Академический Документы
Профессиональный Документы
Культура Документы
1.
2.
3.
4.
5.
6.
7.
Introduction
Background
Glossary
Context diagram
User requirement definition
System requirement specification
Critical evaluation
1
2
3
3
4
5
8
1. INTROUCTION
This project aims to design and develop a fire and security alarm monitoring system
(FASAM). A FASAM is a life critical system with specific concern in identification of
unwanted presence of fire with the help of electronic devices and notify a fire
instance to the Control Area at the initial stage to avoid the damage to lives and
property.
The FASAM is capable of sensing a possible occurrence a of fire instance in the initial
stage through detectors that imitates the high human senses, such as touch, smell
and see. The fire detecting devices that are to be used are smoke detectors and heat
detectors. These are the most commonly used fire detection devices. Smoke
detectors are designed to detect the presence of smoke in a specific area when it
reaches the ceiling where it is normally fixed. Heat detectors can detect a fixed
amount of heat present at the detector or a rapid increase of heat in the area of the
detector. Manual fire alarm boxes are placed at all exits on each floor in the building.
Sprinkler system is used in areas where high combustion may be expected. These are
automatic and connected with the FASAM so that the system itself will activate
sprinkler system once the fire instance is detected and confirmed in this specific
area.
Further Horns, bells or sirens are used to notify the occupants of the instance for
evacuation. The total system will be monitored by a Central Control Area for the
operational integrity.
Page 1 of 9
2. BACKGROUND
The factors that needs to be considered when building this system are
The large building has to be divided into number of zones
A plurality of alarms should be associated with each zone connected to and
alerts the central manned controlled area
A plurality of fire detectors are positioned in each zone being connected to
the fire alarms
Automatic emergency call directing to the Emergency Service
Sprinkler system or system to shut down electric equipment in places where
high combustion is expected
Verify method to check for the availability of people in particular areas.
Direction indicators illuminating the route to the nearest fire exits
Audible signal alert to vacate the building
Automatic door locking placed to completely isolate a required zone(s)
Confirmation of fire alarms for verification
Page 2 of 9
3. GLOSSARY
Alarm Alert: A signal indicating the emergency requiring an immediate action.
Central Control Area/ Central Manned Control Area: The main area from
where the total system is monitored and controlled and is attended by the
authorized operators 24 hours 7 days.
FASAM (Fire and Security Alarm Monitoring System): A system or a group of
systems in which the operations of circuits and devices are transmitted
automatically to, recorded in, maintained by and is supervised. This system is
to be controlled and operated by one or more person and is capable of
functioning automatically in absence of a person where the situation is
regarded serious.
Heat Detector: A device that detects abnormally high temperature or a rise of
the temperature.
Nuisance Alarm: An alarm caused by malfunction or mechanical failure of a
device.
Smoke detector: A device that detects the presence smoke in a specific area.
Zone: A specific area of a building that allows the emergency responds reach
rapidly by helping to locate a fire. To identify the precise location of a device
without too much effort.
4. CONTEXT DIAGRAM
Emergency service
Status
request
Unattended
serious alert
Status
Alert
Signal activate
Activate conformation
Status
request
Automatic
door locking
Alert
FASAM
Activate
request
Response
Confirmed
status
Vacate
request
Verified vacate
status
Building
occupiers
Page 3 of 9
Page 4 of 9
Page 6 of 9
1.4.2. Inputs: Fire alarm serious conformation, Signal from the central
c
control area not responded.
1.4.2.1. Source: The system calls automatically
1.4.2.2. Range of acceptable values: More than three detecting devices
trigger the alarm in a certain area OR
t
the minimum respond time exceeds
1.4.3. Processing: If (Number of detectors triggered the alarm > 2) AND
C
(Central Control Area respond time> Minimum respond time)
1.4.4. Outputs :
1.4.4.1. Destination: Emergency Service.
1.4.4.2. Error messages: Emergency Service Calling ERROR
1.4.5. Pre-condition: Connection line normal condition=True AND
Activation signal=true OR ((Number of detectors triggered the alarm > 2)
AND (Central Control Area respond time> Minimum respond time)=True)
1.4.6. Post-condition: Emergency Service Alert Success=true
1.4.7. Requirements: CCTV, direction indicators, sound alerts
1.4.8. Side effects: Automatic door locking system
1.4.9. Annotation
1.4.9.1. Stability: Stable and the requirement will not change during the
systems expected life.
1.4.9.2. Degree of necessity: Mandatory
2. Non- functional requirements
2.1. External Interface Requirements
2.1.1. User interface: Easy to use and highly accurate with no complexity
2.1.2. Software interfaces: Should be accurate with no delays and quick
restore at failures.
2.1.3. Communication interface: Error free and highly reliable
2.2. Performance requirements: Highly reliable performance.
2.3. Design constraints
2.3.1. Standard compliance: All the system must comply with standard of
National Fire Protection Association.
2.4. Quality attributes
2.4.1. Availability: Highly availability
2.4.2. Security: The total system should be highly secured with no access to
unauthorized personals
Page 7 of 9
Critical Evaluation stating the rationale for notation used and value of supporting
requirement gathering techniques.
Requirement gathering is undertaken at the very beginning of the a software
development lifecycle, which is a major impact on the success of the project this
process is done at the initial stage of any software project to clearly understand the
intended purpose of the software therefore verifying that the development team is
not off the track from delivering the right product which can be very critical to its
success. Requirement are statements from the end users of the software about the
indented output that they expect, which should clearly explain what and how the
software should perform.
Pflegger (2001) defines a requirement as feature of their system (being designed) or
a description of something the system is capable of doing in order to fulfill the
systems purpose.
Since the gathered requirements are the main pillar of the a projects success, this
process should be given much importance to be able to identify the core aspects of
the expected project but it should also be considered that requirement are
sometime transitory and may subject to changes or even new requirement might be
dictated at the later phases of the process. Therefore it is much better to maintain an
active collaboration with the stakeholders of the product to get to know about the
new arising requirement too at an earlier stage.
With the business users which is the key component in the requirement gathering
process entails the collection of an initial set of high level requirement and then
getting end users collaborate to correct any discrepancies and fine tune them
ensures that requirement received are logical and consistent with the end users
needs.
There are diverse techniques of collaboration which is of the organization choice as
to one or many of the techniques to use as per their needs and the given scenario
some of the techniques that could be used for the requirement gathering purpose
could be.
One-on-one interviews, group interviews, facilitated sessions, questionnaires,
prototyping, brainstorming, end user survey, work shop, observations. The
techniques that best suits this system is mainly observation, group interviews and
prototyping. Through a thorough observation it gives the possibility of analyzing how
critical the system is for a specific building, the probability of a fire instance through
which decision could be made regarding the level of coverage of the system should
Page 8 of 9
provide and its standard. Through group interviews with relevant participants, the
suitability of devices and its locations preferred locations can be identified with a
clear analysis of its effectiveness. Since this is a life critical system prototyping the
system and giving a detailed walk-through to all the staffs of the particular system
will be of vital importance.
References.
Pfleeger S.L (2001), Software engineering, Theory and practice, prentice hall PTR,
United States.
Page 9 of 9