Вы находитесь на странице: 1из 21

Safe Home System

Version 1.0
Safe Home System 201
1
Safe Home System 201
1
Table of Contents
1.Introduction....................................................................................................................................................1
Purpose.....................................................................................................................................................1
Scope........................................................................................................................................................1
Definitions, Acronyms and Abbreviations...............................................................................................1
References................................................................................................................................................2
Overview..................................................................................................................................................2

Positioning........................................................................................................................................................3
Business Opportunity...............................................................................................................................3
Problem Statement...................................................................................................................................3
1.1.Product Position Statement................................................................................................................3

Stakeholder and User Descriptions...................................................................................................................4


3.1 Stakeholder Summary................................................................................................................4
3.2 User Summary................................................................................................................................5
3.3. User environment..........................................................................................................................5
3.4 Stakeholders Profiles and User Profiles.........................................................................................5

Product Overview.............................................................................................................................................7

Product Features...............................................................................................................................................8

Constraints........................................................................................................................................................8

Security............................................................................................................................................................8

Security for the SHS includes authentication, access control, data integrity, and data privacy.......................8

Authentication of the user is by identifier and password.................................................................................8

Homeowners and Business Owners can monitor and change the state of the system......................................8

Customer Care users can only monitor the system and manually place a medical alert emergency request
for an ambulance. ............................................................................................................................................8

7. Precedence and Priority...............................................................................................................................9

Other Product Requirements.............................................................................................................................9


8.1 System Requirements.........................................................................................................................9
Performance Requirements.....................................................................................................................9
Environmental Requirements.................................................................................................................10

Documentation Requirements........................................................................................................................10
Port configuration........................................................................................................................................11
Sensor configuration....................................................................................................................................11
Use Case: configure port..............................................................................................................................12
Use Case: System configuration..................................................................................................................13
Safe Home System 201
1

1. Introduction
The purpose of this document is to collect, analyze and define high-level needs and features of
the Safe Home System. It focuses on the capabilities needed by the stakeholders, and the target
users, and why these needs exist. The details of how the Safe Home System fulfils these needs
are detailed in the use-case and supplementary specifications. The document also explains the
working of sensors, alarms and cameras used in Safe Home System.
Purpose
The project Safe Home System (SHS) is open source burglar alarm control and monitoring
software using wireless alarm system.
The is an advanced wireless Home/Business Alarm Controller which supports many types of
sensors, can control various types of devices, and has computer interfaces for USB and Ethernet.
With our code you can:
• Arm and disarm your alarm system
• Read the current settings and program the device
• Monitor all the attached devices (PIR sensors, web cams etc)
Scope
In this system, home owner can start the system as well as independently control all the
sensors through SMS or internet. Home owner will be informed by SMS and call when
any human intrusion detected. He can view logs of images of human and time when
intrusion took place in his home. This system will be very useful to a homeowner who
does not have sufficient funds to pay for a professionally installed security system.

A majority of homeowners simply do not have sufficient funds to pay for a


professionally installed security system.In addition to this; many homeowners may
not feel the need to actually invest in a professionally installed security system. Many
individuals who rent their homes, such as apartment owners, are usually not allowed
to install permanent devices in their homes such as a professionally installed security
system.Most inexpensive home security devices and components are nothing more
than cheap and ineffective noise makers.

Definitions, Acronyms and Abbreviations


• SHS corporate web site: Users who are travelling can have full access to their home
system by connecting to the SHS corporate web site. This site routes all its
communication to the CP located in the client’s home. Direct external connection to the
CP is not allowed to help prevent denial-of-service attacks and other forms of hacking.
• Micaz Motes: A Micaz mote is a node that has a sensor placed on it. It communicates the
sensor data with the programming board via radio. The motes are loaded with nesC
application program.

Safe home System Page 1


Safe Home System 201
1

Term Definition
SMS Short Message Service
SHS Safe Home System
CP Control Panel
UPS Uninterrupted Power Supply
Database An organized collection of related information
Administrator One who manages the entire system
Constraint Any limit or restriction given for the design process

References
• Software Engineering: a practitioner’s approach, by Roger S. Pressman, McGraw-Hill
publication, 6th edition, 2005.
• SafeHome System Architectural Model, by Timothy C. Lethbridge, in conjunction with
Roger Pressman, version 7.01, July 2004

Overview
The remainder of this document is two chapters, the first providing a full description of the
project. It lists all the functions performed by the system. The final chapter concerns details of
each of the system functions and actions in full for the software developers’ assistance.
This project deals the working of SHS using sensors, alarms and cameras. The coding is done in
Java and the system communicates over wireless 802.15.4. It makes use of one PC, a GSM
modem in a mobile phone, sensors, web cameras and an alarm to depict the working of the
system.
The document contains the stakeholders involved, the requirements of the project, and the
product features. This is followed by a future scope of improvement possible in the system.

