• No results found

Social networking website SRS

N/A
N/A
Protected

Academic year: 2021

Share "Social networking website SRS"

Copied!
23
0
0

Loading.... (view fulltext now)

Full text

(1)

Software Requirement Specification

Version-1.0

TEAM GUIDE: -

Dr. Ranjani Parthasartahi

TEAM MEMBERS:- Md Shaukat Ali

Deepak Kumar

Sushant Kumar

Azmath Basha

COLLEGE:- College of Engineering Guindy

Anna University

(2)

JANHIT-for citizens….

Page 2 of 23

Table of Contents

1. Introduction 1.1 Purpose 1.2 Scope

1.3 Definitions, Acronyms, and Abbreviations 1.4 References 1.5 Overview 2. Overall Description 2.1 Product Perspective 2.2 Software Interface 2.3 Hardware Interface 2.4 Communication Interface 2.5 Product Functions 2.6 User Characteristics 2.7 Constraints 2.8 Architecture Design

2.9 Use case Model Description 2.10 Class diagrams

2.11 Database Design 2.13.1 ER Diagram 2.13.2 Schema

2.12 Assumption and Dependencies

3. Specific Requirements

3.1 Use case Reports 3.2 Sequence Diagrams 3.3 Activity Diagrams

3.4 Supplementary Requirements

(3)

JANHIT-for citizens….

Page 3 of 23

1. Introduction

In recent years, the Internet and especially the Web has enabled a communication revolution: the ability to send and retrieve information everywhere has changed the way we work and live. Internet based access to information and internet Communication means have become ubiquitous.

Social networking is the grouping of individuals into specific groups, like small rural communities or a neighborhood subdivision, if you will. Although social networking is possible in person, especially in the workplace, universities, and high schools, it is most popular online. The term SOCIAL NETWORKING (SN) was first coined by Professor J. A. Barnes in the 1950s, who defined the size of a social network as a group of about 100 to 150people.When it comes to online social networking, websites are commonly used. These websites are known as social sites. Social networking websites function like an online community of internet users. Depending on the website in question, many of these online community members share common interests in hobbies, religion, or politics. As mentioned, social networking often involves grouping specific individuals or organizations together. While there are a number of social networking websites that focus on particular interests, there are others that do not. The websites without a main focus are often referred to as "traditional" social networking websites and usually have open memberships. This means that anyone can become a member, no matter what their hobbies, beliefs, or views are. According to a report on Nielsen Wire, about two thirds of the world's population participates in some sort of social network. This accounts for close to 10 percent of all time spent on the Internet. The article also states that social networking has become more popular than email as a means of communicating.

1.1 Purpose

Social networking is a strategy to connect and discuss all sorts of ideas through individuals and communities that may express a primary interest or the comparable pursuits

throughout the planet .A large amount of these sites offer features that will permit anyone to discover individuals or topics by members, which means that everyone are able to peruse and come in contact with new individuals or maybe be a part of new groups by sending a request message. By using this valuable feature anyone should certainly be in a position to connect with other people within their networks that are like-minded. Every time you add anew individual or group, you will be able to have access to the latest people in their circle as well. Social networking can easily go as far as making your page on different social networking websites; at the same time, this may turned out to be a challenging as well as somewhat cumbersome undertaking as you attempt to keep every individual web site up-to-date with content and articles as well as engaging across quite a lot of different tools. Social networking portals are a recent trend. A social networking site (SNS) connects and presents people based on information gathered about them, as stored in their user profiles. These user profiles determine the way in which users are able to present themselves to others. The most important distinguishing factor between the various sites is the range of profile information that they store and can perform operations on.The increasing popularity of online Social Networks (OSNs) is witnessed by the huge number of users acquired in a short amount of time: some social networking services now have gathered hundred of millions of users, e.g. Face book, My Space, Twitter, etc. The growing accessibility of the Internet, through several media, gives to most of the users a 24/7 online presence and

(4)

JANHIT-for citizens….

Page 4 of 23

encourages them to build a solid online interconnection of relationships. As OSNs become the tools of choice for connecting people, sociologists expect that their structure will increasingly mirror real-life society and relationships.

1.2 Scope

 Social Networking is forever.

 Social networking has tremendous prospects in future.

