Академический Документы
Профессиональный Документы
Культура Документы
Version 1.0
Safe Home System 201
1
Safe Home System 201
1
Table of Contents
1.Introduction....................................................................................................................................................1
Purpose.....................................................................................................................................................1
Scope........................................................................................................................................................1
Definitions, Acronyms and Abbreviations...............................................................................................1
References................................................................................................................................................2
Overview..................................................................................................................................................2
Positioning........................................................................................................................................................3
Business Opportunity...............................................................................................................................3
Problem Statement...................................................................................................................................3
1.1.Product Position Statement................................................................................................................3
Product Overview.............................................................................................................................................7
Product Features...............................................................................................................................................8
Constraints........................................................................................................................................................8
Security............................................................................................................................................................8
Security for the SHS includes authentication, access control, data integrity, and data privacy.......................8
Homeowners and Business Owners can monitor and change the state of the system......................................8
Customer Care users can only monitor the system and manually place a medical alert emergency request
for an ambulance. ............................................................................................................................................8
Documentation Requirements........................................................................................................................10
Port configuration........................................................................................................................................11
Sensor configuration....................................................................................................................................11
Use Case: configure port..............................................................................................................................12
Use Case: System configuration..................................................................................................................13
Safe Home System 201
1
1. Introduction
The purpose of this document is to collect, analyze and define high-level needs and features of
the Safe Home System. It focuses on the capabilities needed by the stakeholders, and the target
users, and why these needs exist. The details of how the Safe Home System fulfils these needs
are detailed in the use-case and supplementary specifications. The document also explains the
working of sensors, alarms and cameras used in Safe Home System.
Purpose
The project Safe Home System (SHS) is open source burglar alarm control and monitoring
software using wireless alarm system.
The is an advanced wireless Home/Business Alarm Controller which supports many types of
sensors, can control various types of devices, and has computer interfaces for USB and Ethernet.
With our code you can:
• Arm and disarm your alarm system
• Read the current settings and program the device
• Monitor all the attached devices (PIR sensors, web cams etc)
Scope
In this system, home owner can start the system as well as independently control all the
sensors through SMS or internet. Home owner will be informed by SMS and call when
any human intrusion detected. He can view logs of images of human and time when
intrusion took place in his home. This system will be very useful to a homeowner who
does not have sufficient funds to pay for a professionally installed security system.
Term Definition
SMS Short Message Service
SHS Safe Home System
CP Control Panel
UPS Uninterrupted Power Supply
Database An organized collection of related information
Administrator One who manages the entire system
Constraint Any limit or restriction given for the design process
References
• Software Engineering: a practitioner’s approach, by Roger S. Pressman, McGraw-Hill
publication, 6th edition, 2005.
• SafeHome System Architectural Model, by Timothy C. Lethbridge, in conjunction with
Roger Pressman, version 7.01, July 2004
Overview
The remainder of this document is two chapters, the first providing a full description of the
project. It lists all the functions performed by the system. The final chapter concerns details of
each of the system functions and actions in full for the software developers’ assistance.
This project deals the working of SHS using sensors, alarms and cameras. The coding is done in
Java and the system communicates over wireless 802.15.4. It makes use of one PC, a GSM
modem in a mobile phone, sensors, web cameras and an alarm to depict the working of the
system.
The document contains the stakeholders involved, the requirements of the project, and the
product features. This is followed by a future scope of improvement possible in the system.
Positioning
Business Opportunity
People nowadays give a lot of stress on the safety of their homes. They require a security system
installed in their homes but at an affordable price with desirable services. Since Safe Home Systems
enable the fulfillment of such needs of the masses this software has a tremendous market available.
Problem Statement
The problem of An increase in crime rates in large
cities
Affects Middle income home owners
The impact of which is uncertainty in the safety and security
of the home owners and their
belongings
A successful solution a flexible, cost effective home safety
would and security system that can be easily
configured by the homeowner. In
addition, a home security and safety
system can have a rich variety of
sensors to coordinate, monitor and
control as
well as emergency notification
features. The user would be able to
access the system either locally or
remotely. It will be able to utilize
existing alarm monitoring networks.
1.1. Product Position Statement
For Any residence owner
Who For Security of home in absence of
owner
The (product name) is a Security Services product
That Extra benefit of camera along with
alarm to protect the home with
reasonable price
Our product Web cam detects motion in the home.
Various sensors such as Infrared and
sound help to detect intrusion and
temperature sensor detects fire. Phone
service will inform the house owner of
the same.