Safe home System Page 2


Safe Home System 201
1

Positioning
Business Opportunity
People nowadays give a lot of stress on the safety of their homes. They require a security system
installed in their homes but at an affordable price with desirable services. Since Safe Home Systems
enable the fulfillment of such needs of the masses this software has a tremendous market available.
Problem Statement
The problem of An increase in crime rates in large
cities
Affects Middle income home owners
The impact of which is uncertainty in the safety and security
of the home owners and their
belongings
A successful solution a flexible, cost effective home safety
would and security system that can be easily
configured by the homeowner. In
addition, a home security and safety
system can have a rich variety of
sensors to coordinate, monitor and
control as
well as emergency notification
features. The user would be able to
access the system either locally or
remotely. It will be able to utilize
existing alarm monitoring networks.
1.1. Product Position Statement
For Any residence owner
Who For Security of home in absence of
owner
The (product name) is a Security Services product
That Extra benefit of camera along with
alarm to protect the home with
reasonable price
Our product Web cam detects motion in the home.
Various sensors such as Infrared and
sound help to detect intrusion and
temperature sensor detects fire. Phone
service will inform the house owner of
the same.

Safe home System Page 3


Safe Home System 201
1

Stakeholder and User Descriptions


• The company providing the software and installing in the home of the customer
• The owner of the home and his family
• The friends or guests of the family resident in the home
• Software engineers who are involved in developing the software
• The law governing committee
• Sensor manufacturers
• The police of the locality

3.1 Stakeholder Summary

Name Represents Role


System Analyst This is a stakeholder that works Leads and coordinates requirements
with the stakeholders to gather elicitation and use-case modeling by outlining
their needs. the system's functionality and delimiting the
system; for
example, identifying what actors exist and
what use
cases they will require when interacting with
the system.
Requirements This is a stakeholder that works Specifies the details of one or more a parts of
specifier with the Analysts to correctly the system's functionality by describing one
translate requests/needs into the aspects of the requirements, this will include
requirements to be used for functional and non-functional.
design.
Technical This is a stakeholder that must be Responsible for contributing feedback to the
Reviewer involved regularly to maintain review process. This role is involved in the
the development cycle. category of review that deals with the
technical review of project artifacts. This role
is responsible for providing timely,
appropriate feedback on the project artifacts
being reviewed.

Software This is a stakeholder that is Responsible for the software architecture,


Architect primary for leading the system includes the key technical decisions that
development. constrain the overall design and
implementation for the project. Ensures that
the system is going to be maintainable and the
architectural solution supports the functional
and non-requirements.
Project manager This is a stakeholder that is Plans, manages and allocates resources,
primary for leading the system shapes priorities, coordinates interactions with

Safe home System Page 4


Safe Home System 201
1
development. customers and users, and keeps the project
team focused. Also establishes a set of
practices that ensure the integrity and quality
of project artifacts.

3.2 User Summary


Name Description Stakeholder
Novice End They are end users of product who Self
users.(home has least knowledge about code of
owner) interfacing.
Friends and They are end users of product Self
guests of home
owner

3.3. User environment


• There will be 2 people involved in the completion of the project.
• Can be running on any O.S from windows 98or above along with Java platform.
• Sensors and web cams are in use and the integration of sensors detection and web cams to
have pictures capture. Sensor like temperature sensor detects fire in home; sound sensor
detects human sound in home.
• The user needs to have internet connection and Bluetooth enabled PC.
3.4 Stakeholders Profiles and User Profiles

Representative Stakeholder1
Description Software developers
Type Software developers have extra knowledge of usage and priorities of
operations
Responsibilities Captures customer details, produces reports, co-ordinates work among the
various developers
Success Criteria Successfully able to protect the home and so his reward would be that his
product will be purchased in large amount
Involvement Validate and update the requirements as per the user

Representative Stakeholder2
Description Home owner and his family members
Type Casual user, a private individual that will use the system for protecting their
home.
Responsibilities Provide the security requirements and inform any previous incidences of
human intrusions and burglary.
Success Criteria When a stakeholder is able to catch the unknown person from entering his
home and stealing anything he is said to get success out of the software.

