Case Study: Safe Home Security System

Slides:



Advertisements
Similar presentations
1 Aspects of IEEE P1471 Viewpoints in Unified Modeling Language (UML) Manzur Ashraf, BRAC University Humayra Binte Ali, Dhaka University Md.Mahfuz Ashraf,
Advertisements

Object-Oriented Software Engineering Visual OO Analysis and Design
Enterprise Portal Enterprise Portal Training Communities, Pages, and Portlets Click the arrows to go forward or back.
Welcome to the Award Winning Easiest to Use & Most Advanced View, Manage, and Control Security, Access Control, Video, Energy & Lighting Systems, & Critical.
Component Oriented Programming 1 Chapter 2 Theory of Components.
BioSENSE I introduction
INFO 425 Week 31 INFO 425 Design Problem I Week 3 – SDS Improvements Glenn Booker.
Chapter 8 Analysis Engineering Software Engineering: A Practitioner’s Approach by Roger S. Pressman.
Software Requirements Engineering Elaboration Process Lecture-13.
Team 7 / May 24, 2006 Web Based Automation & Security Client Capstone Design Advisor Prof. David Bourner Team Members Lloyd Emokpae (team Lead) Vikash.
1 SWE Introduction to Software Engineering Lecture 16 – System Modeling An Example.
Use Case Diagram © copyright 2001 SNU OOPSLA Lab..
1 Frameworks. 2 Framework Set of cooperating classes/interfaces –Structure essential mechanisms of a problem domain –Programmer can extend framework classes,
Component-Level Design
Class Diagram & Object Diagram
Component and Deployment Diagrams
UML Sequence Diagrams Eileen Kraemer CSE 335 Michigan State University.
Object-Oriented Analysis
The Crew Barbara Eikov Ethan Jud Eric McGregor Henrik Mäkitaavola.
Copyright © 2013 FingerTec Worldwide Sdn.Bhd. All rights reserved.
DUE Security and Fire Alarm Systems LEARNING OUTCOME 7B Describe design overview and location considerations.
Unified Modeling Language
Architectural Design.
©Ian Sommerville 2004Software Engineering, 7th edition. Chapter 4 Slide 1 Slide 1 Extended Class Diagram.
Documenting Software Architectures
TUTORIAL # 2 INFORMATION SECURITY 493. LAB # 4 (ROUTING TABLE & FIREWALLS) Routing tables is an electronic table (file) or database type object It is.
Analysis Modeling (cont’d) CpSc 372: Introduction to Software Engineering Jason O. Hallstrom Authorship Disclaimer. These slides.
Smith’s Aerospace © P. Bailey & K. Vander Linden, 2005 Architecture: Component and Deployment Diagrams Patrick Bailey Keith Vander Linden Calvin College.
Daniel Arnett · Joseph Vanciel · Brian Krueger Advisor: Dr. Samuel Richie Sponsor: Workforce Central Florida Mentor: Sean Donovan 4 th Annual Senior Design.
Chapter 2 What is an Alarm System? Alarms: The First Line of Defense
DEC0905 Remote Control of Home Appliances ABSTRACT The objective of this project is to enable users to remotely control home appliances and systems over.
Data Flow Diagrams.
Mohammed Mohsen Links Links are what make the World Wide Web web-like one document on the Web can link to several other documents, and those.
An Introduction to Software Architecture
© 2008 Delmar, Cengage Learning Property Security, Emergency Response, and Fire Protection Systems Chapter 13.
Instructor: Tasneem Darwish1 University of Palestine Faculty of Applied Engineering and Urban Planning Software Engineering Department Object Oriented.
Prepared by: Sanaz Helmi Hoda Akbari Zahra Ahmadi Sharif University of Tech. Summer 2006 An Introduction to.
UML Diagrams: Class Diagrams The Static Analysis Model Instructor: Dr. Hany H. Ammar Dept. of Computer Science and Electrical Engineering, WVU.
Home Appliance Control System
Home Guard Security System. Introduction & Basic Ideas Home Guard Security System.
1 UML Basic Training. UML Basic training2 Agenda  Definitions: requirements, design  Basics of Unified Modeling Language 1.4  SysML.
A Framework for the Reconfiguration of Ubicomp Systems Pau Giner, Carlos Cetina, Joan Fons, Vicente Pelechano.
1 Modeling interactions and behavior Lecturer Dr. Mai Fadel.
UML diagrams What is UML UML diagrams –Static modeoing –Dynamic modeling 1.
Class-based Modeling.
SOFTWARE DESIGN AND ARCHITECTURE LECTURE 24. Review ANALYSIS Level Class Diagram – Identifying Entities – Identifying Attributes – Identifying Operations.
1 System Analysis and Design Using UML INSTRUCTOR: Jesmin Akhter Lecturer, IIT, JU.
Use Cases Use Cases are employed to describe the functionality or behavior of a system. Each use case describes a different capability that the system.
Chapter 6 – Architectural Design Lecture 1 1Chapter 6 Architectural design.
Jini Architecture Introduction System Overview An Example.
Architecture View Models A model is a complete, simplified description of a system from a particular perspective or viewpoint. There is no single view.
Information Security 493. Lab # 4 (Routing table & firewalls) Routing tables is an electronic table (file) or database type object that is stored in a.
1 Technical & Business Writing (ENG-715) Muhammad Bilal Bashir UIIT, Rawalpindi.
SOFTWARE DESIGN AND ARCHITECTURE LECTURE 26. Review UML behavioral Diagrams – Sequence diagram.
CSC190 Introduction to Computing Operating Systems and Utility Programs.
Lecture 14 22/10/15. The Object-Oriented Analysis and Design  Process of progressively developing representation of a system component (or object) through.
Hands-On Microsoft Windows Server 2008 Chapter 5 Configuring Windows Server 2008 Printing.
CSCI 383 Object-Oriented Programming & Design Lecture 7 Martin van Bommel.
Object Oriented Analysis Unified Modeling Language By Mary Biddle.
Chapter 3: Software Design –Use case Diagram Nouf Alghanmi.
Security Systems Presented By:
How to configure alarm system
Reference Sites about US. Reference Sites about US.
Chapter 8 Analysis Engineering
Elaboration Process Lecture-16.
Course Outcomes of Object Oriented Modeling Design (17630,C604)
SafeHome Product.
Introduction To Networking
Working Knowledge Training
Chapter 6 – Architectural Design
Presentation transcript:

