software requirements specification - syracuse … · software requirements specification for...

29
Software Requirements Specification for Syracuse Digital Conference Software Prepared by John DeSantis, Zulay Olivo, Siobhan Schloss, Tim Waterhouse December 12, 2006 1

Upload: dotram

Post on 29-Jun-2018

240 views

Category:

Documents


0 download

TRANSCRIPT

Software Requirements Specification

for

Syracuse Digital Conference Software

Prepared by John DeSantis, Zulay Olivo, Siobhan Schloss, Tim Waterhouse

December 12, 2006

1

Table of Contents Introduction...............................................................................................................................7

Purpose..................................................................................................................................7Intended Audience and Reading Suggestions....................................................................... 7Product Scope........................................................................................................................7References............................................................................................................................. 7

Overall Description....................................................................................................................7Product Perspective...............................................................................................................7Product Functions..................................................................................................................8

Instant Messaging.............................................................................................................8Logging........................................................................................................................8White Boards............................................................................................................... 8File Transferring.......................................................................................................... 8Text Formatting (Fonts, colors, links, etc.)................................................................. 8

Conference Rooms........................................................................................................... 8White Boards............................................................................................................... 8File Viewing................................................................................................................ 8Hand Raising............................................................................................................... 8Conference Size Scaling.............................................................................................. 8Logging........................................................................................................................8

Message Boards................................................................................................................8Nested Threads............................................................................................................ 8Permissions.................................................................................................................. 8

Directory...........................................................................................................................8Searching..................................................................................................................... 8Permissions.................................................................................................................. 8

Login.................................................................................................................................8Username..................................................................................................................... 8Password...................................................................................................................... 8Encryption....................................................................................................................8

User Classes and Characteristics...........................................................................................8Server Administrator........................................................................................................ 8Group Administrator........................................................................................................ 8Conference Presenter........................................................................................................8Message Board Moderator............................................................................................... 9Conference User............................................................................................................... 9Group User....................................................................................................................... 9Independent User..............................................................................................................9

Operating Environment.........................................................................................................9Design Implementation Constraints......................................................................................9User Documentation..............................................................................................................9Assumptions and Dependencies............................................................................................9

External Interface Requirements..............................................................................................10User Interfaces.................................................................................................................... 10Hardware Interfaces............................................................................................................ 10Software Interfaces..............................................................................................................10

2

Microsoft Internet Explorer...........................................................................................10Microsoft Windows Operating System.......................................................................... 10Communications Interfaces............................................................................................ 10

System Features....................................................................................................................... 10Instant Messaging................................................................................................................10

Features...........................................................................................................................10Whiteboard................................................................................................................ 10

Drawing.................................................................................................................10Colors/Black & White......................................................................................10Fill In................................................................................................................ 10Line Width........................................................................................................10Ellipse...............................................................................................................10Straight Line.....................................................................................................10Erase................................................................................................................. 11Clear................................................................................................................. 11

Save.......................................................................................................................11Size........................................................................................................................11Text....................................................................................................................... 11

Colors............................................................................................................... 11Unicode............................................................................................................ 11Fonts................................................................................................................. 11Size................................................................................................................... 11Underline/Bold/Italic........................................................................................11

Chat History...............................................................................................................11Save.......................................................................................................................11

HTML...............................................................................................................11Plain Text......................................................................................................... 11XML................................................................................................................. 11

Document and Image Sharing................................................................................... 11File Formats.......................................................................................................... 12

Word Documents..............................................................................................12Excel Documents..............................................................................................12Power Point Presentations................................................................................12Text Files..........................................................................................................12PDF...................................................................................................................12HTML...............................................................................................................12BMP................................................................................................................. 12SVG..................................................................................................................12JPEG.................................................................................................................12DEFAULT........................................................................................................12

File Transfer........................................................................................................................ 12 Features..........................................................................................................................13

Transfer Resuming....................................................................................................13Conference Rooms.............................................................................................................. 13

Features...........................................................................................................................13Whiteboard................................................................................................................ 13

