Home Security SRS Documentation
Home Security SRS Documentation
Home Security SRS Documentation
A Report on
I-Guard
I-Guard
Major Project-I
Submitted in partial fulfilment of the requirements For the degree of Bachelor of Engineering in Computer Engineering
Certificate
This is to certify that the Major Project-I entitled I-Guard submitted by (Honey Patel)
(080120107062), towards the partial fulfillment of the requirements for the degree of Bachelor of Engineering in Computer Engineering of Gandhinagar Institute of Technology, Moti bhoyan is the record of work carried out by her under my supervision and guidance. In my opinion, the submitted work has reached a level required for being accepted for examination. The results embodied in this major project, to the best of my knowledge, havent been submitted to any other university or institution for award of any degree.
External Faculty
Acknowledgement
This project would not have been possible without the guidance and support technical and personal of a number of people. We would like to thank all those individuals, researchers, professionals and technicians who are working in the domain of I-phone directly and indirectly. We went through many problems and challenges during our tenure with the industry. We had gone through many books and also referred many recommendations proposed by many forums and standards making bodies. Finally we would like to thank our college faculty members and friends without whose support we would not have been able to complete the project up to this.
Abstract
The purpose of making this project is to provide security network on .Net platform, with its own database so that all users of that application can secure their premises whether they are at their work place or at their home.
Index
1. Introduction ...........................................................................................................................7 1.1 Purpose ..................................................................................................................................7 1.2 Document Conventions .........................................................................................................7 1.3 Intended audience and reading suggestions....7 1.4 Project Scope ..........................................................................................................................7 2. Overall Description ................................................................................................................8 2.1 Product Perspective ................................................................................................................8 2.2 Product Features......................................................................................................................8 2.3 User Characteristics ................................................................................................................8 2.4 Operating Environment ..........................................................................................................10 2.5 Design and Implementation Constraints ................................................................................13 2.6 User Documentation ...............................................................................................................15 2.7 Assumptions and Dependencies ............................................................................................16 3. System Features .....................................................................................................................17 3.1 System Feature 1 ...................................................................................................................17 4. System design..18 4.1 Data flow Diagram.....18 4.2 Use case Diagram20 4.3 Class Diagram.....21 4.4 Sequence Diagram..22 4.5 E-R Diagram..23 5. External Interface Requirements ........................................................................................24 5.1 User interface.24 5.2 Hardware Interfaces ..............................................................................................................24 5.3 Software Interfaces ...............................................................................................................24 5.4 Communication interface...27 6. Other Nonfunctional Requirements .....................................................................................27 6.1 Safety Requirements ..............................................................................................................27 6.2 Security Requirements ..........................................................................................................28 6.3 Software Quality Attributes ..................................................................................................28 References29
1.Introduction:
1.1 Purpose:
This project is about the design and development of an automated home security system. Home security system should provide security and safety features for those houses that are using it. It should be able to alarm residents from natural, accidental and/or human dangers such as: fire,theft, animals invading, .etc. The requirement document will include some details about the problem or the need for a home security system as well as the solution specifications or what is expected from home security system. This document, the Software Requirements Specification (SRS) is used to describe and track the software requirements for home security system. In addition to basic requirements this SRS will describe the external Interface Requirements, nonfunctional requirements, and Overall Description,System Features,etc.
Face: Bold
Size: 12
Face: Normal
Size: 12
2. Overall Description:
2.1Product Perspective:
iPhone Technology and Literature Review application for Home security &monitoring. User can control arm(lock)/disarm(unlock)/alarm(emergency) his home from the mobile. He can view the history of the events and camera attached in his home. Whoever can interact with our home security systems such as the lightening system, phone system, alarm etc in enable mode.