Representative Stakeholder1
Description Software developers
Type Software developers have extra knowledge of usage and priorities of
operations
Responsibilities Captures customer details, produces reports, co-ordinates work among the
various developers
Success Criteria Successfully able to protect the home and so his reward would be that his
product will be purchased in large amount
Involvement Validate and update the requirements as per the user
Representative Stakeholder2
Description Home owner and his family members
Type Casual user, a private individual that will use the system for protecting their
home.
Responsibilities Provide the security requirements and inform any previous incidences of
human intrusions and burglary.
Success Criteria When a stakeholder is able to catch the unknown person from entering his
home and stealing anything he is said to get success out of the software.
Representative Stakeholder3
Description Friends and guests of the home owner
Type Here stakeholders are subset of end users with not necessarily technical
background
Responsibilities They are required to specify needs is particular formatting so that important
details are not left out. Also they should put efforts to gather information
Success Criteria When a stakeholder is able to catch the unknown person from entering his
home and stealing anything he is said to get success of the software. And he
is rewarded by keeping his home safe and secure.
Involvement Suggests the new requirements and validate the old one
Product Overview
Secured access to the system The primary user can choreograph sequences of
authentication, access control to the system sensor and notification features going on and off at
different times. The sensors include motion sensors
inside the home or garage, infrared sensors inside
the home or garage, sound and temperature sensors
that detect fire.
Management can identify problem areas and Trend and distribution reports allow high level
gauge staff workload. review of problem status.
Distributed support teams can work together Replication server allows current database
to solve problems. information to be shared across the enterprise
Customers can help themselves, lowering Knowledge base can be made available over the
support costs and improving response time. Internet. Includes hypertext search capabilities and
graphical query engine
Product Features
• Local control panel as well as Internet based control panel
• Arms and Disarms the unit
• Calls emergency number when fire is detected.
• Alarm is sounded when motion is detected.
• Motion is detected, corresponding images are stored locally and a log file is generated.
• Sends the message to the Home owner.
• Makes a phone call
Constraints
Security
Security for the SHS includes authentication, access control, data integrity, and data
privacy.
Authentication of the user is by identifier and password.
Homeowners and Business Owners can monitor and change the state of the system.
Customer Care users can only monitor the system and manually place a medical alert
emergency request for an ambulance.
6.2 Usability
• Easy to use (especially safety related features)
• Request for an ambulance, police or fire truck needs to be at the push of a button or voice
activated
6.3 Responsiveness
• System responds quickly to user requests or changes in the environment.
6.4 Capacity
• Maximum number of sensors, security cameras, emergency notifications, that can be
controlled by the personal computer connected via Bluetooth to the mobile for message
alerts.
Performance Requirements
• Battery Backup for the system
Documentation Requirements
9.1. User Manual
• Install the WebCam Looker software and ensure that current drivers for the webcam are also set
up. When you plug in your camera, start WebCam Looker and dismiss the wizard box. You
should now see a live image feed of the area you want to monitor.
• Choose the Settings menu on the bottom of the viewing area. From this menu you can set
destinations for images taken on your PC and set up web servers.
• On application home window, user can specify cell number and message when intrusion detects.
• When the sensor detects intrusion, you’ll be sent message of the intruder.
• User manual will be included in application.
• Before you even begin doing the actual physical installation you need plan out your work. What
areas you need to cover by the burglar alarm system can be seen with the help of a floor plan of
Functional Requirements
Port configuration
Sensor configuration
• Alarm system
• System configuration
Port
Configuration
Configuration
Manager
Test Connection
generic sensor
use case
Sensor Configuration
uses
sensor
Inquire sensor status <<includes>>
<<includes>>
Configuration
manager
<<includes>>
Add/Remove Sensor
uses
GSM Modem
<<includes>>
login
home owner
Start/stop SMS and call service
<<includes>>
<<includes>>
Start/stop alarm
Start/Stop sensor
Brief Description:
The configuration manager configures the sensors port to which the MiacZ motes will be
connected.
uses
Input password
Validate Password
Specify message
Alarm/SMS/Calling Testing
Intruder
Detec tion Intrus ion data s torage
S ens or detec tion
S ounds alarm
Remote System
Configuration
Send message
Home Owner
Fetch data
SHS system
W eb Portal
Use Case
<<include>>
uses
<<include>>
uses
Configure sensors
Home Owner W eb Portal
<<include>> uses Interface SHS system save configuration data
Configure System
Update System
Non-functional Requirements
• Security and Privacy Requirements
The system shall be efficient and portable. The system will be also be reliable and consistent.
• Maintenance Requirements
Up-gradation of the current version of the system being developed can be done easily by
adding new features.