Safe home System Page 5


Safe Home System 201
1
And he is rewarded by keeping his home safe and secure.
Involvement Suggests the new requirements and validate the old one

Representative Stakeholder3
Description Friends and guests of the home owner
Type Here stakeholders are subset of end users with not necessarily technical
background
Responsibilities They are required to specify needs is particular formatting so that important
details are not left out. Also they should put efforts to gather information
Success Criteria When a stakeholder is able to catch the unknown person from entering his
home and stealing anything he is said to get success of the software. And he
is rewarded by keeping his home safe and secure.
Involvement Suggests the new requirements and validate the old one

3.5 Alternatives and Competition


• Home Security System and Monitoring Company
• House Sitter

Safe home System Page 6


Safe Home System 201
1

Product Overview

4.1. Product perspective

4.2. Summary of Capability

Safe home System Page 7


Safe Home System 201
1
Customer Benefit Supporting Features
Convenient, flexible access to Remote (wireless) and local access
the system

Secured access to the system The primary user can choreograph sequences of
authentication, access control to the system sensor and notification features going on and off at
different times. The sensors include motion sensors
inside the home or garage, infrared sensors inside
the home or garage, sound and temperature sensors
that detect fire.
Management can identify problem areas and Trend and distribution reports allow high level
gauge staff workload. review of problem status.
Distributed support teams can work together Replication server allows current database
to solve problems. information to be shared across the enterprise
Customers can help themselves, lowering Knowledge base can be made available over the
support costs and improving response time. Internet. Includes hypertext search capabilities and
graphical query engine

Product Features
• Local control panel as well as Internet based control panel
• Arms and Disarms the unit
• Calls emergency number when fire is detected.
• Alarm is sounded when motion is detected.
• Motion is detected, corresponding images are stored locally and a log file is generated.
• Sends the message to the Home owner.
• Makes a phone call

Constraints
Security
Security for the SHS includes authentication, access control, data integrity, and data
privacy.
Authentication of the user is by identifier and password.
Homeowners and Business Owners can monitor and change the state of the system.
Customer Care users can only monitor the system and manually place a medical alert
emergency request for an ambulance.

6.2 Usability
• Easy to use (especially safety related features)
• Request for an ambulance, police or fire truck needs to be at the push of a button or voice
activated

6.3 Responsiveness
• System responds quickly to user requests or changes in the environment.

Safe home System Page 8


Safe Home System 201
1
• System responds within 2 seconds on average to local user requests and changes in the
environment.
• System responds within 4 seconds on average to remote user requests and changes in the
environment.

6.4 Capacity
• Maximum number of sensors, security cameras, emergency notifications, that can be
controlled by the personal computer connected via Bluetooth to the mobile for message
alerts.

7. Precedence and Priority


Each user can be assigned a unique password that determines his or her level of system
access. A user’s password indicates the following information:
• Days/hours user is authorized to use the system
• Which images inputs user is authorized to view and/or control
• Permission (yes or no) to define Quick Views and Patterns
• Priority levels can be assigned to each alarm and user. Priority levels enable the system to
determine which alarm or user takes precedence over other alarms and users when more
than one is trying to control the same camera simultaneously.

Other Product Requirements


8.1 System Requirements
• O.S : Windows 98 or later
• RAM: 512 MB or more.
• Free space on Hard disk: 1 GB or more.
• Internet with speed of minimum 256 Kbps
• Processor: Pentium 4 or above
• Application: J2SE and JDK

Performance Requirements
• Battery Backup for the system

Safe home System Page 9


Safe Home System 201
1
• Connection should not be loose
• Proper Internet and Bluetooth connectivity for all the time
• Proper network availability for the corresponding mobile network.
• Tight Security and strong authentication
Environmental Requirements
• Sensors and Web Cams should be protected from high temperature, radiation, water,
humidity
• User should be friendly with the usage of software
• All resources should be available to the user to access the software in his/her absence to
protect home
• UPS should be there in order to save the last changes when electricity is not there

Documentation Requirements
9.1. User Manual

• Install the WebCam Looker software and ensure that current drivers for the webcam are also set
up. When you plug in your camera, start WebCam Looker and dismiss the wizard box. You
should now see a live image feed of the area you want to monitor.
• Choose the Settings menu on the bottom of the viewing area. From this menu you can set
destinations for images taken on your PC and set up web servers.
• On application home window, user can specify cell number and message when intrusion detects.
• When the sensor detects intrusion, you’ll be sent message of the intruder.
• User manual will be included in application.

