欢迎来到留学生英语论文网

当前位置:首页 > 论文范文 > Computer Science

Software Requirement Specifications (SRS)

发布时间:2017-12-14
该论文是我们的学员投稿,并非我们专家级的写作水平!如果你有论文作业写作指导需求请联系我们的客服人员

CHAPTER 3

Software Requirement Specifications (SRS)

Software requirement specifications about the requirements. It specifies a hardware and a software requirements are required in the form of run the application correctly. The Software Requirement Specification (SRS) is the explains in full detail, which are includes an overview of this source as well as the functional informatio and non-functional requirement of dissertation report.

3.1 Components of SRS

Functional

Browse the data file, Initialize the all nodes, upload file to router, selecting the lesser cost node, assign cost for nodes, Control the Congestion in Router, Controls and Protecting the files, Routing between the service provider & router, view all attackers by IDS Manager, Find the Attacker, Data aggregation in router.

Non- Functional

The Sender and Receiver never Find the routing path.

External interface

LAN , Routers

Performance

Assign node cost and sleep time, view the node details, view attacker details, node initialization, view router details, File’s Sharing to the receivers, Finding the Attackers.

Attributes

Adhoc networks, probabilistic routing path, routing, prediction, Node sleep time, File Management, data provider, end user, Attackers,IDS Manager,MAC,Node Name

Table: 3.1. Summaries of SRS

3.2 Functional Requirements

Functional Requirement defines the functions of the software system, and how the systems are must behave when presenting with the specific conditions or inputs.

These might include data manipulation, calculations and processing of requirement and other specific process functionality. This system following are the functional requirements:-

  • The data service provider will browse the data file and initialize the nodes, then select a node & send to the particular end user.
  • Data Service provider will send their data file to router and in a router less cost and less sleep node will select and send to the particular end user.
  • The router consist of n-number of nodes (A, B, C, D, E and F) to provide a data service.
  • The router will receive the data file from the service provider and select a less cost node and send to the particular end user.
  • If any attacker will found in a router, then the router will select another less cost or less sleep node and send to particular end user.
  • In a router that can assign city cost, view node details and view attackers.
  • In IDS Manager. that can see the attackers such as attacked node, changed mac, attacked date and time, view attack destination.
  • If that click on view node details, then that will get all information about nodes with their tags such as node name, metadata, time & date.
  • There are n-number of end users are present (A, B, C and D). The end user can receive the data file from the service provider via router.
  • The end user will receive the file by without changing the File Contents. Users may receive particular data files within the router only.
  • Attacker is one who is rerouting the trajectory node. The attacker will select the node and inject fake key to the particular node.

3.3 Non Functional Requirements

Non-Functional requirements are the name suggested for that information that is not in directly concerned with the particular functions is delivered through the system. It may be related to emergency system properties such as reliability, and response time and data store occupancy. Alternatively, that might be defining conditions on the system such as the maintaining of the Input or Output devices and the information representations to used in system interference. On many non-functional requirements related with the system as complete or rather as to single system key features. The following non-functional requirements are valuable of attention.

The key non-functional requirements are:

  • Security: The system should always allow only secured communication in between Service provider and Router and End user.
  • Energy Efficiency: The Time consumed by the Router, transfer the File’s to the end user.
  • Reliability: The systems are reliable and must be not degrading the performance of the previous system and should not lead to the hanging of the system.

3.4 Hardware Requirements

The selection of hardware is very important for the proper working of the proposed system. The technologies which are used for developing the project depend on the hardware configuration. When selecting hardware, the size and capacity requirement are also important.

  • System: Intel dual core 2.2 GHz.
  • Hard Disk : 40 GB.
  • Monitor : 14’ Colour Monitor.
  • Mouse : Optical Mouse.
  • Ram : 1 GB.

3.5 Software Requirements

Once the system requirements are finalized then determine whether a particular software package fits system requirements or not. This section summarizes the software requirements.

  • Operating system : Windows XP or Windows 7, Windows 8.
  • Coding Language: Java – AWT, Swings, Networking
  • Data Base: My Sql / MS Access.
  • Documentation : MS Office
  • IDE : Eclipse Galileo
  • Development Kit : JDK 1.6

3.6 System Analysis

Analysis is the process of finding the best solution to the problem. System analysis is the process by which that learns about the existing problems, defines objects and requirements and evaluates the solutions. It is the way of thinking about the organization and the problem it involves, a set of technologies that helps in solving these problems. Feasibility study plays an important role in system analysis which gives the target for design and development.

3.6.1 Feasibility Analysis

An important result comes of primary investigation this determination, that the system requesting is the feasible. These are possible only, if it is feasible within the limited data resource and schedule. The various feasibilities that have been analyzed are

  • Operational Feasibility
  • Economic Feasibility
  • Technical Feasibility
3.6.2 Operational Feasibility

Operational Feasibility is always deals with the study of requirements of the system which have been developed, and this system operationally eliminates all of the tensions of the Admin and helps to identify effectively tracking at the project progress. This kind of simulation will surely minimize the schedule and energy, which previously consumed in the manual work. For based on the study, the system is proved to be operationally feasible for the project.

3.6.3 Economic Feasibility

An Economic Feasibility or Cost-benefit is an evolution of the economic justification for the computer based on project. The hardware was installed from the an initially and for lots of processes thus the cost on project of hardware is too low. Since the system is in a network based, and any number of employees can connected to the LAN within that organization could use this tools. The Virtual Private Network is to be developed for using the existing data resources of the organization. So the project is economically feasible for all aspects.

3.6.4 Technical Feasibility

The Technical Feasibility is the evaluation of the technical information in the organization, and organization needs IBM compatible machines with graphical web browsers connected with the Intranet and Internet. The systems are developed for platform Independent environment, , and Java Script, HTML, and Java Server Pages, and WebLogic Server SQL server are used to develop the system. And technical feasibility has been bringing together. The system is technically feasible for developed with the existing facility.

3.6.5 Performance Analysis

For the complete functionality of the project work, the project is run with the lelp of the healthy networking environment. Normally, the OS is windows XP. The main theme of this project is to find shortest path and decrease the overhead and also a keep up the complete path route information. Performance analysis is done to find out whether the algorithm is more efficient.

上一篇:XML Parsing : A Review 下一篇:Preventing data leakage detection by automation segmentation