 The bright future prospect of social networking is also proven with the fact that the technology is integrated in the mobile phones as well. The concept is one, wherever on the earth; reach the common platform of the people for everybody’s benefit.  The tremendous popularity of using the social networking could never have been

realized before. In fact, social networking has become an important tool of marketing in true sense of customer orientation.

 The scope of social networking is widening, and today it offers a strong support to the companies in providing the much desired touch of concern. Future of social networking brings exciting promises as expected from the experience of limited users from a few companies in the top bracket.

1.3 Definitions, Acronyms and Abbreviation

 Social networking is a phenomena defined by linking people to each other in some way.

 Social networking is the practice of expanding the number of one's business and/or social contacts by making connections through individuals.

 Social networking is defined as the bringing individuals together into to specific groups, often like a small community or a

neighborhood.

 According to Danah Boyd, leading authority on social networking at U.C.Berkeley, the true definition of a "social network site" is that it contains profiles, semi-persistent public commentary on the profile, and a traversable publicly

articulated social network displayed in relation to the profile

 Admin– Administrator is the controller of all the users, manager and maintaining all profiles in this site.

 User– registered person in this site and posts their views.  User ID:A user identification number to enter the system.

(5)

JANHIT-for citizens….

Page 5 of 23

 HTML (Hyper Text Markup Language): It is used to create static web pages.  JSP (Java Server Pages): It is used to create dynamic web content.

 J2EE (Java 2 Enterprise Edition): It is a programming platform, belonging to the Java platform, which is used for developing and running distributed java applications.  WASCE (Web Sphere Application Server Community Edition): It is an application

server that runs and supports the J2EE and the web service applications.

 WSAD (Web Sphere Studio Application Developer): It is a designer toolkit which is designed to develop more complex projects by providing a complete dynamic web service.

 DB2 (IBM Database 2): It is a database management system that provides a flexible and efficient database platform to raise a strong "on demand" business applications.  HTTP (Hyper Text Transfer Protocol): It is a transaction oriented client/ server

protocol between a web browser and a web server.

 XML (Extensible Markup Language): It is a markup language that was designed to transport and store data.

 Ajax (Asynchronous Java Script and XML): It is a technique used in JavaScript to create dynamic web pages.

 Web 2.0: It is commonly associated with web applications which facilitate interactive information sharing, interoperability, user-centered design and collaboration on the World Wide Web.

 TIVOLI (ADMIN):IBM Tivoli Storage Manager (TSM or ITSM) is a centralized

1.4 References

Kruchten, Philippe. 1999. The Rational Unified Process. Menlo Park, CA: Addison Wesley

Craig Larman, Applying UML and Pattern, Second Edition, CA: Addison Wesley. Leffingwell, D. and Don Widrig. 2000. Managing Software Requirements. Menlo Park, CA: Addison Wesley.

Spence, I. and L. Probasco. 1998. Traceability Strategies for Managing Requirements

with Use Cases. Cupertino, CA: Rational Software Corporation.

Rational Unified Process®, Version 2002.05.00. Copyright © 1987 – 2001. Rational Software Corporation

Backstrom, L., Huttenlocher, D., Kleinberg, J., & Lan, X. (2006). Groupformation in large social networks: Membership, growth, and evolution.

(6)

JANHIT-for citizens….

Page 6 of 23

http://www.facebook.com/policy.php?ref=pf

1.5 Technologies used

XML :-Extensive Mark Up Language

J2EE: -Application architecture

AJAX :-Asynchronous Java script And XML

Web Services, SOA :-Service Oriented Architecture

UML :-unified modeling language

DB2:-IBM Database.

TSM(admin) (Tivoli Storage Manager ):-Back up purpose.

IBM Rational Software Architect - IBM Rational Software Architect, (RSA) made

by IBM's Rational Software division, is a comprehensive modeling and development environment that uses the Unified Modeling Language (UML) for designing

architecture for C++ and Java 2 Enterprise Edition (J2EE)applications and web services. Rational Software Architect is built on the Eclipse open-source software framework and includes capabilities focused on architectural code analysis, C++, and model-driven development (MDD) with the UML for creating resilient applications and web services.

IBM Web sphere Community Edition - WebSphere Application Server Community

Edition (from now on WASCE) is a free, certified Java EE 5 application server for building and managing Java applications. It is IBM's supported distribution of Apache Geronimo that uses Tomcat for servlet container and Axis 2 for web services. Other difference from Apache Geronimo is that WASCE comes with DB2 and Informix database drivers, better XML parser libraries (XML4J and XLXP) and contains the latest patches from unreleased upstream versions.