Case Study: Safe Home Security System Lecture Number 19 and 20. Presented By: Fahim khan Assistant Professor

Introduction This document describes the design of the Safe-Home system. Many parts of the Safe-Home design, and the process used to develop it. A software model can be produced at many different levels of abstraction. The model presented here is at an intermediate level: It includes diagrams relating the important hardware units, classes, and states.

Key actors and use cases As a first step in development, however, we will identify the use cases that should be available in the first few releases – these will provide very basic security functionality. There are two main actors (roles played by users of the system): HouseholdUser and ConfigurationManager. The latter is a sub-actor of the former since ConfigurationManagers can do everything that HouseholdUsers can.

Key actors and use cases The Arm System and Disarm System use cases both require the actor to specify an activation code. The latter is shown as an inclusion use case. The use cases performed by the Configuration manager require a more sophisticated Log-In use case to be performed.

Key actors and use cases

Key actors and use cases Some additional use cases that will need to be implemented in order to provide the functionality of changing configurations of the system. For simplicity we have not shown the fact that each of these also includes the Log-In use case. There will also be a set of use cases for designing a room layout. These are not included for the time being.

Key actors and use cases

Safe Home Architectural Model The SafeHome model is arranged into a hierarchy of packages to help organize it. Each of the elements in the remaining sections of this document is arranged into one of the packages shown. There is also a conceptual outer package, simply called SafeHome, that includes all of them.

Safe Home Architectural Model

Hardware description

Control Software Classes Figure 5 shows the core class diagram of the Control Software component. The classes in this diagram are described below. SafeHomeSystem: The core singleton class (only one instance exists) userid: Entered when logging into the system through a web browser. streetAddress: Street address of the home. Used when communicating with the monitoring company to identify the property.

activationState: The state of the system as a whole. masterPassword: A password that must be entered. Configuration: A setup of the system with various Devices (in zones), FloorPlans, and ActivationCodes. There will always be at least one configuration – a configuration named ‘default’ is created when the system starts.

ConfigurationName: A name given to the configuration by the person setting up the configuration. Can be changed at any time. ActivationCode: Contains a simple integer identifying a code that is typed to arm or disarm the system (Specify Activation Codeuse case). Different people can be given different codes, e.g. to allow a cleaner to enter temporarily (Add Activation Code use case). A future extension of the system would be to identify the time period during which certain codes are active.

DeviceType: Maintains information about each type of device that may be installed in the system. Each Device has a DeviceType – information that is common to all devices of the same type is kept here. Device: A representation of particular piece of hardware installed in the system. A device is installed by telling the user interface thatit exists (specifying its serial number) and then powering it up (the Add Device use case). serialNumber, label and isOn.

Sensor: Represents a device that should trigger a reaction by the system if some condition becomes true (a door is open, CO is detected, water is detected, motion is detected, fire is detected). detectingAnomaly: True if the sensor is detecting the undesirable state it is designed to detect. AlarmSignaler: Represents a device that will sound an alarm. There can be several subclasses. Camera: Represents a camera that can send images to the system, and can be panned and zoomed.

Activity and state diagrams In this section we will describe aspects the SafeHome system’s behavior. When the SafeHome central processor is running, it must be able to do two things at once: Perform its main security monitoring functions and respond to configuration changes.

Activity and state diagrams

Behavioral diagram There are three possible values for its activationState attribute: CheckingSystem, Disarmed and Armed; the latter two are substates of NormalOperation – in which the system spends most of its time.

State Diagram of the Armed State In this state the system has to respond to sensors by triggering alarms. It starts off in the No Sensors Triggered sub state of the Nothing Unusual sub state. Everything is normal while it is in this sub state. If a motion detector detects motion, no alarm is immediately sounded: The system requires more than a short period of motion to sound an alarm; the motion could be caused by the homeowner coming home and going through the process of deactivating the system at a control panel.

State Diagram of the Armed State

State Diagram of the Armed State The user interface of a model of control panel that is used to arm or disarm the system. there may be a web based interface that would allow remote arming of the system, or an interface that could be controlled by the monitoring company. No matter what user interface is used, it must at some point trigger the successful Activation and successful Deactivation transitions.

Behavior of the Control Panel user interface.