SRS On Libraray - Management - System
SRS On Libraray - Management - System
Submitted by:
Name: Majharul Islam Towsif Sumon
ID: 171-35-1846
Department: SWE
Section: E
Mirpur Road, Dhaka 1207, Bangladesh
Date of Submission: 16-10-2018
Table of Contents i
List of Figures ii
1. Introduction 1
1.1 Purpose 1
1.2 Project Scope 1
1.3 Glossary …….1
1.4 References 2
1.5 Overview 2
2. User Classes and Characteristics 3
3. Design and Implementation Constraints 3
3.1 User Interface Technology 3
3.1.1 Programming Language 3
3.1.2 JavaScript and jQuery Library 3
3.1.3 CSS Framework 4
3.2 Implemented Tools and Platform 4
3.2.1 Web Server 4
1.1.1 Database Server 4
2. Use Case Diagram 5
3. Requirement Specification 5
3.1 Functional Requirements 6
3.2 Performance Requirements 7
3.2.1 Capacity Requirements 7
3.3 Dependability Requirements 8
3.3.1 Reliability and Availability 8
3.3.2 Robustness and Fault Tolerance Requirements 8
3.3.3 Safety Critical Requirements 8
3.4 Maintainability and Supportability 8
3.4.1 Maintenance Requirements 9
3.4.2 Supportability Requirements 9
3.4.3 Adaptability Requirements 9
3.5 Security Requirements 9
3.5.1 Access Requirements 10
3.5.2 Integrity Requirements 10
3.5.3 Privacy Requirements 10
3.5.4 Ease of Use Requirements 10
3.5.5 Understand-ability and Politeness Requirements 11
3.5.6 Accessibility Requirements 11
3.5.7 User Documentation 12
3.6 Operational and Environmental Requirements 12
3.6.1 Expected Physical Requirements 12
3.6.2 Requirement for Interfacing with Adjacent System 12
3.6.3 Release Requirements 13
3.7 Legal Requirements 13
3.7.1 Compliance Requirements 13
3.7.2 Standard Requirements 13
3.7.3 Release Requirements 13
3.8 Legal Requirements 13
3.8.1 Compliance Requirements 13
3.8.2 Standard Requirements 13
3.9 Requirement Elicitation Techniques 13
3.9.1 Hold Elicitation Interviews 13
3.9.2 Perform Document Analysis 13
3.9.3 Distribute Questionnaires 14
3.10 Requirement Validation 14
3.10.1 Review the Requirements 14
3.10.2 Test the Requirements 14
3.10.3 Simulate the requirements 14
3.11 Change Management 14
List of Figures
Revision History
Name Date Reason For Changes Version
1. Introduction
The introduction of the Software Requirements Specification (SRS) provides an overview of
the entire SRS with purpose, scope, definitions, acronyms, abbreviations, references and
overview of the SRS. The aim of this document is to gather and analyze and give an in-depth
insight of the complete Library Management System by defining the problem statement in
detail. Nevertheless, it also concentrates on the capabilities required by stakeholders and their
needs while defining high-level product features. The detailed requirements of the Library
Management System are provided in this document.
1.1 Purpose
The purpose of the project is to maintain the details of books and library members of different libraries.
The main purpose of this project is to maintain a easy circulation system between clients and the
libraries, to issue books using single library card, also to search and reserve any book from different
available libraries and to maintain details about the user (fine, address, phone number) .Moreover, the
user can check all these features from their home
✔ Manually updating the library system into an android based application so that the user
can know the details of the books available and maximum limit on borrowing from their
computer and also through their phones.
✔ The ILM System provides information's like details of the books, insertion of new books,
deletion of lost books, limitation on issuing books, fine on keeping a book more than one
month from the issued date.
✔ Also user can provide feedback for adding some new books to the library.
1.3 Glossary
This subsection contains definitions of all the terms, acronyms, and abbreviations used in the
document. Terms and concepts from the application domain are defined.
● LMS –Library Management System
● SRS – System Requirement Specification
● SDLC – Software Development Life Cycle
● UI – User Interface
IEEE. IEEE Std 830-1998 IEEE Recommended Practice for Software Requirements
Specifications. IEEE Computer Society, 1998.