2.2 Product Features: Reports sent in seconds via pop up messages in phone call.
It does support WI-FI and GPRS for iphone and Internet connection for Application server. Arm/Disarm alarm via internet keypad Remote programming of the system Super fast transmission speed Easy to install and set-up APPLICATIONS: Alarm signal reporting Open/Close signal reporting - Monitor by user code Latch-key reporting Polling loss notification - Monitor if you lose communication Supervisory by zone - Monitor a liquor or gun cabinet in your home
2.4Operating Environment:
In our system we would be using following software and hardware: Softwares: 1. Objective c: Objective-C's features often allow for flexible, and often easy, solutions to programming issues. Delegating methods to other objects and remote invocation can be easily implemented using categories and message forwarding. Swizzling is a pointer allows for classes to change at runtime. Typically used for debugging where freed objects are swizzled into zombie objects whose only purpose is to report an error when someone calls them.Swizzling was also used in Enterprise Objects Framework to create database faults. Swizzling is used today by Apples Foundation Framework to implement Key-Value Observing. Serialization, commonly called Archiving in Objective-C, can be done by overwriting read and write methods. 2. SQL server(2005/2008) SQL Server 2005 (codename Yukon), released in October 2005, is the successor to SQL Server 2000. It included native support for managing XML data, in addition to relational data. For this purpose, it defined an xml data type that could be used either as a data type in database columns or as literals in queries. XML columns can be associated with XSD schemas; XML data being stored is verified against the schema. XML is converted to an internal binary data type before being stored in the database. Specialized indexing methods were made available for XML data. XML data is queried using XQuery; Common Language Runtime (CLR) integration was a main feature with this edition, enabling one to write SQL code as Managed Code by the CLR.
10
3. SQL light: A high-level overview of what SQLite is and why you might be interested in using it. This document describes situations where SQLite is an appropriate database engine to use versus situations where a client/server database engine might be a better choice. This document enumerates and describes some of the features of SQLite that make it different from other SQL database engines. A list of all titled pages on this website, sorted by title. 4. Visual studio (2005/2008): Microsoft Visual Studio is an integrated development environment (IDE) from Microsoft. It is used to develop console and graphicaluser interface applications alongwith WindowsForms applications, web sites, web applications, and web services in both native code together with managed code for all platforms supported by Microsoft Windows, Windows Mobile, Windows CE, .NET Framework, .NET Compact Framework and Microsoft Silverlight. This is the newly established software development environment which helps developers to develop applications quickly and gives optimum,
11
6. Iphone SDK(x-code): Apple today provided development details for native third-party applications for the iPhone and iPod touch. The company has created a development kit that uses the same programming language and interface used by Apple itself and now includes Cocoa Touch, an API designed to add touchscreen input. Programmers now use a modified version of Xcode that is not only used to write programs for the iPhone but to manage them as well, including designing the visual interface, source control, and debugging. Developers can also test the final results in an environment known as the iPhone Simulator, according to Apple.
12
Single Window As an experienced Xcode user, the first thing you will notice about Xcode is that the many windows used to perform the development tasks you work on every day have been consolidated into a single window. The Xcode work area has several unique UI elements that make it easy to work on many different tasks, even multiple projects, without cluttering your work area. Your editor is always front and center. Navigators The unified navigator UI provides live filtering of content and search results, so you can focus on your current task.
Hardware: 1. Server(1 gb RAM): Application server: A new, user-friendly Add Roles Wizard that helps you choose the services and features that are necessary to run your applications Application Server Foundation, the default installation of Application Server that includes the .NET Framework 3.0 features (If you have applications that are built with the .NET Framework 3.5, you can download and install the .NET Framework 3.5 onto the operating system.) 2. IP camera: This device takes the images and videos of different areas and sends the updates to the server as well as the device. 3. Sensor: Mechanical device sensitive to light, temperature, radiation level, or the like, that transmits a signal to measuring or control instr -ument.
Security considerations:
security system has the ability to range from a simple motion sensor that turns on a light or an alarm to an entire suite of detectors motion, door/window sensors, glass-break, cameras setting off the most advanced applications employing cutting edge technology. Not only can your highly developed system activate lights and alarms, but also it has the capability of notifying the proper emergency response team. You can also program your system to notify you about an intrusion or emergency via email, cellular phone, instant message, or other online notifications. When you are trying to secure your home, a home security system can go all the way.
language requirements: English communications protocols: It should be voice alert and message alert inside Home security application. security considerations: burglary: The system shoots an alarm in case a burglary takes place and sends an instant notification to our apple device. Breakdown:
14
Remove unnecessary services: operating system installations and configurations, are not secure. Switch off all unnecessary services and disable them, so next time the server is rebooted, they are not started automatically. Switching off unnecessary services will also give an extra boost to your server performances, by freeing some hardware resources. Monitor and audit the server: All the logs present in a web server, should ideally be stored in a segregated area. All network services logs, website access logs, database server logs (e.g. Microsoft SQL Server, MySQL, Oracle) and operating system logs should be monitored and checked frequently.
