SRS-doc-Online Library System
SRS-doc-Online Library System
SRS-doc-Online Library System
0
1. CHAPTER ONE
Introduction
Borrowing books, returning books or viewing the available books at the Library of
the Haramaya University is currently done manually where in the student has to
go to the Library and check the available books at the Library. Students check the
list of books available and borrow the books if the book is a borrow book
otherwise it is of waste for the student to come to the library to check for the books
if the student doesn’t get the book. Then the librarian checks the student id and
allows the member to check out the book and the librarian then updates the
member database and also the books database. This takes at least one to two hours
if the member is available at the nearby place otherwise it may take more time.
Purpose
The purpose of Software Requirements Specification (SRS) document is to
describe the external behavior of the Online Library Management System.
Requirements Specification defines and describes the operations, interfaces,
performance, and quality assurance requirements of the Online Library
Management System. The document also describes the nonfunctional requirements
such as the user interfaces. It also describes the design constraints that are to be
considered when the system is to be designed, and other factors necessary to
provide a complete and comprehensive description of the requirements for the
software. The Software Requirements Specification (SRS)captures the complete
software requirements for the system, or portion of the system. Requirements
described in this document are derived from the Vision Document prepared for the
Online Library System.
1
Scope
The Software Requirements Specification captures all the requirements in a single
document. The Online Library Management System that is to be developed provides
the members of the Library and employees of the library with books information,
online blocking of books and many other facilities. The Online Library System is
supposed to have the following features.
The features that are described in this document are used in the future phases
of the software development cycle. The features described here meet the needs
of all the users. The success criteria for the system is based in the level up to
which the features described in this document are implemented in the system.
2. CHAPTER TWO
Overall Description
This SRS document will provide a detailed description of the Online Library
Management System. This document will provide the outline of the
requirements, overview of the characteristics and constraints of the system.
Section 1: This section of the SRS will provide the general factors that affect
the product and its requirements. It provides the background for those
requirements. The items such as product perspective, product function, user
characteristics, constraints, assumptions and dependencies and requirements
subsets are described in this section.
Section 2: This section of SRS contains all the software requirements
mentioned in section 2 in detail sufficient enough to enable designers to
design the system to satisfy the requirements and testers to test if the system
satisfies those requirements.
Section 3: This section of SRS contains all of the description about the system
we develop by defining the System design, Context diagram, Interaction
model, Use case diagram, Activity diagram, System architecture in detail.
2.1.1 Product Perspective
3
The complete overview of the system is as shown in the overview diagram
below:
The product to be developed has interactions with the Users: Librarian,
Supplier Members who are the students and professors of the HU.
The product has to interact with other systems like: Internet, and the HU
Information Security System.
ADMIN
HU Information
Security System
Librarian
The Proposed Online Library
Management System
Internet
Users
Figure (2.1) Overview of the proposed system
4
The member should be provided with the updated information about
the books catalog.
Provisions for the members to borrow the books they want, if all the
other required rules hold good.
The member is given a provision to check his account information
and change the account information any time in the given valid
period.
The members are provided with the books available roster and
allowed to choose the books, which they want to use in the coming
up days.
The librarian can get the information about the members who have
borrowed or returned the books.
The librarian is provided with interfaces to add/delete the books
available in the book catalog.
The members when complete the book borrowing or returning
process, the Librarian add his name with his PIN to the list which
shows those who borrowed book or those who returned the
book.
The system uses the University information security requirements
to provide the login facility to the users.
The users of the system are members, librarian of the university and the
administrators who maintain the system. The members and the librarian
are assumed to have basic knowledge of the computers and Internet
browsing. The administrators of the system to have more knowledge of
the internals of the system and is able to rectify the small problems that
may arise due to disk crashes, power failures and other catastrophes to
maintain the system. The proper user interface, user manual, online help
and the guide to install and maintain the system must be sufficient to
educate the users on how to use the system without any problems.
2.1.4 Constraints
3. CHAPTER THREE
Software Requirements Specification
This section describes in detail all the functional, User and Non-Functional
requirements.
3.1.1 User Requirement
3.1.1.1 User Interface
Application will be accessed through a Browser Interface. The interface would be
viewed best using 1024 x 768 and 800 x 600 pixels resolution setting. The software
would be fully compatible with Microsoft Internet Explorer for version 6 and above.
No user would be able to access any part of the application without logging on to the
system. The user-interface of the system shall be designed as shown in the user-
interface prototypes.
User Login Screen Form
6
Figure (3.1) User Login Screen Form.
7
Member Registration Screen:
8
Main Search Page of Library Catalog:
9
3.1.1.3 Software Interfaces
A firewall will be used with the server to prevent unauthorized access to the
system.
