Upload
mohit-shah
View
105
Download
3
Embed Size (px)
Citation preview
Safe Home System
Version 1.0
Safe Home System
2011
Safe Home System
2011
Table of Contents
1. Introduction 1
1.1 Purpose 11.2 Scope 11.3 Definitions, Acronyms and Abbreviations 11.4 References 21.5 Overview 2
2. Positioning3
2.1 Business Opportunity 32.2 Problem Statement 32.3 Product Position Statement 3
3. Stakeholder and User Descriptions 4
3.1 Market Demographics 43.2 Stakeholder Summary 43.3 User Summary 53.4 User environment 53.5 Stakeholder Profile and User profile 63.6 Alternatives and Competition 7
4. Product Overview 8
4.1 Product Perspective 84.2 Summary of Capabilities 84.3 Assumptions and Dependencies 84.4 Cost and Pricing 94.5 Licensing and Installation 9
5. Product Features 10
6. Constraints106.1 Security 106.2 Usability 106.3 Responsiveness 106.4 Capacity 10
7. Precedence and Priority 11
8. Other Product Requirements 11
8.1 Applicable Standards 118.2 System Requirements 118.3 Performance Requirements 118.4 Environmental Requirements 11
9. Documentation Requirements 12
9.1 User Manual 139.2 Online Help 13
Safe Home System
2011
9.3 Installation Guides, Configuration, Read Me File 139.4 Labeling and Packaging 13
10. Appendix 1 - Feature Attributes 14
10.1 Status 1510.2 Benefit 1510.3 Effort 1610.4 Risk 1610.5 Stability 1610.6 Target Release 1610.7 Assigned To 16
Safe Home System
2011
1. IntroductionThe purpose of this document is to collect, analyze and define high-level needs and features of the Safe Home System. It focuses on the capabilities needed by the stakeholders, and the target users, and why these needs exist. The details of how the Safe Home System fulfils these needs are detailed in the use-case and supplementary specifications. The document also explains the working of sensors, alarms and cameras used in Safe Home System.
1.1. PurposeThe project Safe Home System (SHS) is open source burglar alarm control and monitoring software using wireless alarm system.The is an advanced wireless Home/Business Alarm Controller which supports many types of sensors, can control various types of devices, and has computer interfaces for USB and Ethernet.With our code you can:
Arm and disarm your alarm system Read the current settings and program the device Monitor all the attached devices (PIR sensors, web cams etc)
1.2. Scope
In this system, home owner can start the system as well as independently control all the sensors through SMS or internet. Home owner will be informed by SMS and call when any human intrusion detected. He can view logs of images of human and time when intrusion took place in his home. This system will be very useful to a homeowner who does not have sufficient funds to pay for a professionally installed security system.
A majority of homeowners simply do not have sufficient funds to pay for a professionally installed security system.In addition to this; many homeowners may not feel the need to actually invest in a professionally installed security system. Many individuals who rent their homes, such as apartment owners, are usually not allowed to install permanent devices in their homes such as a professionally installed security system.Most inexpensive home security devices and components are nothing more than cheap and ineffective noise makers.
1.3. Definitions, Acronyms and Abbreviations SHS corporate web site: Users who are travelling can have full access to their home
system by connecting to the SHS corporate web site. This site routes all its communication to the CP located in the client’s home. Direct external connection to the CP is not allowed to help prevent denial-of-service attacks and other forms of hacking.
Micaz Motes: A Micaz mote is a node that has a sensor placed on it. It communicates the sensor data with the programming board via radio. The motes are loaded with nesC application program.
Safe home System Page 1
Safe Home System
2011
Term Definition
SMS Short Message ServiceSHS Safe Home SystemCP Control PanelUPS Uninterrupted Power Supply Database An organized collection of related informationAdministrator One who manages the entire systemConstraint Any limit or restriction given for the design process
1.4. References Software Engineering: a practitioner’s approach, by Roger S. Pressman, McGraw-Hill
publication, 6th edition, 2005. SafeHome System Architectural Model, by Timothy C. Lethbridge, in conjunction with
Roger Pressman, version 7.01, July 2004
1.5. OverviewThe remainder of this document is two chapters, the first providing a full description of the project. It lists all the functions performed by the system. The final chapter concerns details of each of the system functions and actions in full for the software developers’ assistance.