3

Drawing.................................................................................................................13Colors/Black & White......................................................................................13Fill In................................................................................................................ 13Line Widths...................................................................................................... 13Ellipse...............................................................................................................13Straight Line.....................................................................................................13Erase................................................................................................................. 13Clear................................................................................................................. 13

Save.......................................................................................................................13Text....................................................................................................................... 13

Colors............................................................................................................... 13Unicode............................................................................................................ 13Fonts................................................................................................................. 13Size................................................................................................................... 13Underline/Bold/Italic........................................................................................13

Conference History....................................................................................................14History Retrieval on Conference Join...................................................................14

Text History......................................................................................................14Image History...................................................................................................14Image History...................................................................................................14Document History............................................................................................ 14

Conference Replay.....................................................................................................14Real-time play back.............................................................................................. 14Fast-forward play back..........................................................................................14

Hand Raising............................................................................................................. 14On/Off................................................................................................................... 14Queue.................................................................................................................... 14Groups...................................................................................................................14

GUI............................................................................................................................ 15List of Group Users...............................................................................................15Separated Group User Windows...........................................................................15

Docking............................................................................................................ 15Combined Group Users.........................................................................................15

Message Boards.................................................................................................................. 15Features...........................................................................................................................15

Moderating.................................................................................................................15Editing & Censoring Posts....................................................................................15

Edit Marking.................................................................................................... 15Delete Posts...........................................................................................................15

Public/Private.............................................................................................................15Viewing Permissions.............................................................................................15Posting Permissions.............................................................................................. 16

Group Messaging.......................................................................................................16File Sizes....................................................................................................................16Number Of Files........................................................................................................ 16File Attachments........................................................................................................16

4

Posting Audit Required..............................................................................................16Directory............................................................................................................................. 16

Features...........................................................................................................................16Stored Information.....................................................................................................16

Name..................................................................................................................... 16Group.................................................................................................................... 16Title....................................................................................................................... 16Location................................................................................................................ 16Address..................................................................................................................16Short Description.................................................................................................. 16

Searching................................................................................................................... 16By Name............................................................................................................... 16By Group...............................................................................................................16By Title................................................................................................................. 16By Location...........................................................................................................16

Group Sorting............................................................................................................ 16Privacy....................................................................................................................... 16

Security............................................................................................................................... 16Features...........................................................................................................................16

Login Username/Password........................................................................................ 16Username Stored As Plaintext On Server............................................................. 16Password Is MD5 Hashed..................................................................................... 16Client MD5 Hashes Password, Then Hashes Again With Random Server Code.16

Encryption PGP......................................................................................................... 16Groups................................................................................................................................. 17

Features...........................................................................................................................17Group Name...............................................................................................................17Group Permissions.....................................................................................................17Group Messaging.......................................................................................................17

Permissions......................................................................................................................... 17Features...........................................................................................................................17

Group Permissions.....................................................................................................17Global Permissions.................................................................................................... 17Message Board Permissions...................................................................................... 17Instant Messaging Permissions..................................................................................17Conference Permissions.............................................................................................17

Other Nonfunctional Requirements........................................................................................ 18Performance Requirements................................................................................................. 18

Client Performance.........................................................................................................18Server Performance........................................................................................................ 18

Safety Requirements........................................................................................................... 18Computer Safety.............................................................................................................18

Security Requirements........................................................................................................ 18Usernames...................................................................................................................... 18Passwords....................................................................................................................... 18Permissions.....................................................................................................................18

5

Privacy............................................................................................................................18Software Quality Attributes................................................................................................ 19

Look and Feel................................................................................................................. 19Bugs................................................................................................................................19

Other Requirements................................................................................................................. 19Appendix A: Glossary..............................................................................................................19Appendix B: Analysis Models.................................................................................................20

Client Model:...................................................................................................................... 20Server model:...................................................................................................................... 21Conferences.........................................................................................................................21Whiteboard..........................................................................................................................22Suggested security model:...................................................................................................23

Appendix C: Comparison To Similar Software.......................................................................25Appendix D: Interface Screenshots......................................................................................... 26

6

1. Introduction 1.1. Purpose – This SRS is written for the entire development team of the Syracuse

Digital Conference Software (SDCS). This SRS will cover all the specifications and required design details of the SDCS as well as all of the features that the end product will have. The SDCS will facilitate communication between two or more people by giving users the use of text communication, a shared white board, and the ability to share documents and files. These features will attempt to make collaboration over long distances as easy as collaborating within the same room. This document will be used to make sure all designers of the software are on the same page and know exactly what specifications to adhere to during the development of the SDCS.

