Sei sulla pagina 1di 25

Software Requirements Specifications

Software Requirements Specifications For Web Browser

Prepared by:
1. 2. 3. 4. Ravi prakash Pramod kumar Rishi kumari Abhishek kumar 90710308389 90710308385 90710308392 90710308389 B.Tech.(CSE) B.Tech.(CSE) B.Tech.(CSE) B.Tech.(CSE) 6 sem 6 sem 6 sem 6 se

1. INTRODUCTION
This document aims at defining the overall software requirements for WEB BROWSER. Efforts have been made to define the requirements exhaustively and accurately.

1.1 PURPOSE
This document describes the capabilities that will be provided by the software applications WEB BROWSER. Its purpose is to display the information on the website in a net and organize way; it also helps to navigate the web easily. These programs interpret code (HTML) and display information from WWW. The intended audiences are the anonymous customers.

1.2 SCOPE
A web browser is a software application which enables a user to display and interact with text, images, videos, music, games and other information typically located on a web page at a website on the world or a local area network. Text and images on a web page can contain hyperlink to other web pages at the same or different hyperlinks to other web pages at the same or different websites. Web browsers allow a user too quickly and easily access information provided on many web pages at many web sites by traversing these links.

1.3 DEFINITIONS, ACRONYMS, ABBREVIATIONS

Definitions:
WWW: it is a set of large interlinked hypertext documents accessed via internet. HTML: it is a predominant markup language for the web pages. It is in the form of tags in angle brackets. CSS: it is a style sheet language used to describe the presentation of a document written in a markup language. Protocol: it is a convention or standard that controls or enables the connection, communication and data transfer between computing endpoints.

Acronym and Abbreviations:


WWW- World Wide Web HTML- hypertext markup language HTTP- hypertext transfer protocol CSS- Cascading style sheets

1.4 OVERVIEW
The rest of the SRS document describes the various system requirements, interfaces, features and functionalities in details.

2 OVERALL DESCRIPTIONS
2.1 PRODUCT PERSPECTIVE
The application will be self-contained.
Browser
HTTP

Server

2.1.1 SYSTEM INTERFACES


None

2.1.2 USER INTERFACES


The application will have a user-friendly and menu based interfaces. Following things will be included: Bookmark managing Download managing Form managing

Password managing Spell-checking Search engine toolbar Security configuration Privacy mode Auto-updater Pop-up blocking Full-text history search Tabbing navigation Page zooming Voice control

TOOLBAR:
Address field Auto-fill form button Back button Refresh Home Favorites Close box Fonts Forward button History Security indicators Status bar Stop button Window title Search button

2.1.3 HARDWARE INTERFACES


1) A system needs min. of 64MB RAM. 2) A LAN card for the internet 3) Modem 4) 52GHz Pentium Processor 5) 233MB hard drive

2.1.4 SOFTWARE INTERFACES


1) Any windows- based operating system (Windows 95/98/2000/XP/Vista 2) Net Beans IDE 6.5.1 for coding/developing the software. 3) MYSQL for creating and managing databases.

2.1.5 COMMUNICATION INTERFACES


The Browser should support the following internet protocols: I. II. III. HTTP E MAIL FTP: File Transfer Protocol (FTP) is a network protocol used to exchange and manipulate files over a TCP computer network, such as the internet. An

IV.

V.

VI.

VII.

VIII.

FTP client may connect to an FTP server to manipulate files on that server. NNTP: The Network News Transfer Protocol or NNTP is an internet application protocol used primarily for reading and posting Usenet articles (aka Netnews), as well as transferring news among news servers. TLS: Transport Layer Security (TLS) and its predecessor, Secure Sockets Layer (SSL), are cryptographic protocols that provide security and data integrity for communications over TCP/IP networks such as the Internet. EV: Extended Validation Certificates (EV) is a special type of X.509 certificate which requires more extensive investigation of the requesting entity by the Certificate Authority before being issued. GOPHER: Gopher is a distributed document search and retrieval network protocol designed for the Internet. Its goal is to function as an improved form of Anonymous FTP, enhanced with hyper linking features similar to those of the World Wide Web. PROXY SERVER: In computer networks, a proxy server is a server (a computer system or an application program) that acts as a go-between for requests from clients seeking resources from other servers.

Schematic representation of a proxy server, where the computer in the middle acts as the proxy server between the other two.

2.1.6 MEMORY CONSTRAINTS


At least 64 MB RAM and 233 MB hard disk will be required for running the browser.

2.1.7 OPERATIONS

2.1.8 SITE ADAPTATION REQUIREMENTS:


The terminals at client site will have to support the hardware and software interfaces specified in the above sections.

2.2 PRODUCT FUNCTIONS:


According to the customer use and needs the browser can perform the following functions: Bookmark managing: Internet bookmarks are stored Web pages locations (URLs) that can be retrieved. As a feature of all modern Internet web browsers, their primary purpose is to easily catalog and access web pages that a user has visited and chosen to save. Download managing: A download manger is a computer program dedicated to the task of downloading (and sometimes uploading) possibly unrelated stand-alone files from (and sometimes) the Internet for storage. Password managing: It saves the password the user provides on various sites. Spell checker: In computing, a spell checker is an application program that flags words in a document that may not be spelled correctly. Spell checkers may be stand-alone capable of operating on a block of text. Search Engine: Web search engine is a tool designed to search for information on the World Wide Web. The search results are usually presented in a list and are commonly called hits. The information may consist of web pages, images, information and other types of files. Privacy mode: Privacy mode, also referred to as porn mode, is an informal term that refers to privacy features in some web browsers.

