Software Requirements Specification
Software Requirements Specification
Version 1.0
Table of Contents
1. Introduction
1.1 Purpose
1.2 Scope
1.4 References
2. Overall Description
2.1.7 Operations
2.4 Constraints
3. Specific Requirements
3.2.1 Register
3.2.2 Login
3.3.3 Logout
3.3.10 Feedback
3.3 Performance Requirements
1.Introduction
Chat server management system is a software that enables users to chat with one
another one-to-one or as a group all over the world. It also responsible for the payroll
management of the employees. It makes life easy for the people to communicate
throughout the world.
1.1 Purpose
The goal of the system is to capture time and provide encrypted communication
between users via chat, voice call and video call as a one-to-one or a group. It also
provide recording voice and video calls, send images, documents, user location and
text messages. This data should be further processed to backup management.
1.2 Scope
This Application works in Multiple PC’s installed on multiple Computers but sharing
same database by which users of different department can use it sitting at different
locations simultaneously. But in future we can make the Application where the
database will be hosted in order to manage the all departments which will be located
in different places and by keeping domain of Application as Online.
• User Details
• User History
• User chat
• Users Group and friend list
The administrator will perform the following functions:
• Notification
• Login and logout Management
The User requires the following information :
• Login Id
• Login Password
2.1 Product Perspective
The CRMS shall be developed using Chat server architecture and will be compatible
with
Microsoft Windows Operating System. The front end of the system will be developed
using HTML and CSS, and the back-end will be developed using PHP and MySQL.
It provides simple database rather than complex ones for high requirements and it
provides good and easy graphical user interface to both new as well as experienced
user of the computer.
2.1.1 System Interfaces
None
2.1.2 User Interfaces
The CRMS will have the following user-friendly and menu-driven interfaces:
(a) Login: to allow the entry of only authorized users through valid login ID and
password.
(b) Add Friend: Allow user to add new friends in their database.
(c) Remove Friend: Allow user to remove or delete friends from their database.
(d) Block Friend: Allow user to block a friend on the system.
(e) Group Chat: Allow user to create a group or add in a group.
(f) Log out: Allow user to log out from the system.
2.1.3 Hardware Interfaces
(a) Screen Resolution of at least 640 * 480 or above.
(b) Support for printer.
(c) Computer systems will be in the networked environment as it is a multi-user
system.
2.1.4 Software Interfaces
(a) MS-Windows Operating System
(XP/Vista/8/10) (b) HTML and CSS for
designing front end.
(c) PHP and MySQL for designing the back end.
2.1.5 Communication Interfaces
In the CRMS, communication is via local area network (LAN) and it is a web-
enabled system.
2.1.6 Memory Constraints
At least 2 GB RAM and 200 MB space of hard disk will be required to run the
software.
2.1.7 Operations
None
2.1.8 Site Adaptation Requirements
The terminal at the client side will have to support the hardware and software
interfaces specified in sections 2.1.3 and 2.1.4, respectively.
2.2 Product Functions
The CRMS will allow access only to the authorized users with specific roles (system
administrator, DEO and Users). Depending on the user’s role he/she will be able to
access only specific modules of the system.
A summary of major functions that the LMS shall perform includes:
Introduction: This use case allows the user to register the system.
Actors: User
Admin
Postcondition: If the use case is successful,the user is granted access to the system.
Event Flow:
Basic Flow
1. The user installs the chat application.
2. The user enters his/her phone number or email id and signs up .
3. The users login id i.e phone number and password are saved with the system’s
database.
Alternative Flow:
1. If the user installs the app but does not register, and tries to login then an error message
will be flagged saying please sign up first.And use case returns to the beginning of the
basic flow.
2. This allows the user to exit the server any time during the use case.The use case ends.
B. Validity Checks
i. Every user will have a unique login ID.
ii. Login ID cannot be blank.
iii. Login ID can only have 4 to 15 characters.
iv. Login ID will not accept special characters and blank spaces.
v. Password cannot be blank.
vi. Length of password can only be 4 to 15 digits.
vii. Password will not accept blank spaces.
C. Sequencing Information
None
D. Error Handling
If any of the validation flows does not hold true, appropriate error message will be
prompted to the user for doing the needful.
3.2.2 Login
A. Use Case Description
Introduction: This use case allows the user to access the system.
Actors: Administrator
User
Precondition: The user must have their login id and password with them.
Postcondition: If the use case is successful ,the user is granted access to the system.
Event Flow:
Basic Flow
1.The user enters his/her login id password.
2.The user’s login id password is matched with the system’s database.
3.The user’s credentials match and he is granted access to the system.
Alternative Flow:
If the system does not validate the user's login id or password due to entering wrong
credentials then an error message is flagged and the use case returns to the beginning of
the basic flow.
B. Validity Checks
iv. Every user will have a unique login ID.
v. Login ID cannot be blank.
vi. Login ID can only have 4 to 15 characters.
viii. Login ID will not accept special characters and blank spaces.
ix. Password cannot be blank.
x. Length of password can only be 4 to 15 digits.
xi. Password will not accept blank spaces.
C. Sequencing Information
None
D. Error Handling
If any of the validation flows does not hold true, appropriate error message will be
prompted to the user for doing the needful.
3.2.3 Logout
A. Use Case Description
Introduction: This use case allows the user to logout the system.
Actors: User
Postcondition: If the use case is successful then the user can log out of the system.
