Software Requirements Specification
For
DIGITAL EYE
Presented by: Prasanthi .I 06K01F0028
1: Introduction Purpose:This Digital Eye software is used to view and interact with the computer desktop of the client’s systems one at a time, any where on the network. For example: In a college lab the administrator wants to view and interact with the students. Then he can communicate by using digital eye software. By using this software the administrator can monitor the students.
Existing System:
The general procedure to check the employee’s desktops or to check if the computers in the internet cafe, labs etc are not misused is to manually go and check them. This obviously doesn't solve the purpose as the convict changes the actual content he/she viewing. Even for good reasons it is very inefficient way to check the remote desktops manually.
Proposed System:
In computing, DIGITALEYE is a “graphical desktop sharing” in which a remote display system allows us to view a computing ‘desktop’ environment from anywhere on the network. And we can also send private and broadcasted messages to the clients
when the necessity is felt. Using this software we can also keep track of the persons work who ever connected to the network.
Document Conventions: We have used Times New Roman (text size 12).Bold Font is used for Main Headings (text size of 14). Bold, Underline and Italicized font is used for Modules (text size of 14).Underlining is done for technically important words…… Font: Times New Roman Font Style: Size: 10px Main Heading: Bold Font, 14px
Intended Audience & reading suggestions: This document is for better understanding of view and interacts between the administrator and the clients. Mainly intended for Hod sir, internal guide, external guide, staff members, users and colleagues. This detail given below guides every normal user to how to go through this document for better understanding. The sequence to follow for better understanding is here purpose, scope, features of the monitoring software, operating requirements, modules present in the project, advantages, references etc.
Project scope: This software is not only used for company. We can use it in the college labs and organizations also.
2: Overall Description: Product perspective: This is monitoring software. By using this software the administrator can view and interact with the client’s who ever connected to the network. Client’s also seeing their work any were in the network. The administrator can send a private and broadcasted message to the client’s when the necessity is felt.
Product Features: •
• • •
Affectively Affectively monitors the clients. Provides communication between administrator and client’s. Protection of blocked sites. Provide private and broadcasted messages.
User classes and characteristics: As it is a remote control software which allow the administrator to view and interact with the computer desktop of the client systems one at a time, any where on the network. When the clients try to do
any unnecessary work then administrator can take action on it. And the administrator can send private and broadcasted messages to the clients when the necessity is felt.
Operating environment: Software requirements are used in this project are Microsoft.net frame work 2.0 , Microsoft C# programming language for Front end and XML used to transfer the data from one system to system. Hardware requirements are used in this project is p4 processor, 512 MB of hard disk and database memory.
Design and implementation constraints: The software is designed in such a way that the administrator can easily interact with the clients desktop. Because it is a graphical desktop sharing in which a remote display system allows us to view computing ‘desktop’ environment from any where on the network. Software is designed in such a way that it provides communication between administrator and clients.
Assumptions and dependencies: This software is to be used in the server so that the whole departments members, work can be keep track of the each and every persons work who ever connected to the network. Company should maintain a LAN connection so that they can access every information and mainly for getting communication. Administrator should have all the rights to known that what exactly clients doing on the desktop. Administrator can see all the client's desktops in his desktop.
3: System Features: MANAGER DESKTOP ids The ManagerClient’s Module: Client 1
Administrator monitors the clients systems by using the digital eye. Client 2 In this the server will each and every clients system and Clientadminister 3 ……..… the work performed by them and monitors them. Client n
Manager work area
The Adapter Module: The very most important feature of DIGITAL EYE is that it also helps us to control the client. If any unnecessary work is being performed by the client then the manager can take action on it.
The Broadcaster Module: This module deals with sending private and broadcasted messages to the clients when the necessity is felt.
4: External Interface Requirements: User Interface: This Software include sample screen images such as user login, any GUI standards or product family style guides that are to be followed, screen layout constraints, standard buttons and functions (e.g., help) that will appear on every screen, keyboard shortcuts, error message display standards, and so on.
Hardware Interface: we require LAN connection for interacting with database and local computers for any help or any other requirements. We use TCP/IP protocol for communicating with server. We also need system with P4 processor; 512 MB RAM and database memory.
Software Interface: W use Microsoft dot net frame work 2.0 and Microsoft C# programming language for writing the code for the project. XML for data transaction, Microsoft visual studio 2005 IDE for writings the programs, and winsock is a socket prog
Communications Interface: The communications functions required by this product are LAN connection with in the whole company/department. company/department. By using this manager can interact with clients and we can transfer the data in the network. We use TCP/IP protocol.