1.5 Overview
The goal of this project is to provide simplicity as well as security and efficiency to the Management of
Agape Youth Library and also to reduce the management personal in the library.
Library Management System is a project which aims to develop a computerized system. The system
helps both students and the library manager to keep track of all books available in the library. It allows
both the admin and the student to search for the desired book.
The main feature of this system is that all books available in the library can be displayed in a list so that
students need not roam through the entire library to find a book. Additionally, the System effectively
maintains the users of the students / students whose books have been issued; It also records the issued
date and return date.
There are three types of users in this system. The first two are, Admin, and Librarian, the only
distinction between them is that Admin are allowed to see the preference and exclusion sets
of other users. It is the third type of user, the administrator, who is able to initially setup the
system, add new users, and set their authorization level.
Users: Most members will be of the type users. They also can see all the Admin members’
associates to this system. They also can get the Admin card facilitates.
Librarian: The next most common type of user is the authorized Librarian. These users have
the same permissions as the general member’s with the additional ability to view other
member’s preference and exclusion set. They are allowed to post events notice even they also
can post job circular for general Librarian’s. Also they have the permission to change their
profile.
Design and implementation constraints are those that we have used to implement this project
make successful. It also describes tool that enables developers and testers to view and interact
with the user interface (UI) elements of this application.
User interface (UI) is everything designed into a system view that which person’s associates
with this system may like the interface of this system.
For developing this system we will use PHP as a programming language. PHP (recursive
acronym for PHP: Hypertext Pre-processor) is a widely-used open source general-purpose
scripting language that is especially suited for web development and can be embedded into
HTML. PHP is a server scripting language, and a powerful tool for making dynamic and
interactive Web pages
The most common use of JavaScript is to add client-side behaviour to HTML pages, also
known as Dynamic HTML (DHTML). Scripts are embedded in or included from HTML
pages and interact with the Document Object Model (DOM) of the page.
jQuery is a JavaScript library. jQuery greatly simplifies JavaScript programming. jQuery UI
is a curated set of user interface interactions, effects, widgets, and themes built on top of the
jQuery JavaScript Library. Whether you're building highly interactive web applications or
you just need to add a date picker to a form control, jQuery UI is the perfect choice. jQuery
UI is built for designers and developers alike. We've designed all of our plug-ins to get you up
and running quickly while being flexible enough to evolve with your needs.
CSS is a language that describes the style of an HTML document. CSS describes how HTML
elements should be displayed. Build responsive, mobile-first projects on the web with the
world's most popular front-end component library.
Bootstrap is an open source toolkit for developing with HTML, CSS, and JS. Quickly
prototype your ideas or build your entire app with our Sass variables and mix INS, responsive
grid system, extensive prebuilt components, and powerful plug-ins built on jQuery.
The bootstrap code is included minified, which means that white spaces are removed to make
the file size smaller and therefore make the load time faster for the file which improves the
load time for the whole page. The main design that bootstraps ads without specifically adding
design to elements is that when hovering over a link. This is fixed with some simple CSS-
code added to the CSS-file, unless the bootstrap CSS-file is included after the original, then
bootstrap will override the custom ones and the changes will not be seen. Having some basic
knowledge about how Bootstrap works before starting to use it would increase the efficiency
and speed one might achieve the goal one has in mind for including bootstrap into the project.
Every business plan, campaign, or project comes down to Tactics, Tools, and Strategies. To
conceive, develop, and implement a sound social media marketing strategic plan that will be
successful needs to have those three critical components.
A Web server is a program that uses HTTP (Hypertext Transfer Protocol) to serve the files
that form Web pages to users, in response to their requests, which are forwarded by their
computers' HTTP clients. Dedicated computers and appliances may be referred to as Web
servers as well. We will use the Apache HTTP server to implement this project
We will use MySQL database server to store all of the information of this system. The reason
behind to choose the database server are given below:
● Security
● Reporting and Data Mining
● Replication
● Fault tolerance
● Performance diagnostics
The complete requirement specification based on the elicitation process is described in this
section.