This project deals the working of SHS using sensors, alarms and cameras. The coding is done in Java and the system communicates over wireless 802.15.4. It makes use of one PC, a GSM modem in a mobile phone, sensors, web cameras and an alarm to depict the working of the system.
The document contains the stakeholders involved, the requirements of the project, and the product features. This is followed by a future scope of improvement possible in the system.
Safe home System Page 2
Safe Home System
2011
2. Positioning
2.1. Business OpportunityPeople nowadays give a lot of stress on the safety of their homes. They require a security system
installed in their homes but at an affordable price with desirable services. Since Safe Home Systems enable the fulfillment of such needs of the masses this software has a tremendous market available.
2.2. Problem Statement
The problem of An increase in crime rates in large cities
Affects Middle income home owners
The impact of which is uncertainty in the safety and security of the home owners and their belongings
A successful solution would
a flexible, cost effective home safety and security system that can be easily configured by the homeowner. In addition, a home security and safety system can have a rich variety of sensors to coordinate, monitor and control aswell as emergency notification features. The user would be able to access the system either locally or remotely. It will be able to utilize existing alarm monitoring networks.
2.3. Product Position Statement
For Any residence owner
Who For Security of home in absence of owner
The (product name) is a Security Services product
That Extra benefit of camera along with alarm to protect the home with reasonable price
Our product Web cam detects motion in the home. Various sensors such as Infrared and sound help to detect intrusion and temperature sensor detects fire. Phone service will inform the house owner of the same.
Safe home System Page 3
Safe Home System
2011
3. Stakeholder and User Descriptions The company providing the software and installing in the home of the customer The owner of the home and his family The friends or guests of the family resident in the home Software engineers who are involved in developing the software The law governing committee Sensor manufacturers The police of the locality
3.1 Stakeholder Summary
Name Represents Role
System Analyst This is a stakeholder that works with the stakeholders to gather their needs.
Leads and coordinates requirements elicitation and use-case modeling by outlining the system's functionality and delimiting the system; forexample, identifying what actors exist and what usecases they will require when interacting with the system.
Requirements specifier
This is a stakeholder that workswith the Analysts to correctlytranslate requests/needs into the requirements to be used for design.
Specifies the details of one or more a parts of the system's functionality by describing one aspects of the requirements, this will include functional and non-functional.
Technical Reviewer
This is a stakeholder that must be involved regularly to maintain the development cycle.
Responsible for contributing feedback to the review process. This role is involved in the category of review that deals with the technical review of project artifacts. This role is responsible for providing timely, appropriate feedback on the project artifacts being reviewed.
Software Architect
This is a stakeholder that is primary for leading the system development.
Responsible for the software architecture, includes the key technical decisions that constrain the overall design and implementation for the project. Ensures that the system is going to be maintainable and the architectural solution supports the functional and non-requirements.
Project manager This is a stakeholder that is primary for leading the system development.
Plans, manages and allocates resources, shapes priorities, coordinates interactions with customers and users, and keeps the project team focused. Also establishes a set of practices that ensure the integrity and quality of project artifacts.
Safe home System Page 4
Safe Home System
2011
3.2 User Summary
Name Description Stakeholder
Novice End users.(home owner)
They are end users of product who has least knowledge about code of interfacing.
Self
Friends and guests of home owner
They are end users of product Self
3.3. User environment There will be 2 people involved in the completion of the project. Can be running on any O.S from windows 98or above along with Java platform. Sensors and web cams are in use and the integration of sensors detection and web cams to
have pictures capture. Sensor like temperature sensor detects fire in home; sound sensor detects human sound in home.
The user needs to have internet connection and Bluetooth enabled PC.