1.2. Intended Audience and Reading Suggestions This SRS is written for all staff working on the development of the SDCS. The developers will read this SRS in order to get the constraints and requirements for their programming. This document will not usually be read from the first page to the last page. It will primarily serve as a reference for the programmers. Once they have achieved a certain level of familiarity with this document they will be able to look up specific requirements that will help them with the task they are working on at the time.

1.3. Product Scope SDCS is designed to be a user friendly, network based system of communication between clients looking to have a meeting without requiring physical presence. This software is designed to be used by small to medium businesses and organizations such as schools and universities. SDCS will allow clients to organize meetings of two or more people, public and private group conference, and also provide a non-real time method of communication using message boards. The features of an SDCS conference that separate our software from its competition will be its whiteboard, document sharing and logger.

1.4. References JPEG File Interchange Format - http://www.w3.org/Graphics/JPEG/jfif3.pdfSVG File Format - http://www.w3.org/TR/SVG/Windows Bitmap File Format - http://web.uccs.edu/wbahn/ECE1021/STATIC/REFERENCES/bmpfileformat.htmXML Format - http://www.xml.com/axml/testaxml.htm

2.Overall Description 2.1. Product Perspective

The SDCS is designed as a replacement for both existing instant messaging system and current conferencing software. We also add some features that are in none of these existing systems such as the message board. Similar existing products include Sametime, AOL Instant Messenger, MSN Instant Messenger, and NetMeeting. All of these products perform the same essential core functions that SDCS will perform with the exception that none of them truly merge them all together. Their features are subsets of our software. SDCS will be an all encompassing software suite designed to bring together instant messaging, digital conferences, and true online collaborative

7

works in one package. See Appendix C for a list of the various mention software packages.

2.2. Product Functions This product will have all the functions of an instant messaging program such as person to person messaging, chat rooms, and buddy lists. A key difference, however, is that SDCS will attempt to create a more professional atmosphere by the way we market our software and by what we title those features. We will also use different GUIs than our competitors. SDCS will also include a white board for collaborative drawing and a document presenter so that in a conference people can easily distribute and present important documents. 2.2.1. Instant Messaging

2.2.1.1. Logging2.2.1.2. White Boards2.2.1.3. File Transferring2.2.1.4. Text Formatting (Fonts, colors, links, etc.)

2.2.2. Conference Rooms2.2.2.1. White Boards 2.2.2.2. File Viewing 2.2.2.3. Hand Raising 2.2.2.4. Conference Size Scaling 2.2.2.5. Logging

2.2.3. Message Boards2.2.3.1. Nested Threads 2.2.3.2. Permissions

2.2.4. Directory2.2.4.1. Searching2.2.4.2. Permissions

2.2.5. Login2.2.5.1. Username2.2.5.2. Password2.2.5.3. Encryption

2.3. User Classes and Characteristics 2.3.1. Server Administrator

Needs to have a background in networking. Must be comfortable with a bash shell and have permissions to install software on a central server. Must have experience troubleshooting network problems. Will be responsible for setting up new groups.

2.3.2. Group AdministratorMust have basic computer knowledge and know who should be in their group and who should not. They will be responsible for managing the group members and maintaining privacy. No advanced IT skills are necessary.

2.3.3. Conference PresenterMust have basic computer knowledge and familiar with the functions of SDCS. They will be responsible for managing the conference rooms, calling on individuals who have "raised their hand", enabling logging, and managing privacy settings. They will have full control of the Document Viewer in its

8

content, presentation and multiple user interface (separated group users or combined group users).

