowners simply do not have sufficient funds to pay for a professionally installed security system.In addition to this; many homeowners may not feel the need to actually invest in a professionally installed security system. Many individuals who rent their homes, such as apartment owners, are usually not allowed to install permanent devices in their homes such as a professionally installed security system.Most inexpensive home security devices and components are nothing more than cheap and ineffective noise makers.

1.3. Definitions, Acronyms and Abbreviations SHS corporate web site: Users who are travelling can have full access to their home

system by connecting to the SHS corporate web site. This site routes all its communication to the CP located in the client’s home. Direct external connection to the CP is not allowed to help prevent denial-of-service attacks and other forms of hacking.

Micaz Motes: A Micaz mote is a node that has a sensor placed on it. It communicates the sensor data with the programming board via radio. The motes are loaded with nesC application program.

Safe home System Page 1

Page 6: SHS_SRS

Safe Home System

2011

Term Definition

SMS Short Message ServiceSHS Safe Home SystemCP Control PanelUPS Uninterrupted Power Supply Database An organized collection of related informationAdministrator One who manages the entire systemConstraint Any limit or restriction given for the design process

1.4. References Software Engineering: a practitioner’s approach, by Roger S. Pressman, McGraw-Hill

publication, 6th edition, 2005. SafeHome System Architectural Model, by Timothy C. Lethbridge, in conjunction with

Roger Pressman, version 7.01, July 2004

1.5. OverviewThe remainder of this document is two chapters, the first providing a full description of the project. It lists all the functions performed by the system. The final chapter concerns details of each of the system functions and actions in full for the software developers’ assistance.

This project deals the working of SHS using sensors, alarms and cameras. The coding is done in Java and the system communicates over wireless 802.15.4. It makes use of one PC, a GSM modem in a mobile phone, sensors, web cameras and an alarm to depict the working of the system.

The document contains the stakeholders involved, the requirements of the project, and the product features. This is followed by a future scope of improvement possible in the system.

Safe home System Page 2

Page 7: SHS_SRS

Safe Home System

2011

2. Positioning

2.1. Business OpportunityPeople nowadays give a lot of stress on the safety of their homes. They require a security system

installed in their homes but at an affordable price with desirable services. Since Safe Home Systems enable the fulfillment of such needs of the masses this software has a tremendous market available.

2.2. Problem Statement

The problem of An increase in crime rates in large cities

Affects Middle income home owners

The impact of which is uncertainty in the safety and security of the home owners and their belongings

A successful solution would

a flexible, cost effective home safety and security system that can be easily configured by the homeowner. In addition, a home security and safety system can have a rich variety of sensors to coordinate, monitor and control aswell as emergency notification features. The user would be able to access the system either locally or remotely. It will be able to utilize existing alarm monitoring networks.

2.3. Product Position Statement

For Any residence owner

Who For Security of home in absence of owner

The (product name) is a Security Services product

That Extra benefit of camera along with alarm to protect the home with reasonable price

Our product Web cam detects motion in the home. Various sensors such as Infrared and sound help to detect intrusion and temperature sensor detects fire. Phone service will inform the house owner of the same.

Safe home System Page 3

Page 8: SHS_SRS

Safe Home System

2011

3. Stakeholder and User Descriptions The company providing the software and installing in the home of the customer The owner of the home and his family The friends or guests of the family resident in the home Software engineers who are involved in developing the software The law governing committee Sensor manufacturers The police of the locality

3.1 Stakeholder Summary

Name Represents Role

System Analyst This is a stakeholder that works with the stakeholders to gather their needs.

Leads and coordinates requirements elicitation and use-case modeling by outlining the system's functionality and delimiting the system; forexample, identifying what actors exist and what usecases they will require when interacting with the system.

Requirements specifier

This is a stakeholder that workswith the Analysts to correctlytranslate requests/needs into the requirements to be used for design.

Specifies the details of one or more a parts of the system's functionality by describing one aspects of the requirements, this will include functional and non-functional.

Technical Reviewer

This is a stakeholder that must be involved regularly to maintain the development cycle.

Responsible for contributing feedback to the review process. This role is involved in the category of review that deals with the technical review of project artifacts. This role is responsible for providing timely, appropriate feedback on the project artifacts being reviewed.

Software Architect

This is a stakeholder that is primary for leading the system development.

Responsible for the software architecture, includes the key technical decisions that constrain the overall design and implementation for the project. Ensures that the system is going to be maintainable and the architectural solution supports the functional and non-requirements.

Project manager This is a stakeholder that is primary for leading the system development.

Plans, manages and allocates resources, shapes priorities, coordinates interactions with customers and users, and keeps the project team focused. Also establishes a set of practices that ensure the integrity and quality of project artifacts.

