3.0 Requirement Specification: 3.1 Non Functional Requirements
3.0 Requirement Specification: 3.1 Non Functional Requirements
3.0 Requirement Specification: 3.1 Non Functional Requirements
0 Requirement Specification:
There are requirements that are not functional in nature. Specifically, these are the
constraints the system must work within.
Other N/A
Other N/A
Reference SRS 2.7
Other N/A
Other N/A
Reference SRS 2.9
1. Introduction
2. Actors
Users:
Admin:
Documentation: Admin can manage all users and maintain their data securely1He can
update the details and day to day updating can be done by admin.
System:
Documentation: System can give the suggestions to the users during their discussion in
discussion forum. He /She will give the traffic details. For participating in discussion
forum he/she has to be registered.
Server:
Ask queries:
Documentation: User can ask any questions with the system and server during their chat
3 Contact systems:
Documentation: With the information provided by administrator user can directly contact
with system or he can contact during their chat.
Help user:
Login:
Logout:
Documentation: User can exit from his account.
Participate in chat:
Respond Queries:
Signup:
View Queries:
Documentation: System can view the queries which are asked by user.
View Updates:
4. Supplementary Requirements:
5. Performance Requirements:
6. Safety Requirements:
By incorporating a robust and proven DB2 UDB into the system, reliable performance and
integrity of data is ensured. There must be a power backup for server system. Since the product
is of 24x7 availability there should be power backup for server which provides the information.
Every day the data should be backup even when the operation of a user is not successful i.e.,
while performing the operation power failure occurs then data should be backup.
7. Security Requirements:
Sensitive data is protected from unwanted access by user’s appropriate technology and
implementing strict user-access criteria. Facility of unique user number and Password in such a
way that unauthorized user cannot log in. Operational rights for each user/terminal can be
defined. Thus, a user can have access to specific terminals and specific options only
Logical Database
Tables:
1. Pedestrains (users)
LastName String 30
FirstName varchar 30
MaidenName varchar 30
Address1 varchar 50
Address2# varchar 50
State varchar 2
Zip Int 6
Year Int 4
EmailAddress String 20
ReceiveEmails Boolean 1
Password String 10
2. Vehicle owners:
FirstName String 30
LastName String 30
Address String 50
City String 30
State String 2
Year Int 4
EmailAddress String 20
Password String 10
3. Traffic Police
FirstName varchar 30
LastName varchar 30
City varchar 30
State varchar 10
Email id varchar 20
password varchar 20
4. Admin
username varchar 30
User id varchar 30
Email Id varchar 30
password varchar 10
References:
IEEE SRS format
Project specification requirement