User accounts: Unused default user accounts created during an operating system install should be disabled. There is also a long list of software that when installed, user accounts are created on the operating system. Such accounts should also be checked properly and permissions need to be changed required.
15
16
17
18
Level 1:
Photo capture Input Information Pass the information 1.0 Process detect the obj into its vicinity sensor
1.1 Server
Level -2:
Send the info the device 2.0 Output Server Send respond back
19
authority
camera
user
Create a user
apple device
server
20
Home
Server Buffer()
Output
Receive notification Reply back
21
22
input
M
Send the
Give info to info
server
23
This device takes the images and videos of different areas and sends the updates
to the server as well as the device.
3. SQ L light: A high-level overview of what SQLite is and why you might be interested in using it. This document describes situations where SQLite is an appropriate database engine to use versus situations where a client/server database engine might be a better choice. This document enumerates and describes some of the features of SQLite that make it different from other SQL database engines. A list of all titled pages on this website, sorted by title. 4. Visual studio 2008/2010: Microsoft Visual Studio is an integrated development environment (IDE) from Microsoft. It is used to develop console and graphicaluser interface applications alongwith WindowsForms applications, web sites, web
25
5. Window 7(min 1gb RAM): Features: Internet access (fees may apply) Home Group requires a network and PCs running Windows 7 Windows XP Mode requires an additional 1 GB of RAM and an additional 15 GB of available hard disk space. DVD/CD authoring requires a compatible optical drive PCs with multi-core processors: Windows 7 was designed to work with today's multi-core processors. All 32-bit versions of Windows 7 can support up to 32 processor cores, while 64-bit versions can support up to 256 processor cores. PCs with multiple processors (CPUs): Commercial servers, workstations, and other high-end PCs may have more than one physical processor. Windows 7 Professional, Enterprise, and Ultimate allow for two physical processors, providing the best performance on these computers. Windows 7Starter, Home Basic, and Home Premium will recognize only one physical processor.
6. Iphone SDK(x-code): Apple today provided development details for native third-party applications for the iPhone and iPod touch. The company has created a development kit that uses the same programming language and interface used by Apple itself and now includes Cocoa Touch, an API designed to add touchscreen input. Programmers now use a modified version of Xcode that is not only used to write programs for the iPhone but to manage them as well, including designinnterg the visual interface, source control, and debugging. Developers can also test the final results in an environment known as the iPhone Simulator, according to Apple.
26
Dont just buy one! Theres safety in numbers. Install at least one fire alarm on each floor of the house or residence and outside all sleeping areas. Some fire-safety advocates recommend installing fire alarms inside each sleeping area if sleeping with the door closed.
27
6.2 Security Requirements : Keyless entry to your front door . The card is integrated to a home security system which activates entry. There is no need to fumble with cumbersome sets of keys. Infrared motion sensors. These can be a welcoming beacon of light for family and friends and a simple yet effective deterrent for intruders. Security camera. These should be installed at the front door in conjunction with a videophone that allows you to communicate and see who is outside. You can now see who is at the door without leaving the comfort of your seat. Security system keypads. These offer detection devices, audio and visual alarms with telephone diallers that alert security-monitoring stations and call any telephone or mobile number to alert you of the situation back at home. Home-safety devices. Choose a device that provides emergency lighting to ensure you and your children dont have any accidents during a power failure. One safety switch. These are now compulsory in new homes but a smarter alternative is to use one safety switch for each circuit. Your home will not be plunged into total darkness when the power is cut due to one incident. An added feature of safety switches is extension leads that come in handy when youre using power tools outdoors. Motion detector lidhts trouble shooting. Installing motion detector lights in the surroundings of your house is a total relief from the fear of theft, intruders, lousy animals etc. These lights not only help you see through the darkness, but come on with an alarming bang in case of hunches. On the off chance if these lights are malfunctioning, you need to troubleshoot the problems at your earliest
6.3 Software Quality Attributes: Interface is accessible from at least one or more convenient places. This includes all of the home's common entry ways, bedrooms, and frequently used rooms. If the system interface is not readily accessible, then it will not be as easy to control and will offer little convenience. Interface and system must be properly connected to the sensors. It is essential to have secure wiring, preferably inside the walls, for reliable sensor information to guard against false alarms and tampering. System must be connected to a device that can contact authorities.
28
Security related devices must be tamper-proof. Connections to the power supply and phone lines must be secure. The housing for the actual security system and sensors must also be secure enough to withstand tampering.
29