2.3.4. Message Board ModeratorResponsible for monitoring the message boards and keeping posts decent. Must have basic computer skills and be comfortable censoring posts as deemed necessary by the policies of the organization using the software.

2.3.5. Conference UserA member of an active conference room on the server. Must have very basic computer skills. Will be able to participate in all conference room functions enabled by the Conference Presenter.

2.3.6. Group UserA member of a group on the server. Must have very basic computer skills. Will be able to participate in group based discussions, meetings, and message boards, controlled by the Group Administrator.

2.3.7. Independent UserA user on the server that is not a member of a group. Must have very basic computer skills. They will be able to message any user whose privacy settings allow such a message but cannot participate in any group discussions, meetings, or message boards.

2.4. Operating Environment The server should operate on a UNIX system connected to the network. The minimum software requirements for a server may be determined by the programmers; however, minimal additional software should be required. The client software, which is what the end users will utilize, should be able to be run on the Microsoft Windows environment. The minimum version of Windows can be Windows XP SP2. Potential problems with other software include software and hardware firewalls. These will need to be configured to allow the SDCS software to communicate over the network. The server administrator may be charged with this task. Documentation on which ports to open should be provided with the software.

2.5. Design Implementation Constraints In reference to the central server, the company should allow the Administrator to bypass the company or university firewall (if one exists) in order to maintain SDCS. All end users must have access to the server with the company or university’s permission, wherever they may be as long as they have Internet access.

2.6. User Documentation As of right now, we do not have any user documentation that will be delivered with the software. We will eventually include some documentation for the user to fully understand how our software works.

2.7. Assumptions and Dependencies Our main assumption is that anybody using our software is going to have the specified requirements that are listed in this SRS in order for the program to function correctly. Some of our dependencies are the amount of space that could be needed to install the entire program, the type of server that the program is going to be used for, and the type of operating system that the program is going to be run on. Some of this has been discussed in section 2.4.

9

3.External Interface Requirements 3.1. User Interfaces

See Appendix D as well as section 4 of the SRS3.2. Hardware Interfaces

No hardware interfaces have been specified.3.3. Software Interfaces

3.3.1. Microsoft Internet ExplorerThis will be the only external application that our software willrequire the users of our software to have and will be the onlyexternal application we interact with. This will take place with aclient-side plug-in.

3.3.2. Microsoft Windows Operating SystemSee Section 2.4

3.3.3. Communications InterfacesNo communications interfaces have been specified.

4.System Features 4.1. Instant Messaging

All users should be able to communicate with one another individually with instant messaging. This function is at a medium priority since this is a function that is not unique just to SDCS, however still very crucial to the program. 4.1.1. Features

4.1.1.1. Whiteboard 4.1.1.1.1. Drawing

4.1.1.1.1.1. Colors/Black & WhiteThe users should be able to select what color he or she would like to use to draw. If color drawing has been enabled, then the user could pick from a long list of colors. If it has been disabled, then he or she may only pick black or white.

4.1.1.1.1.2. Fill InAllows the user to select a part of the drawing that has a continuous color and replace that color with another color.

4.1.1.1.1.3. Line WidthThe users should be able to choose between at least four different line widths for drawing. The widths can be measured in pixels, the smallest being one pixel. The largest width depends on the number of widths available but should be between 7-13 pixels.

4.1.1.1.1.4. EllipseAllows the user to select a rectangular area on the whiteboard within which an ellipse will be inscribed. The program should then draw the inscribed ellipse.

4.1.1.1.1.5. Straight Line

10

Allows the user to select a starting point and an ending point and the program will draw a straight line between those two points on the whiteboard, with specified color and width.

4.1.1.1.1.6. Erase Allows users to draw in the color white to give the feeling of erasing.

4.1.1.1.1.7. ClearClears the entire board by Fill-in in white.

4.1.1.1.2. Save See image sharing: file formats

4.1.1.1.3. Size The size of the whiteboard should be able to be set by the initiator

of a conversation. The size should be settable in either menu by typing in the size and/or by resizing it with the mouse. The whiteboard should be a window separate from the main messaging window that the user can "dock" on the messaging window or completely minimize in to the messaging window.