Event Flow:
Basic Flow
User is done using the web application
1. The user clicks on the logout button
2. The system logs the user out and invalidates the cookie/session
3. The system redirects to the default home page
The user logs out of the computer.
Actors: User
Postcondition:If the use case is successful then the user can check their friend list.
Event Flow:
Basic Flow
1.User enters the required details.
2.User clicks on the friends button.
Alternative Flow:If the user does not have any friends then he/she is flagged with a message
no friends yet add friends and the use case is sent to find a friend.
B. Validity Checks
i. Only the User will be authorized to access the Friend List Module.
C. Sequencing Information
User must be Register in the system.
D. Error Handling
If any of the validation flows does not hold true, appropriate error message will be
prompted to the user for doing the needful.
3.2.5 Find Friend
A. Use Case Description
Actors: user
Postcondition:if the use case is successful then the user can find their friend.
Event Flow:
Basic Flow
1.User search for his/her friend in the search tab.
2.User enter his friend’s name or phone number.
3.User clicks on the friend’s profile.
Alternative Flow:
If the user enters a name which is not in the system’s database then an error
message is flagged saying no results found and the use case returns to the beginning
of the basic flow.
B. Validity Checks
i. Only the User will be authorized to access the Find Friend Module.
C. Sequencing Information
User must be Register in the system.
D. Error Handling
If any of the validation flows does not hold true, appropriate error message will be
prompted to the user for doing the needful.
3.2.6 Add Friend
A. Use Case Description
Introduction: This use case allows the user to add a friend on the system.
Actors: User
Precondition: The user must be logged into the system before adding a friend.
Postcondition:If the use case is successful then the user is connected to his/her friend on the
system.
Event Flow:
Basic Flow
1.The user selects another user and sends an invitation by clicking the request button.
2.The system will send a request message to the other user and show a message to the first
user to inform that the action has been done.
Alternative Flow:If the user has already sent an invitation to the other user, the system will
inform the user.
B. Validity Checks
i. Only the User will be authorized to access the Add Friend module.
C. Sequencing Information
User must be Register in the system.
D. Error Handling
If any of the validation flows does not hold true, appropriate error message will be
prompted to the user for doing the needful.
3.2.7 Remove Friend
A. Use Case Description
Introduction: This use case allows the user to remove a friend on the system.
Actors: Users
Precondition: The user must be friends with the user he/she wants to remove.
Postcondition: If the use case is successful then the user can remove his/her friend on the
system.
Event Flow:
Basic Flow
1.The user opens his friend profile.
2.The user selects the option-remove as friend on his/her friend’s
profile.
Alternative Flow:If the user has already removed his friend, the system will inform the user.
B. Validity Checks
i. Only the User will be authorized to access the Remove Friend Module.
C. Sequencing Information
User must be Register in the system.
D. Error Handling
If any of the validation flows does not hold true, appropriate error message will be
prompted to the user for doing the needful.
3.2.8 Block Friend
A. Use Case Description
Introduction: This use case allows the user to block a friend on the system.
Actors: Users
Precondition:The user must enter the name of the user he/she wants to block.
Postcondition: If the use case is successful then the user can block his/her friend on the
system.
Event Flow:
Basic Flow
1.The user opens his friend profile.
2.The user selects the option-block on his/her friend’s
profile.
B. Validity Checks
i. Only the User will be authorized to access the Block
Friend Module.
C. Sequencing Information
User must be Register in the system.
D. Error Handling
If any of the validation flows does not hold true, appropriate error message will be
prompted to the user for doing the needful.
3.2.9 Group Chat
A. Use Case Description
Introduction: This use case allows the user to chat with many friends at a time i.e group chat
on the system.
Actors: Users
Precondition: The user must be logged in to the system and must be connected to his/her
friends.
Postcondition:If the use case is successful ,then the user sends the message on the system.
Event Flow:
Basic Flow
1.The user ,when viewing their friends and acquaintances list can
select the option to create a new group.
2.The user sets the group name.
3.The user select which of their friends and acquaintances will be
added to the group before confirming their selection.
4.A group chat is created. Anyone in the group can send the message
and everyone in the group can receive the message.
Alternative Flow:
If the user tries to add friends more than the limit then an error message is flagged saying
you cannot add more friends and the use case returns to the basic flow.
C. Sequencing Information
User must be Register in the system.
D. Error Handling
If any of the validation flows does not hold true, appropriate error message will be
prompted to the user for doing the needful.
3.2.10 Feedback
A. Use Case Description
Actors: User,Admin
Postcondition:If the use case is successful ,then the user gives feedback to the server.
Event Flow:
Basic Flow
1. User selects "Provide Feedback"
2.System looks up central user support phone numbers.
3.System displays phone numbers to call and gives the user the
option to send email immediately
4.User selects email option
5.System looks up the email address of customer service and passes
it to the browser.
6.System launches email browser client.
7.User enters message, presses "Send"
8.Browser mail client sends mail.
Alternative Flow:If an intruder is detected to open the account of the user ,then the
administrator sends a recovery code on the user’s phone number.
B. Validity Checks
i. Only the User will be authorized to access the Feedback Module.
C. Sequencing Information
User must be Register in the system.
D. Error Handling
If any of the validation flows does not hold true, appropriate error message will be
prompted to the user for doing the needful.
3.3 Performance Requirements
(a) Should support at least 10 terminals.
(b) Should support at least 10 users simultaneously.
(c) Should run on 1.3 GHz, 2GB RAM machine. (d) Responses should be
within 2 seconds.
1. LOGIN
2. Contact Form