1.6 OVERVIEW

 Social networking is the grouping of individuals into specific groups, like small rural communities or a neighborhood subdivision, if you will.

 Social networking often involves grouping specific individuals or organizations or likeminded people together.

 Social networking is a strategy to connect and discuss all sorts of ideas through individuals and communities that may express a primary interest or the comparable pursuits throughout the planet.

 Companies like IBM, Microsoft and Google performs to strengthen their networking platforms via social networks like Twitter and Face book.

 By using this valuable feature anyone should certainly be in a position to connect with other people within their networks that are like-mi

(7)

JANHIT-for citizens….

Page 7 of 23

The user must have a valid User ID and password to login to the system. Users, who don’t have their account in this site, can create a new account for signup. Definitely one should not be allowed to have more than one profile. After the valid user logs in his/her account, the user can edit his/her profile and can post his/her views basing on the activities he/she desires. The site is having the features like auto analyze topics, group discussions, auto recommend threads based on searches etc. Ratings should be given according to their posts.

THE USERS OF THIS WEBSITE INCLUDES: A. Citizen of India.

B. Bearcats of India, Employees of Govt. bodies C. Volunteers from NGOs.

If anyone violates the social disciplines, we will tag his/her user ID in our website. For example if a police cop demanded for bribe, he may not be dismissed in system, but this website could show his corruption level as utterly bad. In this website you can Voice out Constitutional violations, injustice, inhumanity, corruption, cruelty to animals happening in their vicinity, traffic rules, public hygiene etc. This site is helpful to the nation by creating awareness for social responsibilities

2.1Product Perspective EXISTING SYSTEM:

In order to show our voice we need to conduct debates, group discussions, meetings and so on. Present sites focused on some social responsibilities like mainly on business,

entertainment and education. They can’t provide social responsibilities like traffic rules, public hygiene and corruption.

PROPOSED SYSTEM:

In our proposed system we used new technologies to implement more features.

We used front end tool as RAD (Rational Application Development) and for backupDB2 is used. The prospect of social networking is also proven with the fact that the technology is integrated. Social networking is widening, and today it offers a strong support to the companies in providing the much desired touch of concern.

In our system we provide a common platform where people of India can Voice out

violations, injustice, inhumanity, corruption happening in their vicinity, traffic rules, public hygiene, aversion to bribery etc. We call for an online debate or discussion on certain topics. We have the ability to tag social discipline violators using their UID.

Through this site the citizen of India can improve the social awareness. This site needs more proofs and details of user to post their views.

And this site is going to help a nation.

2.2 Software Interface

 Front End Client: RAD/ WASCE  Web Server: WAS /WPS  Data Base Server: DB2

(8)

JANHIT-for citizens….

Page 8 of 23

2.3 Hardware Interface Client

Software Processor Ram Free Disk space Web browser(any) Intel core 2 duo

processor at 2.5 Giga Hz speed

512 MB 750 GB

Server

DB2 Express C

version 9.7 Intel core 2 duo processor at 2.5 Giga Hz speed 512 MB 300 GB WebSphere Application server(community edition)

Intel core 2 duo processor at 2.5 Giga Hz speed

512 MB 300 GB

2.4 Communication Interface

 Client on internet will be using HTTP/HTTPS protocol  Firewall Security is required for securing the server  TCP/IP is the basic need for client

2.5 Product Functions

Functional Requirements

i. Should provide a common platform where people of India can

a. Voice out violations, injustice, inhumanity, corruption happening in their vicinity

b. Endorse someone else’s concern and augment with more proofs, details etc. c. Call for an online debate or discussion on certain topics of broad applicability

(9)

JANHIT-for citizens….