TOOLBAR Address field This area is where the URL (web page address) for the web page is displayed or entered. Auto fills Forms Button When one encounters a page that has a form on it, such as an order page, this button will make filling out the form much easier. Back Button Use this button to go back to the previous page opened in this particular browser window. Bookmarks or Favorites One can easily create a shortcut to your web pages by using the Bookmark (or favorites) menu or button. Close Box This button in the upper right corner of the window will close the browser window.

Forward Button Like the Back button, the Forward button takes the user to pages that he has previously seen in a particular browser window.

Home Button This button takes User to the page that has been designated as home page. User can select home page according to his own wish. Menu Bar In Windows the Menu bar is a part of each browser window. Choices include File, Edit, View, History, Favorites or Bookmarks and Help. Minimize Button In Windows User can this button to make the browsers window disappear from the screen. Maximize Button In Windows User can use this button to make the browsers window enlarge to full screen. Reload or Refresh Button If User suspects the contents of a browsers window may have changed since the last time viewed, he should click the Reload or Refresh button to update the page. Favorites, Links or Personal Toolbar User can add his own buttons to this toolbar.

Restore Button If the browsers window is maximized User can use this button to restore the size of the window so that it no longer fills the entire screen Search Button In some browser, there is a button to go to the page User has designated as search page.

2.3 USER CHARACTERISTICS


Educational Level: At least educated so that be able to understand either of the languages of the browser(English, Hindi etc) Technical Expertise: Should be comfortable using general- purpose applications on a computer.

2.4 CONSTRAINT
Monitor sizes and ratios, color or black-and-white monitors render it virtually impossible to design pages that look good on all device types. Font sizes and colors need to be alterable to fit the requirements of sight-impaired viewers. The situation becomes more complicated when interactive resizing of windows and frames, printing, or communication conditions.

2.5 ASSUMPTIONS AND DEPENDECIES


Some pages display wrong with some browsers. Some web master along the way programmed in some browser-specific codes. HTML and CSS should be syntactically same.

2.6 APPORTIONING OF REQUIREMENTS


The new features of the browser will be available in the future version. It needs to be updated by the user.

3 SPECIFIC REQUIREMENTS
This section contains the software requirements to a level of detail sufficient to designers to design the system and the Testers to test the system.

3.1 USER INTERFACES The following Window will be provided: 1) HOME PAGE: It directs the default page when the user starts the browser.
BROWSER TOOL BAR MENU ADDRESS BAR MORE FUNCTIONS

2) PASSWORD BOX: It manages the password and other information given by user if the User wants it to save. Otherwise request is rejected by the User.
Do you want to remember the password for this site? Yes No Not now Never ask again

3) DOWNLOAD BOX: It shows current downloading on the system.


Download Box Current Downloading: Downloading rate:

Clear list

Pause Play

4) ERROR PAGE: The page displayed when the address is not appropriate or the connection is not there.

The page cannot be displayed The page you are looking for is currently unavailable. The Web sitemight be experiencing technical difficulties, or you may need to adjustyour browser settings. Please try the following: Click the Refresh button, or try again later. If you typed the page address in the Address bar, make sure that it is spelled correctly. To check your connection settings, click the Tools menu, and then click Internet Options.On the Connections tab, click Settings. The settings should match those provided by yourlocal area network (LAN) administrator or Internet serviceprovider (ISP). See if your Internet connection settings are being detected. Youcan set Microsoft Windows to examine your network andautomatically discover network connection settings (if yournetwork administrator has enabled this setting). 1.Click the Toolsmenu, and then clickInternetOptions. 2.On the Connections tab, click LAN Settings. 3.Select Automatically detect settings, and then click OK. Some sites require 128-bit connection security. Click the Help menu and then click About Internet Explorer to determinewhat strength security you have installed. If you are trying to reach a secure site, make sure yourSecurity settings can support it. Click theTools menu, and then click Internet Options. On the Advanced tab, scroll tothe Security section and check settings for SSL 2.0, SSL 3.0,TLS 1.0, PCT 1.0. Click the Back button to try another link.

3.2 FUNCTIONS
It defines the fundamentals actions thar must take place in the software in accepting and processing the inputs and generating the outputs. The system shall. VALIDITY CHECKS The address should be correct. Internet connection should be present. Presence of virus. Some sites are unable to be accessed due to security reasons.

RESPONSES TO ABNORMAL SITUATIONS Pop-up will be generated if any probability of virus is present. Errorpage generated when address is incorrect or other relevant site is opened. Error page generated when internet connection is not detected.

3.3 PERFORMANCE REQUIREMENTS


Static numerical requirements are: HTTP should be supported. HTML should be supported. Any number of users can be supported.

Dynamic numerical requirements includes: the number of transactions and tasks and the amount pf data to be processed within certain time periods for both normal and peak workload conditions depend upon the internet connection and speed of the User.

3.4 LOGICAL DATABASE REQUIREMENTS


None

3.5 DESIGN COSTRAINTS


None

3.6 SOFTWARE SYSTEM ATTRIBUTES


Quality attributes that can be serve as requirements. Reliability: It supports the latest functions as per the user requirements. Availability: It can be downloaded from the site. Security: It supports the privacy mode. Portability: It supports all operating sytems. Efficiency: Appropriate amount of computing resouces and code.

3.7 OTHER REQUIREMENTS


None

4 CHANGE MANAGEMENT PROCESS


Changes in project scope and requirements will be done if: Updation of the software Change in technology(presence of any future OS) Change in User requirements

DATA FLOW DIAGRAMS


Zero-level Data Flow Diagram

Use Case Diagram

UML Activity Diagram

Sequence Diagram

Deployment Diagram

Class Diagram Object Diagram Collaboration Diagram Activity Daigram

Potrebbero piacerti anche