Safe home System Page 4

Page 9: SHS_SRS

Safe Home System

2011

3.2 User Summary

Name Description Stakeholder

Novice End users.(home owner)

They are end users of product who has least knowledge about code of interfacing.

Self

Friends and guests of home owner

They are end users of product Self

3.3. User environment There will be 2 people involved in the completion of the project. Can be running on any O.S from windows 98or above along with Java platform. Sensors and web cams are in use and the integration of sensors detection and web cams to

have pictures capture. Sensor like temperature sensor detects fire in home; sound sensor detects human sound in home.

The user needs to have internet connection and Bluetooth enabled PC.

3.4 Stakeholders Profiles and User Profiles

Representative Stakeholder1 Description Software developersType Software developers have extra knowledge of usage and priorities of

operationsResponsibilities Captures customer details, produces reports, co-ordinates work among the

various developers Success Criteria Successfully able to protect the home and so his reward would be that his

product will be purchased in large amountInvolvement Validate and update the requirements as per the user

Representative Stakeholder2Description Home owner and his family membersType Casual user, a private individual that will use the system for protecting their

home.Responsibilities Provide the security requirements and inform any previous incidences of

human intrusions and burglary. Success Criteria When a stakeholder is able to catch the unknown person from entering his

home and stealing anything he is said to get success out of the software. And he is rewarded by keeping his home safe and secure.

Involvement Suggests the new requirements and validate the old one

Safe home System Page 5

Page 10: SHS_SRS

Safe Home System

2011

Representative Stakeholder3Description Friends and guests of the home ownerType Here stakeholders are subset of end users with not necessarily technical

backgroundResponsibilities They are required to specify needs is particular formatting so that important

details are not left out. Also they should put efforts to gather information Success Criteria When a stakeholder is able to catch the unknown person from entering his

home and stealing anything he is said to get success of the software. And he is rewarded by keeping his home safe and secure.

Involvement Suggests the new requirements and validate the old one

3.5 Alternatives and Competition

Home Security System and Monitoring Company House Sitter

Safe home System Page 6

Page 11: SHS_SRS

Safe Home System

2011

4. Product Overview

4.1. Product perspective

4.2. Summary of Capability

Customer Benefit Supporting FeaturesConvenient, flexible access to the system

Remote (wireless) and local access

Secured access to the system authentication, access control to the system

The primary user can choreograph sequences of sensor and notification features going on and off at different times. The sensors include motion sensors inside the home or garage, infrared sensors inside the home or garage, sound and temperature sensors that detect fire.

Management can identify problem areas and gauge staff workload.

Trend and distribution reports allow high level review of problem status.

Distributed support teams can work together to solve problems.

Replication server allows current database information to be shared across the enterprise

Customers can help themselves, lowering support costs and improving response time.

Knowledge base can be made available over the Internet. Includes hypertext search capabilities and graphical query engine

Safe home System Page 7

Page 12: SHS_SRS

Safe Home System

2011

5. Product Features Local control panel as well as Internet based control panel Arms and Disarms the unit Calls emergency number when fire is detected. Alarm is sounded when motion is detected. Motion is detected, corresponding images are stored locally and a log file is generated. Sends the message to the Home owner. Makes a phone call

6. Constraints

6.1. Security Security for the SHS includes authentication, access control, data integrity, and data privacy. Authentication of the user is by identifier and password. Homeowners and Business Owners can monitor and change the state of the system. Customer Care users can only monitor the system and manually place a medical alert emergency request for an ambulance.

6.2 Usability Easy to use (especially safety related features) Request for an ambulance, police or fire truck needs to be at the push of a button or voice

activated

6.3 Responsiveness System responds quickly to user requests or changes in the environment. System responds within 2 seconds on average to local user requests and changes in the

environment. System responds within 4 seconds on average to remote user requests and changes in the

environment.

6.4 Capacity Maximum number of sensors, security cameras, emergency notifications, that can be

controlled by the personal computer connected via Bluetooth to the mobile for message alerts.

Safe home System Page 8

Page 13: SHS_SRS

Safe Home System

2011

7. Precedence and PriorityEach user can be assigned a unique password that determines his or her level of system access. A user’s password indicates the following information: Days/hours user is authorized to use the system Which images inputs user is authorized to view and/or control Permission (yes or no) to define Quick Views and Patterns Priority levels can be assigned to each alarm and user. Priority levels enable the system to

determine which alarm or user takes precedence over other alarms and users when more than one is trying to control the same camera simultaneously.