Page 9 of 23

ii. Should be highly dynamic, with minimal static content as framework and maximum content created by site participants

iii. Should be highly extensible to the extent technically possible. Users should be able to add content, add small pieces of new functionality and change their portion of the site (not just colors & look & feel).

iv. Being dependent highly on dynamic content collaborated by users, the site should have the features to auto analyze topics, group discussions, auto recommend threads based on searches etc.

v. Should have the ability to tag social discipline violators using their UID

vi. The site can provide various measures for fellow citizens to rate, control and monitor the social responsibility of a given individual. For example, if you find your classmate did a good job at the college function arrangements, you can increase his service-orientation score by +1. If you find your neighbor smoking in public in front of children, you can decrement his responsibility score by 1. When everyone assess & reward a person for his social actions this way, one can see a true scale of where he stands vis-à-vis where he thinks he really is. A traffic police giving ticket is no more just monetary. He can (as a user of this website) affect you driving sense score. If a police cop demanded for bribe, he may not be dismissed in system, but this website could show his corruption level as utterly bad.

vii. Authenticity for adding users are utmost important for such a website. Definitely one should not be allowed to have more than one profile.

There should be a placeholder for dealing with disputing situations for the site as it is quite possible for recipients of negative reward to resist. The dispute resolution mechanism should not be like traditional court, it should again be based on social forum like multiple opinions, group actions etc.

2.6 User Characteristics

A. Professional look and feel

B. Use of AJAX at least with all registration forms

C. Browser testing and support for IE, NN, Mozilla, and Firefox. D. Use of Graphical tool like JASPER to show strategic data to admin

2.7 Constraints

 Lack of Anonymity: As the user is putting out his personal information, someone can find ways to do in.

(10)

JANHIT-for citizens….

Page 10 of 23

 Even though certain measures taken to stop the cyber stalking, online scamsand identity theft, still may never known.

 It is a time wasting process for those who are busy and not interested in these sites.  One should have computer knowledge to view these sites.

 One should be affordable for viewing these sites through internet.

 One should be interested in expressing his views on social responsibilities.

 Many of them are more interested in entertainment and informative sites than these sites.

 Site should be popular to attract many users.

 These sites will never provide information to the end user directly, at least not any more.

 As there are no advertisements on these sites, there is no revenue from these sites and it will be a burden for the administrator.

(11)

JANHIT-for citizens….

Page 11 of 23

2.9 Use case model Description

Use cases. A use case describes a sequence of actions that provide something of

measurable value to an actor and is drawn as a horizontal ellipse.

Actors. An actor is a person, organization, or external system that plays a role in one or

more interactions with your system. Actors are drawn as stick figures.

Associations. Associations between actors and use cases are indicated in use case

diagrams by solid lines. An association exists whenever an actor is involved with

an interaction described by a use case. Associations are modeled as lines connecting use cases and actors to one another, with an optional arrowhead on one end of the line.

(12)

JANHIT-for citizens….

Page 12 of 23

Use case model survey

Users: user is the primary actor of the system or the main person who shares their views

on the discussions topics in the form of post and comments. The users of this website include:

A. Citizens of India

B. Employee of govt. buddies or any bearcats of India C. Volunteers from N.G.O

Citizens: any citizen of India

logout

User admin

login

manges user data access acount

success

update profile

gain rating acorrding to thier action

provide and manage details search topics

(13)

JANHIT-for citizens….

Page 13 of 23

Govt. Employee: govt. buddies or any bearcats N.G.O National Government Officers

Admin– Administrator is the controller of all the users, manager and maintaining all profiles

(14)

JANHIT-for citizens….

Page 14 of 23

(15)

JANHIT-for citizens….

Page 15 of 23

2.11 Database Design 2.13.1 ER Diagram CreatedB y ID Subject Description

GOVT. EMPLOYEE

NGO

INDIVIDUAL

Name Fname Phno Score DOB Gender Mname Lname UI D Address Password age

IMAGE

TEXTUAL

VIDE

O

TOPIC

DISCUSSION

TEXTUAL

VIDEO

IMAGE

COMMEN

T

POST

USER

ADMIN

Manag

e

Do

On

Fname Phno Score dob Gender Mname Lname Name UI D address Password age ID Title Description Unlike Like Description Subject Posted Byy ID Typ e

(16)

JANHIT-for citizens….

Page 16 of 23

2.12 Assumption and Dependencies

 The details of user such as username, password, and their posts details should be manually entered by the administrator before using this system.

 Every user should be comfortable of working with computer and net browsing.  User must have basic knowledge of English too.

(17)

JANHIT-for citizens….

Page 17 of 23

3.

Specific Requirements

3.1 Use case reports:

Use Case diagram for user

User access acount

warning message

logout update profile search topics

request for update enter new values submit profile updated

gain rating acorrding to thier action

actions

post views

edit post

delete post

participite inonline debates

govt. employee volinteer from ngo login

success

(18)

JANHIT-for citizens….