4.1.1.1.4. Text 4.1.1.1.4.1. Colors User can choose what color to type text in.4.1.1.1.4.2. Unicode See 1.2 Document Convention 4.1.1.1.4.3. Fonts User can choose what font to display text in.4.1.1.1.4.4. Size User can choose what size to display text in.4.1.1.1.4.5. Underline/Bold/Italic User can choose what format to display text in.

4.1.1.2. Chat History This enables users to store instant messaging they have had with

other users, in order to reference them later. 4.1.1.2.1. Save

4.1.1.2.1.1. HTML Ability to open past conversations in an internet browser that includes fonts, sizing, color, images and whiteboard drawings. 4.1.1.2.1.2. Plain Text Able to open only the text of the conversations. 4.1.1.2.1.3. XML XML is a standard for storing and transferring data. The developers will be able to come up with their own reasonable XML schema for this data storage. Storing data in this format will allow others to write programs to work with the saved chats. See references for information on the XML format.

4.1.1.3. Document and Image Sharing

11

It is recommended that the Internet Explorer control provided by Microsoft is used to display these documents and images since that control is able to display natively all the following formats.

4.1.1.3.1. File Formats 4.1.1.3.1.1. Word Documents

Will be displayed through Internet Explorer.4.1.1.3.1.2. Excel Documents

Will be displayed through Internet Explorer. 4.1.1.3.1.3. Power Point Presentations

Will be displayed through Internet Explorer. 4.1.1.3.1.4. Text Files

Will be displayed through Internet Explorer. 4.1.1.3.1.5. PDF

Will be displayed through Internet Explorer. 4.1.1.3.1.6. HTML

Will be displayed through Internet Explorer. One can send either an HTML file or just a URL to be loaded in to the SDCS HTML viewer.

4.1.1.3.1.7. BMPWill be displayed through Internet Explorer. This is an uncompressed format. This format will be the easiest to manipulate and work with however due to it being uncompressed it will take up a relatively large number of KB on the users hard disks. For this same reason it will have a long transfer time from client to client.

4.1.1.3.1.8. SVGWill be displayed through Internet Explorer. These graphics contain only geometric shapes and all of its lines are made up of simple mathematical equations. This is a very small file format due to the fact that it works mostly only for drawing straight lines and text. Due to the small nature of this format the transfer times tend to be very short and it will take up a very small amount of disk space.

4.1.1.3.1.9. JPEGWill be displayed through Internet Explorer. This is the default picture format for transfers. JPEG files are loosely compressed file. Despite being a lossy format the quality of JPEG pictures tends to be very high quality. The compression makes these pictures take up a lot less hard drive space than bitmaps and also transfer from client to client much faster.

4.1.1.3.1.10. DEFAULTAny other file format or media supported by Internet Explorer.

4.2. File Transfer File transferring will be available to any two users who are connected on the server. The transfer is requested by the sending user, and it will proceed once the other user signals that he or she will accept the file. This will copy the file from the sending user

12

to the receiving user, and put into specified files. File transfer is a low priority feature since it is not critical to the operation of general functionality of SDCS.4.2.1. Features

4.2.1.1. Transfer ResumingAllow a transfer to pause or stop due to either user intervention or loss of network connection and not lose the part of the file already downloaded. When the user reconnects or resumes the download it should not re-download all of the previous downloaded information.