8. Other Product Requirements

8.1 System Requirements O.S : Windows 98 or later RAM: 512 MB or more. Free space on Hard disk: 1 GB or more. Internet with speed of minimum 256 Kbps Processor: Pentium 4 or above Application: J2SE and JDK

8.2 Performance Requirements Battery Backup for the system Connection should not be loose Proper Internet and Bluetooth connectivity for all the time Proper network availability for the corresponding mobile network. Tight Security and strong authentication

8.3. Environmental Requirements Sensors and Web Cams should be protected from high temperature, radiation, water,

humidity User should be friendly with the usage of software All resources should be available to the user to access the software in his/her absence to

protect home UPS should be there in order to save the last changes when electricity is not there

Safe home System Page 9

Page 14: SHS_SRS

Safe Home System

2011

9. Documentation Requirements9.1. User Manual

Install the WebCam Looker software and ensure that current drivers for the webcam are also set up. When you plug in your camera, start WebCam Looker and dismiss the wizard box. You should now see a live image feed of the area you want to monitor.

Choose the Settings menu on the bottom of the viewing area. From this menu you can set destinations for images taken on your PC and set up web servers.

On application home window, user can specify cell number and message when intrusion detects. When the sensor detects intrusion, you’ll be sent message of the intruder. User manual will be included in application.

9.2. Online Help

Online Answers of FAQ will be available Also Online help will be provided Customers can call us as well as read useful articles for more information

9.3. Installation Guides, Configuration, Read Me File

Before you even begin doing the actual physical installation you need plan out your work. What areas you need to cover by the burglar alarm system can be seen with the help of a floor plan of your home. Also adding outside landscaping and structures that could deter or help a would-be burglar to the plan is a good idea. This will help you know what needs to be where. The basic entry points of course are windows and doors.

With a hard-wired security system, you will begin with laying out the wires. This means you will need to determine the best places to drill holes into the walls and how to pull the wires through to their destination. You may even need to cut the dry wall and drill holes through the studs unless you are able to pull through the attic or basement spaces. Make sure that any holes drilled are big enough for all the wires that must run through them.

A time saver as well as work saver would be to go with a wireless system if you are able to get everything synched up. Much less work as there will be less to no drilling (depends upon how things like the keypad are mounted) and therefore less patching and clean up. You will need to decide if a wireless system is best for you or not.

Safe home System Page 10

Page 15: SHS_SRS

Safe Home System

2011

Functional Requirements

Port configuration

Sensor configuration

Alarm system System configuration Remote system configuration using SMS System configuration using Web portal

Use Case: configure port

Set port name

Specify baud rate

Specify data bits

Test Connection

Save Port Configuration

Configuration Manager

Port Configuration

Figure 1 Configure port

Brief Description: The configuration manager configures the port to which the GSM modem is connected

Safe home System Page 11

Page 16: SHS_SRS

Safe Home System

2011

Initial step-by-step description:For this use case to be initiated, the computer must be connected to the GSM modem.

1. The configuration manager connects the GSM modem to the port2. The configuration manager configures the port connection3. The serial port is tested

Use Case: System configuration

GSM Modem

Sensor Configuration

Inquire sensor status

sensor

uses

generic sensor use case

Start/stop alarm

home owner

Start/stop SMS and call service

Configuration manager

Add/Remove Sensor

Start/Stop sensor

login

uses

<<includes>>

<<includes>>

<<includes>>

<<includes>><<includes>>

<<includes>>

Brief Description: The configuration manager configures the sensors port to which the MiacZ motes will be connected.

Initial step-by-step description:For this use case to be initiated, the

Safe home System Page 12

Page 17: SHS_SRS

Safe Home System

2011

1. The configuration manager connects the micaZ motes to the port2. The configuration manager configures the port connection3. The serial port is tested

Validate PasswordInput password

uses

Specify cell number

Specify message

Safe Home System authentication and Configuration

Home Owner

Alarm/SMS/Calling Testing

Safe home System Page 13

Page 18: SHS_SRS

Safe Home System

2011

Intruder

Sounds alarm

Informs home owner using SMS and phone call

Enters into home

SHS

Intrusion data storage

Sensor detection

intrusion information

Intruder Detection

Home Owner

Cell phoneSpecify message

GSM Modem

Send message

Parse Message

Fetch data

Configure sensor using message

SHS system

Remote System Configuration

Safe home System Page 14

Page 19: SHS_SRS

Safe Home System

2011

Configure System

Configure sensors

Inquiry home status

Interface

parse data

save configuration data

Update System

SHS system

Web Portal Use Case

Home Owner Web Portaluses

uses

uses<<include>>

<<include>>

<<include>>

Safe home System Page 15

Page 20: SHS_SRS

Safe Home System

2011

Non-functional Requirements

Security and Privacy Requirements

Home user will have unique login Id and Password. Usability Requirements

The UI of the system shall be user friendly. Quality Requirements

The system shall be efficient and portable. The system will be also be reliable and consistent. Maintenance Requirements

Up-gradation of the current version of the system being developed can be done easily by adding new features.

Safe home System Page 16

Page 21: SHS_SRS

Safe Home System

2011

Safe home System Page 17