3.4 Stakeholders Profiles and User Profiles
Representative Stakeholder1 Description Software developersType Software developers have extra knowledge of usage and priorities of
operationsResponsibilities Captures customer details, produces reports, co-ordinates work among the
various developers Success Criteria Successfully able to protect the home and so his reward would be that his
product will be purchased in large amountInvolvement Validate and update the requirements as per the user
Representative Stakeholder2Description Home owner and his family membersType Casual user, a private individual that will use the system for protecting their
home.Responsibilities Provide the security requirements and inform any previous incidences of
human intrusions and burglary. Success Criteria When a stakeholder is able to catch the unknown person from entering his
home and stealing anything he is said to get success out of the software. And he is rewarded by keeping his home safe and secure.
Involvement Suggests the new requirements and validate the old one
Safe home System Page 5
Safe Home System
2011
Representative Stakeholder3Description Friends and guests of the home ownerType Here stakeholders are subset of end users with not necessarily technical
backgroundResponsibilities They are required to specify needs is particular formatting so that important
details are not left out. Also they should put efforts to gather information Success Criteria When a stakeholder is able to catch the unknown person from entering his
home and stealing anything he is said to get success of the software. And he is rewarded by keeping his home safe and secure.
Involvement Suggests the new requirements and validate the old one
3.5 Alternatives and Competition
Home Security System and Monitoring Company House Sitter
Safe home System Page 6
Safe Home System
2011
4. Product Overview
4.1. Product perspective
4.2. Summary of Capability
Customer Benefit Supporting FeaturesConvenient, flexible access to the system
Remote (wireless) and local access
Secured access to the system authentication, access control to the system
The primary user can choreograph sequences of sensor and notification features going on and off at different times. The sensors include motion sensors inside the home or garage, infrared sensors inside the home or garage, sound and temperature sensors that detect fire.
Management can identify problem areas and gauge staff workload.
Trend and distribution reports allow high level review of problem status.
Distributed support teams can work together to solve problems.
Replication server allows current database information to be shared across the enterprise
Customers can help themselves, lowering support costs and improving response time.
Knowledge base can be made available over the Internet. Includes hypertext search capabilities and graphical query engine
Safe home System Page 7
Safe Home System
2011
5. Product Features Local control panel as well as Internet based control panel Arms and Disarms the unit Calls emergency number when fire is detected. Alarm is sounded when motion is detected. Motion is detected, corresponding images are stored locally and a log file is generated. Sends the message to the Home owner. Makes a phone call
6. Constraints
6.1. Security Security for the SHS includes authentication, access control, data integrity, and data privacy. Authentication of the user is by identifier and password. Homeowners and Business Owners can monitor and change the state of the system. Customer Care users can only monitor the system and manually place a medical alert emergency request for an ambulance.
6.2 Usability Easy to use (especially safety related features) Request for an ambulance, police or fire truck needs to be at the push of a button or voice
activated
6.3 Responsiveness System responds quickly to user requests or changes in the environment. System responds within 2 seconds on average to local user requests and changes in the
environment. System responds within 4 seconds on average to remote user requests and changes in the
environment.
6.4 Capacity Maximum number of sensors, security cameras, emergency notifications, that can be
controlled by the personal computer connected via Bluetooth to the mobile for message alerts.
Safe home System Page 8
Safe Home System
2011
7. Precedence and PriorityEach user can be assigned a unique password that determines his or her level of system access. A user’s password indicates the following information: Days/hours user is authorized to use the system Which images inputs user is authorized to view and/or control Permission (yes or no) to define Quick Views and Patterns Priority levels can be assigned to each alarm and user. Priority levels enable the system to
determine which alarm or user takes precedence over other alarms and users when more than one is trying to control the same camera simultaneously.
8. Other Product Requirements
8.1 System Requirements O.S : Windows 98 or later RAM: 512 MB or more. Free space on Hard disk: 1 GB or more. Internet with speed of minimum 256 Kbps Processor: Pentium 4 or above Application: J2SE and JDK
8.2 Performance Requirements Battery Backup for the system Connection should not be loose Proper Internet and Bluetooth connectivity for all the time Proper network availability for the corresponding mobile network. Tight Security and strong authentication
8.3. Environmental Requirements Sensors and Web Cams should be protected from high temperature, radiation, water,
humidity User should be friendly with the usage of software All resources should be available to the user to access the software in his/her absence to
protect home UPS should be there in order to save the last changes when electricity is not there
Safe home System Page 9
Safe Home System
2011
9. Documentation Requirements9.1. User Manual
Install the WebCam Looker software and ensure that current drivers for the webcam are also set up. When you plug in your camera, start WebCam Looker and dismiss the wizard box. You should now see a live image feed of the area you want to monitor.