4.3. Conference Rooms Conference rooms will allow multiple users and/or groups to communicate within the specified network, managed by the Conference Presenter. The Conferencers will have access to the functions specified below, according to the settings provided by the Conference Presenter. The Conference Presenter will have control over blocking users’ settings and enabling or disabling the following features: hand raising system, conference history, conference playback, document viewer, and combined user interface.4.3.1. Features

4.3.1.1. Whiteboard4.3.1.1.1. Drawing

4.3.1.1.1.1. Colors/Black & WhiteSee 4.1.2.1.1.1.

4.3.1.1.1.2. Fill InSee 4.1.2.1.1.2.

4.3.1.1.1.3. Line WidthsSee 4.1.2.1.1.3.

4.3.1.1.1.4. EllipseSee 4.1.2.1.1.4.

4.3.1.1.1.5. Straight LineSee 4.1.2.1.1.5.

4.3.1.1.1.6. EraseSee 4.1.2.1.1.6.

4.3.1.1.1.7. ClearSee 4.1.2.1.1.7.

4.3.1.1.2. SaveSee 4.1.1.2.1.

4.3.1.1.3. Text 4.3.1.1.3.1. Colors

See 4.1.1.1.4.1.4.3.1.1.3.2. Unicode

See 4.1.1.1.4.2.4.3.1.1.3.3. Fonts

See 4.1.1.1.4.3.4.3.1.1.3.4. Size

See 4.1.1.1.4.4.4.3.1.1.3.5. Underline/Bold/Italic

See 4.1.1.1.4.5.

13

4.3.1.2. Conference HistoryBy saving the conferences, it enables any user allowed by the permissions of the conference to room, to view the conference that previously occurred. The different types of saves allow the flexibility of which type of conference room occurred. They will be able to be played back in almost real-time, allowing one to get the full feel of the conference.

4.3.1.2.1. History Retrieval on Conference Join When a late-comer joins the conference they will be sent the entire history of the conference up to that point. This is so that they will not be instantly lost and will be able to more quickly pick up on what is going on.

4.3.1.2.1.1. Text HistoryA history of all text sent to/from each member of the conference displayed in a sequential fashion according to time.

4.3.1.2.1.2. Image HistoryA history of all images shown during the conference. A user can go back and review previously shown images.

4.3.1.2.1.3. Document HistoryA history of all documents shown during the conference. A user can go back and review previously shown documents.

4.3.1.3. Conference ReplayAllows a user replay a conference at varying speeds including real-time, 2x, and 4x.

4.3.1.3.1. Real-time play backPlays back the conference at approximately the same speed as the original conference occurred. Should allow for pausing and fast forwarding.

4.3.1.3.2. Fast-forward play backPlays back the conference at a faster than normal pace. Should allow the viewer to pause and skip ahead.

4.3.1.4. Hand RaisingA conference attendee to indicate to the presenter that they wish to make a comment.

4.3.1.4.1. On/OffThe presenter can turn groups on and off.

4.3.1.4.2. QueueThe program will record the order of people raising their hands

so that the presenter can call on them in the order in which their hands were raised. 4.3.1.4.3. Groups

The presenter can separate the conference attendees into groups. Each group can act as its own entity in terms of hand raising which makes things easier to manage for the presenter. Each group can also have its own group chat so that a presenter can challenge two groups to come up with competing ideas.

14

4.3.1.5. GUIThe graphical user interface for a conference. The conference attendees will have a screen similar to that of instant messaging. The presenter, however, will have a lot of controls at their disposal that must be implemented in the user interface.

4.3.1.5.1. List of Group UsersIn addition to the standard instant messaging interface (see ...) attendees will have a list of other users in their group. This is to allow them to communicate more effectively within the group.

4.3.1.5.2. Separated Group User WindowsThis will be controlled by the Group Administrator, and will allow all users to have their own messaging window while in a conference room.

4.3.1.5.2.1. Docking4.3.1.5.3. Combined Group Users

This will be controlled by the Group Administrator, and will group certain users with each other, by order in which they enter the conference room, depending on the amount of people

in the conference room. 4.4. Message Boards

The message boards will be a non-real time communication method. It will consist of topics that users can post a message to, with the ability to reply depending on permissions. These topics will be pertinent to the users who use them, i.e. suggestions, finances, concerns, etc. The posts will remain in view so any user with permission can view posts and see replies. The non-real time component of this is that replies can still be made even after the original poster is no longer online. The message boards are ideal for asking questions that other users may also be wondering the answer to. In this way a user with the same question can simply look through the message board archives and find the previously posted answer even if the answer was posted several months or years prior.4.4.1. Features

4.4.1.1. Moderating Enabling and disabling access to the following functions of the

message boards. 4.4.1.1.1. Editing & Censoring Posts

Moderator will have the ability to edit and censor posts that aren't useful for the specific thread or board.