Client Side: HTML, Web Browser, Windows
XP/2000/Vista, GUI
Web Server: HTML, Windows XP/2000/Vista
3.1.3.2 Reliability
The system has to be very reliable due to the importance of data and the
damages incorrect or incomplete data can do.
11
3.1.3.3 Availability
The system is available 100% for the user and is used 24 hrs a day and 365
days a year. The system shall be operational 24 hours a day and 7 days a week.
3.1.3.4 Mean Time Between Failures (MTBF)
The system will be developed in such a way that it may fail once in a year.
3.1.3.5 Mean Time to Repair (MTTR)
Even if the system fails, the system will be recovered back up within an hour
or less.
3.1.3.6 Accuracy
The accuracy of the system is limited by the accuracy of the speed at which
the employees of the library and users of the library use the system.
3.1.3.7 Access Reliability
The system shall provide 100% access reliability.
3.1.3.8 Performance
Response Time
The Splash Page or Information page should be able to be downloaded within a
minute using a 56K modem. The information is refreshed every two minutes. The
access time for a mobile device should be less than a minute. The system shall
respond to the member in not less than two seconds from the time of the request
submittal. The system shall be allowed to take more time when doing large
processing jobs.
Administrator/Librarian Response
The system shall take as less time as possible to provide service to the
administrator or the librarian.
Throughput
The number of transactions is directly dependent on the number of users, the
users may be the Librarian, employees of the Library and also the people who
use the Library for checking-out books, returning books and checking online
library account.
Capacity
The system is capable of handling 10,000 users at a time.
Resource Utilization
The resources are modified according the user requirements and also
according to the books requested by the users.
12
3.1.3.9 Supportability
The system designers shall take in to considerations the following
supportability and technical limitations.
Internet Protocols
The system shall be complying with the TCP/IP protocol standards and shall
be designed accordingly.
Information Security Requirement
The system shall support the HU information security requirements and use
the same standard as the HU information security requirements.
Maintenance
The maintenance of the system shall be done as per the maintenance contract.
Standards
The coding standards and naming conventions will be as per the American
standards.
3.1.3.10 Quality Requirements
The Quality of the System is maintained in such a way so that it
can be very user friendly to all the users.
The software quality attributes are assumed as under:
Accurate and hence reliable.
Secured.
Fast speed.
Compatibility.
4. CHAPTER FOUR
System Design
Design is the abstraction of a solution; it is a general description of the
solution to a problem without the details. Design is view patterns seen
in the analysis phase to be a pattern in a design phase. After design
phase we can reduce the time required to create the implementation.
In this chapter we are introduce context diagram, models, system
architecture, principal system object, design model and object interface.
13
4.1.1 Context Diagram
This diagram represents what are the bounders and scope of On-Line
Library Management System project. It describes the main objective
of the system and its entities involved.
Administrator
Librarian
User
On-Line Library
Management
System for
HU
Supplier
Figure (4.1): the context diagram of On-line Library management System for HU
Supplier
Control the overall library catalog services.
Supplies a new reading material (Book) to the catalog based on a report from
Administrator.
Check if there is a shortage of Book in the catalog.
14
Investigate for the newly available Book.
Initiate intellectuals to prepare module or a complete book.
Model
4.2.1 Interaction Models
The dynamic model shows how the system interacts with its
environment under different conditions as follows.
View Reports
Administrator
Librarian
Registration Process
Student
Insert Book
Borrow Book
15
4.2.3 Activity Diagram
Request View
Report
Receiving Report Receive
details Registrati master
Administrator on Book master
Book details
Process
Supplier
Library details master
Supplier Library
details master
(a)
Request
Report View
Report
Librar Inserting
y Inserting book
book Supplier Book
master master
(b)
16
Request
Report View
Report
Student
Book
Book master
Register Borrow Borrow
Book master master
User
master
rrr
Control
master
Figure (4.3--b) Activity diagram
Web Browser
17
Appendix
4.3.1 Appendix A: Glossary
User model
Manager model
Admin model
Library catalog model
Help model
18
4.3.3 Appendix C: To Be Determined List
Index
PIN (Personal Identification Number), 3,5
Supplier,14,4
Mean Time Between Failure (MTBF),12
Mean Time To repaired (MTTR),12
Client side,9,10
Server side,10
Webserver,10
Operating System,9
Windows 9x/xp,9
Windows ME,9
Processor,9
Pentium 3.0 GHz or higher,9
RAM: 256 Mb,9
Hard Drive: 10 GB ,9
MAC or UNIX.9
Broadband,10
Constraints,6
Databsase,6
HTML,12
Web Browser,12
Deleting Updating Adding ,11,12
19
Catalog,5,19
Borrow,1,15
20