FR-08 Messaging
Description All the registered alumni members can message to each other through
this system
Stakeholders Alumni members
FR-08 Messaging
Description All the registered alumni members can message to each other through
this system
Stakeholders Alumni members
3.2.1Performance Requirements
A requirement that specifies a performance characteristic that a system or system or system component
must possess; for example, speed, accuracy, frequency
The system is able to manage all the information of passed out students.
The system will almost ensure 0% crush in any single minor error and don’t give any wrong
calculation.
Supportability is the degree to which system design characteristics and planned logistics
resources meet system requirements. Supportability is the capability of a total system design
to support operations and readiness needs throughout the life-cycle of a system at an
affordable cost.
In order to understand the system's behaviour on a technical support required by the system
operator. The reason for reading them might be
● System malfunction has occurred and the system operator has to find the exact point
of time when this happened
● System produces wrong results and the developers must be able to reproduce the
data flow through the system
● Hacker tried to breach the system's security mechanisms and the system operator
must understand what he did
There are no access requirements beside those that have been outlined in the below:
● The software must validate all user input to ensure it does not exceed the size
specified for that type of input
● The server must authenticate every request accessing the restricted Web pages
● After authenticating the browser, the server must determine whether that browser is
authorized to access the requested restricted Web pages
● The system must have security controls to protect against denial-of-service attacks
● The system must encrypt sensitive data transmitted over the Internet between the
server and the browser
To get access to this system or a specific module the system must provide a central
authentication mechanism. In order to prevent anyone to exploit stolen all users password
must
To get access to the system, the system provides authorization/authentication way. This
system uses various modules.
To protect credentials of user from being stolen, all passwords are stored in encrypted form.
The Requirements significantly reduces the value of stolen user credentials, it’s not easy to
decrypt the password.
The system provides a protection of the database in the server. However, the system will have
to increment this level of protection because of the personal data mode available on the
system & the larger share of people that will be having access to it through the system’s
registration. The user’s privacy will be granted by the limited access that the log in process is
going to give to the database.
These Requirements define how to meet the physical and cognitive needs of the intended
users of your website or application
This section describes more requirements of DIU Alumni system to add more features in
future
We have 3 levels
User module: In the user module, user will check the availability of the books
⮚ Issue Book
⮚ Reserve book
⮚ Return book
⮚ Fine details
Library module
Register user
Book issue
To get access to this system or a specific module the system must provide a central
authentication mechanism. In order to prevent anyone to exploit stolen all users password
must be encrypted in hash process.
This Requirements focus on how the users will operate the system, including interfaces and
interoperability with other systems. The requirements establish how well and under what
conditions the system must perform.
There are no specific release requirements but in the project schedule section it was described
briefly.
These requirements consider any violence of rules and regulation and which rules should be
followed to maintain this system.
We hold interviews that can be performed one-on-one or with a small group of stakeholders.
They are an effective way to elicit requirements without taking too much stakeholder time
because we meet with people to discuss only the specific requirements that are important to
this system. Interviews are helpful to separately elicit requirements from members in
preparation for workshops where those member of this system come together to resolve any
conflicts.
We conduct a survey to collect requirements for this system. Questionnaires are a way to
survey large groups of users to determine what they need. Questionnaires are useful with any
large user population but are particularly helpful with distributed groups.
Validation ensures that the requirements are correct and demonstrate the desired quality that
you want from this system. Requirements that seem fine when you read them might turn out
to have ambiguities and gaps when to try to work with them.
Peer review of requirements, particularly the type of rigorous review called inspection, is one
of the highest-value software quality practices available. Assemble a small team of reviewers
who represent different perspectives and carefully examine the written requirements, analysis
models, and related information for defects.
We tests constitute an alternative view of the requirements. We also conduct writing tests
about how to tell if the expected functionality was correctly implemented. Derive tests from
the user requirements to document the expected behaviour of the product under specified
conditions.
To simulate the requirements commercial tools are available that we have used to simulate a
proposed system either in place of or to augment written requirements specifications.
Simulation takes prototyping to the next level.