4.4.1.1.1.1. Edit Marking 4.4.1.1.2. Delete Posts Moderator will have the ability to delete any posts that are not helpful for the specific thread or are deemed offensive.

4.4.1.2. Public/Private4.4.1.2.1. Viewing Permissions

Moderator will allow certain people registered with either the company or school to view any posts or threads on the message board.

15

4.4.1.2.2. Posting PermissionsModerator will allow certain people registered with either the

company or school to post anything or create new threads on the message board.

4.4.1.3. Group MessagingMessages posted to a specific group message board can only be viewed and replied to by people in that group. Group Administrator will have control of who is in the group.

4.4.1.4. File Sizes 4.4.1.5. Number Of Files 4.4.1.6. File Attachments 4.4.1.7. Posting Audit Required

4.5. Directory A listing of all the users on the SDCS network. The listing may include information on the users and will be searchable. Users will have the option of making their directory listings private so that only certain associates can access it (group members, conference members, etc...). The directory will mainly be used to look up contact information, such as an address or phone number, of another user on SDCS.4.5.1. Features

4.5.1.1. Stored Information4.5.1.1.1. Name 4.5.1.1.2. Group 4.5.1.1.3. Title 4.5.1.1.4. Location 4.5.1.1.5. Address 4.5.1.1.6. Short Description

4.5.1.2. Searching4.5.1.2.1. By Name 4.5.1.2.2. By Group 4.5.1.2.3. By Title 4.5.1.2.4. By Location

4.5.1.3. Group Sorting4.5.1.4. Privacy

4.6. Security Security is applied to every aspect of the programming. By requiring logins we can ascertain that only authorized users are allowed on the network. Then by encrypting the passwords and all communications on the network no sniffing attempts will be able to get any data. SDCS will use multiple encryption techniques including server side keys, MD5 hashing, and PGP. 4.6.1. Features

4.6.1.1. Login Username/Password 4.6.1.1.1. Username Stored As Plaintext On Server 4.6.1.1.2. Password Is MD5 Hashed 4.6.1.1.3. Client MD5 Hashes Password, Then Hashes Again With Random

Server Code 4.6.1.2. Encryption PGP

16

4.7. Groups Groups will arrange a designated number of people to belong to a group with a specified group name, controlled by the Group Administrator. The group user will be able to request entry into a group, depending on the admission settings. There could be any number of groups within a business or university, and individuals could potentially be part of more than one group.4.7.1. Features

4.7.1.1. Group NameCreated at the time of the creation of the group.

4.7.1.2. Group PermissionsSee 4.8.2.1.

4.7.1.3. Group MessagingImplemented through Message Board.

4.8. Permissions The permissions are the core of the privacy settings for SDCS. The permissions control who is allowed to post to and view message boards, who is allowed in to a group, who is allowed in to a conference, and who is allowed to message who. By having so many different privacy settings administrators will be able to tightly control privacy on their network. 4.8.1. Features

4.8.1.1. Group PermissionsGroup permissions determine who belongs to a group and who has permissions to alter what portions of a group. These are the ability to add other users to the group, the ability to remove users from the group, and permissions to post on the group message board. These permissions are given by the group administrator whom is appointed by the server administrator.

4.8.1.2. Global PermissionsThese permissions determine what someone can do outside of the confines of a single group. These involve the ability to view/post on global message boards and to form conferences.

4.8.1.3. Message Board PermissionsThe ability to post on message boards are controlled by the Server Administrator and the message board moderator. In addition permissions may be applied that allow posting of files and the ability to moderate a message board. See 4.4 for more information. These permissions are determined by the message board moderator who is appointed by the server administrator.