Page 18 of 23

USE CASE DESCCRIPTION

login The user must have login before starting any activity.

access account User can access his account after login.

Warning message User get warning message after wrong password/invalid account id. He is prompted to signup if have no account or trying again.

logout Users safely logout after finishing their activity

Update profile User can update his profile content i.e. can make modification as their wish.

Request for update User makes request to admin for approving their updating profile.

Enter new values User can enter their new values t make updation in the profile

submit User can submit their update information to admin.

Profile updated The updated information is approved by admin and stored in profile

Search topics After login the user can search their topic of interest on which he/she wants to do some activity/actions

actions This is actions or activity which user can perform

Post views User can post their views on different topics

Edit post User can edit their post according to their desire or motive Participates in online

debates

User can participates in the online debates

Gain rating according

(19)

JANHIT-for citizens….

Page 19 of 23

USE CASE DESCCRIPTION

login admin must have login before starting any activity.

Manages user data Admin can manage data of users i.e. admin is responsible for overall maintenance of user data

Create account Admin only can create account of users after the full

verification and validation of user information provided by user at the time of signup.

Tag account Admin can tag any user to any post any event.

Provide and manage

details Admin is responsible for providing information to user an their demand and managing overall data of users

Users details Admin can provide users details

Site details Admin can provide site details.

logout Admin can logout after performing their activity login

logout

manges user data

provide and manage details

create account

tag account

user datails

site details admin

(20)

JANHIT-for citizens….

Page 20 of 23

(21)

JANHIT-for citizens….

Page 21 of 23

admin:

user: database

1.login

1.1:verify user deatails 2:invalid user 2.1:ask for signup

3:verified 3.1:give acces to account

4:edit profile

5:stores updates 6:search information

7:search information in datbase 7.1: gives information 7.1.1:recieve information

8:choose activity 9:participates in discussion

10:posts views

10.1:store view in database 11:provide score or rating to user views

12:logout request 12.1:logout succesfuly

(22)

JANHIT-for citizens….

Page 22 of 23

3.3 ActivityDiagram 3.4 Supplementary Requirements login/signup discussions access acount post comments like/unlike general user activity

(23)

JANHIT-for citizens….

Page 23 of 23

1) Performance requirements

A user with valid id can share his views on the activities he desires.

2) Safety requirements

By incorporating robust and proven DB2 in to the system the reliable performance and integrity of data is insured. There must be a power backup for the server system. Since the product is of 24X7 availability, there should be a power backup for the server which

provides the information.

3).Security requirements

Sensitive data is protected from unwanted access by user’s appropriate technology and implementing strict user access criteria.Facilty of unique user number and password s that unauthorized user cannot login the system. Operational rights for each user or terminal can be defined .Thus a user can have access to specific terminals and specific options only. This site uses the SSL (Secure Socket Layer) protocol for securing the data. Secure Socket Layer (SSL) protects data in three key ways:

Authentication: ensures that you are communicating with the correct server. This

prevents another computer from impersonating the site.

Encryption: Scrambles transferred data.

Data integrity: verifies that the information post by the user wasn’t altered during the posting. The system detects if data was added or deleted after user post the message. If any tampering has occurred, the connection is dropped.

References

Related documents

C121: DEMO OF ISO 45001:2018 OH&S SYSTEM AWARENESS AND INTERNAL AUDITOR TRAINING PPT PRESENTATION KIT. Price

The combination of large volume cryogenic headspace injection with two-dimensional chromatography allowed resolution and detection of low amounts of trace volatile

An understanding of herbicide mode of action is essential for diagnos- ing crop injury or off-target injury problems and for designing weed management programs with a low risk

This study concluded that reduced operational and inventory cost enhances decision making, tactical benefits including a desire to shorten the procurement cycle drives

People with schizophrenia die earlier not because schizophrenia per se is fatal but rather because of the discrimination and lack of access to good health services,

The project development objectives (PDOs) were " to improve the capacity of the main navigation channel in Meizhou Bay and enhance the management capacity of Meizhou Bay

Change Management at Aditya Birla Group….People at the heart of strategy 

The Secretary of Revenue would be required to report all income tax rate reductions triggered under the formula to the Governor, the Chairperson of the Senate Assessment and