Choose the Settings menu on the bottom of the viewing area. From this menu you can set destinations for images taken on your PC and set up web servers.
On application home window, user can specify cell number and message when intrusion detects. When the sensor detects intrusion, you’ll be sent message of the intruder. User manual will be included in application.
9.2. Online Help
Online Answers of FAQ will be available Also Online help will be provided Customers can call us as well as read useful articles for more information
9.3. Installation Guides, Configuration, Read Me File
Before you even begin doing the actual physical installation you need plan out your work. What areas you need to cover by the burglar alarm system can be seen with the help of a floor plan of your home. Also adding outside landscaping and structures that could deter or help a would-be burglar to the plan is a good idea. This will help you know what needs to be where. The basic entry points of course are windows and doors.
With a hard-wired security system, you will begin with laying out the wires. This means you will need to determine the best places to drill holes into the walls and how to pull the wires through to their destination. You may even need to cut the dry wall and drill holes through the studs unless you are able to pull through the attic or basement spaces. Make sure that any holes drilled are big enough for all the wires that must run through them.
A time saver as well as work saver would be to go with a wireless system if you are able to get everything synched up. Much less work as there will be less to no drilling (depends upon how things like the keypad are mounted) and therefore less patching and clean up. You will need to decide if a wireless system is best for you or not.
Safe home System Page 10
Safe Home System
2011
Functional Requirements
Port configuration
Sensor configuration
Alarm system System configuration Remote system configuration using SMS System configuration using Web portal
Use Case: configure port
Set port name
Specify baud rate
Specify data bits
Test Connection
Save Port Configuration
Configuration Manager
Port Configuration
Figure 1 Configure port
Brief Description: The configuration manager configures the port to which the GSM modem is connected
Safe home System Page 11
Safe Home System
2011
Initial step-by-step description:For this use case to be initiated, the computer must be connected to the GSM modem.
1. The configuration manager connects the GSM modem to the port2. The configuration manager configures the port connection3. The serial port is tested
Use Case: System configuration
GSM Modem
Sensor Configuration
Inquire sensor status
sensor
uses
generic sensor use case
Start/stop alarm
home owner
Start/stop SMS and call service
Configuration manager
Add/Remove Sensor
Start/Stop sensor
login
uses
<<includes>>
<<includes>>
<<includes>>
<<includes>><<includes>>
<<includes>>
Brief Description: The configuration manager configures the sensors port to which the MiacZ motes will be connected.
Initial step-by-step description:For this use case to be initiated, the
Safe home System Page 12
Safe Home System
2011
1. The configuration manager connects the micaZ motes to the port2. The configuration manager configures the port connection3. The serial port is tested
Validate PasswordInput password
uses
Specify cell number
Specify message
Safe Home System authentication and Configuration
Home Owner
Alarm/SMS/Calling Testing
Safe home System Page 13
Safe Home System
2011
Intruder
Sounds alarm
Informs home owner using SMS and phone call
Enters into home
SHS
Intrusion data storage
Sensor detection
intrusion information
Intruder Detection
Home Owner
Cell phoneSpecify message
GSM Modem
Send message
Parse Message
Fetch data
Configure sensor using message
SHS system
Remote System Configuration
Safe home System Page 14
Safe Home System
2011
Configure System
Configure sensors
Inquiry home status
Interface
parse data
save configuration data
Update System
SHS system
Web Portal Use Case
Home Owner Web Portaluses
uses
uses<<include>>
<<include>>
<<include>>
Safe home System Page 15
Safe Home System
2011
Non-functional Requirements
Security and Privacy Requirements
Home user will have unique login Id and Password. Usability Requirements
The UI of the system shall be user friendly. Quality Requirements
The system shall be efficient and portable. The system will be also be reliable and consistent. Maintenance Requirements
Up-gradation of the current version of the system being developed can be done easily by adding new features.
Safe home System Page 16
Safe Home System
2011
Safe home System Page 17