4.8.1.4. Instant Messaging PermissionsSome users may select to only be contacted by members of the same groups as them or by no one at all. These permissions are able to be set by individual users.

4.8.1.5. Conference PermissionsThese permissions determine who may join a conference and who has a right to speak. These are determined by the conference creator and can limited a conference to invitation only, group only, or open.

17

5. Other Nonfunctional Requirements 5.1. Performance Requirements

5.1.1. Client PerformanceThe client software should be able to run easily on computer systems with a processor as slow as 1 GHz and as little as 512 MB of ram. This will accommodate low end systems that may still be in use throughout a lot of corporations.

5.1.2. Server PerformanceThe server software should be able to run on a server with only a 1 GHz processor and 1 GB of ram. The software should be able to coexist with a low-load web server on a system with these minimal requirements as well. This is so that the server will be able to be run on any old server that a corporation may have which will lower the cost of adoption of our software platform.

5.2. Safety Requirements 5.2.1. Computer Safety

The only safety requirement for this software is that it must not doing anything that is likely to harm any computer or user. Warnings should be included that advice taking frequent breaks to avoid repetitive stress syndromes and to state that the software is not intended to be used for communication in an emergency.

5.3. Security Requirements 5.3.1. Usernames

Individuals’ usernames can be stored in plaintext on the central server. There needs not be an excessive amount of security around usernames since they will be available to anyone logged in to the system and will not really give any unauthorized person access to the system or the ability to impersonate a valid user.

5.3.2. PasswordsPasswords should be stored in an MD5 hashed form on the server. This is to ensure that even if an unauthorized person gained access to the server they would not be able to acquire the passwords of users. In rare extreme cases, the access may grant the unauthorized person the ability to change user passwords, but they should never be able to view the original passwords. During network transfers involving passwords the passwords should always be encoded with a one time hash. This makes packet sniffing essentially useless.

5.3.3. PermissionsUsers should not be allowed to view or join conference rooms or message boards that they do not have permissions to. Packet sniffing may still reveal the information in these rooms and boards but that should be taken care of by the network administrator with good routing.

5.3.4. PrivacyPrivacy concerns should be taken care of by setting up permissions correctly and not logging conversations involving sensitive information. This will be the

18

responsibility of the administrators of the system and not the SDCS development team.

5.4. Software Quality Attributes 5.4.1. Look and Feel

The client software in particular should have a polished user interface. It is important to give off an air of professionalism so that business leaders take it seriously.

5.4.2. BugsAll attempts should be made to eliminate and minimize all potential bugs in the software before release. The programming schedule should include ample time for debugging and a test company should be found to do real world testing.

6. Other Requirements

Appendix A: GlossaryTerm Definition

SDCS Syracuse Digital Conferencing Software

GUI Graphical User Interface

Dock To visually attach a window or toolbar to another window as to make them move together as if they were one window

Unicode The new replacement for ASCII (American Standards Code for Information Interchange). This new format allows representing almost every character of almost every language on earth without switching fonts. See http://unicode.org/.

XML Schema A file for describing a specific XML file format for a program.

BMP Windows Bitmap File Format

19

JPEG Joint Picture Experts Group

SVG Scalar Vector Graphics

PDF Portable Document Format

ODF Open Document Format

HTML Hyper Text Markup Language

Lossy Causes the depreciation of quality during compression

Non-lossy Keeps full quality even when compressed

Conferencers

Appendix B: Analysis ModelsClient Model:

20

Server model:

Conferences :

21

Whiteboard :

22

Suggested security model:

23

24

Appendix C: Comparison To Similar Software

Features SDCS AIM MSN NetMeeting Sametime

Instant Messaging

X X X X

Conference Rooms*

X X X X

Whiteboard X X X

Hand Raising System

X

Image Sharing X X X

File Transfer X X X X

Message Boards

X

Document Viewer

X

Encryption X

Video X X X

25

Appendix D: Interface Screenshots

Login Window:

Group List Window

26

Business Presentation Window

27

Classroom Presentation Window

28

29