9.2. Online Help

• Online Answers of FAQ will be available


• Also Online help will be provided
• Customers can call us as well as read useful articles for more information

9.3. Installation Guides, Configuration, Read Me File

• Before you even begin doing the actual physical installation you need plan out your work. What
areas you need to cover by the burglar alarm system can be seen with the help of a floor plan of

Safe home System Page 10


Safe Home System 201
1
your home. Also adding outside landscaping and structures that could deter or help a would-be
burglar to the plan is a good idea. This will help you know what needs to be where. The basic
entry points of course are windows and doors.
• With a hard-wired security system, you will begin with laying out the wires. This means you will
need to determine the best places to drill holes into the walls and how to pull the wires through to
their destination. You may even need to cut the dry wall and drill holes through the studs unless
you are able to pull through the attic or basement spaces. Make sure that any holes drilled are big
enough for all the wires that must run through them.
• A time saver as well as work saver would be to go with a wireless system if you are able to get
everything synched up. Much less work as there will be less to no drilling (depends upon how
things like the keypad are mounted) and therefore less patching and clean up. You will need to
decide if a wireless system is best for you or not.

Functional Requirements

Port configuration
Sensor configuration
• Alarm system

• System configuration

• Remote system configuration using SMS

• System configuration using Web portal

Safe home System Page 11


Safe Home System 201
1
Use Case: configure port

Port
Configuration

Set port name

Specify baud rate

Configuration
Manager

Specify data bits

Test Connection

Save Port Configuration

Figure 1 Configure port


Brief Description:
The configuration manager configures the port to which the GSM modem is connected

Initial step-by-step description:


For this use case to be initiated, the computer must be connected to the GSM modem.
1. The configuration manager connects the GSM modem to the port
2. The configuration manager configures the port connection
3. The serial port is tested

Safe home System Page 12


Safe Home System 201
1
Use Case: System configuration

generic sensor
use case
Sensor Configuration
uses

sensor
Inquire sensor status <<includes>>
<<includes>>
Configuration
manager

<<includes>>
Add/Remove Sensor

uses
GSM Modem
<<includes>>
login
home owner
Start/stop SMS and call service

<<includes>>
<<includes>>

Start/stop alarm

Start/Stop sensor

Brief Description:
The configuration manager configures the sensors port to which the MiacZ motes will be
connected.

Initial step-by-step description:


For this use case to be initiated, the
1. The configuration manager connects the micaZ motes to the port
2. The configuration manager configures the port connection
3. The serial port is tested

Safe home System Page 13


Safe Home System 201
1

Safe Home System


authentication and
Configuration

uses

Input password
Validate Password

Specify cell number


Home Owner

Specify message

Alarm/SMS/Calling Testing

Safe home System Page 14


Safe Home System 201
1

Intruder
Detec tion Intrus ion data s torage
S ens or detec tion

int rus ion inform at ion

Inform s hom e ow ner us ing S M S


and phone c all

Intruder E nters into hom e


S HS

S ounds alarm

Remote System
Configuration

Specify message Cell phone


Parse Message

Send message

Home Owner
Fetch data
SHS system

Configure sensor using message


GSM Modem

Safe home System Page 15


Safe Home System 201
1

W eb Portal
Use Case

Inquiry home status parse data

<<include>>
uses
<<include>>
uses
Configure sensors
Home Owner W eb Portal
<<include>> uses Interface SHS system save configuration data

Configure System

Update System

Safe home System Page 16


Safe Home System 201
1

Non-functional Requirements
• Security and Privacy Requirements

Home user will have unique login Id and Password.


• Usability Requirements

The UI of the system shall be user friendly.


• Quality Requirements

The system shall be efficient and portable. The system will be also be reliable and consistent.
• Maintenance Requirements

Up-gradation of the current version of the system being developed can be done easily by
adding new features.

Safe home System Page 17


Safe Home System 201
1

Safe home System Page 18

Вам также может понравиться